Received: by 2002:ab2:7855:0:b0:1f9:5764:f03e with SMTP id m21csp1011816lqp; Thu, 23 May 2024 06:50:09 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVbO/mNyXvibpajXUMAcKG4jWIC3IhOdA8D0vKI4AX5Xb3CIJK4NAP1ld8y06DKKBqyo13V6kPhSDy60Vl477obL98Zz11E2yHqRxWeQQ== X-Google-Smtp-Source: AGHT+IFWBvrzdg9HbCUpiZQ+qsU9FPVzdBzs63922eVzs6XkZ5ocwrEJcr05R6QbZ69YpjzLHKoC X-Received: by 2002:a17:90a:178e:b0:2bd:e874:f169 with SMTP id 98e67ed59e1d1-2bde874f1c7mr1580127a91.29.1716472209553; Thu, 23 May 2024 06:50:09 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716472209; cv=pass; d=google.com; s=arc-20160816; b=iLiL9OwGRDCtkWHCt3rdcllt35AfwzOars27Y8909wXSj2xXD1bDREzFrUsRochDcU x6TggP/r1bndovoQFYpB66s6kXeM5/uFMECac70wPbbS+aiNjpc8IzQibiJOH3i0c0Hd c3O0WBq88OvPYLav8Cpri0sVgmhrpWQwSsAI3RO/BGUQGEVf6dytFBbfAle8ziEoP02d NirEoXHngUBdokytyi5wEFziAy1d+8LyMhIZL38egU8dgeiO8Fci79XMddMgErd4686Z tMnzaRjcwHq0e2d1UIYnzJZYlIjQ6NVeJNVJ+6wegd3s9srXDpLdNoRqHSvB9Bl6YCHO I6+g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=0TKYeGlvzvdqtWvuD++Z/wQlZDYtb/FPSBCCSj4UAZM=; fh=xU08tGyWF1PlgDySLd9A8nO6V71N1+ypYro/ApiXA3U=; b=vgDOSN2x5e4lhvwk3GIX+YNkXFs62nyT4PWk1CqtS72Nuij1UthOuq7HCQsOb+6YMK 3PhIEYyRGbOw5hU482rMD5ZexgdXVt9oyCxw41SOtRmUr+MSHGjHCi1FtzjL4Aj/W84f WtQSSTfpy8hFAd5x9Z15ZpDrLwRlRpae25UA/PEJECQLIXyMNBOgs6S6AVSWjtzrd02c Mv0DTQ12ycAqOynDKABJJB/377k5kaVfS72rPMM3jHuAH/wZ53lQWyf6R4g1sAIa4gNq /NSM3Po6NnmXzB++E+C7tknvQ1NMQu9NnFYcWobBNeuldoLFnzgdsmoRTO2ey/u7gBl9 yU7Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pRr41XoO; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-187595-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-187595-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id 98e67ed59e1d1-2bdd9ed36d8si946696a91.35.2024.05.23.06.50.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 May 2024 06:50:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-187595-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pRr41XoO; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-187595-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-187595-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 2A3462852C7 for ; Thu, 23 May 2024 13:50:09 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id D56AE14A623; Thu, 23 May 2024 13:50:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="pRr41XoO" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E76EB1E520; Thu, 23 May 2024 13:50:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716472203; cv=none; b=SQo7ZxZqPQi0XYH2m/C13n5z5VAE4Jt1Ohacw74JSs8nYFwZXWn1mXKJ1ZmGO1bqYkEtSWTCZaFddamu4xbXtBLQLtkkD9o4qZS89PL9sdthKHe2HhTGdn4Q/g4G3/5KAow6xIrV2oYX4NdqZpdKgT0yOxyRL/35F8UByQ/24V8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716472203; c=relaxed/simple; bh=p4SE2t2t9xproHJFHx8jIsBOYFhu7L96mr6qTM2GP0I=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=SZyr8GZoj1h33sd4fEBY20nWTVb6bDMmovpUBSoChv+yh2QFk6gCg3E9LbEHrpERBooB1UkzTwjJuSKqY8jDPhxelKtFWkNFfux0y6JA/zJzZoX/7v94GJyBX5BiAaSJ9i+8lnG4PGQT0VYUZj0fljMcPAuiR+mRLVrrl7m/ks0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=pRr41XoO; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id E03C3C2BD10; Thu, 23 May 2024 13:50:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1716472202; bh=p4SE2t2t9xproHJFHx8jIsBOYFhu7L96mr6qTM2GP0I=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=pRr41XoOZ1avtvfDkIXUjviT2jhrcwY4hhtNjzbGpE+lTr7NrkNu+hv+p0F2zLeNw iKR/Hq3hZ5Kg7KFL/eiBC9UzalW73EmRcKelaxBe9BPlAUUgEKKCLXlZSWLTfQBDfw Q8TUJzbDdaYGyMyBnkH4xo4J0X/WceJAtYIuDc6E= Date: Thu, 23 May 2024 15:49:59 +0200 From: Greg Kroah-Hartman To: Michal Hocko Cc: cve@kernel.org, linux-kernel@vger.kernel.org, linux-cve-announce@vger.kernel.org Subject: Re: CVE-2024-35906: drm/amd/display: Send DTBCLK disable message on first commit Message-ID: <2024052309-scabby-favored-0973@gregkh> References: <2024051954-CVE-2024-35906-1c6f@gregkh> <2024052136-cubbyhole-ecologist-5b68@gregkh> <2024052110-grasp-liking-22c0@gregkh> <2024052243-napping-coastal-3306@gregkh> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Thu, May 23, 2024 at 10:26:56AM +0200, Michal Hocko wrote: > On Wed 22-05-24 05:57:38, Greg KH wrote: > [...] > > > I completely do get why you do not care about that downstream > > > engineering cost but generating bogus CVEs on top of a huge pile of > > > dubious ones is less than useful, don't you think? > > > > How is this a "bogus" CVE on their own? > > I suspect you haven't looked at those commits. This is a boot time > suboptimal HW configuration. There is no way any user can exploit that I > can see. Not to mention it cases system boot hangs! Yes, you are correct, the original should not have had a CVE assigned to it, that was wrong, and I have rejected it now. Same for the revert, it too is now rejected. Thanks for the review, it is much appreciated. Also, the reason the original had a cve assigned to it was a fault on my side, that shouldn't have happened, and I've re-reviewed to make sure that I didn't mark anything else that way as well (so far I have not found anything, the 'revert' caused problems in our tools, not to blame them, but me, the author of that tool...) > [...] > > > Seriously, we can disagree whether something is a security threat that > > > is worth marking by a CVE. But making the CVE generation process mostly > > > unattended script driven process without any _serious_ review in place > > > is burning a lot of man power that could be used in a much more > > > productive way. This is not the way how to convince people to use stable > > > kernels. > > > > To think that any of this is an "unattended script without any _serious_ > > review" is slandering all of the people who put in their free time to do > > this work for you and the community. This is ANYTHING BUT an unattended > > script. > > This is a perception one can easily draw by watching the stream of > incoming flow. Sorry if that is not the case but there is about zero > transparency about the process except for Documentation/process/cve.rst > and let me quote > " > As part of the normal stable release process, kernel changes that are > potentially security issues are identified by the developers responsible > for CVE number assignments and have CVE numbers automatically assigned > to them. > " > > There is no mention about criteria, review process. Who is involve in > the assignment and who is doing the review. The vulns.git tree doesn't > contain Sign-off-by of those involved parties except for the submitter. The "criteria" is that as described by cve.org, we can't do anything about that. The process, yes, we can be more open about that but as it has been evolving over time, it's hard to describe a moving target at times. I know Lee is writing up an article about how this all works, and I'm going to be giving talks at conferences in a few months as well. And people also just ask us directly, which you can :) Because of asking, many others are starting to help out, you can too, just submit patches against the cve/review/proposed/ directory with a list of commits that you feel should have CVEs assigned for, or annotate why you feel specific ones we have reviewed should NOT have a CVE assigned, and our tools can handle them quite well as part of the assignment process (see scripts/cve_review for a tool that some of us use to create these files, that's not required, as not all of us use it, but the output format is the key, and that's a simple list of commit ids, personally I generate that from mboxes.) > > Also, this is work ostensibly that you are also already doing for your > > day-job, right? > > We, like stable trees, rely on Fixes tag and those (including other > commits that might be this tag) are reviewed by domain experts. Great, so you already have reviewed all of these, so it should be a simple match up on your end. > I have raised a concern based on observed CVE flow that the current > process is automated without a proper review as I can see very dubious > CVEs being assigned (splats resembling oops/warnings coming from lockdep, > data_race fixes as they resemble race condition fixes, READ_ONCE fixes > which do not fix anything discussed in other thread and others). It's a learning process for all of us involved, and I thank you for your reviews to help make this better. > I have tried to dispute quite some but quickly learned that many of them > have been dismissed because "no usecases are assumed". It is a very > broad category that could indeed make any fix a CVE. We can't assume usecases, sorry, you know that. And yes, it does make it such that many broad categories can get a CVE, which is just part of the "business" when working at this low level in the stack. > If you really want to build a trust around the CVE process then make it > more transparent. I would start by adding reason why something has been > marked CVE. You are saying there is peer review process going on then > why not add Reviewed-by: to make it explicit and visible. We have that, see the git log of the cve/review/ directory for the files and where most all of the cves come from. Some come directly from requests by others to us, and a few other places (i.e. security reports), so we of course can't document the source of everything for obvious reasons. But always feel free to ask if you think something looks "odd" and we'll do the best that we can to answer it. thanks, greg k-h