
oss-sec mailing list archives
Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros
From: Attila Szasz <szasza.contact () gmail com>
Date: Thu, 2 Oct 2025 15:11:17 +0200
I’m not going to frame this in a flame-inducing way, but MITRE has been sitting on my dispute request for months without even adding a clear “DISPUTED” flag. That makes it feel like my input doesn’t really matter in this process in the grand scheme of vulnerability management, so be it. For the same reason, I’d rather not repeat my letter to MITRE here, as the arguments there, while clear and very important in my view, risk inviting the same somewhat stillborn discussion and answers.
For the sake of product security folks who rely on consistency: the Linux CNA recently registered a batch of HFS/HFS+ CVEs that require manipulating malformed filesystems as a first step. This seems inconsistent with how similar cases were previously handled.
I don’t think grepping for |slab-out-of-bounds| is sufficient for automation here. Even prompting an LLM on the syzkaller reproducer could already help filter filesystem-corruption cases more effectively if that previous decision about rejecting these classes of bugs were to be enforced practically. Of course, a full decision still needs human review, but it would reduce false positives and make the rules feel more consistently enforced.
—Attila On 6/7/25 10:17, Greg KH wrote:
On Fri, Jun 06, 2025 at 06:00:09PM +0200, Attila Szasz wrote:I don't see how Canonical Product Security is a bad actor here for caring about the actual security of downstream users and acting in a timely manner about an issue that they considered to impact Ubuntu Linux, correctly. Canonical has a scope of "All Canonical issues (including Ubuntu Linux) only." kernel.rg has a scope of "Any vulnerabilities in the Linux kernel as listed on kernel.org, excluding end-of-life (EOL) versions." Both of them were contacted.For the record, the CNA for kernel.org was NOT contacted here at all for this issue. You sent a message to security () kernel org, NOT cve () kernel org. security@k.o has nothing to do with CVE assignments and is NOT responsible for the kernel.org CNA. Our documentation should state this very clearly, if not, we will be glad to update it where needed, just let us know.4.2.2.1 CNAs SHOULD assign a CVE ID if: the CNA has reasonable evidence to determine the existence of a Vulnerability (4.1), and the Vulnerability has been or is expected to be Publicly Disclosed, and the CNA has appropriate scope (3.1). On 3rd Nov, 2024, Kees Cook writes: "The hfsplus filesystem currently has no maintainer, and since we don't view filesystem corruption flaws to be particularly sensitive, probably the best thing to do would be to send the patch like normal to the public linux-fsdevel () vger kernel org (please keep me and other others in this email's CC now on the CC for your patch). Let's see if the VFS maintainers have any other thoughts on this? (I am forwarding them a copy of the original email now.)" This is pretty much the last update—no patch is introduced, nor is a CVE issued. The issue is not viewed as sensitive.Again, no one asked for a CVE to be assigned, nor did anyone notify the kernel.org CNA about this issue.My understanding is that 4.1 was not satisfied according to them.Nope, we never were even notified. That being said, we defer to the filesystem maintainers here, and they have stated many times before that hand-crafted filesystems are not a vulnerability according to their rules. That is why we rejected the CVE eventually.CVE-2025-0927 was reserved by Canonical on 31st January, 2025, around the time they fixed the issue internally. At this point, Canonical, as per 4.2.2.1, assigned a CVE for Canonical Ubuntu Linux for the issue they deemed a vulnerability in Ubuntu Linux. The kernel neither assigned nor fixed anything regarding the email that was sent to them. After Canonical’s fix went live, the public advisory was published on 18 March, 2025. Now, according to: 4.2.1.2 For Publicly Disclosed Vulnerabilities, if the CNA with the most appropriate scope: preemptively documents that it will not assign, or responds within 72 hours that it will not assign, or does not respond within 72 hours, then an appropriate Root MUST make a Vulnerability determination. So the kernel.org CNA team would have had 72 hours to respond to the public disclosure if they thought that the issue was in their scope—but they didn’t.Again, you never notified the kernel.org CNA about this, nor do we even attempt to watch all CVEs that are being created in the system as we just assume that all CNAs are "good actors" and don't do foolish things like this :)So what the hell happens to consumers of the Ubuntu Linux product that don't want their boxes rooted by non-sudoers according to the CNA? How could Canonical be the bad cowboy here? Someone please enlighten me.They created a CVE against the upstream kernel.org codebase without EVER contacting the kernel.org CNA. That is against the CNA rules, which is why cve.org reassigned the CVE to kernel.org when notified of this.In fact, I'm not even sure upstream would have ever fixed this unless Salvatore reached out from Debian basically asking what had happened: https://lore.kernel.org/lkml/Z9xsx-w4YCBuYjx5 () eldamar lan/ Note that the initial report was received by security@ early November, 2024. Salvatore's message is dated 20th March.Again, security@k.o has nothing to do with CVEs.After that, Canonical helps Debian by sharing the fix they used in the Ubuntu kernel. Then, on 24th March, 2024, the Linux CNA finally expresses interest in owning the CVE—that is, 6 days after the disclosure and 72 hours past the deadline defined in 4.2.1.2.Again, no one ever notified cve () kernel org about this, so that is why we did not react until we actually were notified, and then we did act then to get the CVE assigned back to kernel.org Hope this helps explain things as to why the kernel.org CNA didn't do anything here, because again, they were never notified. Anyway, we know communication mistakes can happen, not a big deal, we got the CVE reassigned properly, which again, happens every few months with other companies accidentally assigning CVEs against kernel.org stuff, and we move on. Given we are running at a rate of 13+ CVEs a day, stuff like this is bound to happen. All we can do is properly deal with it when we are notified, like we did. thanks, greg k-h
Current thread:
- Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros Attila Szasz (Oct 02)