Conversation

Say (completely hypothetical!) there was an easy unpriv -> root privesc added by a Google employee to the 5.13 kernel, does the Google VRP pay for an exploit/report/fix even if they don't currently use the kernel (presumably)?
1
23
Replying to
They wouldn't pay for a recent mainline kernel bug. Official rule is that it has to impact Pixels to qualify. In practice, it's broader and they would probably pay a bounty if the kernel bug was in Android common kernel tagged releases shipping on devices but not yet Pixels.
1
2
Replying to and
It doesn't just have to be in the kernel version but needs to impact them. A lot of severe bugs in other environments won't be in code that's enabled or exposed so they won't pay for them. They don't have unprivileged user namespaces, BPF, etc. and netd is considered privileged.
1
Replying to
I think they might get the latency for shipping kernel.org LTS down to ~4 weeks once they're using GKI. Google doesn't currently believe in shipping Qualcomm's MSM kernel LTS though. They still try to cherry-pick those and even miss some fixes they put in bulletins.
1
Show replies