| ▲ | baggy_trough 7 hours ago |
| Why wouldn't the linux security team notify the main linux distributions? |
|
| ▲ | staticassertion 3 hours ago | parent | next [-] |
| Greg and Linus do not believe in the entire concept of "vulnerabilities" in the Linux kernel and do not believe in the methods that distros use like cherry picking, therefor they typically are against issuing CVEs, scoring CVEs, describing vulnerabilities at all (if you use the word "vulnerability", your patch will be rejected), etc. It's fundamentally their position to not work the way that you describe. |
| |
| ▲ | baggy_trough 3 hours ago | parent [-] | | That doesn't really seem to map onto the situation since Greg himself released a 6.12 with the patch earlier today. | | |
| ▲ | staticassertion 3 hours ago | parent [-] | | I don't know what you mean at all. I'm just repeating known kernel policy here. What does 6.12 have to do with anything? | | |
| ▲ | baggy_trough 2 hours ago | parent [-] | | What is your interpretation of why Greg KH released a version of 6.12 with this fix in it today, other than to help distributions avoid this vulnerability? |
|
|
|
|
| ▲ | bluepuma77 5 hours ago | parent | prev | next [-] |
| Well, how do you define main Linux distros? Isn’t the next smaller one not receiving the info always complaining? |
| |
| ▲ | throw0101a an hour ago | parent | next [-] | | > Well, how do you define main Linux distros? Isn’t the next smaller one not receiving the info always complaining? For a first approximation: Ubuntu, Debian, RHEL(-derived) to begin with, and SuSE which is in EU/server space (AIUI): * https://commandlinux.com/statistics/most-popular-linux-distr... * https://commandlinux.com/statistics/linux-server-market-shar... Seems like Gentoo, Arch, Mint, and Slackware could also be as well: * https://distrowatch.com/dwres.php?resource=major U/Deb/RHEL are 'upstream' of a lot of other projects, and fixes would trickle down to Rocky, Alma, etc. Perhaps VM OS in cloud (AWS, Azure) could be a usage gauge as well. | |
| ▲ | baggy_trough 5 hours ago | parent | prev [-] | | Isn't there already a distro security list for this purpose? | | |
|
|
| ▲ | bonzini 6 hours ago | parent | prev | next [-] |
| Partly they already have enough on their plate. It's up to the reporter to pick how to handle the disclosure, and unless a specific maintainer chooses to handle it, the Linux security team clearly says they won't. Partly they have a strong belief that all kernel bugs are vulnerabilities and all vulnerabilities are just bugs; sometimes taken to the extreme in both ways (on one hand this case where the vulnerability is almost ignored; on the other hand, I saw cases where a VM panic that could be triggered only by a misbehaving host—which could just choose to stop executing the VM—was given a CVE). |
| |
| ▲ | staticassertion 3 hours ago | parent | next [-] | | This couldn't be more backwards. This has literally nothing to do with bandwidth. The kernel is a CNA, they are explicitly the ones to do this. The reason they don't is because Linus and Greg have repeatedly, publicly stated that they don't want to because they don't believe that vulnerabilities conceptually make sense for the linux kernel and they refuse to engage in the process. | |
| ▲ | baggy_trough 6 hours ago | parent | prev [-] | | Seems a little crazy. Somebody should evaluate blast radius and do appropriate distro notifications in a case like this (I presume the impact was part of the disclosure, so not much extra work). | | |
| ▲ | seanhunter 5 hours ago | parent [-] | | You know the linux kernel is a free software project right? If you think “somebody should” do a thing but you aren’t prepared to do it yourself then you should maybe ask for a full refund. | | |
|
|
|
| ▲ | shimman 3 hours ago | parent | prev | next [-] |
| Because one of them might have an incentive to not do so. In this case it's because they want to advertise their own company. |
|
| ▲ | 7 hours ago | parent | prev [-] |
| [deleted] |