From: Willy Tarreau <w@1wt.eu>
To: Greg KH <greg@kroah.com>
Cc: Linus Torvalds <torvalds@linuxfoundation.org>,
leon@kernel.org, security@kernel.org,
Jonathan Corbet <corbet@lwn.net>,
skhan@linuxfoundation.org, workflows@vger.kernel.org,
linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH v2 2/3] Documentation: security-bugs: explain what is and is not a security bug
Date: Sat, 9 May 2026 09:43:11 +0200 [thread overview]
Message-ID: <af7lj1zH-4wvMAI_@1wt.eu> (raw)
In-Reply-To: <2026050929-hatred-underfoot-a32a@gregkh>
On Sat, May 09, 2026 at 08:39:37AM +0200, Greg KH wrote:
> On Fri, May 08, 2026 at 06:39:07PM +0200, Willy Tarreau wrote:
> > Greg,
> >
> > does this addition on top of the current patch address your concerns ?
> >
> > --- a/Documentation/process/security-bugs.rst
> > +++ b/Documentation/process/security-bugs.rst
> > @@ -88,6 +88,14 @@ can be easily exploited, representing an imminent threat to many users. Before
> > reporting, consider whether the issue actually crosses a trust boundary on such
> > a system.
> >
> > +**If you resorted to AI assistance to identify a bug, you must treat it as
> > +public**. While you may have valid reasons to believe it is not, the security
> > +team's experience shows that bugs discovered this way systematically surface
> > +simultaneously across multiple researchers, often on the same day. In this
> > +case, do not publicly share a reproducer, as this could cause unintended harm;
> > +just mention that one is available and maintainers might ask for it privately
> > +if they need it.
> > +
> > If you are unsure whether an issue qualifies, err on the side of reporting
> > privately: the security team would rather triage a borderline report than miss
> > a real vulnerability. Reporting ordinary bugs to the security list, however,
> > @@ -102,7 +110,7 @@ affected subsystem's maintainers and Cc: the Linux kernel security team. Do
> > not send it to a public list at this stage, unless you have good reasons to
> > consider the issue as being public or trivial to discover (e.g. result of a
> > widely available automated vulnerability scanning tool that can be repeated by
> > -anyone).
> > +anyone, or use of AI-based tools).
> >
> > If you're sending a report for issues affecting multiple parts in the kernel,
> > even if they're fairly similar issues, please send individual messages (think
> >
> > If so I can resend with it.
>
> Looks good to me, thanks!
Thank you. I'll integrate Shuah's comments and will send a v3. After
that I'll see if we can better split the public vs private part, because
I'm starting to find it complicated, but I don't want to postpone for
too long if having all of this can already help us.
Willy
next prev parent reply other threads:[~2026-05-09 7:43 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20260503113506.5710-1-w@1wt.eu>
[not found] ` <20260503113506.5710-4-w@1wt.eu>
2026-05-05 14:09 ` [PATCH v2 3/3] Documentation: security-bugs: clarify requirements for AI-assisted reports Leon Romanovsky
[not found] ` <20260503113506.5710-2-w@1wt.eu>
2026-05-05 14:10 ` [PATCH v2 1/3] Documentation: security-bugs: do not systematically Cc the security team Leon Romanovsky
2026-05-08 15:31 ` Greg KH
[not found] ` <20260503113506.5710-3-w@1wt.eu>
2026-05-05 14:10 ` [PATCH v2 2/3] Documentation: security-bugs: explain what is and is not a security bug Leon Romanovsky
2026-05-06 15:46 ` Linus Torvalds
2026-05-06 16:02 ` Willy Tarreau
2026-05-07 4:18 ` Willy Tarreau
2026-05-07 7:14 ` Peter Zijlstra
2026-05-07 7:07 ` Peter Zijlstra
2026-05-07 15:37 ` Linus Torvalds
2026-05-07 15:48 ` Willy Tarreau
2026-05-08 15:35 ` Greg KH
2026-05-08 15:54 ` Joshua Peisach
2026-05-08 16:07 ` Willy Tarreau
2026-05-08 15:59 ` Willy Tarreau
2026-05-08 16:39 ` Willy Tarreau
2026-05-09 6:39 ` Greg KH
2026-05-09 7:43 ` Willy Tarreau [this message]
2026-05-08 20:52 ` Shuah Khan
2026-05-09 4:48 ` Willy Tarreau
2026-05-09 19:50 ` Shuah Khan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=af7lj1zH-4wvMAI_@1wt.eu \
--to=w@1wt.eu \
--cc=corbet@lwn.net \
--cc=greg@kroah.com \
--cc=leon@kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=security@kernel.org \
--cc=skhan@linuxfoundation.org \
--cc=torvalds@linuxfoundation.org \
--cc=workflows@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox