|
Message-ID: <Pine.GSO.4.51.0904241925010.13343@faron.mitre.org> Date: Fri, 24 Apr 2009 19:50:57 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: security@...nel.org, sfrench@...ibm.com Subject: Re: CVE request? buffer overflow in CIFS in 2.6.* On Tue, 21 Apr 2009, Eugene Teo wrote: > > Our maintainer also referenced: > > > > http://lists.samba.org/archive/linux-cifs-client/2009-April/004450.html > > http://lists.samba.org/archive/linux-cifs-client/2009-April/004452.html > > > > They are already in the CIFS git tree: > > http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=summary > > http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commit;h=7b0c8fcff47a885743125dd843db64af41af5a61 > > http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commit;h=968460ebd8006d55661dec0fb86712b40d71c413 > > As discussed with Marcus, these two are unrelated to this issue, so we > will need new CVE names. > > I spoke to Jeff Layton about this, and it looks like there are some more > in the pipeline (but unrelated to this issue), so stay tuned. This ominous statement is proving prophetic. CVE is not designed to track every intermediate change that's being made, reviewed, debugged, fixed, re-bugged, re-submitted, re-fixed, and refactored in multiple branches on a real-time basis. There's an extensive list of changes going on at http://lists.samba.org/archive/linux-cifs-client/2009-April/thread.html, many of which don't provide any notions of attack scenarios or vulnerability (and neither should they - but it puts a severe analytical burden on CVE to reverse-engineer patches for the bowels of code that only a handful of people in the world fully understand). I don't think it helps most people to have a dozen different CVEs for an extensive set of issues that are being fixed so dynamically. One approach might be to "pre-tag" this whole set of changes with a single CVE, then when they ultimately get merged into a single kernel version or some other concrete milestone, the "scope" of that CVE ends. An alternate approach would be for the CVE requesters to provide more detailed explanations of what exactly is going on and what the scope of the bug is. This moves the analytical burden back to the distros, but theoretically, the requesters are more familiar with the code than CVE analysts are. Yet another approach would be for CVE to adopt very generic descriptions and rely more heavily on the provided references, but that wouldn't cut down on the number of CVEs being assigned and it would create many opportunities for incorrect mappings and duplicate entries, not to mention confusion for consumers (this based on the experience of the past 10 years of CVE...) Another more radical approach would be for the Linux community to adopt a different mechanism for a "universal bug ID" besides CVE, where multiple people can file multiple bug IDs and share them across distros without caring about duplicates or inaccuracies or incomplete information. The CVE tie-in could occur when something is mature and final enough to make it into a stable release, and then the CVE becomes a mechanism for the distros to communicate to their consumers, instead of between themselves. Any and all thoughts are welcome. I've thought that a big win for CVE was as a "universal bug ID" for the Linux community, which was outside what we had originally envisioned for it. But these kinds of dynamic, low-information disclosures really stress the CVE process, so I'm starting to question whether CVE is really a good fit. - Steve
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.