cve.rst 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. ====
  2. CVEs
  3. ====
  4. Common Vulnerabilities and Exposure (CVE®) numbers were developed as an
  5. unambiguous way to identify, define, and catalog publicly disclosed
  6. security vulnerabilities. Over time, their usefulness has declined with
  7. regards to the kernel project, and CVE numbers were very often assigned
  8. in inappropriate ways and for inappropriate reasons. Because of this,
  9. the kernel development community has tended to avoid them. However, the
  10. combination of continuing pressure to assign CVEs and other forms of
  11. security identifiers, and ongoing abuses by individuals and companies
  12. outside of the kernel community has made it clear that the kernel
  13. community should have control over those assignments.
  14. The Linux kernel developer team does have the ability to assign CVEs for
  15. potential Linux kernel security issues. This assignment is independent
  16. of the :doc:`normal Linux kernel security bug reporting
  17. process<../process/security-bugs>`.
  18. A list of all assigned CVEs for the Linux kernel can be found in the
  19. archives of the linux-cve mailing list, as seen on
  20. https://lore.kernel.org/linux-cve-announce/. To get notice of the
  21. assigned CVEs, please `subscribe
  22. <https://subspace.kernel.org/subscribing.html>`_ to that mailing list.
  23. Process
  24. =======
  25. As part of the normal stable release process, kernel changes that are
  26. potentially security issues are identified by the developers responsible
  27. for CVE number assignments and have CVE numbers automatically assigned
  28. to them. These assignments are published on the linux-cve-announce
  29. mailing list as announcements on a frequent basis.
  30. Note, due to the layer at which the Linux kernel is in a system, almost
  31. any bug might be exploitable to compromise the security of the kernel,
  32. but the possibility of exploitation is often not evident when the bug is
  33. fixed. Because of this, the CVE assignment team is overly cautious and
  34. assign CVE numbers to any bugfix that they identify. This
  35. explains the seemingly large number of CVEs that are issued by the Linux
  36. kernel team.
  37. If the CVE assignment team misses a specific fix that any user feels
  38. should have a CVE assigned to it, please email them at <cve@kernel.org>
  39. and the team there will work with you on it. Note that no potential
  40. security issues should be sent to this alias, it is ONLY for assignment
  41. of CVEs for fixes that are already in released kernel trees. If you
  42. feel you have found an unfixed security issue, please follow the
  43. :doc:`normal Linux kernel security bug reporting
  44. process<../process/security-bugs>`.
  45. No CVEs will be automatically assigned for unfixed security issues in
  46. the Linux kernel; assignment will only automatically happen after a fix
  47. is available and applied to a stable kernel tree, and it will be tracked
  48. that way by the git commit id of the original fix. If anyone wishes to
  49. have a CVE assigned before an issue is resolved with a commit, please
  50. contact the kernel CVE assignment team at <cve@kernel.org> to get an
  51. identifier assigned from their batch of reserved identifiers.
  52. No CVEs will be assigned for any issue found in a version of the kernel
  53. that is not currently being actively supported by the Stable/LTS kernel
  54. team. A list of the currently supported kernel branches can be found at
  55. https://kernel.org/releases.html
  56. Disputes of assigned CVEs
  57. =========================
  58. The authority to dispute or modify an assigned CVE for a specific kernel
  59. change lies solely with the maintainers of the relevant subsystem
  60. affected. This principle ensures a high degree of accuracy and
  61. accountability in vulnerability reporting. Only those individuals with
  62. deep expertise and intimate knowledge of the subsystem can effectively
  63. assess the validity and scope of a reported vulnerability and determine
  64. its appropriate CVE designation. Any attempt to modify or dispute a CVE
  65. outside of this designated authority could lead to confusion, inaccurate
  66. reporting, and ultimately, compromised systems.
  67. Invalid CVEs
  68. ============
  69. If a security issue is found in a Linux kernel that is only supported by
  70. a Linux distribution due to the changes that have been made by that
  71. distribution, or due to the distribution supporting a kernel version
  72. that is no longer one of the kernel.org supported releases, then a CVE
  73. can not be assigned by the Linux kernel CVE team, and must be asked for
  74. from that Linux distribution itself.
  75. Any CVE that is assigned against the Linux kernel for an actively
  76. supported kernel version, by any group other than the kernel assignment
  77. CVE team should not be treated as a valid CVE. Please notify the
  78. kernel CVE assignment team at <cve@kernel.org> so that they can work to
  79. invalidate such entries through the CNA remediation process.
  80. Applicability of specific CVEs
  81. ==============================
  82. As the Linux kernel can be used in many different ways, with many
  83. different ways of accessing it by external users, or no access at all,
  84. the applicability of any specific CVE is up to the user of Linux to
  85. determine, it is not up to the CVE assignment team. Please do not
  86. contact us to attempt to determine the applicability of any specific
  87. CVE.
  88. Also, as the source tree is so large, and any one system only uses a
  89. small subset of the source tree, any users of Linux should be aware that
  90. large numbers of assigned CVEs are not relevant for their systems.
  91. In short, we do not know your use case, and we do not know what portions
  92. of the kernel that you use, so there is no way for us to determine if a
  93. specific CVE is relevant for your system.
  94. As always, it is best to take all released kernel changes, as they are
  95. tested together in a unified whole by many community members, and not as
  96. individual cherry-picked changes. Also note that for many bugs, the
  97. solution to the overall problem is not found in a single change, but by
  98. the sum of many fixes on top of each other. Ideally CVEs will be
  99. assigned to all fixes for all issues, but sometimes we will fail to
  100. notice fixes, therefore assume that some changes without a CVE assigned
  101. might be relevant to take.