Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756118AbYGVAw3 (ORCPT ); Mon, 21 Jul 2008 20:52:29 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751680AbYGVAwV (ORCPT ); Mon, 21 Jul 2008 20:52:21 -0400 Received: from usmail2.us.checkpoint.com ([216.200.240.146]:44554 "EHLO us.checkpoint.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751308AbYGVAwU (ORCPT ); Mon, 21 Jul 2008 20:52:20 -0400 Message-ID: <48852E4D.3050405@la.checkpoint.com> Date: Mon, 21 Jul 2008 21:48:13 -0300 From: "Rodrigo Rubira Branco (BSDaemon)" Reply-To: rbranco@la.checkpoint.com Organization: Check Point User-Agent: Thunderbird 2.0.0.14 (Windows/20080421) MIME-Version: 1.0 To: Alan Cox CC: Greg KH , linux-kernel@vger.kernel.org, stable@kernel.org, greg@kroah.com, "'Justin Forbes'" , "'Zwane Mwaikambo'" , "'Theodore Ts'o'" , "'Randy Dunlap'" , "'Dave Jones'" , "'Chuck Wolber'" , "'Chris Wedgwood'" , "'Michael Krufky'" , "'Chuck Ebbert'" , "'Domenico Andreoli'" , "'Willy Tarreau'" , torvalds@linux-foundation.org, akpm@linux-foundation.org, alan@lxorguk.ukuu.org.uk, caglar@pardus.org.tr, casey@schaufler-ca.com, spender@grsecurity.net, pageexec@freemail.hu, rodrigo@kernelhacking.com Subject: Re: [stable] Linux 2.6.25.10 (resume) References: <20080701151057.930340322@mini.kroah.org> <200807021257.47593.caglar@pardus.org.tr> <20080702144149.GA16850@suse.de> <200807021809.07679.caglar@pardus.org.tr> <005001c8e6f8$ac0955f0$a6181fac@ad.checkpoint.com> <20080716044905.GA9033@suse.de> <4880A3B1.3050103@la.checkpoint.com> <20080719101140.GB20802@devserv.devel.redhat.com> In-Reply-To: <20080719101140.GB20802@devserv.devel.redhat.com> Content-Type: multipart/mixed; boundary="------------050603020507090205080609" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5015 Lines: 105 This is a multi-part message in MIME format. --------------050603020507090205080609 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Alan Cox escreveu: >> @@ -1,7 +1,7 @@ >> -Linux kernel developers take security very seriously. As such, we'd >> -like to know when a security bug is found so that it can be fixed and >> -disclosed as quickly as possible. Please report security bugs to the >> -Linux kernel security team. >> +Linux kernel developers take security very seriously, in exactly the >> +same way we do with any other bugs. As such, we'd like to know when >> +a security bug is found so that it can be fixed as soon as possible. >> +Please report security bugs to the Linux kernel security team. >> > > NAK this. If the fix is not clear and the bug not too serious it is better > to disclose it than fail to fix it. The security team does not usually fix the > bugs, the experts in the various bits of code do. > ACK ;) Changed the sentence. Tks. >> -Any exploit code is very helpful and will not be released without >> -consent from the reporter unless it has already been made public. >> +Any exploit code is very helpful and will not be released. >> > > NAK this too. If someone releases an exploit publically or it leaks we > want to be able to freely share it too. Your proposal would mean any but > those dumb enough to agree to this could share it. That is why the unless made > public is part of every generic NDA document on the planet. > Agreed. Changed the sentence. Tks. > The rest needs Linus to return from holiday for discussion and that'll > be a week or two. In the meantime you might want to define "disclose" as > I don't think we all agree on what it means as you've not defined who is and > isn't the linux security team and/or its helpers. Cool. --------------050603020507090205080609 Content-Type: text/plain; name="SecurityBugs.patch" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="SecurityBugs.patch" --- SecurityBugs.orig 2008-07-16 23:46:09.000000000 -0300 +++ SecurityBugs 2008-07-21 07:28:01.000000000 -0300 @@ -1,7 +1,9 @@ -Linux kernel developers take security very seriously. As such, we'd -like to know when a security bug is found so that it can be fixed and -disclosed as quickly as possible. Please report security bugs to the -Linux kernel security team. +Linux kernel developers take security very seriously, in exactly the +same way we do with any other bugs. As such, we'd like to know when +a security bug is found so that it can be fixed as soon as possible by +the experts in this portion of the kernel code. + +Please report security bugs to the Linux kernel security team. 1) Contact @@ -14,23 +16,26 @@ As it is with any bug, the more information provided the easier it will be to diagnose and fix. Please review the procedure outlined in REPORTING-BUGS if you are unclear about what information is helpful. -Any exploit code is very helpful and will not be released without -consent from the reporter unless it has already been made public. +Any exploit code is very helpful and will not be released by our team +unless already made public. The exploit code may be shared with third +parties to facilitate a fix or to verify the vulnerability. 2) Disclosure The goal of the Linux kernel security team is to work with the bug submitter to bug resolution as well as disclosure. We prefer -to fully disclose the bug as soon as possible. It is reasonable to +to not disclose the bug, since we believe any kind of bug deserves the +same attention and will be quickly patched. It is reasonable to delay disclosure when the bug or the fix is not yet fully understood, the solution is not well-tested or for vendor coordination. However, we expect these delays to be short, measurable in days, not weeks or months. A disclosure date is negotiated by the security team working with the -bug submitter as well as vendors. However, the kernel security team -holds the final say when setting a disclosure date. The timeframe for -disclosure is from immediate (esp. if it's already publically known) -to a few weeks. As a basic default policy, we expect report date to -disclosure date to be on the order of 7 days. +bug submitter as well as vendors if the submitter wants to disclose. +However, the kernel security team holds the final say when setting a +disclosure date. The timeframe for disclousure is from immediate (esp. if +it's already publically known) to a few weeks. As a basic default policy, +we expect report date to disclosure (if the submitter requires disclosure) +to be on the order of 7 days. 3) Non-disclosure agreements --------------050603020507090205080609-- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/