You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/linux/reporting_kernel_bugs.md
+54-44
Original file line number
Diff line number
Diff line change
@@ -52,61 +52,71 @@ If you can't figure out the right fix, but have some understanding of the bug, p
52
52
53
53
## Reporting security bugs
54
54
55
-
If you believe that a found bug poses potential security threat, consider following the instructions below.
56
-
Note, that these instructions are a work-in-progress and based on my current understanding of the disclosure process.
57
-
This instruction is now being discussed [here](http://seclists.org/oss-sec/2017/q3/242).
55
+
If you believe that a found bug a poses a potential security threat, consider the following instructions below.
56
+
The initial version of these guidelines was discussed [here](http://seclists.org/oss-sec/2017/q3/242).
58
57
59
-
If you don't want to deal with this complex disclosure process you can either:
58
+
The two main mailing lists for reporting Linux kernel security issues are listed below with guidelines.
59
+
Please read them carefully before sending anything to these lists.
60
60
61
-
1. Report the bug privately to `[email protected]`. In this case it should be fixed in the upstream kernel, but there are no guarantees that the fix will be propagated to stable or distro kernels. The maximum embargo on this list is 7 days.
62
-
2. Report the bug privately to a vendor such as Red Hat (`[email protected]`) or SUSE (`[email protected]`). They should fix the bug, assign a CVE, and notify other vendors. The maximum embargo on these lists is 5 weeks.
Official kernel.org CNA. CVE assignment team has its own procedure of manual voting whether the bug is CVE eligible.
73
68
74
-
### Reporting minor security bugs
69
+
### Vulnerability definition
75
70
76
-
To report minor security bugs (such as local DOS or local info leak):
71
+
From [cve.org](https://www.cve.org/resourcessupport/allresources/cnarules):
77
72
78
-
1. Report the bug publicly to kernel developers as described above and wait until a fix is committed. Alternatively, you can develop and send a fix yourself.
79
-
2. Request a CVE from MITRE through [the web form](https://cveform.mitre.org/). Describe the bug details and add a link to the fix (from `patchwork.kernel.org`, `git.kernel.org`or `github.com`) in the request.
80
-
3. Once a CVE is assigned, send the bug details, the CVE number and a link to the fix to `oss-security@lists.openwall.com`.
73
+
> A vulnerability is an instance of one or more weaknesses in a Product that can be exploited,
74
+
> causing a negative impact to confidentiality, integrity, or availability; a set of conditions
75
+
> or behaviors that allows the violation of an explicit or implicit security policy.
81
76
82
-
### Reporting major security bugs
77
+
According to [Greg Kroah-Hartman](https://youtu.be/KumwRn1BA6s?t=203), a kernel vulnerability is defined as:
78
+
> * Any user-triggerable crash or reboot
79
+
> * Memory UAF / leak / overflow (even 1 byte)
80
+
> * Incorrect boundary checks
81
+
> * Denial of service
82
+
> * Logic errors & lots of other things*
83
83
84
-
To report major security bugs (such as LPE, remote DOS, remote info leak or RCE):
84
+
*Data corruption/loss, performance issues, bugs that are not externally triggered are not considered kernel vulnerabilities.
85
85
86
-
1. Understand the bug and develop a patch with a fix if possible. Optionally develop a proof-of-concept exploit.
* When working on the patch together with the `[email protected]` members and upstream maintainers, keep the linux-distros aware of the progress.
109
-
* There should ideally be no delay between CVE description publication, distros' updates, upstream commit and notification to `[email protected]`. All of these should be on the same day, at worst.
110
-
* The moment the issue is made public (e.g. patch is submitted upstream, CVE description published, etc.) it must be reported to `[email protected]` right away.
91
+
It is strictly [recommended](https://docs.kernel.org/process/security-bugs.html#coordination-with-other-groups) to **exclude** other parties,
92
+
such as `linux-distros`, from the discussion until the fix is merged into the stable tree.
111
93
112
-
A good example of an LPE announcement structure on `[email protected]` can be found [here](http://seclists.org/oss-sec/2016/q4/607), however the timeline doesn't look right there: public announcement should have occurred right after the patch was submitted to netdev.
94
+
Note that `[email protected]` does not require CVE assignment; instructions for assigning a CVE are provided below.
95
+
96
+
### CVE assignment
97
+
98
+
kernel.org is now CNA (from [February 13, 2024](https://www.cve.org/Media/News/item/news/2024/02/13/kernel-org-Added-as-CNA)),
99
+
therefore they have reserved CVE IDs for the kernel vulnerability bugs classified as CVE.
100
+
101
+
CVE assignments (sometimes rejections) are publicly announced in the public list, see [linux-cve-announce](https://lore.kernel.org/linux-cve-announce) on which you can [subscribe](https://subspace.kernel.org/subscribing.html).
102
+
103
+
CVEs are typically assigned after the fact, with a delay of 1-2 weeks.
104
+
105
+
> Note: No hardware CVEs are issued by the Linux community (SPECTRE-like CVEs come from other sources) (c) Greg K-H.
106
+
107
+
For example, bugs in drivers that relate to the Linux kernel may be treated as CVEs.
108
+
However, hardware bugs in components like CPUs, NICs, and other chips that affect multiple operating systems (e.g., Linux kernel, Windows, macOS)
109
+
and are not caused by Linux kernel code should be handled by the hardware vendor.
110
+
111
+
Averaging 55 CVEs per week (2024 Q3):
112
+
> The CVE assignment team is very thorough and assigns CVE numbers to any bugfix that they identify.
113
+
> This explains the seemingly large number of CVEs that are issued by the Linux kernel team.
114
+
115
+
Kernel CVE assignment process is explained [here](https://www.kernel.org/doc/html/latest/process/cve.html), quoting the important paragraph:
116
+
> If the CVE assignment team misses a specific fix that any user feels should have a CVE assigned to it,
117
+
> please email them at <[email protected]> and the team there will work with you on it.
118
+
> Note that no potential security issues should be sent to this alias,
119
+
> it is ONLY for assignment of CVEs for fixes that are already in released kernel trees.
120
+
> If you feel you have found an unfixed security issue, please follow the [normal Linux kernel security bug reporting process](https://docs.kernel.org/process/security-bugs.html).
121
+
122
+
An example of a kernel-assigned CVE: [CVE-2024-50078](https://lore.kernel.org/linux-cve-announce/2024102936-CVE-2024-50078-cfe9@gregkh/T/#u).
0 commit comments