public inbox for gentoo-security@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-security] Kernel Vulnerability Handling and Classification Criteria
@ 2014-01-08  2:04 Samuel Damashek
  2014-01-08  8:29 ` Kristian Fiskerstrand
  2014-01-08 19:49 ` Agostino Sarubbo
  0 siblings, 2 replies; 5+ messages in thread
From: Samuel Damashek @ 2014-01-08  2:04 UTC (permalink / raw
  To: gentoo-security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At the moment, we don't have an accepted and documented way to handle
Kernel CVEs. Right now, they're just being filed and then maybe being
resolved when upstream commits a patch.

I believe we need some way of judging priority and severity of kernel
vulnerabilities to improve bug handling and make sure that we stay
up-to-date with current patches being released. Linux kernel
development is very fast paced, so we should set up a clear system,
much like we have right now for packages in Portage, to facilitate the
filing and management of these bugs.

I'm not really a kernel guy, but there are some things that I can
figure out and propose without knowing much about kernel internals.
First, we could classify priority (giving it a letter grade) by
considering whether the issue is in kernel code that is enabled by
default, or whether the user has to enable the vulnerable code in the
kernel config. We could also use the tilde (~) as a grade when the
vulnerable code is marked EXPERIMENTAL in the config, much like we do
for unstable packages.

As far as severity goes, I think that severity would be similar to
what we have at the moment for packages, with maybe some minor
improvements to make the descriptions relevant. Priority and severity
could then be translated to an appropriate Whiteboard grade for better
tracking.

We need to develop and agree on solid criteria so that bug wranglers
can classify security issues efficiently.

Since the general workflow for handling kernel issues is report to
upstream -> patch -> patch included in next release, we can have three
statuses in the Whiteboard field to represent these. Just as a
proposal, those could be "upstream" and "patch", and then close the
bug as Resolved Fixed when the next version is released. An
alternative is to close the bug when the patch is committed to the
kernel repositories instead of when the next version is released.

Something else to consider is whether GLSAs will be released after a
release is available. I have varying opinions on the matter, as while
the Kernel is not a part of Gentoo persay, it is still a security
issue that should be reported to users and spread for wide
distribution. I'm open to opinions on this matter.

- --
Samuel Damashek
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSzLIsAAoJEGw+uP08RytWQ+cH/3w/0hWEWupYJGbQD5/LSqzm
fT8BD5hdYyN53wmYLopAs9pLJ4spaVxJBCY6xGaabWCEC1PgoQiIQ1URh4Bmekei
Z/6ruNSMcBStV+ATJPN2pawz28/ByFEIWjEECGNhInx/DnmbCoNASZ9d728kw1TK
gYbCg/FkOMn333+KmU0Q8QyxIB30gi6ApbD0SBKUwtHVVNOUnbHfo4YAbNypBN2m
xQjmNMlYDWUyTSq6+8II9zQk0zDPo5GC1TRW6f1/Jw6B/wh5IbCir9qaVMdRi+S8
nUKqkhMXhJJuXEmmYWKgxFFhnVFBwPYH3MuSuxG+UUN7u7yuPI5PycCRlagVSD4=
=DFua
-----END PGP SIGNATURE-----


^ permalink raw reply	[flat|nested] 5+ messages in thread
[parent not found: <52ccb5e5.470b440a.3fc3.2ca6SMTPIN_ADDED_MISSING@mx.google.com>]

end of thread, other threads:[~2014-01-09  4:29 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-01-08  2:04 [gentoo-security] Kernel Vulnerability Handling and Classification Criteria Samuel Damashek
2014-01-08  8:29 ` Kristian Fiskerstrand
2014-01-09  4:28   ` Andrew Hamilton
2014-01-08 19:49 ` Agostino Sarubbo
     [not found] <52ccb5e5.470b440a.3fc3.2ca6SMTPIN_ADDED_MISSING@mx.google.com>
2014-01-08  2:28 ` Samuel Damashek

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox