Received: by 2002:a05:6500:1b8f:b0:1fa:5c73:8e2d with SMTP id df15csp856059lqb; Wed, 29 May 2024 12:34:58 -0700 (PDT) X-Forwarded-Encrypted: i=2; AJvYcCVvZk4XcDCYNUAEuS+JsTEvboQL/RMip9fEntrn0ZRfGplNdjA+URR4ge7+kp8zzm4hvOoJdcKpf/AfyY0QDWd1vqH0uT9kXDQQviMfMw== X-Google-Smtp-Source: AGHT+IEDxK4tKqSwJFUsBIlVM0BWdYym/rH2JLPiBi1OIPnpThxdh10jqtZa3/+tjzE7Oz1upWc7 X-Received: by 2002:a50:8a91:0:b0:572:4e6b:c31 with SMTP id 4fb4d7f45d1cf-57a178ef503mr50894a12.34.1717011297965; Wed, 29 May 2024 12:34:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1717011297; cv=none; d=google.com; s=arc-20160816; b=ye6+yVRhhhIvLf3wtO9AsoxV5s/B135lcrwBlG8aiXYsl9ADIQVMfrBWBKg0xRNRbG QNLV2TO8RGqh+KjEO/WY83HXdpNbOroY0jKPZMWVMc6TRi5Jn3ARf1zmogOcxyT0+Ijy hla8TCoz3VxcwdWgQfeYdxCMpap7yIzpD7ziO2V9XTrmnBXhH4e2+9Mr8kh1jM4lXP04 3v2gGDvn+gLFEV0P18zSdtkfRmlor/vuYijVpBObjFJIkohWpWZkR3SSmgm6GTbphD8B NxG7dJKxkzOMXZvA68OuL2Sc0ec+omsPJaLjCF8p618V233mSRbQUmhfVtg+rhipRu7p lGwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=subject:in-reply-to:content-disposition:mime-version:references :message-id:cc:to:from:date:dkim-signature:delivered-to:delivered-to :reply-to:list-id:list-subscribe:list-unsubscribe:list-help :list-post:precedence:mailing-list; bh=R+xWtHN7AHOihyPqhjoXG3jNyXzYI0SYXsvmc74HSAk=; fh=vM+yaR3a/zUmFBiUUAeoRkLPtywITUzwfaZE/EIOTwk=; b=LVZyRRJoyyu0jcFf5KE4NT6pqfYiU/DQO/ci2YGr0W+P8kxQOd38Y4xQflIRi0VkE5 4bu3xFM8pSz2l3Jg7VdfdVbRnvUon6gx1f3g+4TR+VuhHMPAFnw0Wjc5I2B8gEDOdRst WI1iecTxsYJY6CTk8vbnCylL8FrB2RFJi08MzWSPY+H8Ulo8upwuKT2utDB3ury9nEwb A2nmaG3pgzuBW8davIHnFG1dT409Yo8nVs95j6bSSE4lDLarIfNHQV3uHZnd7eTh6Mfe NhxZE6LWNQMa2z83PPPUEqVr1Zkmm7aDo3A2rHCdkW3vMe3d8Z+oeV7z+ZGPNZqFzDhk +Pog==; dara=google.com ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uxmTr24t; spf=pass (google.com: domain of oss-security-return-30173-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) smtp.mailfrom="oss-security-return-30173-linux.lists.archive=gmail.com@lists.openwall.com"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from second.openwall.net (second.openwall.net. [193.110.157.125]) by mx.google.com with SMTP id 4fb4d7f45d1cf-578621b5ea3si5930088a12.576.2024.05.29.12.34.57 for ; Wed, 29 May 2024 12:34:57 -0700 (PDT) Received-SPF: pass (google.com: domain of oss-security-return-30173-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) client-ip=193.110.157.125; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uxmTr24t; spf=pass (google.com: domain of oss-security-return-30173-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) smtp.mailfrom="oss-security-return-30173-linux.lists.archive=gmail.com@lists.openwall.com"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (qmail 8094 invoked by uid 550); 29 May 2024 19:34:38 -0000 Mailing-List: contact oss-security-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Reply-To: oss-security@lists.openwall.com Delivered-To: mailing list oss-security@lists.openwall.com Delivered-To: moderator for oss-security@lists.openwall.com Received: (qmail 20208 invoked from network); 29 May 2024 19:23:58 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1717010625; bh=d8Hmx8vQs0ebj/vAwDbPJQ8/fBeyRxUH2cbzl4KKdnc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=uxmTr24twgeCG5soCNzfyLQg4+sgYNoZ/Pmvw8JXAer90w9TEPB8nlbPolNRwyK3N 1nmC70FWDe0HmFCo0T+x8bgiuMOPe2C0zSXyq46Xe1Xvm+aEVmb233uTJraqRh03ZM iliyxWYJD4BOO4JFPB4AmAj02m/H3dUoRKyQSxrk= Date: Wed, 29 May 2024 21:23:50 +0200 From: Greg Kroah-Hartman To: Dominique Martinet Cc: oss-security@lists.openwall.com Message-ID: <2024052926-moneyless-applause-a95b@gregkh> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Subject: Re: [oss-security] List linux CVEs for a given stable release? On Wed, May 29, 2024 at 09:53:48AM +0900, Dominique Martinet wrote: > > With the new vulns[3] repo I thought I could do similar search there, > but while there are scripts to search by commit ID or by CVE I don't see > anything allowing search for issues affecting a given stable release. > > [3] https://git.kernel.org/pub/scm/linux/security/vulns.git/ True, we don't have that yet, but with the scripts in there, it should be easy to knock this up (hint, pass the id to scripts/cve_search) if you need it. > My motivation here is double: > - We notify our users of notable CVEs fixed on every update to encourage > them to upgrade every time (it's sad, but in the embedded world not > updating is still the norm despite our efforts to make upgrades as > painless as possible... New regulations are coming so hopefully that > will slowly improve, but as of now such motivations help) The issue is, CVEs are assigned usually long _AFTER_ the stable release has happened. So if you want to do this type of report for the latest stable release, it will look like there are no CVEs. But if you wait a few weeks, suddenly that old release will have many CVEs assigned to them. This is just due to the process we currently have where we review each commit in the stable releases to determine if a CVE should be assigned or not. Obviously this takes time and we are running a few weeks behind the current releases. So you would have to run the script a lot, to keep it up to date, which is why a "how many CVEs are listed in the latest release" isn't really going to be all that valuable to your users. > - I'm currently not watching patches entering newer stable branches as > closely, so if there are any new CVEs not fixed in the latest 5.10 I'd > like to check if some impact us and will help with backports as possible > (we're a small company so my time is limited, but might as well give > back when I can) That would be great, for where we know, we list when a vulnerability was added to the tree, and where it was fixed. That can leave many branches still vulnerable where we have not fixed the issue yet. One example would be CVE-2024-26629. You can see these in our repo by just doing: git grep "5\.10" | grep introduced | grep -v fixed But note that for some issues, we don't have the information for when they are introduced, so if they are not fixed in the 5.10 branch, does that mean the branch _is_ vulnerable, or is not? One example of a "is not" might be CVE-2024-35867 as we think the code isn't present in 5.10, but we don't have an automated way of determining that. So that would take more work than just a simple grep of the tree. > The information is there in the json files, so it's just a matter of > writing some scripts to check them, but I can't believe there's none so > I probably have missed something. > > Does someone have such a script that'd list the latest CVEs for a given > tree? How about something as simple as the following to see what is in 5.10.101: for id in $(git log --format="%H" v5.10.100..v5.10.101); do cve=$(cve_search ${id}) cve_found=$? if [[ "${cve_found}" == "0" ]]; then echo "${cve} is in range" fi done Note, typed in email client, not tested, use at your own risk... hope this helps, greg k-h