oss-sec mailing list archives

Re: Re: CVE-2021-20219 Linux kernel: improper synchronization in flush_to_ldisc() can lead to DoS


From: Sasha Levin <sashal () kernel org>
Date: Fri, 19 Mar 2021 13:55:07 -0400

On Fri, Mar 19, 2021 at 10:43:11AM -0400, Brad Spengler wrote:
Hi Sasha,

I'm sorry, but I can't let this email demonstrating a complete lack of
self-awareness go without comment.

I suppose we can't *require* them, but it's a matter of curtesy, right?
They already have that information, and instead of making a bunch of
other people do the same job they could just share the information to
begin with.

I'm seriously baffled that you could type those words out with a straight
face.  As we know happens often, including with the recent iSCSI
vulnerabilities, upstream has intentionally omitted CVE information
from kernel commit messages -- in other words:
"they already have the information, and instead of making a bunch of
other people do the same job they could just share the information to
begin with."

I'm really not sure how to respond to this. I don't own upstream, my
name isn't Linus, Greg, nor do I maintain a major subsystem. I don't
have any control over how upstream commits look like.

This isn't a claim that that process is perfect, this is just me saying
that you're barking up the wrong tree. I'd happily add that Linus's
"obfuscated" commit messages are making things more difficult for me,
but again - I can't control what he does.

Which is why I can type what I typed with a straight face: I'm trying to
improve the oss-sec process, I'm not in any way claiming the upstream is
superior or anything. I'm not sure why you're personally attacking me
here for the upstream process.

Do none of you understand at all that the problems that exist are entirely
of your own creation?  Neither you nor Greg ever come to this list with
announcements of your own.  That you have to endure a tiny fraction of what

I don't usually discover security vulnerabilities these days. I did in
the past and those were assigned CVE numbers.

Otherwise, I don't do analysis of a security impact of a fix.

the rest of the world is inflicted with from your intentional actions --
sorry, you are not the victims here, and it's completely ridiculous to
paint yourselves as one.

Could you specify what actions *I* did to hurt the world?

Greg started his tirade yesterday with a false assumption that the stable
kernels had already fixed the one issue August of last year.  That was not
true (stable kernels < 5.7 were all missing the fix).  Then he claimed SuSE
didn't bother to backport the fix.  That was not true:
https://github.com/SUSE/kernel/commit/b93bddd7ae24aa8ebe48d13dcff4011a34861482

If you guys want to complain about bad information, leaving it out of useless
snarky replies would be a good start.

Can you please stop complaining about Greg's mails as if I was the one
who wrote them? I'm not his alter-ego, twin, or so on. If you have a
concern with what he writes take it up with him.

My concern with the notifications is that some of them don't even
include a commit id, I never claimed (nor will) claim that stable
already fixed them all. On the contrary, I want that commit id to make
sure we did.

Exactly, they already must have this information, which is where some of
the frustration around these notifications comes from: it reads as
nothing more than a lip service.

You're assuming too much -- it's quite clearly someone new at RH doing these
recent advisories.

Great, let's work together on making it better, but it's been following
the same pattern for quite a while now.

--
Thanks,
Sasha


Current thread: