Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp482098lqb; Fri, 24 May 2024 04:47:10 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCV3nVZiZQdqcqK41Tt1x+Hjp+qjzu6/VAi2pWhw9puk9Ggrwzet1d7YgI2s1OnoNUJGOZF6Kel53MTMrEXoNx+eKa4i5DXkcs9EQEk67w== X-Google-Smtp-Source: AGHT+IGfE9Y2Z4sLjSc5pwMNmkeIkcw1zD6oMrBNixeFD2XzD3lLPdAIMAJ2GwIc5IZokSCoPHuO X-Received: by 2002:a17:902:d492:b0:1ea:9585:a1d7 with SMTP id d9443c01a7336-1f44873dd8cmr24556375ad.37.1716551230516; Fri, 24 May 2024 04:47:10 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716551230; cv=pass; d=google.com; s=arc-20160816; b=oDQKipUBJ0ANv9KahJTO361vnEAbvPOUFc71osh6LrDSMIq11TlPJ8xeZftW57k2L9 ErELcSV9URLoK9FD1XXcPX0AkfC0vWSxPraRmU2XThrTr7u81UERTKrasTC+AtDQr43g 8140i3ezth1u/hQbeSvX2Fh4u2Slu43j2xqm33Z9Tzn4OYvrc5+Iby7bNjEh4KNQHHC6 PrnaGqyR+M7SfBvGNXo3byi1FF6uW5p3eb5UlRUXA3njHWg97GbH7jrYVtONeFlXYSEw 0yhkpDiYx/LKyyI2fU6YqIg6pSi8kk+aNbWyf6sgUWVilons28t8mPqw7W7pqgWsYuFq KCpQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=MF5ijsBwmhZTmALmOrWGlxnvCBJ9HuLtJ6/vNoL3hac=; fh=xU08tGyWF1PlgDySLd9A8nO6V71N1+ypYro/ApiXA3U=; b=bP5A78qR206dWLTRw4i2lhkyWLD+EBKtDAGHFFOjalJOuaLfoiiMP+CVxVptrPlzhN pOcGhGcy/5bEUKuvTKcsQ4vzPseL/tpkV6zdeXE1WRCXzfry6hOfXf3j/MtXC5aZXynS xV/25f6xbymJiUru9cQw6En1vObJ3V/8sB3oWdk/yrNJKUSOoGeKtXnbubAJysYrwCPJ xPS0YKJ02VqFR0FuyiJo3yXHpKT2es7ySDlYZ+oDbsMGzEPE9nyx0FCnQ0qMqBDtOKjC Yk8ke+Xsq1iY84o527pyovy4Jqk+tAdigWUnTYBBdgwX3XB9+ee6ikXA1/01yrEcLStA Dk7A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=InS41C++; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-188653-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-188653-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id d9443c01a7336-1f44c9b881asi12889445ad.459.2024.05.24.04.47.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 May 2024 04:47:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-188653-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=InS41C++; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-188653-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-188653-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 2A692282228 for ; Fri, 24 May 2024 11:47:10 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id ABEC386251; Fri, 24 May 2024 11:47:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="InS41C++" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9E03A85640; Fri, 24 May 2024 11:47:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716551223; cv=none; b=ozSGTj9QdXJevMacWOdCHp4AHB6OL1MNJ8/xGchUHCz9HdNJbNuhDJEjJgbz2FXGwsNH/A4Db6IftRxfbupoKebPbm0EL/6FJ5h8Vx1QFd9kMfAk7yZJGWzZPvMBhKrIFk5XnRcOIMpXEGz3lxZq0INk582XJygK/fOZF6jbMHw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716551223; c=relaxed/simple; bh=JpuU8lZO9Lj61ZyzRAc21/U7aehfqnVfemYlR7Llv6E=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=XnlC5s324MecScJuPnvsFNpFVUQUpjefLAqzLoRd2xvzrO+HCp2qLokmdIdYPjAWOBn2KgwVJFIbGJ3NSf5VfX5ii0MPpz5vCWvrBAY0ZgQ6f46xU7dvPyJsAgN5Ii1+3NgNWy8wETQwISlFD/no3WBko6i2OCB9o2dElGiNspQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=InS41C++; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id CCF4FC2BBFC; Fri, 24 May 2024 11:47:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1716551223; bh=JpuU8lZO9Lj61ZyzRAc21/U7aehfqnVfemYlR7Llv6E=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=InS41C++hlq0xqUEiSCu0NHF5SAuHHc4pieLDq1F4ofqzD9Xf7sAGrT0nJEJl10Th DBKgjzuKvr5reIu4UTMKc2t5yEBNp71WfpC0WUOlKEP7IOQiHD0iwJ8QUeiy0WYi4F IS6nggAKu3jztxrBeHVwgcIsD/Asw5jr0ArWjhOM= Date: Fri, 24 May 2024 13:47:00 +0200 From: Greg Kroah-Hartman To: Michal Hocko Cc: cve@kernel.org, linux-kernel@vger.kernel.org, linux-cve-announce@vger.kernel.org Subject: Re: CVE-2024-35906: drm/amd/display: Send DTBCLK disable message on first commit Message-ID: <2024052458-matrimony-making-b7f1@gregkh> References: <2024051954-CVE-2024-35906-1c6f@gregkh> <2024052136-cubbyhole-ecologist-5b68@gregkh> <2024052110-grasp-liking-22c0@gregkh> <2024052243-napping-coastal-3306@gregkh> <2024052309-scabby-favored-0973@gregkh> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Fri, May 24, 2024 at 12:10:56PM +0200, Michal Hocko wrote: > On Thu 23-05-24 15:49:59, Greg KH wrote: > > On Thu, May 23, 2024 at 10:26:56AM +0200, Michal Hocko wrote: > > > On Wed 22-05-24 05:57:38, Greg KH wrote: > [...] > > Because of asking, many others are starting to help out, you can too, > > just submit patches against the cve/review/proposed/ directory with a > > list of commits that you feel should have CVEs assigned for, or annotate > > why you feel specific ones we have reviewed should NOT have a CVE > > assigned, and our tools can handle them quite well as part of the > > assignment process (see scripts/cve_review for a tool that some of us > > use to create these files, that's not required, as not all of us use it, > > but the output format is the key, and that's a simple list of commit > > ids, personally I generate that from mboxes.) > > Do I get it right that proposals shouldn't be sent via email to > cve@kernel.org as suggested by the in tree documentation? The documentation should say that you _SHOULD_ send proposals to cve@kernel.org, did we get it wrong somehow? > I do not mind > the specific workflow but until now I have followed Documentation/process/cve.rst > as authoritative source of the process. It would be really great if that > matched the workflow. I'm confused as to what in that document is incorrect, care to point it out? > > > If you really want to build a trust around the CVE process then make it > > > more transparent. I would start by adding reason why something has been > > > marked CVE. You are saying there is peer review process going on then > > > why not add Reviewed-by: to make it explicit and visible. > > > > We have that, see the git log of the cve/review/ directory for the files > > and where most all of the cves come from. Some come directly from > > requests by others to us, and a few other places (i.e. security > > reports), so we of course can't document the source of everything for > > obvious reasons. > > Thanks for pointing me there but I do not think this is what I've had in > mind. I do understand that there is some pattern matching happening to > select most of the candidates, but as you've said this is then reviewed > and during that review you likely need to read through that changelog > and build some sort of statement why this is considered a security > threat. Right now for the 3 people doing all of the reviews, 1 is using pattern matching of a sort (see the cve_review tool for the big regex and workflow used there), one is reading each patch/header in mbox format, and one is using some other tool. Then for the ones that we disagree on (i.e. not a score of 2 out of 3), we comment as to why we feel they should, or should not, be accepted. As this process is evolving, we haven't really documented it, except here and in talks with others as we travel. We're working on making that more public over time. Note, I do not know of any other CNA that does this in public as much as we are already, we are pushing the boundry of what CNAs are doing pretty hard here by putting almost all of our reviews in public _before_ a CVE is assigned. That's not normal, and hopefully we don't get told to stop that (sshhh, don't tell anyone...) > I believe exactly _this_ would be a much more valuable information in > the CVE announcement than a copy&past of the changelog which on its own > can be trially referenced by a link. Also if there is a peer review > happening then Reviewed-by would be really nice. Not to mention > Reported-by if this was externally reported (the report could be a part > of the announcement as well). We can't do a "Reported-by:" for CVEs as we aren't allowed to add personal information like that to the records as per cve.org's rules. And people want to word-smith the text all the time already, so we just default to using the changelog text as that's the most "neutral" and public information out there (i.e. we don't have to worry about any sort of data-retention or classification laws as the information is already public in kernel changelog text.) Same for "reviewed-by:" we don't want to do that, as again, no personal information can be added to cve records, but as we are putting our reviews in a public repo, you can work backwards if you are curious from there. And again, others are sending us reviews as well, you can see them in the repo already. Hopefully more will do the same as time goes by, and we have a steady stream of developers at various companies sending us requests as well just through email and we handle them that way. We do have one CVE right now that does want the text changed, and we are working on making that possible (by accepting patches to the text) as the changelog text was incorrect and called out an incorrect device as being a problem when it was not. But that's an outlier and we will handle that on a case-by-case basis. thanks, greg k-h