Conversation

Say (completely hypothetical!) there was an easy unpriv -> root privesc added by a Google employee to the 5.13 kernel, does the Google VRP pay for an exploit/report/fix even if they don't currently use the kernel (presumably)?
1
23
Replying to and
It doesn't just have to be in the kernel version but needs to impact them. A lot of severe bugs in other environments won't be in code that's enabled or exposed so they won't pay for them. They don't have unprivileged user namespaces, BPF, etc. and netd is considered privileged.
1
Replying to and
A new mainline bug would usually only qualify without 1-2 years of delay if it got backported to an LTS. Not clear how long it would need to be in an LTS branch to qualify. I don't think they'd pay out for the LTS branches that aren't really used in production yet either.
1
2
Show replies