[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE-2017-15102: Linux kernel: usb: NULL-deref due to a race condition in [legousb
From:       Stiepan <stie () itk ! swiss>
Date:       2017-11-10 19:29:15
Message-ID: iXtB5CpTryJAQZDKw3BO6URrMMnVSEovxuKwMlUoB5UiDo9R-YmfNUIQJO_iSpdNOqIm8wPxDWPvQtYG6xUY2z412ER8onCt2IAudAIAUks= () itk ! swiss
[Download RAW message or body]

[Attachment #2 (text/plain)]

> -------- Original Message --------
> Subject: Re: [oss-security] CVE-2017-15102: Linux kernel: usb: NULL-deref due to a \
> race condition in [legousbtower] driver Local Time: November 9, 2017 5:09 PM
> UTC Time: November 9, 2017 5:09 PM
> From: dwheeler@dwheeler.com
> To: oss-security <oss-security@lists.openwall.com>
> 
> > > On Tue, 2017-11-07 at 21:22 +0100, Greg KH wrote:
> > > 
> > > > I hate to ask, but why are you getting CVEs for bugs fixed over a
> > > > year ago, and are already in all stable kernel releases a year ago?  Why
> > > > does it matter?...
> > > > 
> > > > On Tue, Nov 07, 2017 at 08:30:05PM +0000, Maier, Kurt H wrote:
> > 
> > > Kernel maintainers' policy is clear, and nobody is asking for that to
> > > change, but please don't sandbag the process of keeping track of
> > > vulnerabilities. The fraction of "products" (regardless of vendor)
> > > that run linux and never get updates approaches unity. Being able to
> > > precisely catalog which linux releases suffer from which
> > > vulnerabilities is useful to many.
> > > 
> > > On Wed, 8 Nov 2017 10:15:17 +0100, Greg KH greg@kroah.com wrote:
> > > Well, I'm working on fixing the "devices do not get updates" issue
> > > through other means, so don't just give up on that one just yet :)
> > > 
> > > I applaud your work! I think getting CVE assignments may help, as I explain \
> > > below. 
> > > As for the "keep track of vulnerabilities", is that what is really
> > > happening here? Why pick a random bug fix from over a year ago for a
> > > CVE vs. the 100 other bugfixes in the past few weeks/months?
> > 
> > I'm really curious as to what triggered this specific CVE request that
> > somehow misses the hundreds/thousands of other fixes that land in newer
> > kernel releases?
> > 
> > Manufacturers & recipients often won't update unless there's a reason to update.
> > Documenting a number of specific CVEs in older kernel versions
> > provides clear documented reasons that an update needs to occur,
> > instead of a vague "you should upgrade" claim.
> > 
> > Perhaps most importantly, once a vulnerability has a CVE id,
> > some laws and regulations can come into play. Manufacturers
> > will (correctly) argue that no one can track all the mailing lists, but if a
> > vulnerability has a CVE id, it's generally agreed that the
> > vulnerability is a publicly known vulnerability.
> > In the US, there has been recent proposed legislation that requires
> > that "Internet of Things" devices sold to the federal government cannot have
> > "known security vulnerabilities" ("Internet of Things Cybersecurity Improvement
> > Act of 2017" proposed by Senators Mark Warner (R-Va.) and Cory Gardner \
> > (D-Colo.)). I suspect many other countries have or will pass similiar laws,
> > or will interpret their existing laws this way.
> > It's easy to argue that known security vulnerabilities are known flaws
> > that should be remediated by the manufacturer (at no cost to the consumer).
> > 
> > I agree that many vulnerabilities don't have CVE ids.
> > You don't need to identify all vulnerabilities in old kernels... just enough to \
> > make it easier to update the kernel than try to back-patch everything.
> > If manufacturers have to fix the CVEs to sell products, or to avoid massive \
> > returns, that creates an economic reason for manufacturers to
> > begin responsibly maintain their products.
> > 
> > There's no guarantee that this sequence of events will happen, but it's worth \
> > trying. 
> > --- David A. Wheeler

I would like to add that starting in May, 2018, companies will have the huge \
incentive of the European GDPR, with fines going up to 4% annual turnover of the \
company or group in case of a breach involving EU citizen's data. Here in Switzerland \
we will have a "light" version with fines capped to 250k CHF. But we're only about 8M \
(although, including many people and companies in a position to hire lawyers). This \
makes some incentives already. Now back to the specific question of CVE IDs, it's a \
tough one, knowing that not everyone might agree on that "single root of trust"... \
But I would say here, something is way better than nothing!

About the "fraction nearing unity", Linux-specific problem: this is why we are \
evaluating all possible open-source kernels for a secure "CEuniX"*, in collaboration \
with two EU-based organizations and a Canadian dev. First results should be published \
before the May 2018 deadline, giving people an early direction to follow in their \
journey to compliance. Actually this is a turning point - where law exceeds tech - \
instead of the reverse, which usually happens. Or perhaps better said, the rule of \
law will soon apply to the digital world, "fully". (Europe is far from being the only \
one, as was hinted by David; this is an international trend, where cultural \
differences will come into play and can have a crucial role in shaping how those laws \
are made and implemented in the real world, ultimately affecting our lives.)

Stiepan A. Kovac

*please e-mail me for details about the project, which is an H2020 candidate, meaning \
it is likely to get funding from the European Commission



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic