stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")
@ 2019-06-03 17:31 Zubin Mithra
  2019-06-04  7:52 ` Greg KH
  0 siblings, 1 reply; 5+ messages in thread
From: Zubin Mithra @ 2019-06-03 17:31 UTC (permalink / raw)
  To: stable; +Cc: gregkh, groeck, blackgod016574, davem, kuznet, yoshfuji

Hello,

CVE-2019-12378 was fixed in the upstream linux kernel with the following commit.
* 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")

Could the patch be applied to v4.19.y, v4.14.y, v4.9.y and v4.4.y?

Tests run:
* Chrome OS tryjobs


Thanks,
- Zubin

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")
  2019-06-03 17:31 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()") Zubin Mithra
@ 2019-06-04  7:52 ` Greg KH
  2019-06-04  8:04   ` Greg KH
  2019-06-04  8:43   ` Guenter Roeck
  0 siblings, 2 replies; 5+ messages in thread
From: Greg KH @ 2019-06-04  7:52 UTC (permalink / raw)
  To: Zubin Mithra; +Cc: stable, groeck, blackgod016574, davem, kuznet, yoshfuji

On Mon, Jun 03, 2019 at 10:31:15AM -0700, Zubin Mithra wrote:
> Hello,
> 
> CVE-2019-12378 was fixed in the upstream linux kernel with the following commit.
> * 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")

A CVE was created for that tiny thing?

Hah, no, I think I'll refuse to apply it just for the very point of it.
That's something that can not be triggered by normal operations, right?
It's a bugfix-for-the-theoritical from what I can see...

> Could the patch be applied to v4.19.y, v4.14.y, v4.9.y and v4.4.y?

Why are you ignoring 5.1?

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")
  2019-06-04  7:52 ` Greg KH
@ 2019-06-04  8:04   ` Greg KH
  2019-06-04  8:43   ` Guenter Roeck
  1 sibling, 0 replies; 5+ messages in thread
From: Greg KH @ 2019-06-04  8:04 UTC (permalink / raw)
  To: Zubin Mithra; +Cc: stable, groeck, blackgod016574, davem, kuznet, yoshfuji

On Tue, Jun 04, 2019 at 09:52:35AM +0200, Greg KH wrote:
> On Mon, Jun 03, 2019 at 10:31:15AM -0700, Zubin Mithra wrote:
> > Hello,
> > 
> > CVE-2019-12378 was fixed in the upstream linux kernel with the following commit.
> > * 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")
> 
> A CVE was created for that tiny thing?
> 
> Hah, no, I think I'll refuse to apply it just for the very point of it.
> That's something that can not be triggered by normal operations, right?
> It's a bugfix-for-the-theoritical from what I can see...
> 
> > Could the patch be applied to v4.19.y, v4.14.y, v4.9.y and v4.4.y?
> 
> Why are you ignoring 5.1?

Also, stable networking patches need to come from the networking
maintainer, as the documentation states, so I shouldn't be applying this
directly anyway.  If Dave thinks it is worth to backport, I'll gladly
apply it from his submissions, so you need to convince him, not me.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")
  2019-06-04  7:52 ` Greg KH
  2019-06-04  8:04   ` Greg KH
@ 2019-06-04  8:43   ` Guenter Roeck
  2019-06-04  9:04     ` Greg KH
  1 sibling, 1 reply; 5+ messages in thread
From: Guenter Roeck @ 2019-06-04  8:43 UTC (permalink / raw)
  To: Greg KH
  Cc: Zubin Mithra, # v4 . 10+, Guenter Roeck, blackgod016574,
	David Miller, kuznet, yoshfuji

On Tue, Jun 4, 2019 at 12:52 AM Greg KH <gregkh@linuxfoundation.org> wrote:
>
> On Mon, Jun 03, 2019 at 10:31:15AM -0700, Zubin Mithra wrote:
> > Hello,
> >
> > CVE-2019-12378 was fixed in the upstream linux kernel with the following commit.
> > * 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")
>
> A CVE was created for that tiny thing?
>
> Hah, no, I think I'll refuse to apply it just for the very point of it.

We don't create CVEs, but we do have to get CVE fixes applied to our
branches. We don't try to police the creation of CVEs, and we don't
try to double-guess them since that would be futile (who guarantees
that our double-guessing matches yours ?). We do have a policy to not
apply CVEs directly but ask for stable tree merges instead to avoid
deviation, and we (more specifically, Zubin) spend a lot of time
validating the fixes before sending a request. I just made that
official policy, but a policy is not cast in stone. We will stop doing
that if we get this kind of response. If that is what you want, let me
know.

Zubin, maybe hold back with -stable backport requests for the time
being, and just apply missing patches directly to our branches. Sorry
for the trouble.

> That's something that can not be triggered by normal operations, right?
> It's a bugfix-for-the-theoritical from what I can see...
>
> > Could the patch be applied to v4.19.y, v4.14.y, v4.9.y and v4.4.y?
>
> Why are you ignoring 5.1?
>
Probably because no one is perfect.

Thanks,
Guenter

> thanks,
>
> greg k-h

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")
  2019-06-04  8:43   ` Guenter Roeck
@ 2019-06-04  9:04     ` Greg KH
  0 siblings, 0 replies; 5+ messages in thread
From: Greg KH @ 2019-06-04  9:04 UTC (permalink / raw)
  To: Guenter Roeck
  Cc: Zubin Mithra, # v4 . 10+, Guenter Roeck, blackgod016574,
	David Miller, kuznet, yoshfuji

On Tue, Jun 04, 2019 at 01:43:17AM -0700, Guenter Roeck wrote:
> On Tue, Jun 4, 2019 at 12:52 AM Greg KH <gregkh@linuxfoundation.org> wrote:
> >
> > On Mon, Jun 03, 2019 at 10:31:15AM -0700, Zubin Mithra wrote:
> > > Hello,
> > >
> > > CVE-2019-12378 was fixed in the upstream linux kernel with the following commit.
> > > * 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()")
> >
> > A CVE was created for that tiny thing?
> >
> > Hah, no, I think I'll refuse to apply it just for the very point of it.
> 
> We don't create CVEs, but we do have to get CVE fixes applied to our
> branches. We don't try to police the creation of CVEs, and we don't
> try to double-guess them since that would be futile (who guarantees
> that our double-guessing matches yours ?). We do have a policy to not
> apply CVEs directly but ask for stable tree merges instead to avoid
> deviation, and we (more specifically, Zubin) spend a lot of time
> validating the fixes before sending a request. I just made that
> official policy, but a policy is not cast in stone. We will stop doing
> that if we get this kind of response. If that is what you want, let me
> know.
> 
> Zubin, maybe hold back with -stable backport requests for the time
> being, and just apply missing patches directly to our branches. Sorry
> for the trouble.

It's not "trouble", and don't hold back on requesting stable backports,
I'm not asking for that at all, be reasonable.

What I am asking for is pushing back on the "all CVEs must be applied"
when obviously the patch is dumb.  It is trivial for anyone to get a CVE
for a kernel patch these days, and loads of work to try to get one
revoked (I tried in the past, gave up due to it being futile.)

So while CVEs might be a "flag" that you should look at something, they
are never a "this MUST be applied" rule that ANYONE should ever follow.

> > That's something that can not be triggered by normal operations, right?
> > It's a bugfix-for-the-theoritical from what I can see...
> >
> > > Could the patch be applied to v4.19.y, v4.14.y, v4.9.y and v4.4.y?
> >
> > Why are you ignoring 5.1?
> >
> Probably because no one is perfect.

That's fine, but always remember that I can not apply patches only to
older stable kernels and not newer ones.  When you see a patch is only
in 5.2-rcX, that's a big hint that maybe it should go to all stable
releases, if necessary.

And again, as always, for networking stable patches, please follow the
documented rules for how to ask for them.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2019-06-04  9:04 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-06-03 17:31 95baa60a0da8 ("ipv6_sockglue: Fix a missing-check bug in ip6_ra_control()") Zubin Mithra
2019-06-04  7:52 ` Greg KH
2019-06-04  8:04   ` Greg KH
2019-06-04  8:43   ` Guenter Roeck
2019-06-04  9:04     ` Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).