| ==== |
| CVEs |
| ==== |
| |
| Common Vulnerabilities and Exposure (CVE®) numbers were developed as an |
| unambiguous way to identify, define, and catalog publicly disclosed |
| security vulnerabilities. Over time, their usefulness has declined with |
| regards to the kernel project, and CVE numbers were very often assigned |
| in inappropriate ways and for inappropriate reasons. Because of this, |
| the kernel development community has tended to avoid them. However, the |
| combination of continuing pressure to assign CVEs and other forms of |
| security identifiers, and ongoing abuses by individuals and companies |
| outside of the kernel community has made it clear that the kernel |
| community should have control over those assignments. |
| |
| The Linux kernel developer team does have the ability to assign CVEs for |
| potential Linux kernel security issues. This assignment is independent |
| of the :doc:`normal Linux kernel security bug reporting |
| process<../process/security-bugs>`. |
| |
| A list of all assigned CVEs for the Linux kernel can be found in the |
| archives of the linux-cve mailing list, as seen on |
| https://lore.kernel.org/linux-cve-announce/. To get notice of the |
| assigned CVEs, please `subscribe |
| <https://subspace.kernel.org/subscribing.html>`_ to that mailing list. |
| |
| Process |
| ======= |
| |
| As part of the normal stable release process, kernel changes that are |
| potentially security issues are identified by the developers responsible |
| for CVE number assignments and have CVE numbers automatically assigned |
| to them. These assignments are published on the linux-cve-announce |
| mailing list as announcements on a frequent basis. |
| |
| Note, due to the layer at which the Linux kernel is in a system, almost |
| any bug might be exploitable to compromise the security of the kernel, |
| but the possibility of exploitation is often not evident when the bug is |
| fixed. Because of this, the CVE assignment team is overly cautious and |
| assign CVE numbers to any bugfix that they identify. This |
| explains the seemingly large number of CVEs that are issued by the Linux |
| kernel team. |
| |
| If the CVE assignment team misses a specific fix that any user feels |
| should have a CVE assigned to it, please email them at <cve@kernel.org> |
| and the team there will work with you on it. Note that no potential |
| security issues should be sent to this alias, it is ONLY for assignment |
| of CVEs for fixes that are already in released kernel trees. If you |
| feel you have found an unfixed security issue, please follow the |
| :doc:`normal Linux kernel security bug reporting |
| process<../process/security-bugs>`. |
| |
| No CVEs will be automatically assigned for unfixed security issues in |
| the Linux kernel; assignment will only automatically happen after a fix |
| is available and applied to a stable kernel tree, and it will be tracked |
| that way by the git commit id of the original fix. If anyone wishes to |
| have a CVE assigned before an issue is resolved with a commit, please |
| contact the kernel CVE assignment team at <cve@kernel.org> to get an |
| identifier assigned from their batch of reserved identifiers. |
| |
| No CVEs will be assigned for any issue found in a version of the kernel |
| that is not currently being actively supported by the Stable/LTS kernel |
| team. A list of the currently supported kernel branches can be found at |
| https://kernel.org/releases.html |
| |
| Disputes of assigned CVEs |
| ========================= |
| |
| The authority to dispute or modify an assigned CVE for a specific kernel |
| change lies solely with the maintainers of the relevant subsystem |
| affected. This principle ensures a high degree of accuracy and |
| accountability in vulnerability reporting. Only those individuals with |
| deep expertise and intimate knowledge of the subsystem can effectively |
| assess the validity and scope of a reported vulnerability and determine |
| its appropriate CVE designation. Any attempt to modify or dispute a CVE |
| outside of this designated authority could lead to confusion, inaccurate |
| reporting, and ultimately, compromised systems. |
| |
| Invalid CVEs |
| ============ |
| |
| If a security issue is found in a Linux kernel that is only supported by |
| a Linux distribution due to the changes that have been made by that |
| distribution, or due to the distribution supporting a kernel version |
| that is no longer one of the kernel.org supported releases, then a CVE |
| can not be assigned by the Linux kernel CVE team, and must be asked for |
| from that Linux distribution itself. |
| |
| Any CVE that is assigned against the Linux kernel for an actively |
| supported kernel version, by any group other than the kernel assignment |
| CVE team should not be treated as a valid CVE. Please notify the |
| kernel CVE assignment team at <cve@kernel.org> so that they can work to |
| invalidate such entries through the CNA remediation process. |
| |
| Applicability of specific CVEs |
| ============================== |
| |
| As the Linux kernel can be used in many different ways, with many |
| different ways of accessing it by external users, or no access at all, |
| the applicability of any specific CVE is up to the user of Linux to |
| determine, it is not up to the CVE assignment team. Please do not |
| contact us to attempt to determine the applicability of any specific |
| CVE. |
| |
| Also, as the source tree is so large, and any one system only uses a |
| small subset of the source tree, any users of Linux should be aware that |
| large numbers of assigned CVEs are not relevant for their systems. |
| |
| In short, we do not know your use case, and we do not know what portions |
| of the kernel that you use, so there is no way for us to determine if a |
| specific CVE is relevant for your system. |
| |
| As always, it is best to take all released kernel changes, as they are |
| tested together in a unified whole by many community members, and not as |
| individual cherry-picked changes. Also note that for many bugs, the |
| solution to the overall problem is not found in a single change, but by |
| the sum of many fixes on top of each other. Ideally CVEs will be |
| assigned to all fixes for all issues, but sometimes we will fail to |
| notice fixes, therefore assume that some changes without a CVE assigned |
| might be relevant to take. |
| |