~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/Documentation/process/cve.rst

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /Documentation/process/cve.rst (Architecture mips) and /Documentation/process/cve.rst (Architecture ppc)


  1 ====                                                1 ====
  2 CVEs                                                2 CVEs
  3 ====                                                3 ====
  4                                                     4 
  5 Common Vulnerabilities and Exposure (CVE®) nu      5 Common Vulnerabilities and Exposure (CVE®) numbers were developed as an
  6 unambiguous way to identify, define, and catal      6 unambiguous way to identify, define, and catalog publicly disclosed
  7 security vulnerabilities.  Over time, their us      7 security vulnerabilities.  Over time, their usefulness has declined with
  8 regards to the kernel project, and CVE numbers      8 regards to the kernel project, and CVE numbers were very often assigned
  9 in inappropriate ways and for inappropriate re      9 in inappropriate ways and for inappropriate reasons.  Because of this,
 10 the kernel development community has tended to     10 the kernel development community has tended to avoid them.  However, the
 11 combination of continuing pressure to assign C     11 combination of continuing pressure to assign CVEs and other forms of
 12 security identifiers, and ongoing abuses by in     12 security identifiers, and ongoing abuses by individuals and companies
 13 outside of the kernel community has made it cl     13 outside of the kernel community has made it clear that the kernel
 14 community should have control over those assig     14 community should have control over those assignments.
 15                                                    15 
 16 The Linux kernel developer team does have the      16 The Linux kernel developer team does have the ability to assign CVEs for
 17 potential Linux kernel security issues.  This      17 potential Linux kernel security issues.  This assignment is independent
 18 of the :doc:`normal Linux kernel security bug      18 of the :doc:`normal Linux kernel security bug reporting
 19 process<../process/security-bugs>`.                19 process<../process/security-bugs>`.
 20                                                    20 
 21 A list of all assigned CVEs for the Linux kern     21 A list of all assigned CVEs for the Linux kernel can be found in the
 22 archives of the linux-cve mailing list, as see     22 archives of the linux-cve mailing list, as seen on
 23 https://lore.kernel.org/linux-cve-announce/.       23 https://lore.kernel.org/linux-cve-announce/.  To get notice of the
 24 assigned CVEs, please `subscribe                   24 assigned CVEs, please `subscribe
 25 <https://subspace.kernel.org/subscribing.html>     25 <https://subspace.kernel.org/subscribing.html>`_ to that mailing list.
 26                                                    26 
 27 Process                                            27 Process
 28 =======                                            28 =======
 29                                                    29 
 30 As part of the normal stable release process,      30 As part of the normal stable release process, kernel changes that are
 31 potentially security issues are identified by      31 potentially security issues are identified by the developers responsible
 32 for CVE number assignments and have CVE number     32 for CVE number assignments and have CVE numbers automatically assigned
 33 to them.  These assignments are published on t     33 to them.  These assignments are published on the linux-cve-announce
 34 mailing list as announcements on a frequent ba     34 mailing list as announcements on a frequent basis.
 35                                                    35 
 36 Note, due to the layer at which the Linux kern     36 Note, due to the layer at which the Linux kernel is in a system, almost
 37 any bug might be exploitable to compromise the     37 any bug might be exploitable to compromise the security of the kernel,
 38 but the possibility of exploitation is often n     38 but the possibility of exploitation is often not evident when the bug is
 39 fixed.  Because of this, the CVE assignment te     39 fixed.  Because of this, the CVE assignment team is overly cautious and
 40 assign CVE numbers to any bugfix that they ide     40 assign CVE numbers to any bugfix that they identify.  This
 41 explains the seemingly large number of CVEs th     41 explains the seemingly large number of CVEs that are issued by the Linux
 42 kernel team.                                       42 kernel team.
 43                                                    43 
 44 If the CVE assignment team misses a specific f     44 If the CVE assignment team misses a specific fix that any user feels
 45 should have a CVE assigned to it, please email<     45 should have a CVE assigned to it, please email them at <cve@kernel.org>
 46 and the team there will work with you on it.       46 and the team there will work with you on it.  Note that no potential
 47 security issues should be sent to this alias,      47 security issues should be sent to this alias, it is ONLY for assignment
 48 of CVEs for fixes that are already in released     48 of CVEs for fixes that are already in released kernel trees.  If you
 49 feel you have found an unfixed security issue,     49 feel you have found an unfixed security issue, please follow the
 50 :doc:`normal Linux kernel security bug reporti     50 :doc:`normal Linux kernel security bug reporting
 51 process<../process/security-bugs>`.                51 process<../process/security-bugs>`.
 52                                                    52 
 53 No CVEs will be automatically assigned for unf     53 No CVEs will be automatically assigned for unfixed security issues in
 54 the Linux kernel; assignment will only automat     54 the Linux kernel; assignment will only automatically happen after a fix
 55 is available and applied to a stable kernel tr     55 is available and applied to a stable kernel tree, and it will be tracked
 56 that way by the git commit id of the original      56 that way by the git commit id of the original fix.  If anyone wishes to
 57 have a CVE assigned before an issue is resolve     57 have a CVE assigned before an issue is resolved with a commit, please
 58 contact the kernel CVE assignment team at <cve@     58 contact the kernel CVE assignment team at <cve@kernel.org> to get an
 59 identifier assigned from their batch of reserv     59 identifier assigned from their batch of reserved identifiers.
 60                                                    60 
 61 No CVEs will be assigned for any issue found i     61 No CVEs will be assigned for any issue found in a version of the kernel
 62 that is not currently being actively supported     62 that is not currently being actively supported by the Stable/LTS kernel
 63 team.  A list of the currently supported kerne     63 team.  A list of the currently supported kernel branches can be found at
 64 https://kernel.org/releases.html                   64 https://kernel.org/releases.html
 65                                                    65 
 66 Disputes of assigned CVEs                          66 Disputes of assigned CVEs
 67 =========================                          67 =========================
 68                                                    68 
 69 The authority to dispute or modify an assigned     69 The authority to dispute or modify an assigned CVE for a specific kernel
 70 change lies solely with the maintainers of the     70 change lies solely with the maintainers of the relevant subsystem
 71 affected.  This principle ensures a high degre     71 affected.  This principle ensures a high degree of accuracy and
 72 accountability in vulnerability reporting.  On     72 accountability in vulnerability reporting.  Only those individuals with
 73 deep expertise and intimate knowledge of the s     73 deep expertise and intimate knowledge of the subsystem can effectively
 74 assess the validity and scope of a reported vu     74 assess the validity and scope of a reported vulnerability and determine
 75 its appropriate CVE designation.  Any attempt      75 its appropriate CVE designation.  Any attempt to modify or dispute a CVE
 76 outside of this designated authority could lea     76 outside of this designated authority could lead to confusion, inaccurate
 77 reporting, and ultimately, compromised systems     77 reporting, and ultimately, compromised systems.
 78                                                    78 
 79 Invalid CVEs                                       79 Invalid CVEs
 80 ============                                       80 ============
 81                                                    81 
 82 If a security issue is found in a Linux kernel     82 If a security issue is found in a Linux kernel that is only supported by
 83 a Linux distribution due to the changes that h     83 a Linux distribution due to the changes that have been made by that
 84 distribution, or due to the distribution suppo     84 distribution, or due to the distribution supporting a kernel version
 85 that is no longer one of the kernel.org suppor     85 that is no longer one of the kernel.org supported releases, then a CVE
 86 can not be assigned by the Linux kernel CVE te     86 can not be assigned by the Linux kernel CVE team, and must be asked for
 87 from that Linux distribution itself.               87 from that Linux distribution itself.
 88                                                    88 
 89 Any CVE that is assigned against the Linux ker     89 Any CVE that is assigned against the Linux kernel for an actively
 90 supported kernel version, by any group other t     90 supported kernel version, by any group other than the kernel assignment
 91 CVE team should not be treated as a valid CVE.     91 CVE team should not be treated as a valid CVE.  Please notify the
 92 kernel CVE assignment team at <cve@kernel.org>      92 kernel CVE assignment team at <cve@kernel.org> so that they can work to
 93 invalidate such entries through the CNA remedi     93 invalidate such entries through the CNA remediation process.
 94                                                    94 
 95 Applicability of specific CVEs                     95 Applicability of specific CVEs
 96 ==============================                     96 ==============================
 97                                                    97 
 98 As the Linux kernel can be used in many differ     98 As the Linux kernel can be used in many different ways, with many
 99 different ways of accessing it by external use     99 different ways of accessing it by external users, or no access at all,
100 the applicability of any specific CVE is up to    100 the applicability of any specific CVE is up to the user of Linux to
101 determine, it is not up to the CVE assignment     101 determine, it is not up to the CVE assignment team.  Please do not
102 contact us to attempt to determine the applica    102 contact us to attempt to determine the applicability of any specific
103 CVE.                                              103 CVE.
104                                                   104 
105 Also, as the source tree is so large, and any     105 Also, as the source tree is so large, and any one system only uses a
106 small subset of the source tree, any users of     106 small subset of the source tree, any users of Linux should be aware that
107 large numbers of assigned CVEs are not relevan    107 large numbers of assigned CVEs are not relevant for their systems.
108                                                   108 
109 In short, we do not know your use case, and we    109 In short, we do not know your use case, and we do not know what portions
110 of the kernel that you use, so there is no way    110 of the kernel that you use, so there is no way for us to determine if a
111 specific CVE is relevant for your system.         111 specific CVE is relevant for your system.
112                                                   112 
113 As always, it is best to take all released ker    113 As always, it is best to take all released kernel changes, as they are
114 tested together in a unified whole by many com    114 tested together in a unified whole by many community members, and not as
115 individual cherry-picked changes.  Also note t    115 individual cherry-picked changes.  Also note that for many bugs, the
116 solution to the overall problem is not found i    116 solution to the overall problem is not found in a single change, but by
117 the sum of many fixes on top of each other.  I    117 the sum of many fixes on top of each other.  Ideally CVEs will be
118 assigned to all fixes for all issues, but some    118 assigned to all fixes for all issues, but sometimes we will fail to
119 notice fixes, therefore assume that some chang    119 notice fixes, therefore assume that some changes without a CVE assigned
120 might be relevant to take.                        120 might be relevant to take.
121                                                   121 
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php