|
Message-ID: <20181214130755.GA24633@openwall.com> Date: Fri, 14 Dec 2018 14:07:55 +0100 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Cc: Jann Horn <jannh@...gle.com> Subject: Re: Linux kernel: userfaultfd bypasses tmpfs file permissions (CVE-2018-18397; since 4.11; fixed in 4.14.87 and 4.19.7) On Thu, Dec 13, 2018 at 09:02:12PM +0100, Yves-Alexis Perez wrote: > On Wed, 2018-12-12 at 15:24 +0100, Solar Designer wrote: > > A question to ask may be: out of Linux kernel vulnerabilities being > > patched, are there more high and critical overall severity (e.g., as > > risk impact times risk probability) vulnerabilities found in "too > > recent" kernels than there are high and critical severity untracked > > vulnerabilities (also or instead) affecting "sufficiently old" kernels? > > Data collected by Kees and regularly updated might help here. See > https://events.linuxfoundation.org/wp-content/uploads/2017/12/Overview-and-Recent-Developments-Kernel-Self-Protection-Project_Kees-Cook.pdf#%5B%7B%22num%22%3A22%2C%22gen%22%3A0%7D%2C%7B%22name%22%3A%22XYZ%22%7D%2C0%2C446.4%2C0%5D > for the last edition (sorry for the weird anchor, in case it breaks it's on > slide 5) Thanks! Slide 4 says average lifetime among 3 critical issues is 5.3 years, and among 79 high severity issues is 5.6 years. (And then there's over a thousand of medium and low severity issues. Ouch.) However, to answer my question above we need median and not average. For example, (1, 2, 3, 16) has an average of 5.5 years, but in that example by choosing a kernel version that is 2.5 years old, which is way below the average, we'd nevertheless avoid half of the issues. Slide 5 is in fact more relevant: it's an illustration showing "critical & high CVE lifetimes" against kernel versions. Per this illustration, we can see that my example of 3.10 (as RHEL7's base kernel) is hit by many low-numbered issues, but is hit by only two in the 67 to 82 range, which is 1/8 or 12.5% of issues found that recently. This is consistent with what I said about it having needed to mature "for a few years and a few hundred revisions" after RHEL7 was first released. I think it became mature enough just recently. It didn't feel mature enough to me when I ran Trinity for a few days (with many restarts) on a RHEL7-derived system two years ago. I hope those crashes have since been rediscovered with superior fuzzers allowing for easy reproduction, and patched. We've seen major improvement in fuzzing. Somehow Nicholas' reply below isn't part of the same thread (no proper In-Reply-To header), so let me bring it to the thread: https://www.openwall.com/lists/oss-security/2018/12/13/14 On Thu, Dec 13, 2018 at 06:07:32PM -0500, Nicholas Luedtke wrote: > We have also been compiling and presenting the CVEs on a per stream > basis at https://www.linuxkernelcves.com because the question of which > upstream stable branch to choose has been asked on a enterprise level > many times. Of course, once you choose once you still have to track the > changes (or lack there of). This is also very interesting and relevant. As the website (and GitHub README.md) acknowledges: "This is currently autogenerated and will go through testing before any promises of accuracy are made. The eventual goal would be to have a community curated list of CVEs along with when the code was introduced and when it was fixed." Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.