Received: by 2002:ab2:710b:0:b0:1ef:a325:1205 with SMTP id z11csp582352lql; Mon, 11 Mar 2024 11:00:34 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXWmGetuzWcE4X+oOluCGXmusn/cSWJ8uvncTxpIQU0lAV9Dh3JZ9Y/ihzteOeYQ3ZvNpZvr1Knk7tdrInmcKBMU7g5n3nOsHmIm6ohfA== X-Google-Smtp-Source: AGHT+IG/4V4z8gDvsW40vDwG08Rz+4ngtc0xijsapn5h+Qt+fTziexyduKdF/IiinOE+Pk1cT7ch X-Received: by 2002:a17:906:a851:b0:a46:3826:a8f5 with SMTP id dx17-20020a170906a85100b00a463826a8f5mr846772ejb.38.1710180034049; Mon, 11 Mar 2024 11:00:34 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710180034; cv=pass; d=google.com; s=arc-20160816; b=WoDW3wc7Pr+BNXsTEVm6M7aso0h1O3OFHum1cEp8ktjTOIZBGd47jkiLDBvDdmgTfJ SAKx3YOGsX/xhNIbaH2qf9VwvVPk7+eBYRMWgzcSHn4n05jXgLR38l5skFTQdKiW2+Je tLVkzmI7rV3iIwH5PYVHo5Q3A8wND6U2yEJ0hHNfHWSFeUtixUE8zpuJsnfBOp+AYFGz sRxh1tVOj1IRQISbK3MEairFHC6nroAWC2TD87jUORCr1vsFWLhX65FYIgN+iSwaXQCD gyjIxWhIiJYl/dhPmmeenEfWwXAshqbsGf0yeQfxwdZEnxMK6FQoPX8NVs5cq1ETvNU3 59Lg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:sender:dkim-signature; bh=VwzG5Nm3k5sScApQNXJxPh63PgQB/wEWtXh54ZIc9U4=; fh=nOIZwocje0iPtFSSvp1bTdy/14lleSvNlPci4eY3GX8=; b=aaa5uidDOdsYtt+8vr8R3XpeNzrAYw3ElChJNWcyHA2/7bJZZmaqRIPE9mlO2SE4Vl 9Ndtrr8X7mERM/y04Na4F8WT26q9FoX2zZNKWufRGQoeJCLY6ETaqZW42EI8RpR5TkNo AgGXz2jnxSgqCsMOMliKVjNZXHnAHoJ4Iep5qMkFKYOpEIXEA3ok2ULZnX1/KWEn244S 1usuBIa3ImkMYcvoby5lA9ZF+LAUBQpDpH5eqB1oWQz49l+AGresP59IhNiiQU8w1ZE3 lKhemvAcxNJ4RK4TuLV3RAJsqMOUs6lnj747aJcbwITeQghL/RgKosnD/CUtIZLBoz0P +ZVw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=WyL2tVQD; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-99338-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-99338-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linux.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id ku14-20020a170907788e00b00a44ddfa4588si2621469ejc.95.2024.03.11.11.00.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Mar 2024 11:00:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-99338-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=WyL2tVQD; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-99338-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-99338-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linux.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 9A2041F22D40 for ; Mon, 11 Mar 2024 18:00:33 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1C89054BE8; Mon, 11 Mar 2024 18:00:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="WyL2tVQD" Received: from mail-pj1-f52.google.com (mail-pj1-f52.google.com [209.85.216.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4B767537E3; Mon, 11 Mar 2024 17:59:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.52 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710180001; cv=none; b=SfzUEy21WwUOg/R44JGpJf+LNyeUeFCEbDpXFja7pHcC118Ie3grjwgEkY8QY2r2JzpT6+Tf8V55EANDjfaOa0FfugCCoxVFbd/mfuGcoXOS8+EU5JfTzoPRtSmnoe0ZD7GgDarYyXs9BPrf4PhKVT67LC3cOTApay51MzKTLTo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710180001; c=relaxed/simple; bh=2c3lV2jTzoYOBHWiSD2R429XF1UT/AUT774OAIhD9X8=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=QcwXC5lyEoSZd5Maf3RdfscjqxkSQ/g1/N27L0f2D9mFUVtV2MEjVF7usR7aCJKTS0T4IKE55VW951XCBf7xTWtzYzLCnv0x4/wlYFzs9acsMbdnEqmY41f8vCTUNX0+DSXmghm3rwYoSJd0v0jh70+Tpt0PD7bEQ/MqBbQY6Hg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=WyL2tVQD; arc=none smtp.client-ip=209.85.216.52 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-pj1-f52.google.com with SMTP id 98e67ed59e1d1-29bd4dfbf56so1228973a91.3; Mon, 11 Mar 2024 10:59:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1710179998; x=1710784798; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:sender:from:to:cc:subject:date:message-id :reply-to; bh=VwzG5Nm3k5sScApQNXJxPh63PgQB/wEWtXh54ZIc9U4=; b=WyL2tVQDdnLp2RXaf9XmW3L95i8laY0WpA1CdpZc57wlJCJSiXFZPyKdR620TgqGPS tWMXcm8klEg2eDW7dxeA2BOSdKdFgHZvL17t8CpUqmvCov5fu//whn/92vmjwHQSV2d6 yO6jTnwShrbycRXcGiJbe4WVm3OfrflxWg/pMH57cdA8tIWcLGbj/KXhNkm2/qgVLNiw uvN2IQqN5Qdl5yQQDfq+TbaNgJ0GPtdlAsMTKm1RCqyRdvi9FTWaCS0gb7dpWMRNGXvC McYqnpGzNz5hy5TVFElA9VDtvkBvmnoHNVmEQed/JGtvn8kViLHSmiPuMUEDRd5RBJyp LlQA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710179998; x=1710784798; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:sender:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=VwzG5Nm3k5sScApQNXJxPh63PgQB/wEWtXh54ZIc9U4=; b=I2XNp68b7/GznZyVXjTAZ5eq99FQFfMqhiz+P9qBXzN3/qdrJ2TM3xpQajsMDt+pdT d86BwwgCaBI2f1OqP8spbAu+Rg91Zw81OfApDin5QIAskc/5b0gFooW5b3WH8q00VytC zymrqlUN9ESkCvp22dwwDmL3MSTE2Q8odmxQIvyoV5sR/UX4klV6BKWTvTPM9kgJ1tJc cLpctmMar/sq+MEYrSyLcneb6FniR3bjxfDMzbd6zEaj/RCuixa2g+wJqLRKlPjjQYrW nIbQu63ifyfJGK3RQqDgSd5+hhg5iFSkk94QfMuPVOnE6zKUb0oUeSe/keSg8JvnIJM7 ghLA== X-Forwarded-Encrypted: i=1; AJvYcCUlCkUh8Bx/MAYKrzXcLKJvpGc48FfCla9vA4DMgYqTtVwoFUlNtUw+MpamY5eOtY/z/wQxSQL52yAKyrNnnRCInvAf4VjGRf5Ip2E/J+uf8bbo8XYlrM5ynOM+4MCO8tEFgKK+u1Id X-Gm-Message-State: AOJu0YzcZhE1/GX/NZPh62ft1Us+RsrEndVGE8WkZPCUkdREaQypdE/o bT9qbs9zJoO66cOSO8jdMVvLG84ZQWunpjn0FRmLLZCFeIPUrcpR X-Received: by 2002:a17:90a:df82:b0:299:4269:b8c9 with SMTP id p2-20020a17090adf8200b002994269b8c9mr5500216pjv.26.1710179998530; Mon, 11 Mar 2024 10:59:58 -0700 (PDT) Received: from gmail.com ([205.251.233.182]) by smtp.gmail.com with ESMTPSA id z24-20020a17090ab11800b0029bacd0f271sm5952429pjq.31.2024.03.11.10.59.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Mar 2024 10:59:56 -0700 (PDT) Sender: Matt Wilson Received: by gmail.com (sSMTP sendmail emulation); Mon, 11 Mar 2024 10:59:54 -0700 Date: Mon, 11 Mar 2024 10:59:54 -0700 From: Matt Wilson To: Vegard Nossum Cc: Jonathan Corbet , cve@kernel.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, security@kernel.org, Kees Cook , Konstantin Ryabitsev , Krzysztof Kozlowski , Lukas Bulwahn , Sasha Levin , Lee Jones , Pavel Machek , John Haxby , Marcus Meissner , Vlastimil Babka , Roxana Bradescu , Solar Designer , Matt Wilson , Matt Wilson Subject: Re: [RFC PATCH 2/2] doc: distros: new document about assessing security vulnerabilities Message-ID: References: <20240311150054.2945210-1-vegard.nossum@oracle.com> <20240311150054.2945210-2-vegard.nossum@oracle.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240311150054.2945210-2-vegard.nossum@oracle.com> On Mon, Mar 11, 2024 at 04:00:54PM +0100, Vegard Nossum wrote: > On February 13, kernel.org became a CVE Numbering Authority (CNA): > > https://www.cve.org/Media/News/item/news/2024/02/13/kernel-org-Added-as-CNA > > The kernel.org CNA/CVE team does not provide any kind of assessment of > the allocated CVEs or patches. However, this is something that many > distributions want and need. > > Provide a new document that can be used as a guide when assessing > vulnerabilities. The hope is to have a common point of reference that > can standardize or harmonize the process and hopefully enable more > cross-distribution collaboration when it comes to assessing bugfixes. > > We deliberately emphasize the difficulty of assessing security impact > in the wide variety of configurations and deployments. > > Since what most distros probably ultimately want is a type of CVSS score, > the guide is written with that in mind. CVSS provides its own "contextual" > modifiers, but these are not accurate or nuanced enough to capture the > wide variety of kernel configurations and deployments. We therefore focus > on practical evaluation under different sets of assumptions. (sending from my msw@linux.com account to emphasize that I am speaking only for myself, not my current employer.) I'm not sure that Linux distributions particularly *want* a CVSS base score for kernel CVEs. It is something that downstream _users_ of software have come to expect, especially those that operate under compliance regimes that suggest or require the use of CVSS in an enterprise's vulnerability management function. Those compliance regimes often suggest using CVSS scores as found in the NVD in search of an objective third party assessment of a vulnerability. Unfortunately the text of these regulations suggests that the base scores generated by the CVSS system, and found in the NVD, are a measure of "risk" rather than a contextless measure of "impact". There have been occurrences where a CVSSv3.1 score produced by a vendor of software are ignored when the score in the NVD is higher (often 9.8 due to NIST's standard practice in producing CVSS scores from "Incomplete Data" [1]). I don't know that harmonizing the practice of producing CVSSv3.1 base scores across Linux vendors will address the problem unless scores that are made available in the NVD match. But, stepping back for a moment I want to make sure that we are putting energy into a system that is fit for the Linux community's needs. CVSS lacks a strong scientific and statistical basis as an information capture and conveyance system. A study of the distribution of CVSSv3.1 base scores historically generated [2] shows that while the system was designed to resemble a normal distribution, in practice it is anything but. A guide that helps a practitioner evaluate the legitimate risks that may be present in a given version, configuration, and use case for the Linux kernel could be a very helpful thing. This guide is an excellent start for one! But as you rightly call out, CVSS is not a system that has an ability to capture all the nuance and context of software the likes of the Linux kernel, therefore the focus should be on practical evaluation under common use cases. > Create a new top-level (admittedly rather thin) "book" for information > for distros and place the document there as this document is not meant > for either developers or users. > > See the rendered document at: > > https://vegard.github.io/linux/2024-03-11/security-assessment.html [...] > + > +CVEs and CVSS scores for the kernel > +=================================== > + > +CVSS (`Common Vulnerability Scoring System `_) > +is an open standard for vulnerability scoring and the system which is > +commonly used by Linux distributions and various industry and government > +bodies. > + > +We won't go into the details of CVSS here, except to give a guide on how > +it could be applied most effectively in the context of the kernel. If the guide has something to say about CVSS, I (speaking only for myself) would like for it to call out the hazards that the system presents. I am not convinced that CVSS can be applied effectively in the context of the kernel, and would rather this section call out all the reasons why it's a fool's errand to try. --msw [1] https://nvd.nist.gov/vuln-metrics/cvss [2] https://theoryof.predictable.software/articles/a-closer-look-at-cvss-scores/#the-distribution-of-actual-scores