
oss-sec mailing list archives
Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros
From: Greg KH <greg () kroah com>
Date: Fri, 3 Oct 2025 10:16:50 +0200
On Thu, Oct 02, 2025 at 09:32:49PM +0200, Attila Szasz wrote:
*Hi Greg,* I am writing to formally invite you to a public debate at next year’s FOSDEM. Our past discussions surrounding the HFS+ vulnerability—and the subsequent "lamest vendor response" award the Linux CNA received at DEFCON—highlighted a significant disconnect in how we approach security, disclosure, and community roles.
Wait, we got an award and no one invited us to the party to receive it? That's sad, we need to add it to our shelf of "awards we never knew we wanted to shoot for" :)
My goal is not to re-litigate a past issue, but to bring transparency to crucial questions that many in our community are asking about the future. I propose a moderated discussion in the Linux kernel devroom to explore these topics. The idea is to foster a constructive dialogue, not a confrontation. The key questions to address would be:
While I appreciate the invitation, unfortunately my travel schedule will not allow me to attend FOSDEM next year. Fortunately your list of questions have already been covered by me in previous talks I have given so you can refer to them and follow up if you have further specific questions:
* *The Linux CNA's Role:* What is its responsibility in global product security, and is its current approach effective?
Please see my many talks over the past years about Linux kernel CVEs and how the Linux kernel CNA works. Here are some links that might help: Open Source security podcast right after we became a CNA: https://opensourcesecurity.io/2024/02/25/episode-417-linux-kernel-security-with-greg-k-h/ Kernel Recipes 2024 talk, "CVEs are alive, but do not panic": https://kernel-recipes.org/en/2024/cves-are-alive-but-no-not-panic/ OSS Hong Kong 2024 talk about the same topic with updated numbers: https://www.youtube.com/watch?v=at-uDXbX-18 OSS Japan 2024 talk with more info about the same topic: https://www.youtube.com/watch?v=KumwRn1BA6s December 2024 talk about this with even more detail, but I can't find the video of it anywhere: https://ossmw2024.sched.com/event/1sLVt/welcome-keynote-50-cves-a-week-how-the-linux-kernel-project-went-from-ignoring-cves-to-embracing-them-greg-kroah-hartman-fellow-the-linux-foundation I think there are some other links somewhere as I feel I've given this talk even more times than just the list above.
* *Vulnerability Triage:* Is the "all bugs are just bugs" philosophy sustainable, or do certain flaws require a higher class of treatment?
Remember this is open source, we do NOT dictate use, NOR do we know how our software is being used. Because of that we can not know if a specific bug we fix really is a "major" issue for you or not. I have loads of specific examples of this, where a seemingly "minor" bugfix was really a fix for a major security flaw in some users of Linux, while it wasn't even a issue at all for many others. And so, we treat "all bugs are bugs and we fix them as soon as possible" as our goal. That's how the kernel security team has been working for the past 20+ years, and how it continues to work. As a CNA, we are REQUIRED to mark any bug that fixes the definition of a "vulnerability" as a CVE, that is the requirement by cve.org. But because we do not know your use case, we can not provide any sort of "severity" score to the issue, that is up to you to decide as you decided to use the software in your specific use case. This is the same for almost any open source project, and is the hardest thing for many companies and organizations to wrap their heads around over the past years as they come to grips with all of the software they are using and rely on. Frankly, I think this is a good thing as being aware of your dependencies and use cases is important, for too long it has been ignored.
* *The Future of Linux Security:* What are the long-term consequences of our strategic choices regarding security investment and process?
"strategic"? Hah, this is Linux, you think we have a single strategy? :) Seriously, we do have many plans for this type of thing, why do you think it is not working out? We are handling this on multiple different fronts, all at the same time, and have been doing so for years, with resources going into many projects and developers to address the known issues that the world faces when it comes to software at the level of which Linux runs. Any specific questions you have about those initiatives are always appreciated, and of course, the developers running and working on them are always appreciative of help, review, and testing.
* *The Next Generation:* How does the kernel project integrate the perspectives of independent, nonconformist, and younger developers?
As lwn.net constantly reports, we average about 200+ new developers to Linux ever 3 months. That's a number that just dwarfs any other project out there in the world, and is larger than almost all other project's total development teams (including all other operating systems.) We also are evolving with those new developers as they help integrate their ideas and projects into the kernel to help us all solve the problems that we currently face.
* *Regulatory Readiness:* How can the kernel community best prepare for the impact of legislation like the EU’s Cyber Resilience Act (CRA)?
I've given loads of talks about this too! And I'm on the CRA "Expert Group committee" that meets every few months, so I know all too much about this. There are still many "open" issues around the CRA that are still being worked out, but in short, I think we are going to be ok. My most recent talk was just a few weeks ago about this topic: https://kernel-recipes.org/en/2025/schedule/the-cra-and-what-it-means-for-us/ the link for the video is somewhere, I can't seem to find it just yet, but here's a good summary of it from The Register: https://www.theregister.com/2025/09/30/cyber_reiliance_act_opinion_column/ I also want to specifically call out the great work being done by the Apache Foundation when it comes to open source and the CRA. And the Eclipse Foundation as well. Both groups, and many others, are helping us in educating lawmakers and others about the issues involved with open source and the CRA. See the links in the slides for my Kernel Recipes talk for many detailed documents about the issues involved here. I'm also working with OpenSSF and others to help prepare loads of good documents, and even simple "form letters", for the open source community to be able to use when it comes to this issue as manufacturers are getting very nervous and sending out crazy things to open source projects that they really should know better than to do. There are many different specifications being created for the CRA, and many open source groups and developers are helping out with them too. Most of that work is happening right now, and is being crammed into a short window, so that after the drafts of the specs are finished in a few months, they can get widespread public review and comments and adjustments before they are written into final versions. The drafts I have seen so far, while pretty verbose in many places, are semi-sane and I don't think that anyone will have any issues with using open source software to address their requirements. In short, I think the CRA is going to be a good thing for us overall. Don't fear it, for open source individual developers, it will not affect them contributing at all. For projects that are under an organization like a "foundation", the only thing that it dictates is two requirements that all open source projects should probably be doing already anyway: - have a way to report security bugs to the project - the project, if it fixes a security bug, should report it to "someone". That "someone" is still being worked out, but should be a simple web form, or json endpoint you can push to. We'll know more in a few months about the specifics there. That's it, should not really be an issue for any project to follow.
I believe FOSDEM's open, community-driven, and unfiltered nature makes it the ideal venue. A frank conversation between us would bring immense value and clarity to these complex challenges for the benefit of the entire ecosystem.
FOSDEM is great, but the kernel dev room is pretty tiny, and these different topics encompass way more people and organizations than just can attend that small room. Which is why I travel so so much and give talks like the above links show, and is why I will be not able to attend FOSDEM, as I'll be on the road somewhere else :( Hope this helps answer some questions about these topics. And thanks for forcing me to write a bunch of this down (like the links to past talks), I have been meaning to do that for a while now. I don't know how relevant all of this is for oss-security, but I think the CRA interactions are relevant as many people here are going to start running into them late next year as the regulations start to go into effect. When we have some solid documents around this topic finished up and published, I'll try to remember to drop a link here so that people can find them. thanks, greg k-h
Current thread:
- Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros Attila Szasz (Oct 02)
- Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros Greg KH (Oct 02)
- Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros Attila Szasz (Oct 02)
- Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros Greg KH (Oct 03)
- Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros Attila Szasz (Oct 02)
- Re: Re: Re: Linux kernel: HFS+ filesystem implementation, issues, exposure in distros Greg KH (Oct 02)