* Re: XFS security fix never sent to -stable? [not found] ` <CA+5PVA4ychvLEi1ZZ6rYy2=5-wZAbQ_a-aoy8=1w3+tr-pt3Fg@mail.gmail.com> @ 2013-12-09 23:55 ` Dave Chinner 2013-12-10 7:56 ` Greg KH 2013-12-10 13:20 ` Josh Boyer 0 siblings, 2 replies; 14+ messages in thread From: Dave Chinner @ 2013-12-09 23:55 UTC (permalink / raw) To: Josh Boyer Cc: Luis Henriques, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, Greg KH, xfs, stable [cc xfs list, cc stable@vger.kernel.org] On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: > On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques > <luis.henriques@canonical.com> wrote: > > On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: > >> Hi, > >> > >> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c ("xfs: add > >> capability check to free eofblocks ioctl") is a security fix that was > >> never sent to -stable? From what I can see, it was introduced in 3.8 > >> by 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add > >> XFS_IOC_FREE_EOFBLOCKS ioctl"). > >> > >> I don't see this in the 3.8.y tree. Should it be added there and newer? > > > > Thanks Kees, I'm queuing it for the 3.11 kernel. > > There's also this one: > > http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 > > It fixes CVE-2013-6382 First I've heard about it there being a CVE for that bug. Since when has it been considered best practice to publish CVEs without first (or ever) directly contacting the relevant upstream developers? But, regardless of how broken I think the CVE process is, commit 071c529 ("xfs: underflow bug in xfs_attrlist_by_handle()") should be picked up by the stable kernels. Cheers, Dave. -- Dave Chinner david@fromorbit.com ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-09 23:55 ` XFS security fix never sent to -stable? Dave Chinner @ 2013-12-10 7:56 ` Greg KH 2013-12-10 13:15 ` Josh Boyer 2013-12-17 13:58 ` Luis Henriques 2013-12-10 13:20 ` Josh Boyer 1 sibling, 2 replies; 14+ messages in thread From: Greg KH @ 2013-12-10 7:56 UTC (permalink / raw) To: Dave Chinner Cc: Josh Boyer, Luis Henriques, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, xfs, stable On Tue, Dec 10, 2013 at 10:55:23AM +1100, Dave Chinner wrote: > [cc xfs list, cc stable@vger.kernel.org] > > On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: > > On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques > > <luis.henriques@canonical.com> wrote: > > > On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: > > >> Hi, > > >> > > >> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c ("xfs: add > > >> capability check to free eofblocks ioctl") is a security fix that was > > >> never sent to -stable? From what I can see, it was introduced in 3.8 > > >> by 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add > > >> XFS_IOC_FREE_EOFBLOCKS ioctl"). > > >> > > >> I don't see this in the 3.8.y tree. Should it be added there and newer? > > > > > > Thanks Kees, I'm queuing it for the 3.11 kernel. > > > > There's also this one: > > > > http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 > > > > It fixes CVE-2013-6382 > > First I've heard about it there being a CVE for that bug. Since when > has it been considered best practice to publish CVEs without first > (or ever) directly contacting the relevant upstream developers? > > But, regardless of how broken I think the CVE process is, commit > 071c529 ("xfs: underflow bug in xfs_attrlist_by_handle()") should be > picked up by the stable kernels. I don't see that commit in Linus's tree, is it not there yet? thanks, greg k-h ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-10 7:56 ` Greg KH @ 2013-12-10 13:15 ` Josh Boyer 2013-12-10 14:31 ` Eric Sandeen 2013-12-17 13:58 ` Luis Henriques 1 sibling, 1 reply; 14+ messages in thread From: Josh Boyer @ 2013-12-10 13:15 UTC (permalink / raw) To: Greg KH Cc: Dave Chinner, Luis Henriques, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, xfs, stable@vger.kernel.org On Tue, Dec 10, 2013 at 2:56 AM, Greg KH <gregkh@linuxfoundation.org> wrote: > On Tue, Dec 10, 2013 at 10:55:23AM +1100, Dave Chinner wrote: >> [cc xfs list, cc stable@vger.kernel.org] >> >> On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: >> > On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques >> > <luis.henriques@canonical.com> wrote: >> > > On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: >> > >> Hi, >> > >> >> > >> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c ("xfs: add >> > >> capability check to free eofblocks ioctl") is a security fix that was >> > >> never sent to -stable? From what I can see, it was introduced in 3.8 >> > >> by 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add >> > >> XFS_IOC_FREE_EOFBLOCKS ioctl"). >> > >> >> > >> I don't see this in the 3.8.y tree. Should it be added there and newer? >> > > >> > > Thanks Kees, I'm queuing it for the 3.11 kernel. >> > >> > There's also this one: >> > >> > http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 >> > >> > It fixes CVE-2013-6382 >> >> First I've heard about it there being a CVE for that bug. Since when >> has it been considered best practice to publish CVEs without first >> (or ever) directly contacting the relevant upstream developers? >> >> But, regardless of how broken I think the CVE process is, commit >> 071c529 ("xfs: underflow bug in xfs_attrlist_by_handle()") should be >> picked up by the stable kernels. > > I don't see that commit in Linus's tree, is it not there yet? Not yet. Ben said it's applied but I'm not sure where that is. josh ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-10 13:15 ` Josh Boyer @ 2013-12-10 14:31 ` Eric Sandeen 2013-12-10 15:57 ` Ben Myers 0 siblings, 1 reply; 14+ messages in thread From: Eric Sandeen @ 2013-12-10 14:31 UTC (permalink / raw) To: Josh Boyer, Greg KH Cc: Luis Henriques, Brian Foster, Dave Chinner, Dwight Engen, LKML, stable@vger.kernel.org, xfs, Ben Myers, Gao feng, Kees Cook On 12/10/13, 7:15 AM, Josh Boyer wrote: > On Tue, Dec 10, 2013 at 2:56 AM, Greg KH <gregkh@linuxfoundation.org> wrote: >> On Tue, Dec 10, 2013 at 10:55:23AM +1100, Dave Chinner wrote: >>> [cc xfs list, cc stable@vger.kernel.org] >>> >>> On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: >>>> On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques >>>> <luis.henriques@canonical.com> wrote: >>>>> On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: >>>>>> Hi, >>>>>> >>>>>> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c ("xfs: add >>>>>> capability check to free eofblocks ioctl") is a security fix that was >>>>>> never sent to -stable? From what I can see, it was introduced in 3.8 >>>>>> by 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add >>>>>> XFS_IOC_FREE_EOFBLOCKS ioctl"). >>>>>> >>>>>> I don't see this in the 3.8.y tree. Should it be added there and newer? >>>>> >>>>> Thanks Kees, I'm queuing it for the 3.11 kernel. >>>> >>>> There's also this one: >>>> >>>> http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 >>>> >>>> It fixes CVE-2013-6382 >>> >>> First I've heard about it there being a CVE for that bug. Since when >>> has it been considered best practice to publish CVEs without first >>> (or ever) directly contacting the relevant upstream developers? >>> >>> But, regardless of how broken I think the CVE process is, commit >>> 071c529 ("xfs: underflow bug in xfs_attrlist_by_handle()") should be >>> picked up by the stable kernels. >> >> I don't see that commit in Linus's tree, is it not there yet? > > Not yet. Ben said it's applied but I'm not sure where that is. xfs git tree: http://oss.sgi.com/cgi-bin/gitweb.cgi?p=xfs/xfs.git;a=commitdiff;h=071c529eb672648ee8ca3f90944bcbcc730b4c06 -Eric > josh ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-10 14:31 ` Eric Sandeen @ 2013-12-10 15:57 ` Ben Myers 0 siblings, 0 replies; 14+ messages in thread From: Ben Myers @ 2013-12-10 15:57 UTC (permalink / raw) To: Eric Sandeen Cc: Josh Boyer, Greg KH, Luis Henriques, Brian Foster, Kees Cook, Dwight Engen, LKML, stable@vger.kernel.org, xfs, Gao feng, Dave Chinner Hi, On Tue, Dec 10, 2013 at 08:31:23AM -0600, Eric Sandeen wrote: > On 12/10/13, 7:15 AM, Josh Boyer wrote: > > On Tue, Dec 10, 2013 at 2:56 AM, Greg KH <gregkh@linuxfoundation.org> wrote: > >> On Tue, Dec 10, 2013 at 10:55:23AM +1100, Dave Chinner wrote: > >>> [cc xfs list, cc stable@vger.kernel.org] > >>> > >>> On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: > >>>> On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques > >>>> <luis.henriques@canonical.com> wrote: > >>>>> On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: > >>>>>> Hi, > >>>>>> > >>>>>> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c ("xfs: add > >>>>>> capability check to free eofblocks ioctl") is a security fix that was > >>>>>> never sent to -stable? From what I can see, it was introduced in 3.8 > >>>>>> by 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add > >>>>>> XFS_IOC_FREE_EOFBLOCKS ioctl"). > >>>>>> > >>>>>> I don't see this in the 3.8.y tree. Should it be added there and newer? > >>>>> > >>>>> Thanks Kees, I'm queuing it for the 3.11 kernel. > >>>> > >>>> There's also this one: > >>>> > >>>> http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 > >>>> > >>>> It fixes CVE-2013-6382 > >>> > >>> First I've heard about it there being a CVE for that bug. Since when > >>> has it been considered best practice to publish CVEs without first > >>> (or ever) directly contacting the relevant upstream developers? > >>> > >>> But, regardless of how broken I think the CVE process is, commit > >>> 071c529 ("xfs: underflow bug in xfs_attrlist_by_handle()") should be > >>> picked up by the stable kernels. > >> > >> I don't see that commit in Linus's tree, is it not there yet? > > > > Not yet. Ben said it's applied but I'm not sure where that is. > > xfs git tree: > > http://oss.sgi.com/cgi-bin/gitweb.cgi?p=xfs/xfs.git;a=commitdiff;h=071c529eb672648ee8ca3f90944bcbcc730b4c06 I'll send a pull request containing this commit this afternoon. Thanks, Ben ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-10 7:56 ` Greg KH 2013-12-10 13:15 ` Josh Boyer @ 2013-12-17 13:58 ` Luis Henriques 1 sibling, 0 replies; 14+ messages in thread From: Luis Henriques @ 2013-12-17 13:58 UTC (permalink / raw) To: Greg KH Cc: Dave Chinner, Josh Boyer, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, xfs, stable On Mon, Dec 09, 2013 at 11:56:21PM -0800, Greg Kroah-Hartman wrote: > On Tue, Dec 10, 2013 at 10:55:23AM +1100, Dave Chinner wrote: > > [cc xfs list, cc stable@vger.kernel.org] > > > > On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: > > > On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques > > > <luis.henriques@canonical.com> wrote: > > > > On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: > > > >> Hi, > > > >> > > > >> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c ("xfs: add > > > >> capability check to free eofblocks ioctl") is a security fix that was > > > >> never sent to -stable? From what I can see, it was introduced in 3.8 > > > >> by 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add > > > >> XFS_IOC_FREE_EOFBLOCKS ioctl"). > > > >> > > > >> I don't see this in the 3.8.y tree. Should it be added there and newer? > > > > > > > > Thanks Kees, I'm queuing it for the 3.11 kernel. > > > > > > There's also this one: > > > > > > http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 > > > > > > It fixes CVE-2013-6382 > > > > First I've heard about it there being a CVE for that bug. Since when > > has it been considered best practice to publish CVEs without first > > (or ever) directly contacting the relevant upstream developers? > > > > But, regardless of how broken I think the CVE process is, commit > > 071c529 ("xfs: underflow bug in xfs_attrlist_by_handle()") should be > > picked up by the stable kernels. > > I don't see that commit in Linus's tree, is it not there yet? This commit is now in Linus's: 31978b5 xfs: underflow bug in xfs_attrlist_by_handle() Cheers, -- Luis ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-09 23:55 ` XFS security fix never sent to -stable? Dave Chinner 2013-12-10 7:56 ` Greg KH @ 2013-12-10 13:20 ` Josh Boyer 2013-12-11 1:03 ` Dave Chinner 1 sibling, 1 reply; 14+ messages in thread From: Josh Boyer @ 2013-12-10 13:20 UTC (permalink / raw) To: Dave Chinner Cc: Luis Henriques, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, Greg KH, xfs, stable@vger.kernel.org On Mon, Dec 9, 2013 at 6:55 PM, Dave Chinner <david@fromorbit.com> wrote: > [cc xfs list, cc stable@vger.kernel.org] > > On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: >> On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques >> <luis.henriques@canonical.com> wrote: >> > On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: >> >> Hi, >> >> >> >> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c ("xfs: add >> >> capability check to free eofblocks ioctl") is a security fix that was >> >> never sent to -stable? From what I can see, it was introduced in 3.8 >> >> by 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add >> >> XFS_IOC_FREE_EOFBLOCKS ioctl"). >> >> >> >> I don't see this in the 3.8.y tree. Should it be added there and newer? >> > >> > Thanks Kees, I'm queuing it for the 3.11 kernel. >> >> There's also this one: >> >> http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 >> >> It fixes CVE-2013-6382 > > First I've heard about it there being a CVE for that bug. Since when > has it been considered best practice to publish CVEs without first > (or ever) directly contacting the relevant upstream developers? We got a Fedora bug for it, and there are similar RHEL bugs open. I had assumed you would be informed either via upstream or through those. The CVE request was submitted by Kees here: http://seclists.org/oss-sec/2013/q4/330 josh ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-10 13:20 ` Josh Boyer @ 2013-12-11 1:03 ` Dave Chinner 2013-12-11 1:10 ` Josh Boyer 0 siblings, 1 reply; 14+ messages in thread From: Dave Chinner @ 2013-12-11 1:03 UTC (permalink / raw) To: Josh Boyer Cc: Luis Henriques, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, Greg KH, xfs, stable@vger.kernel.org On Tue, Dec 10, 2013 at 08:20:07AM -0500, Josh Boyer wrote: > On Mon, Dec 9, 2013 at 6:55 PM, Dave Chinner <david@fromorbit.com> > wrote: > > [cc xfs list, cc stable@vger.kernel.org] > > > > On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: > >> On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques > >> <luis.henriques@canonical.com> wrote: > >> > On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: > >> >> Hi, > >> >> > >> >> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c > >> >> ("xfs: add capability check to free eofblocks ioctl") is a > >> >> security fix that was never sent to -stable? From what I can > >> >> see, it was introduced in 3.8 by > >> >> 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add > >> >> XFS_IOC_FREE_EOFBLOCKS ioctl"). > >> >> > >> >> I don't see this in the 3.8.y tree. Should it be added there > >> >> and newer? > >> > > >> > Thanks Kees, I'm queuing it for the 3.11 kernel. > >> > >> There's also this one: > >> > >> http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 > >> > >> It fixes CVE-2013-6382 > > > > First I've heard about it there being a CVE for that bug. Since > > when has it been considered best practice to publish CVEs > > without first (or ever) directly contacting the relevant > > upstream developers? > > We got a Fedora bug for it, and there are similar RHEL bugs open. > I had assumed you would be informed either via upstream or > through those. I've not been cc'd on any of those bugs internally at RH, so I don't have visibility of the problems unless someone specifically adds me to those bugs. As it is, raising fedora/RHEL bugs is not informing upstream - it is a distro process for tracking the distro issue through to closure. > The CVE request was submitted by Kees here: > http://seclists.org/oss-sec/2013/q4/330 Ugh, no, I'm not going to subscribe to a high noise list where the only way I might be informed of a CVE being raised is by following links to git commit IDs.... Upstream is not magically informed about CVEs, and relying on upstream developers to scan or poll *anything* just to find if a CVE on their subsystem has been released is not reliable and does not scale. If anyone raises a CVE against a kernel subsystem, then the relevant list in the MAINTAINERS file for that subsystem should be on the cc list of any discussion about the CVE, and on the announcement of the CVE. Security processes are not something that should be hidden away in it's own private corner - if there's a problem upstream needs to take action on, then direct contact with upstream is necessary. We need to know about security issues - even ones that are classified post-commit as security issues - so we are operating with full knowledge of the issues in our code and the impact of our fixes.... Cheers, Dave. -- Dave Chinner david@fromorbit.com ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-11 1:03 ` Dave Chinner @ 2013-12-11 1:10 ` Josh Boyer 2013-12-11 2:00 ` Dave Chinner 0 siblings, 1 reply; 14+ messages in thread From: Josh Boyer @ 2013-12-11 1:10 UTC (permalink / raw) To: Dave Chinner Cc: Luis Henriques, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, Greg KH, xfs, stable@vger.kernel.org On Tue, Dec 10, 2013 at 8:03 PM, Dave Chinner <david@fromorbit.com> wrote: > On Tue, Dec 10, 2013 at 08:20:07AM -0500, Josh Boyer wrote: >> On Mon, Dec 9, 2013 at 6:55 PM, Dave Chinner <david@fromorbit.com> >> wrote: >> > [cc xfs list, cc stable@vger.kernel.org] >> > >> > On Mon, Dec 09, 2013 at 08:17:09AM -0500, Josh Boyer wrote: >> >> On Mon, Dec 9, 2013 at 7:15 AM, Luis Henriques >> >> <luis.henriques@canonical.com> wrote: >> >> > On Thu, Dec 05, 2013 at 04:35:50PM -0800, Kees Cook wrote: >> >> >> Hi, >> >> >> >> >> >> It looks like 8c567a7fab6e086a0284eee2db82348521e7120c >> >> >> ("xfs: add capability check to free eofblocks ioctl") is a >> >> >> security fix that was never sent to -stable? From what I can >> >> >> see, it was introduced in 3.8 by >> >> >> 8ca149de80478441352a8622ea15fae7de703ced ("xfs: add >> >> >> XFS_IOC_FREE_EOFBLOCKS ioctl"). >> >> >> >> >> >> I don't see this in the 3.8.y tree. Should it be added there >> >> >> and newer? >> >> > >> >> > Thanks Kees, I'm queuing it for the 3.11 kernel. >> >> >> >> There's also this one: >> >> >> >> http://thread.gmane.org/gmane.comp.file-systems.xfs.general/57654 >> >> >> >> It fixes CVE-2013-6382 >> > >> > First I've heard about it there being a CVE for that bug. Since >> > when has it been considered best practice to publish CVEs >> > without first (or ever) directly contacting the relevant >> > upstream developers? >> >> We got a Fedora bug for it, and there are similar RHEL bugs open. >> I had assumed you would be informed either via upstream or >> through those. > > I've not been cc'd on any of those bugs internally at RH, so I don't > have visibility of the problems unless someone specifically adds me > to those bugs. As it is, raising fedora/RHEL bugs is not informing > upstream - it is a distro process for tracking the distro issue > through to closure. Agreed. We should probably fix the bug thing anyway though. >> The CVE request was submitted by Kees here: >> http://seclists.org/oss-sec/2013/q4/330 > > Ugh, no, I'm not going to subscribe to a high noise list where the > only way I might be informed of a CVE being raised is by following > links to git commit IDs.... > > Upstream is not magically informed about CVEs, and relying on > upstream developers to scan or poll *anything* just to find if a > CVE on their subsystem has been released is not reliable and > does not scale. If anyone raises a CVE against a kernel subsystem, > then the relevant list in the MAINTAINERS file for that subsystem > should be on the cc list of any discussion about the CVE, and on the > announcement of the CVE. > > Security processes are not something that should be hidden away in > it's own private corner - if there's a problem upstream needs to > take action on, then direct contact with upstream is necessary. We > need to know about security issues - even ones that are classified > post-commit as security issues - so we are operating with full > knowledge of the issues in our code and the impact of our fixes.... Agreed. I'm going to interpret your comments at being directed to the general audience because otherwise you're just shooting the messenger :). josh ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-11 1:10 ` Josh Boyer @ 2013-12-11 2:00 ` Dave Chinner 2013-12-11 2:12 ` Greg KH 2013-12-11 2:45 ` Kees Cook 0 siblings, 2 replies; 14+ messages in thread From: Dave Chinner @ 2013-12-11 2:00 UTC (permalink / raw) To: Josh Boyer Cc: Luis Henriques, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, Greg KH, xfs, stable@vger.kernel.org On Tue, Dec 10, 2013 at 08:10:51PM -0500, Josh Boyer wrote: > On Tue, Dec 10, 2013 at 8:03 PM, Dave Chinner <david@fromorbit.com> wrote: > > Security processes are not something that should be hidden away in > > it's own private corner - if there's a problem upstream needs to > > take action on, then direct contact with upstream is necessary. We > > need to know about security issues - even ones that are classified > > post-commit as security issues - so we are operating with full > > knowledge of the issues in our code and the impact of our fixes.... > > Agreed. I'm going to interpret your comments at being directed to the > general audience because otherwise you're just shooting the messenger > :). Right, they are not aimed at you - they are aimed at those on the security side of the fence. I'm tired of learning about CVEs in XFS code through chinese whispers and/or luck. Cheers, Dave. -- Dave Chinner david@fromorbit.com ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-11 2:00 ` Dave Chinner @ 2013-12-11 2:12 ` Greg KH 2013-12-11 2:45 ` Kees Cook 1 sibling, 0 replies; 14+ messages in thread From: Greg KH @ 2013-12-11 2:12 UTC (permalink / raw) To: Dave Chinner Cc: Josh Boyer, Luis Henriques, Kees Cook, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, xfs, stable@vger.kernel.org On Wed, Dec 11, 2013 at 01:00:07PM +1100, Dave Chinner wrote: > On Tue, Dec 10, 2013 at 08:10:51PM -0500, Josh Boyer wrote: > > On Tue, Dec 10, 2013 at 8:03 PM, Dave Chinner <david@fromorbit.com> wrote: > > > Security processes are not something that should be hidden away in > > > it's own private corner - if there's a problem upstream needs to > > > take action on, then direct contact with upstream is necessary. We > > > need to know about security issues - even ones that are classified > > > post-commit as security issues - so we are operating with full > > > knowledge of the issues in our code and the impact of our fixes.... > > > > Agreed. I'm going to interpret your comments at being directed to the > > general audience because otherwise you're just shooting the messenger > > :). > > Right, they are not aimed at you - they are aimed at those on the > security side of the fence. I'm tired of learning about CVEs in XFS > code through chinese whispers and/or luck. CVEs for the kernel are almost always "assigned" after the problem is fixed, or when people "notice" something was changed upstream. At that point, there's no need for the original committer to be notified, as there's nothing to do. Anyway, I understand your frustration about CVEs, I don't like them much either, but some people do, so let them deal with them, and don't give them a second thought. greg k-h ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-11 2:00 ` Dave Chinner 2013-12-11 2:12 ` Greg KH @ 2013-12-11 2:45 ` Kees Cook 2013-12-11 4:17 ` Dave Chinner 1 sibling, 1 reply; 14+ messages in thread From: Kees Cook @ 2013-12-11 2:45 UTC (permalink / raw) To: Dave Chinner Cc: Josh Boyer, Luis Henriques, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, Greg KH, xfs, stable@vger.kernel.org, Dan Carpenter On Tue, Dec 10, 2013 at 6:00 PM, Dave Chinner <david@fromorbit.com> wrote: > On Tue, Dec 10, 2013 at 08:10:51PM -0500, Josh Boyer wrote: >> On Tue, Dec 10, 2013 at 8:03 PM, Dave Chinner <david@fromorbit.com> wrote: >> > Security processes are not something that should be hidden away in >> > it's own private corner - if there's a problem upstream needs to >> > take action on, then direct contact with upstream is necessary. We >> > need to know about security issues - even ones that are classified >> > post-commit as security issues - so we are operating with full >> > knowledge of the issues in our code and the impact of our fixes.... >> >> Agreed. I'm going to interpret your comments at being directed to the >> general audience because otherwise you're just shooting the messenger >> :). > > Right, they are not aimed at you - they are aimed at those on the > security side of the fence. I'm tired of learning about CVEs in XFS > code through chinese whispers and/or luck. Mostly I try to shield anyone not interested in CVEs from the boring process, and try to focus on just getting things marked as needing to go into stable. I don't think anyone needs to read the oss-security list if they don't want to. In this case, the fix Dan sent was part of a larger collection of security issues reported by Nico. I think the communication error here was Dan accidentally forgetting to add the Cc: stable tag. But beyond that, it was sent to the xfs list and Cc: to security, so I'm not sure it's fair to say it was hidden away. :) Besides the missing Cc: stable tag, what should future patch senders do to call attention to an issue being a security problem at the time it is being reported? -Kees -- Kees Cook Chrome OS Security ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-11 2:45 ` Kees Cook @ 2013-12-11 4:17 ` Dave Chinner 2013-12-11 8:27 ` Dan Carpenter 0 siblings, 1 reply; 14+ messages in thread From: Dave Chinner @ 2013-12-11 4:17 UTC (permalink / raw) To: Kees Cook Cc: Josh Boyer, Luis Henriques, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, Greg KH, xfs, stable@vger.kernel.org, Dan Carpenter On Tue, Dec 10, 2013 at 06:45:54PM -0800, Kees Cook wrote: > On Tue, Dec 10, 2013 at 6:00 PM, Dave Chinner <david@fromorbit.com> wrote: > > On Tue, Dec 10, 2013 at 08:10:51PM -0500, Josh Boyer wrote: > >> On Tue, Dec 10, 2013 at 8:03 PM, Dave Chinner <david@fromorbit.com> wrote: > >> > Security processes are not something that should be hidden away in > >> > it's own private corner - if there's a problem upstream needs to > >> > take action on, then direct contact with upstream is necessary. We > >> > need to know about security issues - even ones that are classified > >> > post-commit as security issues - so we are operating with full > >> > knowledge of the issues in our code and the impact of our fixes.... > >> > >> Agreed. I'm going to interpret your comments at being directed to the > >> general audience because otherwise you're just shooting the messenger > >> :). > > > > Right, they are not aimed at you - they are aimed at those on the > > security side of the fence. I'm tired of learning about CVEs in XFS > > code through chinese whispers and/or luck. > > Mostly I try to shield anyone not interested in CVEs from the boring > process, and try to focus on just getting things marked as needing to > go into stable. I don't think anyone needs to read the oss-security > list if they don't want to. Which is how is should be. ;) All I want is some kind of notification when a CVE raised for an XFS issue. It may be telling us something we already known, but if: a) it has not yet been pushed upstream; or b) it was not marked for stable kernels at commit time; or c) don't have a fix for it yet then it's an indication that we need to pay a little more attention to this class of problem when we review similar fixes. > In this case, the fix Dan sent was part of a larger collection of > security issues reported by Nico. I think the communication error here > was Dan accidentally forgetting to add the Cc: stable tag. But beyond > that, it was sent to the xfs list and Cc: to security, so I'm not sure > it's fair to say it was hidden away. :) Right - this falls into the above category a) because of that. There didn't appear to be any urgency because of the level of exposure of the problem (i.e. need CAP_SYS_ADMIN to trip over it) and the fact it's been like this for the past 10 years.... > Besides the missing Cc: stable tag, what should future patch senders > do to call attention to an issue being a security problem at the time > it is being reported? Well, it may not be known at the time it's considered a security issue, so I think that the best thing to do is make sure that when a CVE is actually raise a note is sent to the relevant list just to indicate 'CVE 1024-3267 has been raised for commit abcd1234 ("xfs: knabgraddle the frobnozzle")'. At least that way everyone - including XFS users - that there is an issue that they might want to look out for and plan to upgrade their stable kernels in the not-to-distant future... Cheers, Dave. -- Dave Chinner david@fromorbit.com ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: XFS security fix never sent to -stable? 2013-12-11 4:17 ` Dave Chinner @ 2013-12-11 8:27 ` Dan Carpenter 0 siblings, 0 replies; 14+ messages in thread From: Dan Carpenter @ 2013-12-11 8:27 UTC (permalink / raw) To: Dave Chinner Cc: Kees Cook, Josh Boyer, Luis Henriques, Dwight Engen, LKML, Brian Foster, Dave Chinner, Gao feng, Ben Myers, Greg KH, xfs, stable@vger.kernel.org I wasn't really expecting it to get a CVE since it requires CAP_SYS_ADMIN but I should have added the CC to stable. Sorry about that. regards, dan carpenter ^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2013-12-17 13:58 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <CAGXu5jLKkgYg5UWJc8xBGN5NgDh68Q3YRxO--zmDL86BWPH78A@mail.gmail.com>
[not found] ` <20131209121534.GE4278@hercules>
[not found] ` <CA+5PVA4ychvLEi1ZZ6rYy2=5-wZAbQ_a-aoy8=1w3+tr-pt3Fg@mail.gmail.com>
2013-12-09 23:55 ` XFS security fix never sent to -stable? Dave Chinner
2013-12-10 7:56 ` Greg KH
2013-12-10 13:15 ` Josh Boyer
2013-12-10 14:31 ` Eric Sandeen
2013-12-10 15:57 ` Ben Myers
2013-12-17 13:58 ` Luis Henriques
2013-12-10 13:20 ` Josh Boyer
2013-12-11 1:03 ` Dave Chinner
2013-12-11 1:10 ` Josh Boyer
2013-12-11 2:00 ` Dave Chinner
2013-12-11 2:12 ` Greg KH
2013-12-11 2:45 ` Kees Cook
2013-12-11 4:17 ` Dave Chinner
2013-12-11 8:27 ` Dan Carpenter
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).