From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752689Ab3LMLzr (ORCPT ); Fri, 13 Dec 2013 06:55:47 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:38044 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752536Ab3LMLzq (ORCPT ); Fri, 13 Dec 2013 06:55:46 -0500 Date: Fri, 13 Dec 2013 03:57:38 -0800 From: Greg Kroah-Hartman To: Dan Carpenter Cc: Alexander Holler , Dave Jones , Kees Cook , "Theodore Ts'o" , vegard.nossum@oracle.com, LKML , Tommi Rantala , Ingo Molnar , "Eric W. Biederman" , Andy Lutomirski , Daniel Vetter , Alan Cox , Jason Wang , "David S. Miller" , James Morris Subject: Re: [PATCH 1/9] Known exploit detection Message-ID: <20131213115738.GA17838@kroah.com> References: <1386867152-24072-1-git-send-email-vegard.nossum@oracle.com> <20131212190659.GG13547@thunk.org> <20131213002523.GA20706@redhat.com> <20131213014220.GB11068@kroah.com> <52AAE214.7020109@ahsoftware.de> <20131213114841.GA5443@mwanda> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20131213114841.GA5443@mwanda> User-Agent: Mutt/1.5.22 (2013-10-16) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Dec 13, 2013 at 02:48:41PM +0300, Dan Carpenter wrote: > On Fri, Dec 13, 2013 at 11:31:48AM +0100, Alexander Holler wrote: > > I've never seen a comment inside the kernel sources which does point > > to a CVE, so I assume there already does exists some agreement about > > not doing so. > > We do occasionally put CVE numbers in the commit message, but normally > the commit comes first before we ask for a CVE number. > > If you want a list of kernel CVEs then you can use the Ubuntu list: > https://launchpad.net/ubuntu-cve-tracker > http://people.canonical.com/~ubuntu-security/cve/main.html > It has the commit which introduced the bug and commit which fixes the > bug. Suse has a public CVE list as well. There is a project underway to track fixes for CVE issues in the kernel, and to corrispond them with the patch that resolves them, as well as when (if at all) they enter the various stable kernel releases. That should make tracking this type of thing easier over time, and is more comprehensive than the Ubuntu list. But that's getting off-topic here a bit, sorry... greg k-h