All of lore.kernel.org
 help / color / mirror / Atom feed
From: Dave Chinner <david@fromorbit.com>
To: Kees Cook <keescook@google.com>
Cc: Josh Boyer <jwboyer@fedoraproject.org>,
	Luis Henriques <luis.henriques@canonical.com>,
	Greg KH <gregkh@linuxfoundation.org>,
	Brian Foster <bfoster@redhat.com>,
	Dwight Engen <dwight.engen@oracle.com>,
	LKML <linux-kernel@vger.kernel.org>,
	"stable@vger.kernel.org" <stable@vger.kernel.org>,
	xfs@oss.sgi.com, Ben Myers <bpm@sgi.com>,
	Gao feng <gaofeng@cn.fujitsu.com>,
	Dave Chinner <dchinner@redhat.com>,
	Dan Carpenter <dan.carpenter@oracle.com>
Subject: Re: XFS security fix never sent to -stable?
Date: Wed, 11 Dec 2013 15:17:59 +1100	[thread overview]
Message-ID: <20131211041758.GI10988@dastard> (raw)
In-Reply-To: <CAGXu5jKUShtztTK-PtY7w0WSg=F3KUGL-iCM3=6H61qy3u6aZg@mail.gmail.com>

On Tue, Dec 10, 2013 at 06:45:54PM -0800, Kees Cook wrote:
> On Tue, Dec 10, 2013 at 6:00 PM, Dave Chinner <david@fromorbit.com> wrote:
> > On Tue, Dec 10, 2013 at 08:10:51PM -0500, Josh Boyer wrote:
> >> On Tue, Dec 10, 2013 at 8:03 PM, Dave Chinner <david@fromorbit.com> wrote:
> >> > Security processes are not something that should be hidden away in
> >> > it's own private corner - if there's a problem upstream needs to
> >> > take action on, then direct contact with upstream is necessary. We
> >> > need to know about security issues - even ones that are classified
> >> > post-commit as security issues - so we are operating with full
> >> > knowledge of the issues in our code and the impact of our fixes....
> >>
> >> Agreed.  I'm going to interpret your comments at being directed to the
> >> general audience because otherwise you're just shooting the messenger
> >> :).
> >
> > Right, they are not aimed at you - they are aimed at those on the
> > security side of the fence. I'm tired of learning about CVEs in XFS
> > code through chinese whispers and/or luck.
> 
> Mostly I try to shield anyone not interested in CVEs from the boring
> process, and try to focus on just getting things marked as needing to
> go into stable. I don't think anyone needs to read the oss-security
> list if they don't want to.

Which is how is should be. ;) All I want is some kind of
notification when a CVE raised for an XFS issue. It may be telling
us something we already known, but if:

	a) it has not yet been pushed upstream; or
	b) it was not marked for stable kernels at commit time; or
	c) don't have a fix for it yet

then it's an indication that we need to pay a little more attention
to this class of problem when we review similar fixes.

> In this case, the fix Dan sent was part of a larger collection of
> security issues reported by Nico. I think the communication error here
> was Dan accidentally forgetting to add the Cc: stable tag. But beyond
> that, it was sent to the xfs list and Cc: to security, so I'm not sure
> it's fair to say it was hidden away. :)

Right - this falls into the above category a) because of that. There
didn't appear to be any urgency because of the level of exposure of
the problem (i.e. need CAP_SYS_ADMIN to trip over it) and the fact
it's been like this for the past 10 years....

> Besides the missing Cc: stable tag, what should future patch senders
> do to call attention to an issue being a security problem at the time
> it is being reported?

Well, it may not be known at the time it's considered a security
issue, so I think that the best thing to do is make sure that when
a CVE is actually raise a note is sent to the relevant list just to
indicate 'CVE 1024-3267 has been raised for commit abcd1234
("xfs: knabgraddle the frobnozzle")'.

At least that way everyone - including XFS users - that there is an
issue that they might want to look out for and plan to upgrade their
stable kernels in the not-to-distant future...

Cheers,

Dave.
-- 
Dave Chinner
david@fromorbit.com

_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs

WARNING: multiple messages have this Message-ID (diff)
From: Dave Chinner <david@fromorbit.com>
To: Kees Cook <keescook@google.com>
Cc: Josh Boyer <jwboyer@fedoraproject.org>,
	Luis Henriques <luis.henriques@canonical.com>,
	Dwight Engen <dwight.engen@oracle.com>,
	LKML <linux-kernel@vger.kernel.org>,
	Brian Foster <bfoster@redhat.com>,
	Dave Chinner <dchinner@redhat.com>,
	Gao feng <gaofeng@cn.fujitsu.com>, Ben Myers <bpm@sgi.com>,
	Greg KH <gregkh@linuxfoundation.org>,
	xfs@oss.sgi.com,
	"stable@vger.kernel.org" <stable@vger.kernel.org>,
	Dan Carpenter <dan.carpenter@oracle.com>
Subject: Re: XFS security fix never sent to -stable?
Date: Wed, 11 Dec 2013 15:17:59 +1100	[thread overview]
Message-ID: <20131211041758.GI10988@dastard> (raw)
In-Reply-To: <CAGXu5jKUShtztTK-PtY7w0WSg=F3KUGL-iCM3=6H61qy3u6aZg@mail.gmail.com>

On Tue, Dec 10, 2013 at 06:45:54PM -0800, Kees Cook wrote:
> On Tue, Dec 10, 2013 at 6:00 PM, Dave Chinner <david@fromorbit.com> wrote:
> > On Tue, Dec 10, 2013 at 08:10:51PM -0500, Josh Boyer wrote:
> >> On Tue, Dec 10, 2013 at 8:03 PM, Dave Chinner <david@fromorbit.com> wrote:
> >> > Security processes are not something that should be hidden away in
> >> > it's own private corner - if there's a problem upstream needs to
> >> > take action on, then direct contact with upstream is necessary. We
> >> > need to know about security issues - even ones that are classified
> >> > post-commit as security issues - so we are operating with full
> >> > knowledge of the issues in our code and the impact of our fixes....
> >>
> >> Agreed.  I'm going to interpret your comments at being directed to the
> >> general audience because otherwise you're just shooting the messenger
> >> :).
> >
> > Right, they are not aimed at you - they are aimed at those on the
> > security side of the fence. I'm tired of learning about CVEs in XFS
> > code through chinese whispers and/or luck.
> 
> Mostly I try to shield anyone not interested in CVEs from the boring
> process, and try to focus on just getting things marked as needing to
> go into stable. I don't think anyone needs to read the oss-security
> list if they don't want to.

Which is how is should be. ;) All I want is some kind of
notification when a CVE raised for an XFS issue. It may be telling
us something we already known, but if:

	a) it has not yet been pushed upstream; or
	b) it was not marked for stable kernels at commit time; or
	c) don't have a fix for it yet

then it's an indication that we need to pay a little more attention
to this class of problem when we review similar fixes.

> In this case, the fix Dan sent was part of a larger collection of
> security issues reported by Nico. I think the communication error here
> was Dan accidentally forgetting to add the Cc: stable tag. But beyond
> that, it was sent to the xfs list and Cc: to security, so I'm not sure
> it's fair to say it was hidden away. :)

Right - this falls into the above category a) because of that. There
didn't appear to be any urgency because of the level of exposure of
the problem (i.e. need CAP_SYS_ADMIN to trip over it) and the fact
it's been like this for the past 10 years....

> Besides the missing Cc: stable tag, what should future patch senders
> do to call attention to an issue being a security problem at the time
> it is being reported?

Well, it may not be known at the time it's considered a security
issue, so I think that the best thing to do is make sure that when
a CVE is actually raise a note is sent to the relevant list just to
indicate 'CVE 1024-3267 has been raised for commit abcd1234
("xfs: knabgraddle the frobnozzle")'.

At least that way everyone - including XFS users - that there is an
issue that they might want to look out for and plan to upgrade their
stable kernels in the not-to-distant future...

Cheers,

Dave.
-- 
Dave Chinner
david@fromorbit.com

  reply	other threads:[~2013-12-11  4:18 UTC|newest]

Thread overview: 37+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-12-06  0:35 XFS security fix never sent to -stable? Kees Cook
2013-12-06 14:43 ` Dwight Engen
2013-12-06 15:06   ` Brian Foster
2013-12-09 12:15 ` Luis Henriques
2013-12-09 13:17   ` Josh Boyer
2013-12-09 23:55     ` Dave Chinner
2013-12-09 23:55       ` Dave Chinner
2013-12-10  7:56       ` Greg KH
2013-12-10  7:56         ` Greg KH
2013-12-10 13:15         ` Josh Boyer
2013-12-10 13:15           ` Josh Boyer
2013-12-10 14:31           ` Eric Sandeen
2013-12-10 14:31             ` Eric Sandeen
2013-12-10 15:57             ` Ben Myers
2013-12-10 15:57               ` Ben Myers
2013-12-17 13:58         ` Luis Henriques
2013-12-17 13:58           ` Luis Henriques
2013-12-10 13:20       ` Josh Boyer
2013-12-10 13:20         ` Josh Boyer
2013-12-11  1:03         ` Dave Chinner
2013-12-11  1:03           ` Dave Chinner
2013-12-11  1:10           ` Josh Boyer
2013-12-11  1:10             ` Josh Boyer
2013-12-11  2:00             ` Dave Chinner
2013-12-11  2:00               ` Dave Chinner
2013-12-11  2:12               ` Greg KH
2013-12-11  2:12                 ` Greg KH
2013-12-11  2:45               ` Kees Cook
2013-12-11  2:45                 ` Kees Cook
2013-12-11  4:17                 ` Dave Chinner [this message]
2013-12-11  4:17                   ` Dave Chinner
2013-12-11  8:27                   ` Dan Carpenter
2013-12-11  8:27                     ` Dan Carpenter
2013-12-09 23:30 ` Dave Chinner
2013-12-09 23:30   ` Dave Chinner
2013-12-11  2:36   ` Kees Cook
2013-12-11  2:36     ` Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20131211041758.GI10988@dastard \
    --to=david@fromorbit.com \
    --cc=bfoster@redhat.com \
    --cc=bpm@sgi.com \
    --cc=dan.carpenter@oracle.com \
    --cc=dchinner@redhat.com \
    --cc=dwight.engen@oracle.com \
    --cc=gaofeng@cn.fujitsu.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=jwboyer@fedoraproject.org \
    --cc=keescook@google.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=luis.henriques@canonical.com \
    --cc=stable@vger.kernel.org \
    --cc=xfs@oss.sgi.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.