Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp3026270ybh; Mon, 5 Aug 2019 10:39:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqzSIT8tIdnekWa9T1WhLAdQ+TFUulGB8C/G9T+FjA4uq4rGvTlzx2Lz4/U4X1Uc8foTmX56 X-Received: by 2002:a63:3d4f:: with SMTP id k76mr14189342pga.345.1565026773079; Mon, 05 Aug 2019 10:39:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565026773; cv=none; d=google.com; s=arc-20160816; b=NYWNG04LCEf8mUO1G3g84l7zppa3Wx8F+NzmfP5hcMh6H7sdOzgjHAg67qQoCyAX1V 0NVdOmXlyovn1/rb3yUI5kCmzqFVxqQv516trVze3Pg1Kc1jI7BGfEz9LI15+lUlM4FD U4s75PRbg6DESHnJNsW0/Yqc7bLXbp8DIMCm7U2goW8Ax++0TTW8fWtjqPVaCnWKr0cT EP2f/zFacy0nORM1YPv/tkKOoGJ92eogY/vyQLZimU/l5ghwsowHcDpnnImBrkT4i9rx ujoyjaVAhKdnCMgOb8jwRwGG/EaB2/ysHDdtubuk6nzR44hLFtjHxnF9dvbcZxf4Q4z7 OEpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:content-transfer-encoding :mime-version:cc:to:rt-originator:managed-by:rt-ticket:message-id :references:in-reply-to:reply-to:subject:from; bh=ZylAAVHVZYDbABi1CyqU8lWiTc29WrANKpZTfjefWas=; b=DEgRdPKYame934NE5a+aNo80Yl37WDWz9SIOlD8/itJ7fheZvQnTWScywb2eGdOHvF SHVOTN+DyxGp17FKl3UGMNNuWa/2B3NRfjyUB+M+3NRtzkNZtiqkBO/A5yX9DHsaR9zK Sgo1BG/upOgDCKh1swbJ/S08cxgRT4TytI19PgNl9o5+ssbCHHio+EgD2tI47VZzubPo Od+Kg8xWNaczIcjBG6TdOdUpccMdKW4Teb+ID6rRIsJtZo29akU6xdMltpePgNUpVfZT uGV342Wh7WfRY5xLIz9W3lNWbTEKtkvBn5X36533Z5niMKuQ8L/3qlYGtvJG7ZaPiwSJ ONNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q19si45069446pgg.521.2019.08.05.10.39.09; Mon, 05 Aug 2019 10:39:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728518AbfHERjJ (ORCPT + 99 others); Mon, 5 Aug 2019 13:39:09 -0400 Received: from mx1.redhat.com ([209.132.183.28]:51470 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726779AbfHERjI (ORCPT ); Mon, 5 Aug 2019 13:39:08 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 74DB8C056807; Mon, 5 Aug 2019 17:39:06 +0000 (UTC) Received: from rt4.app.eng.rdu2.redhat.com (rt4.app.eng.rdu2.redhat.com [10.10.161.56]) by smtp.corp.redhat.com (Postfix) with ESMTPS id D7C3E5DA60; Mon, 5 Aug 2019 17:39:01 +0000 (UTC) Received: from rt4.app.eng.rdu2.redhat.com (localhost [127.0.0.1]) by rt4.app.eng.rdu2.redhat.com (8.14.4/8.14.4) with ESMTP id x75Hd0BJ023399; Mon, 5 Aug 2019 13:39:00 -0400 Received: (from apache@localhost) by rt4.app.eng.rdu2.redhat.com (8.14.4/8.14.4/Submit) id x75Hcnwa023396; Mon, 5 Aug 2019 13:38:49 -0400 From: Red Hat Product Security X-PGP-Public-Key: https://www.redhat.com/security/650d5882.txt Subject: [engineering.redhat.com #494100] Question on submitting patch for a security bug Reply-To: secalert@redhat.com In-Reply-To: References: Message-ID: X-RT-Loop-Prevention: engineering.redhat.com RT-Ticket: engineering.redhat.com #494100 Managed-BY: RT 4.0.13 (http://www.bestpractical.com/rt/) RT-Originator: pjp@redhat.com To: b.zolnierkie@samsung.com, bob.liu@oracle.com, chuck.lever@oracle.com, davem@davemloft.net, emamd001@umn.edu, gregkh@linuxfoundation.org, kubakici@wp.pl, kvalo@codeaurora.org, navid.emamdoost@gmail.com, sam@ravnborg.org CC: airlied@linux.ie, alexandre.belloni@bootlin.com, alexandre.torgue@st.com, allison@lohutok.net, andriy.shevchenko@linux.intel.com, anna.schumaker@netapp.com, axboe@kernel.dk, bfields@fieldses.org, colin.king@canonical.com, daniel@ffwll.ch, devel@driverdev.osuosl.org, dri-devel@lists.freedesktop.org, joabreu@synopsys.com, johnfwhitmore@gmail.com, josef@toxicpanda.com, jslaby@suse.com, kjlu@umn.edu, kstewart@linuxfoundation.org, linux-arm-kernel@lists.infradead.org, linux-block@vger.kernel.org, linux-ide@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mediatek@lists.infradead.org, linux-nfs@vger.kernel.org, linux-serial@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, linux-wireless@vger.kernel.org, matthias.bgg@gmail.com, matthias@redhat.com, mcoquelin.stm32@gmail.com, nbd@other.debian.org, netdev@vger.kernel.org, nishkadg.linux@gmail.com, peppe.cavallaro@st.com, smccaman@umn.edu, tglx@linutronix.de, thierry.reding@gmail.com, trond.myklebust@hammerspace.com, unglinuxdriver@microchip.com, vishal@chelsio.com, vkoul@kernel.org MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="utf-8" X-RT-Original-Encoding: utf-8 Date: Mon, 5 Aug 2019 13:38:48 -0400 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Mon, 05 Aug 2019 17:39:08 +0000 (UTC) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Hello Navid, On Thu, 18 Jul 2019 01:30:20 GMT, emamd001@umn.edu wrote: > I've found a null dereference bug in the Linux kernel source code. I was > wondering should I cc the patch to you as well (along with the > maintainers)? No. Please do not cc on the upstream kernel patches. It is meant for reporting security issues only. Going through the patches here 1. Issues in ../staging/ drivers are not considered for CVE, they are not to be used in production environment. 2. Many of the patches listed fix NULL pointer dereference when memory allocation fails and returns NULL. 3. Do you happen to have reproducers for these issues? Could an unprivileged user trigger them? > Also, I was wondering what are the steps to get CVE for the bug (this is > the first time I am reporting a bug)? Generally CVE is assigned after confirming that a given issue really is a security issue. And it may have impact ranging from information leakage, DoS to privilege escalation or maybe arbitrary code execution. Every NULL pointer dereference is not security issue. Hope it helps. Thank you. --- Prasad J Pandit / Red Hat Product Security Team