mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 06:44:00 -04:00
In previous patch "Documentation: clarify the mandatory and desirable info for security reports" I left two typos that I didn't detect in local checks. One is "get_maintainers.pl" (no 's' in the script name), and the other one is a missing closing quote after "Reported-by", which didn't have effect here but I don't know if it can break rendering elsewhere (e.g. on the public HTML page). Better fix it before it gets merged. Signed-off-by: Willy Tarreau <w@1wt.eu> Link: https://patch.msgid.link/20260404082033.5160-1-w@1wt.eu Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
245 lines
12 KiB
ReStructuredText
245 lines
12 KiB
ReStructuredText
.. _securitybugs:
|
|
|
|
Security bugs
|
|
=============
|
|
|
|
Linux kernel developers take security very seriously. As such, we'd
|
|
like to know when a security bug is found so that it can be fixed and
|
|
disclosed as quickly as possible.
|
|
|
|
Preparing your report
|
|
---------------------
|
|
|
|
Like with any bug report, a security bug report requires a lot of analysis work
|
|
from the developers, so the more information you can share about the issue, the
|
|
better. Please review the procedure outlined in
|
|
Documentation/admin-guide/reporting-issues.rst if you are unclear about what
|
|
information is helpful. The following information are absolutely necessary in
|
|
**any** security bug report:
|
|
|
|
* **affected kernel version range**: with no version indication, your report
|
|
will not be processed. A significant part of reports are for bugs that
|
|
have already been fixed, so it is extremely important that vulnerabilities
|
|
are verified on recent versions (development tree or latest stable
|
|
version), at least by verifying that the code has not changed since the
|
|
version where it was detected.
|
|
|
|
* **description of the problem**: a detailed description of the problem, with
|
|
traces showing its manifestation, and why you consider that the observed
|
|
behavior as a problem in the kernel, is necessary.
|
|
|
|
* **reproducer**: developers will need to be able to reproduce the problem to
|
|
consider a fix as effective. This includes both a way to trigger the issue
|
|
and a way to confirm it happens. A reproducer with low complexity
|
|
dependencies will be needed (source code, shell script, sequence of
|
|
instructions, file-system image etc). Binary-only executables are not
|
|
accepted. Working exploits are extremely helpful and will not be released
|
|
without consent from the reporter, unless they are already public. By
|
|
definition if an issue cannot be reproduced, it is not exploitable, thus it
|
|
is not a security bug.
|
|
|
|
* **conditions**: if the bug depends on certain configuration options,
|
|
sysctls, permissions, timing, code modifications etc, these should be
|
|
indicated.
|
|
|
|
In addition, the following information are highly desirable:
|
|
|
|
* **suspected location of the bug**: the file names and functions where the
|
|
bug is suspected to be present are very important, at least to help forward
|
|
the report to the appropriate maintainers. When not possible (for example,
|
|
"system freezes each time I run this command"), the security team will help
|
|
identify the source of the bug.
|
|
|
|
* **a proposed fix**: bug reporters who have analyzed the cause of a bug in
|
|
the source code almost always have an accurate idea on how to fix it,
|
|
because they spent a long time studying it and its implications. Proposing
|
|
a tested fix will save maintainers a lot of time, even if the fix ends up
|
|
not being the right one, because it helps understand the bug. When
|
|
proposing a tested fix, please always format it in a way that can be
|
|
immediately merged (see Documentation/process/submitting-patches.rst).
|
|
This will save some back-and-forth exchanges if it is accepted, and you
|
|
will be credited for finding and fixing this issue. Note that in this case
|
|
only a ``Signed-off-by:`` tag is needed, without ``Reported-by:`` when the
|
|
reporter and author are the same.
|
|
|
|
* **mitigations**: very often during a bug analysis, some ways of mitigating
|
|
the issue appear. It is useful to share them, as they can be helpful to
|
|
keep end users protected during the time it takes them to apply the fix.
|
|
|
|
Identifying contacts
|
|
--------------------
|
|
|
|
The most effective way to report a security bug is to send it directly to the
|
|
affected subsystem's maintainers and Cc: the Linux kernel security team. Do
|
|
not send it to a public list at this stage, unless you have good reasons to
|
|
consider the issue as being public or trivial to discover (e.g. result of a
|
|
widely available automated vulnerability scanning tool that can be repeated by
|
|
anyone).
|
|
|
|
If you're sending a report for issues affecting multiple parts in the kernel,
|
|
even if they're fairly similar issues, please send individual messages (think
|
|
that maintainers will not all work on the issues at the same time). The only
|
|
exception is when an issue concerns closely related parts maintained by the
|
|
exact same subset of maintainers, and these parts are expected to be fixed all
|
|
at once by the same commit, then it may be acceptable to report them at once.
|
|
|
|
One difficulty for most first-time reporters is to figure the right list of
|
|
recipients to send a report to. In the Linux kernel, all official maintainers
|
|
are trusted, so the consequences of accidentally including the wrong maintainer
|
|
are essentially a bit more noise for that person, i.e. nothing dramatic. As
|
|
such, a suitable method to figure the list of maintainers (which kernel
|
|
security officers use) is to rely on the get_maintainer.pl script, tuned to
|
|
only report maintainers. This script, when passed a file name, will look for
|
|
its path in the MAINTAINERS file to figure a hierarchical list of relevant
|
|
maintainers. Calling it a first time with the finest level of filtering will
|
|
most of the time return a short list of this specific file's maintainers::
|
|
|
|
$ ./scripts/get_maintainer.pl --no-l --no-r --pattern-depth 1 \
|
|
drivers/example.c
|
|
Developer One <dev1@example.com> (maintainer:example driver)
|
|
Developer Two <dev2@example.org> (maintainer:example driver)
|
|
|
|
These two maintainers should then receive the message. If the command does not
|
|
return anything, it means the affected file is part of a wider subsystem, so we
|
|
should be less specific::
|
|
|
|
$ ./scripts/get_maintainer.pl --no-l --no-r drivers/example.c
|
|
Developer One <dev1@example.com> (maintainer:example subsystem)
|
|
Developer Two <dev2@example.org> (maintainer:example subsystem)
|
|
Developer Three <dev3@example.com> (maintainer:example subsystem [GENERAL])
|
|
Developer Four <dev4@example.org> (maintainer:example subsystem [GENERAL])
|
|
|
|
Here, picking the first, most specific ones, is sufficient. When the list is
|
|
long, it is possible to produce a comma-delimited e-mail address list on a
|
|
single line suitable for use in the To: field of a mailer like this::
|
|
|
|
$ ./scripts/get_maintainer.pl --no-tree --no-l --no-r --no-n --m \
|
|
--no-git-fallback --no-substatus --no-rolestats --no-multiline \
|
|
--pattern-depth 1 drivers/example.c
|
|
dev1@example.com, dev2@example.org
|
|
|
|
or this for the wider list::
|
|
|
|
$ ./scripts/get_maintainer.pl --no-tree --no-l --no-r --no-n --m \
|
|
--no-git-fallback --no-substatus --no-rolestats --no-multiline \
|
|
drivers/example.c
|
|
dev1@example.com, dev2@example.org, dev3@example.com, dev4@example.org
|
|
|
|
If at this point you're still facing difficulties spotting the right
|
|
maintainers, **and only in this case**, it's possible to send your report to
|
|
the Linux kernel security team only. Your message will be triaged, and you
|
|
will receive instructions about whom to contact, if needed. Your message may
|
|
equally be forwarded as-is to the relevant maintainers.
|
|
|
|
Sending the report
|
|
------------------
|
|
|
|
Reports are to be sent over e-mail exclusively. Please use a working e-mail
|
|
address, preferably the same that you want to appear in ``Reported-by`` tags
|
|
if any. If unsure, send your report to yourself first.
|
|
|
|
The security team and maintainers almost always require additional
|
|
information beyond what was initially provided in a report and rely on
|
|
active and efficient collaboration with the reporter to perform further
|
|
testing (e.g., verifying versions, configuration options, mitigations, or
|
|
patches). Before contacting the security team, the reporter must ensure
|
|
they are available to explain their findings, engage in discussions, and
|
|
run additional tests. Reports where the reporter does not respond promptly
|
|
or cannot effectively discuss their findings may be abandoned if the
|
|
communication does not quickly improve.
|
|
|
|
The report must be sent to maintainers, with the security team in ``Cc:``.
|
|
The Linux kernel security team can be contacted by email at
|
|
<security@kernel.org>. This is a private list of security officers
|
|
who will help verify the bug report and assist developers working on a fix.
|
|
It is possible that the security team will bring in extra help from area
|
|
maintainers to understand and fix the security vulnerability.
|
|
|
|
Please send **plain text** emails without attachments where possible.
|
|
It is much harder to have a context-quoted discussion about a complex
|
|
issue if all the details are hidden away in attachments. Think of it like a
|
|
:doc:`regular patch submission <../process/submitting-patches>`
|
|
(even if you don't have a patch yet): describe the problem and impact, list
|
|
reproduction steps, and follow it with a proposed fix, all in plain text.
|
|
Markdown, HTML and RST formatted reports are particularly frowned upon since
|
|
they're quite hard to read for humans and encourage to use dedicated viewers,
|
|
sometimes online, which by definition is not acceptable for a confidential
|
|
security report. Note that some mailers tend to mangle formatting of plain
|
|
text by default, please consult Documentation/process/email-clients.rst for
|
|
more info.
|
|
|
|
Disclosure and embargoed information
|
|
------------------------------------
|
|
|
|
The security list is not a disclosure channel. For that, see Coordination
|
|
below.
|
|
|
|
Once a robust fix has been developed, the release process starts. Fixes
|
|
for publicly known bugs are released immediately.
|
|
|
|
Although our preference is to release fixes for publicly undisclosed bugs
|
|
as soon as they become available, this may be postponed at the request of
|
|
the reporter or an affected party for up to 7 calendar days from the start
|
|
of the release process, with an exceptional extension to 14 calendar days
|
|
if it is agreed that the criticality of the bug requires more time. The
|
|
only valid reason for deferring the publication of a fix is to accommodate
|
|
the logistics of QA and large scale rollouts which require release
|
|
coordination.
|
|
|
|
While embargoed information may be shared with trusted individuals in
|
|
order to develop a fix, such information will not be published alongside
|
|
the fix or on any other disclosure channel without the permission of the
|
|
reporter. This includes but is not limited to the original bug report
|
|
and followup discussions (if any), exploits, CVE information or the
|
|
identity of the reporter.
|
|
|
|
In other words our only interest is in getting bugs fixed. All other
|
|
information submitted to the security list and any followup discussions
|
|
of the report are treated confidentially even after the embargo has been
|
|
lifted, in perpetuity.
|
|
|
|
Coordination with other groups
|
|
------------------------------
|
|
|
|
While the kernel security team solely focuses on getting bugs fixed,
|
|
other groups focus on fixing issues in distros and coordinating
|
|
disclosure between operating system vendors. Coordination is usually
|
|
handled by the "linux-distros" mailing list and disclosure by the
|
|
public "oss-security" mailing list, both of which are closely related
|
|
and presented in the linux-distros wiki:
|
|
<https://oss-security.openwall.org/wiki/mailing-lists/distros>
|
|
|
|
Please note that the respective policies and rules are different since
|
|
the 3 lists pursue different goals. Coordinating between the kernel
|
|
security team and other teams is difficult since for the kernel security
|
|
team occasional embargoes (as subject to a maximum allowed number of
|
|
days) start from the availability of a fix, while for "linux-distros"
|
|
they start from the initial post to the list regardless of the
|
|
availability of a fix.
|
|
|
|
As such, the kernel security team strongly recommends that as a reporter
|
|
of a potential security issue you DO NOT contact the "linux-distros"
|
|
mailing list UNTIL a fix is accepted by the affected code's maintainers
|
|
and you have read the distros wiki page above and you fully understand
|
|
the requirements that contacting "linux-distros" will impose on you and
|
|
the kernel community. This also means that in general it doesn't make
|
|
sense to Cc: both lists at once, except maybe for coordination if and
|
|
while an accepted fix has not yet been merged. In other words, until a
|
|
fix is accepted do not Cc: "linux-distros", and after it's merged do not
|
|
Cc: the kernel security team.
|
|
|
|
CVE assignment
|
|
--------------
|
|
|
|
The security team does not assign CVEs, nor do we require them for
|
|
reports or fixes, as this can needlessly complicate the process and may
|
|
delay the bug handling. If a reporter wishes to have a CVE identifier
|
|
assigned for a confirmed issue, they can contact the :doc:`kernel CVE
|
|
assignment team<../process/cve>` to obtain one.
|
|
|
|
Non-disclosure agreements
|
|
-------------------------
|
|
|
|
The Linux kernel security team is not a formal body and therefore unable
|
|
to enter any non-disclosure agreements.
|