oss-sec mailing list archives

Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros


From: Greg KH <greg () kroah com>
Date: Fri, 3 Oct 2025 10:16:50 +0200

On Thu, Oct 02, 2025 at 09:32:49PM +0200, Attila Szasz wrote:
*Hi Greg,*

I am writing to formally invite you to a public debate at next year’s
FOSDEM.

Our past discussions surrounding the HFS+ vulnerability—and the subsequent
"lamest vendor response" award the Linux CNA received at DEFCON—highlighted
a significant disconnect in how we approach security, disclosure, and
community roles.

Wait, we got an award and no one invited us to the party to receive it?
That's sad, we need to add it to our shelf of "awards we never knew we
wanted to shoot for" :)

My goal is not to re-litigate a past issue, but to bring
transparency to crucial questions that many in our community are asking
about the future.

I propose a moderated discussion in the Linux kernel devroom to explore
these topics. The idea is to foster a constructive dialogue, not a
confrontation. The key questions to address would be:

While I appreciate the invitation, unfortunately my travel schedule will
not allow me to attend FOSDEM next year.  Fortunately your list of
questions have already been covered by me in previous talks I have given
so you can refer to them and follow up if you have further specific
questions:

 *

   *The Linux CNA's Role:* What is its responsibility in global product
   security, and is its current approach effective?

Please see my many talks over the past years about Linux kernel CVEs and
how the Linux kernel CNA works.  Here are some links that might help:
        Open Source security podcast right after we became a CNA:
                https://opensourcesecurity.io/2024/02/25/episode-417-linux-kernel-security-with-greg-k-h/
        Kernel Recipes 2024 talk, "CVEs are alive, but do not panic":
                https://kernel-recipes.org/en/2024/cves-are-alive-but-no-not-panic/
        OSS Hong Kong 2024 talk about the same topic with updated
        numbers:
                https://www.youtube.com/watch?v=at-uDXbX-18
        OSS Japan 2024 talk with more info about the same topic:
                https://www.youtube.com/watch?v=KumwRn1BA6s
        December 2024 talk about this with even more detail, but I can't
        find the video of it anywhere:
                
https://ossmw2024.sched.com/event/1sLVt/welcome-keynote-50-cves-a-week-how-the-linux-kernel-project-went-from-ignoring-cves-to-embracing-them-greg-kroah-hartman-fellow-the-linux-foundation

I think there are some other links somewhere as I feel I've given this
talk even more times than just the list above.

 *

   *Vulnerability Triage:* Is the "all bugs are just bugs" philosophy
   sustainable, or do certain flaws require a higher class of treatment?

Remember this is open source, we do NOT dictate use, NOR do we know how
our software is being used.  Because of that we can not know if a
specific bug we fix really is a "major" issue for you or not.  I have
loads of specific examples of this, where a seemingly "minor" bugfix was
really a fix for a major security flaw in some users of Linux, while it
wasn't even a issue at all for many others.

And so, we treat "all bugs are bugs and we fix them as soon as possible"
as our goal.  That's how the kernel security team has been working for
the past 20+ years, and how it continues to work.  As a CNA, we are
REQUIRED to mark any bug that fixes the definition of a "vulnerability"
as a CVE, that is the requirement by cve.org.  But because we do not
know your use case, we can not provide any sort of "severity" score to
the issue, that is up to you to decide as you decided to use the
software in your specific use case.

This is the same for almost any open source project, and is the hardest
thing for many companies and organizations to wrap their heads around
over the past years as they come to grips with all of the software they
are using and rely on.  Frankly, I think this is a good thing as being
aware of your dependencies and use cases is important, for too long it
has been ignored.

 *

   *The Future of Linux Security:* What are the long-term consequences
   of our strategic choices regarding security investment and process?

"strategic"?  Hah, this is Linux, you think we have a single strategy?  :)

Seriously, we do have many plans for this type of thing, why do you
think it is not working out?  We are handling this on multiple different
fronts, all at the same time, and have been doing so for years, with
resources going into many projects and developers to address the known
issues that the world faces when it comes to software at the level of
which Linux runs.

Any specific questions you have about those initiatives are always
appreciated, and of course, the developers running and working on them
are always appreciative of help, review, and testing.

 *

   *The Next Generation:* How does the kernel project integrate the
   perspectives of independent, nonconformist, and younger developers?

As lwn.net constantly reports, we average about 200+ new developers to
Linux ever 3 months.  That's a number that just dwarfs any other project
out there in the world, and is larger than almost all other project's
total development teams (including all other operating systems.)  We
also are evolving with those new developers as they help integrate their
ideas and projects into the kernel to help us all solve the problems
that we currently face.

 *

   *Regulatory Readiness:* How can the kernel community best prepare
   for the impact of legislation like the EU’s Cyber Resilience Act (CRA)?

I've given loads of talks about this too!  And I'm on the CRA "Expert
Group committee" that meets every few months, so I know all too much
about this.  There are still many "open" issues around the CRA that are
still being worked out, but in short, I think we are going to be ok.

My most recent talk was just a few weeks ago about this topic:
        https://kernel-recipes.org/en/2025/schedule/the-cra-and-what-it-means-for-us/
the link for the video is somewhere, I can't seem to find it just yet,
but here's a good summary of it from The Register:
        https://www.theregister.com/2025/09/30/cyber_reiliance_act_opinion_column/

I also want to specifically call out the great work being done by the
Apache Foundation when it comes to open source and the CRA.  And
the Eclipse Foundation as well.  Both groups, and many others, are
helping us in educating lawmakers and others about the issues involved
with open source and the CRA.  See the links in the slides for my Kernel
Recipes talk for many detailed documents about the issues involved here.
I'm also working with OpenSSF and others to help prepare loads of good
documents, and even simple "form letters", for the open source community
to be able to use when it comes to this issue as manufacturers are
getting very nervous and sending out crazy things to open source
projects that they really should know better than to do.

There are many different specifications being created for the CRA, and
many open source groups and developers are helping out with them too.
Most of that work is happening right now, and is being crammed into a
short window, so that after the drafts of the specs are finished in a
few months, they can get widespread public review and comments and
adjustments before they are written into final versions.  The drafts I
have seen so far, while pretty verbose in many places, are semi-sane and
I don't think that anyone will have any issues with using open source
software to address their requirements.

In short, I think the CRA is going to be a good thing for us overall.
Don't fear it, for open source individual developers, it will not affect
them contributing at all.  For projects that are under an organization
like a "foundation", the only thing that it dictates is two requirements
that all open source projects should probably be doing already anyway:

        - have a way to report security bugs to the project
        - the project, if it fixes a security bug, should report it to
          "someone".  That "someone" is still being worked out, but
          should be a simple web form, or json endpoint you can push to.
          We'll know more in a few months about the specifics there.

That's it, should not really be an issue for any project to follow.

I believe FOSDEM's open, community-driven, and unfiltered nature makes it
the ideal venue. A frank conversation between us would bring immense value
and clarity to these complex challenges for the benefit of the entire
ecosystem.

FOSDEM is great, but the kernel dev room is pretty tiny, and these
different topics encompass way more people and organizations than just
can attend that small room.  Which is why I travel so so much and give
talks like the above links show, and is why I will be not able to attend
FOSDEM, as I'll be on the road somewhere else :(

Hope this helps answer some questions about these topics.  And thanks
for forcing me to write a bunch of this down (like the links to past
talks), I have been meaning to do that for a while now.

I don't know how relevant all of this is for oss-security, but I think
the CRA interactions are relevant as many people here are going to start
running into them late next year as the regulations start to go into
effect.  When we have some solid documents around this topic finished up
and published, I'll try to remember to drop a link here so that people
can find them.

thanks,

greg k-h


Current thread: