GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kernel Recipes (kernelrecipes@fosstodon.org)'s status on Monday, 23-Sep-2024 22:42:40 JST Kernel Recipes Kernel Recipes

    Keep it in mind! First one is a kind of personal mantra #kr2024

    In conversation about 9 months ago from fosstodon.org permalink

    Attachments


    1. https://cdn.fosstodon.org/media_attachments/files/113/186/834/951/056/113/original/d2f813823f0143a5.png
    • Embed this notice
      Kees Cook :tux: (kees@fosstodon.org)'s status on Monday, 23-Sep-2024 22:42:39 JST Kees Cook :tux: Kees Cook :tux:
      in reply to

      @KernelRecipes Followed up by my more nihilistic take:
      https://youtu.be/b2_HAH2kX04#t=373

      Bottom line remains the same: we have to eliminate bug classes. I'm really excited by all the work that continues on this front between fixing the C language itself and the adoption of Rust. We continue to make steady progress, but can always use more help. :)

      In conversation about 9 months ago permalink

      Attachments


      1. https://cdn.fosstodon.org/media_attachments/files/113/187/131/087/449/409/original/87f7941699be07b6.png
      2. Kernel Recipes 2017 - The State of Kernel Self-Protection - Kees Cook
        from Kernel Recipes
        The Kernel Self-Protection Project focuses on addressing gaps in Linux’s defensive technologies. With Linux reaching into every corner of modern life, and us...
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Kees Cook :tux: (kees@fosstodon.org)'s status on Monday, 23-Sep-2024 22:42:40 JST Kees Cook :tux: Kees Cook :tux:
      in reply to
      • Greg K-H

      @KernelRecipes The continuity across upstream messaging has been clear since (probably before) 2017. Same observations then too: https://youtu.be/RKadXpQLmPU#t=2796
      "If you are not using a stable / long-term kernel, your machine is insecure" - @gregkh

      In conversation about 9 months ago permalink

      Attachments


      1. https://cdn.fosstodon.org/media_attachments/files/113/187/106/985/443/500/original/0f37460fe00b8f90.png
      2. Kernel Recipes 2017 - Linux Kernel release model - Greg KH
        from Kernel Recipes
        This talk describes how the Linux kernel development model works, what a long term supported kernel is, and why all Linux-based systems devices should be usi...
    • Embed this notice
      Kees Cook :tux: (kees@fosstodon.org)'s status on Monday, 23-Sep-2024 23:54:47 JST Kees Cook :tux: Kees Cook :tux:
      in reply to

      @KernelRecipes Sometimes people need reminding that CVEs are just a stand-in for the real goal: fixing vulnerabilities. The point of "the deployment cannot have any CVEs" isn't an arbitrary check list. The goal is to get as close as possible to "the deployment cannot have any vulnerabilities".

      The Linux Kernel CNA solves the "tons of false negatives" problem (but creates the "a few false positives" problem), but the result is a more accurate mapping from vulnerabilities to CVEs.

      In conversation about 9 months ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Kernel Recipes (kernelrecipes@fosstodon.org)'s status on Monday, 23-Sep-2024 23:54:49 JST Kernel Recipes Kernel Recipes
      in reply to
      • Kees Cook :tux:

      From @kees

      In conversation about 9 months ago permalink

      Attachments


      1. https://cdn.fosstodon.org/media_attachments/files/113/186/836/859/771/635/original/9204bf65e0a7bb52.png
    • Embed this notice
      Kees Cook :tux: (kees@fosstodon.org)'s status on Wednesday, 25-Sep-2024 00:35:00 JST Kees Cook :tux: Kees Cook :tux:
      in reply to
      • Pavel Machek

      @pavel @KernelRecipes Deployments always had an obligation to evaluate vulnerabilities and fix them, but now it has become unavoidable and threat model mismatches are glaringly obvious.

      Yes, it is possible that for a given threat model, there are now a ton of CVEs that will need to have their severity labeled as "don't care". But this was always true -- but no one triaged fixes, they triaged against the prior CVEs, which were a small subset of the distro threat model. Lots of fixes got missed.

      In conversation about 9 months ago permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      Kees Cook :tux: (kees@fosstodon.org)'s status on Wednesday, 25-Sep-2024 00:35:01 JST Kees Cook :tux: Kees Cook :tux:
      in reply to
      • Pavel Machek

      @pavel @KernelRecipes At the LPC CVE BoF, in a room filled with people who care deeply about this topic, there appeared to be consensus that the CNA has traded many false negatives for a few false positives. (I.e. we are now closer to the imagined objective reality of a 1:1 mapping between fixes and CVEs.)

      In the past, with distros and researchers mostly causing the CVE assignments, the implied threat model was that of a distro, and didn't represent other models. (But still missed fixes.)

      In conversation about 9 months ago permalink
    • Embed this notice
      Kees Cook :tux: (kees@fosstodon.org)'s status on Wednesday, 25-Sep-2024 00:35:01 JST Kees Cook :tux: Kees Cook :tux:
      in reply to
      • Pavel Machek

      @pavel @KernelRecipes I think of the CNA as doing a first pass at CVEs, and then each deployment can continue triage based on their threat model. This is how it's always been, it's just that severity triage has been moved closer to where it is needed: with those that have a threat model to apply. What has changed is that there isn't yet a place for common threat models to share triage. This used to be the CVEs themself, but that left out all the other threat models and missed tons of fixes.

      In conversation about 9 months ago permalink
    • Embed this notice
      Pavel Machek (pavel@social.kernel.org)'s status on Wednesday, 25-Sep-2024 00:35:02 JST Pavel Machek Pavel Machek
      in reply to
      • Kees Cook :tux:
      @kees @KernelRecipes Greg & company is introducing so many false positives into the CVE system that CVEs are now completely useless for kernel. Good job! :-( (And calling it "a few false positives" is not really a good sign).
      In conversation about 9 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.