stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Dave Chinner <dchinner@redhat.com>
To: Greg KH <gregkh@linuxfoundation.org>
Cc: Yuki Machida <machida.yuki@jp.fujitsu.com>,
	stable@vger.kernel.org, wen.xu@gatech.edu,
	darrick.wong@oracle.com
Subject: Re: Backport Security Fix for CVE-2018-13095 to v4.14
Date: Wed, 8 Aug 2018 08:43:11 +1000	[thread overview]
Message-ID: <20180807224311.GB20351@rh> (raw)
In-Reply-To: <20180807163941.GA2785@kroah.com>

On Tue, Aug 07, 2018 at 06:39:41PM +0200, Greg KH wrote:
> On Tue, Aug 07, 2018 at 03:17:53PM +0200, Greg KH wrote:
> > On Mon, Aug 06, 2018 at 12:01:20PM +0900, Yuki Machida wrote:
> > > Hi Greg,
> > > 
> > > I conformed that a patch of CVE-2018-13095 not applied at v4.14.60.
> > > Could you please apply a patch for 4.14-stable ?
> > 
> > It does not apply cleanly at all, can you please provide a working
> > backport that you have tested?
> 
> It also breaks the build in 4.17.y, so I've had to drop it there as
> well.

I was going to ask "who tested the backport", but I see that the
backport doesn't even get that far. Blind backports of this sort of
fix is roughly equivalent to playing russian roulette - there's
every chance the additional validation to catch the issue is
completely inappropriate for older kernels and will explode on
users.

> Are you sure this fixes something that you care about?  Why are people
> creating random CVEs for things that no one seems to actually backport?

Glad you said this, Greg, because the recent rash of CVEs raised for
filesystem corruption issues has got well and truly out of hand, not
just for mainline stable backports.

It looks to me like someone thinks that "issue found by fuzzing the
on disk format of a filesystem" equates to an exploitable security
vulnerability. i.e.  they stop thinking at "fuzzing", and they
don't think through to the "need root permissions to mount the
fuzzed filesystem and trigger the bug".

I've ranted a lot about the crappy state of 3rd party filesystem
fuzz testing in recent times, but this rash of CVEs really puts
the icing on the cake....

Cheers,

Dave.

-- 
Dave Chinner
dchinner@redhat.com

      reply	other threads:[~2018-08-08  0:59 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-08-06  3:01 Backport Security Fix for CVE-2018-13095 to v4.14 Yuki Machida
2018-08-07 13:17 ` Greg KH
2018-08-07 16:39   ` Greg KH
2018-08-07 22:43     ` Dave Chinner [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180807224311.GB20351@rh \
    --to=dchinner@redhat.com \
    --cc=darrick.wong@oracle.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=machida.yuki@jp.fujitsu.com \
    --cc=stable@vger.kernel.org \
    --cc=wen.xu@gatech.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).