LWN: Comments on "Kernel.org's road to recovery" https://lwn.net/Articles/461552/ This is a special feed containing comments posted to the individual LWN article titled "Kernel.org's road to recovery". en-us Fri, 03 Oct 2025 19:07:53 +0000 Fri, 03 Oct 2025 19:07:53 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Kernel.org's road to recovery https://lwn.net/Articles/463302/ https://lwn.net/Articles/463302/ dlang <div class="FormattedComment"> the problem is that one person's 'bugfix' is another person's 'new feature'<br> <p> especially when the bugfix can end up refactoring the code in the process.<br> <p> yes, this is a big problem with Linux, but the rate of fixes (of all kinds) is the great strength of Linux. At this point nobody knows how to fix the weakness without giving up the strength. There are other OS groups (openBSD comes to mind) that seem like they follow the philosophy that you are advocating, but despite the fact that they had several years of a head start on Linux, their development models have caused them to be far less useful on current hardware. (and therefor any security benefits they may provide, far less useful) <br> <p> <p> I don't understand your comment about the kernel developers being unable to provide shared access to a single kernel image.<br> <p> are you referring to the fact that there was a privilege escalation vulnerability on kernel.org? if so, any conclusions about what the problem was need to wait until we learn what happened. And in any case, the vast majority of the kernel developers were not involved in administering the systems (and note that it was several systems, not a single system)<br> </div> Mon, 17 Oct 2011 07:28:36 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463299/ https://lwn.net/Articles/463299/ malor <blockquote><I>Unfortunately trying to separate feature from fix work didn't work as a process from the kernel developers perspective</I></blockquote><P> And that, right there, is the single core problem with Linux security.<P> Security is hard. It means more pain during development. Separating fixes and features is a pain in the ass. But if it doesn't get done, you end up in the snarl they're in now.<P> Even the <I>developers themselves</i> can't provide secure shared access to a single Linux kernel image. How can anyone else expect to?<P> Mon, 17 Oct 2011 06:53:26 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463291/ https://lwn.net/Articles/463291/ raven667 <blockquote>3. you haven't explained what 'all of the fixes' means. you and others already said that *everything* not proven otherwise is a security fix therefore the same everything must be backported by everyone who cares which in practice is possible only by following linus's git HEAD. i bet even you don't dare to do that to your company's servers (i actually wonder what you do given that you don't use -stable either).</blockquote> <p>I don't know if you pay attention to kernel development but from my understanding running the latest Linus kernel release is what is recommended to have all the fixes. I'm sure there are some people who _do_ run raw Linus kernels who want the latest fixes as soon as they are out of the oven. The current Linus kernel certainly has more security relevant fixes than any vendor kernel which only has backports as the very nature of cherry picking backports is going to miss security fixes which aren't known at the time the fix is made. That is what the kernel release announcements recommend. <P>Many people think running the latest kernel.org release is potentially too disruptive due to other changes unrelated to bug and security fix work. Unfortunately trying to separate feature from fix work didn't work as a process from the kernel developers perspective which is why the development process was changed in the transition from 2.4 to 2.6 so that feature and architectural changes are fed right into the main line of development. <p>I think that the major vendors (RedHat, Debian, SuSE, various embedded, etc.) should continuously re-evaluate how close they can run to the main line of kernel.org kernels rather than trying to cherry pick backports and maintain their own "stable" forks. Ideally the regular kernel releases would be equivalent in stability and superior in security than the current situation. Mon, 17 Oct 2011 01:09:45 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463272/ https://lwn.net/Articles/463272/ PaXTeam <div class="FormattedComment"> <font class="QuotedText">&gt; not all patches that have security implications are known at the time they are created</font><br> <p> so far so good.<br> <p> <font class="QuotedText">&gt; so if you only install fixes that were tagged as security fixes, you</font><br> <font class="QuotedText">&gt; will miss other fixes that have security implications because those</font><br> <font class="QuotedText">&gt; implications were not known at the time they were written, and so they</font><br> <font class="QuotedText">&gt; were not tagged.</font><br> <p> now, following this logic, noone will ever be able to apply all security fixes since the security impact of a given commit may reveal itself any time in the distant future. therefore everyone who applies anything (tagged or not) is in a constant state of 'not tagged as being a security fix, then it doesn't have security implications'. IOW, i don't see the usefulness of your statement, it looks like a tautology.<br> <p> <font class="QuotedText">&gt; what decreases security is the attitude that if it's not tagged as being</font><br> <font class="QuotedText">&gt; a security fix, then it doesn't have security implications.</font><br> <p> why does it decrease security?<br> <p> and since you've just established that everyone can only do selective backporting, regardless of commits being tagged with whatever or not, this attitude is seemingly prevalent, even you suffer it yourself, so why does it matter again?<br> <p> <font class="QuotedText">&gt; And if even you are making the mistake that tagging known security fixes</font><br> <font class="QuotedText">&gt; means that other fixes don't need to be applied (on the basis that they</font><br> <font class="QuotedText">&gt; don't have security implications),</font><br> <p> actually, i don't make that mistake, in fact, i don't see it as a mistake and you have yet to explain *why* it is a mistake at all. for a start, your acknowledging that fixing a security bug doesn't decrease security means that you're already in contradiction.<br> <p> <font class="QuotedText">&gt; then you have just proven the case that many of the kernel developers</font><br> <font class="QuotedText">&gt; are trying to make, that tagging some patches as security related will</font><br> <font class="QuotedText">&gt; cause people to ignore the others and have less security than updating</font><br> <font class="QuotedText">&gt; to a newer version with all of the fixes</font><br> <p> this one bleeds from several wounds, i'm afraid:<br> <p> 1. you haven't shown evidence that people are actually ignoring anything else but explicitly marked security fixes (i think i asked this one before ;).<br> <p> 2. you haven't shown evidence that ignoring anything but explicitly marked security fixes is a bad thing (you actually acknowledged that it's not, now what ;).<br> <p> 3. you haven't explained what 'all of the fixes' means. you and others already said that *everything* not proven otherwise is a security fix therefore the same everything must be backported by everyone who cares which in practice is possible only by following linus's git HEAD. i bet even you don't dare to do that to your company's servers (i actually wonder what you do given that you don't use -stable either).<br> <p> 4. you haven't shown evidence that *not* ignoring (i.e., backporting) random unmarked paches increases one's security/etc. you see, all those security and other fixes are the result of some *earlier* change that *introduced* the problem, so you'd have to somehow prove that the net result of backporting everything under the sun (i.e., following git HEAD) is positive, not negative.<br> </div> Sun, 16 Oct 2011 21:37:41 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463265/ https://lwn.net/Articles/463265/ malor But less stability, because patches have an annoying habit of introducing both regressions and new, unwanted features, which can themselves, of course, have all kinds of nasty security implications.<P> <blockquote><I>you have just proven the case that many of the kernel developers are trying to make, that tagging some patches as security related will cause people to ignore the others and have less security than updating to a newer version with all of the fixes</i></blockquote><P> That's up to <I>them</i> to decide. The guys running these huge, complex systems are pretty goddamn good at what they're doing, and you guys are forcing new, untested code down their throats. <P> Let people have their own agency, and make their own decisions. Don't try to force them to do things the way YOU think they should, sitting there coding on your laptop. Let the guys (and gals) standing in those roaring data centers full of thousands of machines make those calls for themselves.<P> Just be <b>honest</b>, and things will come out better for the people who choose to use your code. If you are not expert in large-scale systems management, you shouldn't try to substitute your judgement for those who are. <P> Sun, 16 Oct 2011 06:35:13 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463254/ https://lwn.net/Articles/463254/ dlang <div class="FormattedComment"> not all patches that have security implications are known at the time they are created<br> <p> so if you only install fixes that were tagged as security fixes, you will miss other fixes that have security implications because those implications were not known at the time they were written, and so they were not tagged.<br> <p> it's not that fixing a security bug decreases security. what decreases security is the attitude that if it's not tagged as being a security fix, then it doesn't have security implications.<br> <p> tagged as a security fix guarantees security implications<br> <p> not tagged as a security fix does not guarantee that there are no security implications.<br> <p> <p> And if even you are making the mistake that tagging known security fixes means that other fixes don't need to be applied (on the basis that they don't have security implications), then you have just proven the case that many of the kernel developers are trying to make, that tagging some patches as security related will cause people to ignore the others and have less security than updating to a newer version with all of the fixes<br> </div> Sat, 15 Oct 2011 21:19:37 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463252/ https://lwn.net/Articles/463252/ dlang <div class="FormattedComment"> I actually don't think that all important fixes get backported to -stable, which is part of the reason why I tend not to rely on them as a long-term measure.<br> <p> I see the -stable branch as useful for fixing any functional bugs that slipped through, but I don't rely on them for fixing security bugs<br> </div> Sat, 15 Oct 2011 21:11:22 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463244/ https://lwn.net/Articles/463244/ PaXTeam <div class="FormattedComment"> <font class="QuotedText">&gt; if people only apply patches that say "this is a security patch" in the</font><br> <font class="QuotedText">&gt; commit, they will skip installing a lot of security related fixes.</font><br> <p> if security fixes are marked as such then how can they be missing 'security related fixes'?<br> <p> <font class="QuotedText">&gt; This can lead to worse security than not making such comments in the commit message.</font><br> <p> how does fixing a security bug *decrease* security?<br> </div> Sat, 15 Oct 2011 16:40:25 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463243/ https://lwn.net/Articles/463243/ PaXTeam <div class="FormattedComment"> <font class="QuotedText">&gt; You contend that my statement that for few bugs developers are aware of</font><br> <font class="QuotedText">&gt; their security implications.</font><br> <p> actually no, what i contend is your assertion of there being 'very, very few' commits fixing a bug with a known security impact to be of relevance. have you got evidence for this assertion?<br> <p> <font class="QuotedText">&gt; Then prove me wrong by showing lots and lots of examples of patches</font><br> <font class="QuotedText">&gt; where the developer did know the security impact.</font><br> <p> this is tangential, but i actually did provide examples in the past, here on LWN, in threads you also participated in so let google be your friend if you really want to see examples.<br> <p> <font class="QuotedText">&gt; The "apply important fixes" angle is presumably well covered by the</font><br> <font class="QuotedText">&gt; stable kernel series.</font><br> <p> i guessed you'd bring this up but it means you also shoot yourself in the foot ;). you see, there's a contradiction in your statements. according to you:<br> <p> <font class="QuotedText">&gt; Count me in the camp with "any kernel bug that can't be shown to be</font><br> <font class="QuotedText">&gt; absolutely neutral with respect to results is a security bug."</font><br> <p> that implies that most of the bugfixes must be backported to -stable but we know that's not the case. therefore either -stable doesn't apply all 'important fixes' (including security fixes) or most bugfixes aren't security related as you claimed before. which is it?<br> <p> <font class="QuotedText">&gt; Your second point is pure nonsense, ext* (and a lot of other classes of</font><br> <font class="QuotedText">&gt; patches) are important. Nobody is advocating suppressing any class of</font><br> <font class="QuotedText">&gt; patches, just flagging commits with potential miscreant atractors.</font><br> <p> we aren't talking about suppressing patches per se (that'd be crazy), but important information in commit messages (security impact in general, file system corruption for the ext* case i brought up as comparison).<br> <p> so you're admitting that there's a useful category of impact information that you would not advocate to suppress. that's a good step! now you'll have to explain why 'security impact' is different from 'filesystem corruption' in this regard. for that you'll have to explain how exploiting security bugs can never ever corrupt filesystems (else you'll have to conclude that at least some of the security fixes must be marked for filesystem corruption, which is enough to grep for, contradicting your other desire to make security fixes non-greppable), and also why helping miscreants to corrupt filesystems is a good thing (i.e., you can't use the same argument for contradicting purposes).<br> <p> <font class="QuotedText">&gt; Third, noone I heard of is trying to supress security information.</font><br> <font class="QuotedText">&gt; Nobody is in any position to do so, in fact.</font><br> <p> did you read the Linus mail (and the whole thread actually) i linked to? he admitted it.<br> <p> <font class="QuotedText">&gt; What I do see is efforts to fix security bugs, and get the fixes out to</font><br> <font class="QuotedText">&gt; anybody affected as soon as humanly possible, hopefully without alerting</font><br> <font class="QuotedText">&gt; would-be miscreants beforehand.</font><br> <p> how can they be fixing security bugs when they don't even know what bugs have a security impact? or are you now praising selective fixing of bugs?<br> <p> <font class="QuotedText">&gt; And yes, LWN's security errata page is a part of this effort.</font><br> <p> so when kernel devs put security impact info into a commit it's a bad thing but when LWN points at the same commit it's a good thing. i think you want to try this one again.<br> <p> <font class="QuotedText">&gt; I never said exploits are written as you say, so this point is moot.</font><br> <p> but you did, even in this latest response in yours:<br> <p> <font class="QuotedText">&gt; [...]hopefully without alerting would-be miscreants beforehand.[...]</font><br> <p> this statement means that you assume that people can write exploits *because* they read about exploitable bugs in the commit message. that is, you're claiming that to exploit a kernel bug one has to read about the fact that a given commit fixes it, and magically the exploit appears out of thin air.<br> <p> in the reality out there, people writing exploits couldn't care less about what the commit message says about the security impact, instead they'll look at the actual code and decide based on that. in other words, your justification to cover up security impact information in commit messages doesn't stand on any legs so far.<br> <p> <font class="QuotedText">&gt; Security through obscurity works as long as the attackers are in the</font><br> <font class="QuotedText">&gt; dark, which will usually be for a limited time only.</font><br> <p> have you got evidence that attackers are in the dark when all they can rely on is the code in a patch (vs. the commit message)? as a sidenote, i'd like to hear your theory on how 0-day exploits are written 'cos they certainly can't be based on any security related information in the commits.<br> <p> <font class="QuotedText">&gt; AFAICS, there are clear negative effects (miscreants grepping,</font><br> <p> you haven't shown any evidence for this.<br> <p> <font class="QuotedText">&gt; "only apply flagged security fixes" mindset)</font><br> <p> you haven't shown any evidence for this. (see a theme here? repeating the same statement without evidence doesn't make it any more true)<br> <p> <font class="QuotedText">&gt; and few (if any) positive ones,</font><br> <p> you must be out of your mind if you think that making security fixes public has no positive outcome. what else on earth would allow people to fix their systems?<br> <p> <font class="QuotedText">&gt; so the net result would be a loss.</font><br> <p> since all the premises for this conclusion have yet to be shown to be true, the jury is still out on this one.<br> <p> <font class="QuotedText">&gt; You clearly see it otherwise, but haven't shown any positive result of your proposal.</font><br> <p> it's not my proposal, it's what most of the rest of the world does (heck, even the linux world, just ask any distro maintainer how much they appreciate that they have to reverse engineer security impact information from kernel commits).<br> </div> Sat, 15 Oct 2011 16:31:22 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463102/ https://lwn.net/Articles/463102/ anselm <blockquote><em>Security is probably the hardest problem in computing, and if they are indeed saying "there will always be root exploits", it sounds like they're giving up on the idea entirely.</em></blockquote> <p> Not necessarily. Maybe they're just being realistic while they're trying to fix problems as they are discovered (and prevent them where they can). </p> <p> With a program of the size and complexity of the Linux kernel, I would be very sceptical of anybody claiming the logical opposite, namely that »there will never be even a single root exploit«. Not even the OpenBSD folks subscribe to that kind of hubris ;^) </p> Fri, 14 Oct 2011 07:14:45 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463089/ https://lwn.net/Articles/463089/ dlang <div class="FormattedComment"> they are working to fix any problems they find as fast as they can.<br> <p> the kernel developers are not giving up.<br> <p> there was one person who made the claim in the discussion on containers that containers were not good enough, but on the other hand, I'm one of the people who says that virtualisation isn't good enough isolation for some applications due to possible bugs in the hypervisor. It all depends on how much security you are going for.<br> <p> This is part of the reason that SELinux is optional.<br> </div> Fri, 14 Oct 2011 03:10:07 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463080/ https://lwn.net/Articles/463080/ malor <blockquote><I>major kernel developers comment was that it wasn't worth the effort to increase security separation between containers because there will always be local root exploits that will break separation. </I></blockquote><P> Well, that's good in the sense that they're admitting there's a big problem. But I would argue that if they can't keep user accounts secure from gaining root access, then there's really not much point to even HAVING user accounts. If your summary is accurate, there's no way you can safely use Linux to share access between potentially hostile accounts on one kernel. You can sorta do it through virtualization, but running an entire kernel per user is a hell of a lot of overhead to carry around.<P> Security is probably the hardest problem in computing, and if they are indeed saying "there will always be root exploits", it sounds like they're giving up on the idea entirely. They want to make it go <I>fast</i>, and security be damned. <P> This is something that people need to be very aware of; that wording makes it sound like they're throwing in the towel. If so, Linux is no longer appropriate for many use cases, particularly when lives are at risk. Fri, 14 Oct 2011 01:29:04 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463052/ https://lwn.net/Articles/463052/ raven667 <div class="FormattedComment"> This is probably something that reasonable people can disagree on, whether it is better to be protected against _some_ attacks but have a system which runs stably or be protected against _more_ attacks (but not all, the kernel developers do not claim perfection but instead the opposite) and suffer stability issues due to unrelated changes.<br> </div> Thu, 13 Oct 2011 20:20:08 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463030/ https://lwn.net/Articles/463030/ raven667 <blockquote> And it makes the Linux kernel look more secure than it actually is, which is another form of lying by omission.</blockquote> <p>I just have to respond to this one thing. The kernel announcements and general discussions have been pretty open about the belief that it is _less_ secure than many people would like. Just the other day in a discussion about containers and namespaces, major kernel developers comment was that it wasn't worth the effort to increase security separation between containers because there will always be local root exploits that will break separation. <p>The kernel developers do not appear to be trying to claim more security by omission, they are explicitly claiming less. Thu, 13 Oct 2011 18:32:53 +0000 Kernel.org's road to recovery https://lwn.net/Articles/463022/ https://lwn.net/Articles/463022/ dlang <div class="FormattedComment"> and since the security impact of the patches is usually not known at the time the commit is written, if people only apply patches that say "this is a security patch" in the commit, they will skip installing a lot of security related fixes.<br> <p> This can lead to worse security than not making such comments in the commit message.<br> <p> In my opinion, this is a far bigger reason to not put such comments in the commit message than worries about bad guys reading them<br> </div> Thu, 13 Oct 2011 17:33:24 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462925/ https://lwn.net/Articles/462925/ malor <div class="FormattedComment"> And vonbrand is saying 'all bugs are security-related'. If that's true, which I do NOT grant, but if it is, then adding known security impacts to a bugfix note is irrelevant, because the bad guys are going to be looking at the code on EVERY patch. <br> <p> Only good guys read changelogs, basically, so hiding security information only hurts good guys. And it makes the Linux kernel look more secure than it actually is, which is another form of lying by omission.<br> <p> There is a reason why many many admins try to limit patches to known security-related issues... it's because they're constantly getting new features shoveled at them, with brand-new potential, unanalyzed security impacts. And programmers are very good at introducing weird and subtle regressions with their fixes. Architects and administrators only get shit when stuff breaks, so they try to change as little as possible with a setup, once they know it works. Even tiny tuning adjustments in the kernel code can throw a large-scale application out of kilter, so the people in charge of actually putting all that abstract code to real work in the world try to avoid running new code in a given application unless they either have to, or need new features. <br> <p> The harder the programmers make it on the architects and administrators, the more appealing the BSDs, Solaris, and even Windows look. And hiding security impacts makes it much harder for them to do their jobs. Programmers just wave their hands and say "You should just run all the code we give you, no matter what", but they don't lose their jobs when the cluster dies.<br> <p> </div> Thu, 13 Oct 2011 08:47:50 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462921/ https://lwn.net/Articles/462921/ Klavs <div class="FormattedComment"> I don't understand why you keep believing that any "grep'able" info in changelogs as to some bugfix having a security impact, will in ANY way help someone who is smart enough to actually exploit it.<br> <p> If you're smart enough to exploit a bug of a certain type - you'll be looking at the code(!) for any lines of C - that looks like the certain bug you want to exploit. I would like to hear of a person - smart enough to actually write an exploit, but dumb enough to be helped by information of security impact in changelogs? Pls. - just find me one, who can actually write an exploit, who thinks he/she is helped by such a msg in a changelog :)<br> <p> As you may have gathered, I see no reason for actively excluding available information of bugs having a security impact.<br> <p> Anyone dumb enough to think because it sometimes says along the lines of "security impact" in the changelog (which it actually already does some times AFAIK) - they should only upgrade when that's the case - is already doing their job horribly - and won't be worse off, if any relevant information was actually in the changelogs.<br> </div> Thu, 13 Oct 2011 08:32:41 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462920/ https://lwn.net/Articles/462920/ Klavs <div class="FormattedComment"> Not to be annoying here - but fact remains, that upgrading to new versions of the kernel, also includes new features, which in turn may add more security problems, than the bugfixes solved.<br> <p> There's a reason people pay RHEL to backport ONLY fixes (bugs, security etc.) - so the change becomes as little as possible - increasing the likelyhood of the amount of bugs with security impact going down, as time goes by and bugfixes are applied.<br> </div> Thu, 13 Oct 2011 08:23:23 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462919/ https://lwn.net/Articles/462919/ jrn <div class="FormattedComment"> <font class="QuotedText">&gt; Currently, they - by their own admission - choose not to reveal such knowledge in changelogs</font><br> <p> Again, be careful who "they" is. Linus has said he chooses to avoid easily greppable phrases, yes.<br> </div> Thu, 13 Oct 2011 08:20:07 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462916/ https://lwn.net/Articles/462916/ Klavs <div class="FormattedComment"> I'm sorry - but all that this discussion seems to be about, is that PaxTeam (and others) would like to developers to write in changelogs, if they know the bug fixed, to have a security impact. That's all.<br> <p> Currently, they - by their own admission - choose not to reveal such knowledge in changelogs (which could defintely be called a "lie of omission").<br> <p> I don't think anyone disagrees with the fact, that even if such knowledge was in the changelog, many bugfixes, would not be known by the dev(s) to be security fixes as well - and as such, one will never be able to simple grep for a "Security fix" or similar in changelogs to know when to upgrade to stay secure - such is the world of computers today :)<br> </div> Thu, 13 Oct 2011 08:14:31 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462588/ https://lwn.net/Articles/462588/ dlang <div class="FormattedComment"> I can't talk about the 'large part of the customer base' part of this question, but I work in a large (8000+ person) company that runs thousands of servers and I see this mindset of "if it's not tagged as a security issue, we don't really need to apply it" continuously.<br> <p> Far too many people have the opinion that change, _any_ change should be avoided and so they avoid doing any changes that aren't either tagged as security fixes or causing an outage.<br> </div> Tue, 11 Oct 2011 18:58:44 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462530/ https://lwn.net/Articles/462530/ vonbrand <p>You contend that my statement that for few bugs developers are aware of their security implications. Fine. Then prove me wrong by showing lots and lots of examples of patches where the developer did know the security impact. The "apply important fixes" angle is presumably well covered by the stable kernel series. If somebody wants to do their own work here, they'd better know what they are doing. Just grepping around for some keywords in the changelogs won't get them very far.</p> <p>Your second point is pure nonsense, ext* (and a lot of other classes of patches) are important. Nobody is advocating suppressing any class of patches, just flagging commits with potential miscreant atractors.</p> <p>Third, noone I heard of is trying to supress security information. Nobody is in any position to do so, in fact. What I do see is efforts to fix security bugs, and get the fixes out to anybody affected as soon as humanly possible, hopefully without alerting would-be miscreants beforehand. Sure, it's not perfect, you are wellcome to propose ways of making it more fluid. And yes, LWN's security errata page is a part of this effort.</p> <p>I never said exploits are written as you say, so this point is moot.</p> <p>Security through obscurity works as long as the attackers are in the dark, which will usually be for a limited time only. So it can have a short term beneficial effect, but won't normally work long term. That is all I said.</p> <p>If the net effect of posting in upstream changelogs that a patch fixes, say, an overflow is a net positive or negative is very much up for debate. AFAICS, there are clear negative effects (miscreants grepping, "only apply flagged security fixes" mindset) and few (if any) positive ones, so the net result would be a loss. You clearly see it otherwise, but haven't shown any positive result of your proposal. And the ones in charge of writing the kernel's commit messages are the ones in charge of the decision, not you or me.</p> Tue, 11 Oct 2011 15:48:11 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462505/ https://lwn.net/Articles/462505/ PaXTeam <div class="FormattedComment"> right and we're talking about linux here, so give it another try. like, show me poeple who work for companies/distros of any significance (in terms of user base) *and* live under this mistaken belief. otherwise you've got no argument. also, this software you mentioned, do its authors publish security errata? do they mark security fixes explictly? did you tell them that they must at once stop doing that because it'll cause unspeakable damage?<br> </div> Tue, 11 Oct 2011 10:34:55 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462496/ https://lwn.net/Articles/462496/ mpr22 <p>I have actually encountered <em>people who should know better</em> engaging in behaviours sufficiently similar to "security fixes only!", though not on Linux. In this case it was approximately "fixes for our known problems only, cherry-picked from the more recent patches so that we can play semantic games with the qualification authority to avoid requal", and they subsequently ran into a problem that had been fixed in the latest patch, <em>which they had been sent</em>. They were somewhat upset when they were told that they wouldn't get support unless they applied the patches properly.</p> <p>So yes, these people exist, and what matters is not the detail metric "how large a portion of the general-public user base do they feed kernels to?", but the overall metric "how important is it that they not screw up?".</p> Tue, 11 Oct 2011 09:07:30 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462490/ https://lwn.net/Articles/462490/ PaXTeam <div class="FormattedComment"> let's see these 'answers'.<br> <p> <font class="QuotedText">&gt; There are very, very few of those; way too few to be of any relevance</font><br> <font class="QuotedText">&gt; for whatever you are trying to do.</font><br> <p> first, noone has ever shown actual numbers, i.e., all this 'very few of those' is purely made up, with *nothing* whatsoever to back it up (i bet you don't answer back with actual numbers much like you ignored the rest of my questions so far, you know how well that advances your arguments ;).<br> <p> second, what does it matter whether there's a lot or only a few of such fixes where the security impact is known? are they doing the same judgement call when they're fixing other kinds of bugs? like, are we to assume now that file system corruption bugs in ext* are also suppressed because "there are very very few of those"? they can't have it both ways.<br> <p> third, it's none of their business what any given user is trying to do with that information. the rest of the world publishes security errata all the time with varying level of details, but the very fact of having a security bug is not usually suppressed (save for a few companies and apparently linux left in the dark ages).<br> <p> <font class="QuotedText">&gt; We worry there are people out there who will think that only the commits</font><br> <font class="QuotedText">&gt; flagged as with security impact are important, so encouraging said</font><br> <font class="QuotedText">&gt; selectiveness is a loss.</font><br> <p> first, why is it a loss when someone backports a security fix he learns about? does it reduce his security or something?<br> <p> second, and i asked this already in this very thread, who are these 'people out there' who think this way? show me a single and relevant one (i.e., not your grandma but someone's responsible for the kernel of some sizable chunk of the linux user world). i bet you can't show anyone, and you just made this excuse up to appear 'caring' yet you're achieving the exact opposite.<br> <p> third, and i asked this already, but let's see if you'll avoid it: what do you think about LWN's having an entire page dedicated to security resources (errata, etc)? are they too "encouraging said selectiveness" causing a net loss? i'm sure the LWN folks are all ears to hear you out on this one.<br> <p> <font class="QuotedText">&gt; Furthermore, there are miscreants grepping changelogs for stuff</font><br> <font class="QuotedText">&gt; like "overflow" to zero in on potential security problems.</font><br> <p> first, show me evidence of this but then i'm pretty sure you also made this up. little hint for the future: evidence based arguments fare much better in a discussion than your imagination.<br> <p> second, and i explained this too some time ago, you're assuming the existence of a person with impossible qualities. namely, you assume that a person can write an exploit based on a patch when he can read its commit message but he's unable to write said exploit based on the same patch when he cannot read the commit message. you should probably talk to some exploit writers one of these days and ask them whether they write exploits based on a few words in a commit *message* or the actual *code* being fixed. you'll be surprised, i guarantee you that ;).<br> <p> third, you're assuming that exploit writers write exploits based on the commit that fixes the bug vs. the one that introduces it. what evidence is this assumption based on?<br> <p> <font class="QuotedText">&gt; Yes, security through obscurity, which is useful as long as it isn't for</font><br> <font class="QuotedText">&gt; the long term or the only security measure.</font><br> <p> why is security by obscurity useful when it's not for the long term? and what other security measures do the kernel devs have in place?<br> <p> <font class="QuotedText">&gt; What could be won with the flagging is minuscule, what would be lost is,</font><br> <font class="QuotedText">&gt; in our opinion, much more than the gain.</font><br> <p> neither of this has been established yet, but keep trying ;).<br> <p> <font class="QuotedText">&gt; If you want to research the security impact of bugs, knock yourself out.</font><br> <font class="QuotedText">&gt; It's all out there for the taking.</font><br> <p> so on one hand the loss (caused by disclosing security impact of fixes) is much more than the gain but on the other hand they're encouraging others to do the very same and hence cause a net loss (harm). now that's some logic there. unfortunately, they can't have it both ways.<br> <p> </div> Tue, 11 Oct 2011 08:46:57 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462489/ https://lwn.net/Articles/462489/ PaXTeam <div class="FormattedComment"> <font class="QuotedText">&gt; He asked not to indulge in a theater of flagging commits with useless</font><br> <font class="QuotedText">&gt; (and probably misleading) comments.</font><br> <p> no, he didn't *ask* anything. he *declared* that he does *not* want to see greppable words that'd identify a commit as fixing a security bug. no ifs and buts there. in less euphemistic words it's also called a coverup. second, if identifying security fixes was 'useless (and probably misleading)' then 1. why does he still let through such commits sometimes, 2. why does the rest world do this? something doesn't add up here if you theory holds ;).<br> </div> Tue, 11 Oct 2011 07:36:46 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462480/ https://lwn.net/Articles/462480/ jrn <div class="FormattedComment"> Sorry, I don't really want to participate in a conversation like that.<br> <p> I don't recall accusing anyone of dishonesty and lying, but if I'm mistaken, I'd be glad to have a pointer. Cheers.<br> </div> Tue, 11 Oct 2011 02:23:23 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462479/ https://lwn.net/Articles/462479/ vonbrand <p>Examples, please? You go around accusing people of dishonesty and lying, and have yet to show an example of said behaviour, let alone that it is widespread, and even less that it has a measurable impact on the kernel's security overall (which it really can't have, the commit messages are pure comments).</p> Tue, 11 Oct 2011 01:59:53 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462477/ https://lwn.net/Articles/462477/ jrn <div class="FormattedComment"> <font class="QuotedText">&gt;&gt; reveal security implications you already know of.</font><br> <p> <font class="QuotedText">&gt; And the simple answer has been given over and over: "There are very, very few of those</font><br> <p> Are you kidding? There are very, very many of those.<br> <p> A more complex answer would be more accurate: "Sometimes people are sloppy or forgetful, sometimes they do not want to reveal how to exploit a bug, and sometimes by some strange fluke they actually do do a good job of explaining what a patch fixes". And while it is right to be concerned that some patches do a poor job of explaining their impact and why anyone would want the change they make (which is what a change description should do), mischaracterising the problem and helplessly demanding that other people solve it instead of, say, reviewing patches as they appear on the linux-kernel@ list and providing feedback to help their authors, does not seem like a particularly good way to improve, well, anything.<br> </div> Tue, 11 Oct 2011 01:49:47 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462476/ https://lwn.net/Articles/462476/ vonbrand <p>You presume that the kernel hackers are prescient, and immediately know the security ramifications of each and every bug they fix. Sorry to disapoint you, if they were that smart they wouldn't make the patched mistakes in the first place. Unless you are into <em>serious</em> conspiracy theories, where they insert the bugs full knowing they can be exploited...</p> Tue, 11 Oct 2011 01:28:32 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462474/ https://lwn.net/Articles/462474/ vonbrand <blockquote> What we <em>actually</em> ask: reveal security implications you already know of. That's it. The entire request, in two words, is "be honest". You wouldn't think that would be a big deal. </blockquote> <p>And the simple answer has been given over and over: "There are very, very few of those; way too few to be of any relevance for whatever you are trying to do. We worry there are people out there who will think that only the commits flagged as with security impact are important, so encouraging said selectiveness is a loss. Furthermore, there are miscreants grepping changelogs for stuff like "overflow" to zero in on potential security problems. Yes, security through obscurity, which is useful as long as it isn't for the long term or the only security measure. What could be won with the flagging is minuscule, what would be lost is, in our opinion, much more than the gain. If you want to research the security impact of bugs, knock yourself out. It's all out there for the taking."</p> Tue, 11 Oct 2011 01:24:32 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462471/ https://lwn.net/Articles/462471/ vonbrand <p>He asked not to indulge in a theater of flagging commits with useless (and probably misleading) comments. That is a very far cry from dishonesty.</p> <p>The contention that such commit messages will make Linux look bad is nonsense, if somebody wants to get data on security problems there are lots of other sources, very much more accurate than self-selected comments on patches.</p> Tue, 11 Oct 2011 01:10:01 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462467/ https://lwn.net/Articles/462467/ malor <div class="FormattedComment"> Ok, I'm done talking to you. You just keep moving the goalposts around, anything to not be wrong.<br> <p> </div> Tue, 11 Oct 2011 00:24:19 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462462/ https://lwn.net/Articles/462462/ vonbrand <p>And? How do you know whoever patched the bug knew the CVEs beforehand? This is a RHEL kernel, i.e., a stable kernel (+ patches), so this came probably via the stable patch stream.</p> Tue, 11 Oct 2011 00:09:39 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462453/ https://lwn.net/Articles/462453/ malor Oh, and I didn't mention the <b>remote</b> root exploit from today's post, because that looks hard to exploit, involving an attempt to mount a CIFS share from a hostile server. But it is remote root, and using CIFS to share files across security boundaries is hardly unheard of. Mon, 10 Oct 2011 22:47:14 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462452/ https://lwn.net/Articles/462452/ malor Try the security alert from five days ago: <P> From <a href="https://rhn.redhat.com/errata/RHSA-2011-1350.html">RedHat errata</A>:<P> <blockquote>* Flaws in the AGPGART driver implementation when handling certain IOCTL commands could allow a local user to cause a denial of service or escalate their privileges. (CVE-2011-1745, CVE-2011-2022, Important)<P> * An integer overflow flaw in agp_allocate_memory() could allow a local user to cause a denial of service or escalate their privileges (CVE-2011-1746, Important)</blockquote><P> Bunch of other stuff too, but there's two likely local root exploits from October 5. Took me about ten minutes to spot, and that's only because I had to look through some lesser CVEs LWN posted about twenty minutes ago.<P> It would have proved the point even more thoroughly to have gotten a local root exploit today, but five days ago, I think, is adequate. Mon, 10 Oct 2011 22:41:59 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462451/ https://lwn.net/Articles/462451/ malor And why on earth are you fighting me so hard about simple <i>honesty</i>? Mon, 10 Oct 2011 22:25:36 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462450/ https://lwn.net/Articles/462450/ malor <div class="FormattedComment"> Have you even read the thread? That post strikes me as deliberate misunderstanding. <br> <p> If a developer knows a bug has a definite security impact, I want to know that. That's all. Nobody else can know what's in his or her head, or read what's on the bug reports that have been submitted. <br> <p> Be honest about known security implications, instead of hiding them. It's not a difficult request. It probably takes more work to come up with euphemisms to hide the security issue, than it does to just write what they're actually doing.<br> <p> </div> Mon, 10 Oct 2011 22:23:46 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462368/ https://lwn.net/Articles/462368/ PaXTeam <div class="FormattedComment"> you're talking about possible lifetimes of security bugs, i specifically talked about the ones whose security impact is known *before* any fix gets committed. the problem with such fixes is that their commit message tends to not mention that little fact. and no, such information doesn't belong to any other tree first than the one where said fix is committed. do you understand the problem now?<br> <p> <font class="QuotedText">&gt; For me it is enough that the bug got fixed, and move on.</font><br> <p> how do you know when a security bug gets fixed when such information is covered up? have you got some psychic abilities or other channels that mere mortals are not privy to?<br> <p> <font class="QuotedText">&gt; Sure, security fixes should be backported.</font><br> <p> yes, if you know which commits fix security issues. you too can point out every single commit that has a CVE but isn't mentioned in the git commit log. you see, if you can't find them, then how could others?<br> <p> <font class="QuotedText">&gt; You know what, that is what the -stable trees are for...</font><br> <p> wait, are you saying that the -stable trees contain all the CVEs that are missing in the Linus tree (since the importance of the backported commits must be known by then)? can you back it up with actual numbers? ;)<br> </div> Mon, 10 Oct 2011 14:43:25 +0000 Kernel.org's road to recovery https://lwn.net/Articles/462367/ https://lwn.net/Articles/462367/ PaXTeam <div class="FormattedComment"> this is what you said:<br> <p> <font class="QuotedText">&gt; Any such assesment they do will miss an order of magnitude more</font><br> <font class="QuotedText">&gt; exploitable flaws than the ones flagged, and flag many that are</font><br> <font class="QuotedText">&gt; completely irrelevant. Pure noise, a complete waste of effort.</font><br> <p> i don't see 'first impression' in there, but i do see 'assessment' which in my book is much closer to research than what you now claim you meant. but let it be ;), the main thing is that you now admitted that there is such a thing as security bugs (you're one step ahead of the kernel devs) and their research is not useless, contrary to what Linus/Ingo/etc claimed over the years. the next step you'll have to make is that doing the research is not enough, it has to be published to be of value and then we're on the same page and can ask the kernel devs together to not suppress such research. i'm so rooting for you!<br> </div> Mon, 10 Oct 2011 14:31:36 +0000