|  | ==== | 
|  | CVEs | 
|  | ==== | 
|  |  | 
|  | Common Vulnerabilities and Exposure (CVE®) numbers were developed as an | 
|  | unambiguous way to identify, define, and catalog publicly disclosed | 
|  | security vulnerabilities.  Over time, their usefulness has declined with | 
|  | regards to the kernel project, and CVE numbers were very often assigned | 
|  | in inappropriate ways and for inappropriate reasons.  Because of this, | 
|  | the kernel development community has tended to avoid them.  However, the | 
|  | combination of continuing pressure to assign CVEs and other forms of | 
|  | security identifiers, and ongoing abuses by individuals and companies | 
|  | outside of the kernel community has made it clear that the kernel | 
|  | community should have control over those assignments. | 
|  |  | 
|  | The Linux kernel developer team does have the ability to assign CVEs for | 
|  | potential Linux kernel security issues.  This assignment is independent | 
|  | of the :doc:`normal Linux kernel security bug reporting | 
|  | process<../process/security-bugs>`. | 
|  |  | 
|  | A list of all assigned CVEs for the Linux kernel can be found in the | 
|  | archives of the linux-cve mailing list, as seen on | 
|  | https://lore.kernel.org/linux-cve-announce/.  To get notice of the | 
|  | assigned CVEs, please `subscribe | 
|  | <https://subspace.kernel.org/subscribing.html>`_ to that mailing list. | 
|  |  | 
|  | Process | 
|  | ======= | 
|  |  | 
|  | As part of the normal stable release process, kernel changes that are | 
|  | potentially security issues are identified by the developers responsible | 
|  | for CVE number assignments and have CVE numbers automatically assigned | 
|  | to them.  These assignments are published on the linux-cve-announce | 
|  | mailing list as announcements on a frequent basis. | 
|  |  | 
|  | Note, due to the layer at which the Linux kernel is in a system, almost | 
|  | any bug might be exploitable to compromise the security of the kernel, | 
|  | but the possibility of exploitation is often not evident when the bug is | 
|  | fixed.  Because of this, the CVE assignment team is overly cautious and | 
|  | assign CVE numbers to any bugfix that they identify.  This | 
|  | explains the seemingly large number of CVEs that are issued by the Linux | 
|  | kernel team. | 
|  |  | 
|  | If the CVE assignment team misses a specific fix that any user feels | 
|  | should have a CVE assigned to it, please email them at <cve@kernel.org> | 
|  | and the team there will work with you on it.  Note that no potential | 
|  | security issues should be sent to this alias, it is ONLY for assignment | 
|  | of CVEs for fixes that are already in released kernel trees.  If you | 
|  | feel you have found an unfixed security issue, please follow the | 
|  | :doc:`normal Linux kernel security bug reporting | 
|  | process<../process/security-bugs>`. | 
|  |  | 
|  | No CVEs will be automatically assigned for unfixed security issues in | 
|  | the Linux kernel; assignment will only automatically happen after a fix | 
|  | is available and applied to a stable kernel tree, and it will be tracked | 
|  | that way by the git commit id of the original fix.  If anyone wishes to | 
|  | have a CVE assigned before an issue is resolved with a commit, please | 
|  | contact the kernel CVE assignment team at <cve@kernel.org> to get an | 
|  | identifier assigned from their batch of reserved identifiers. | 
|  |  | 
|  | No CVEs will be assigned for any issue found in a version of the kernel | 
|  | that is not currently being actively supported by the Stable/LTS kernel | 
|  | team.  A list of the currently supported kernel branches can be found at | 
|  | https://kernel.org/releases.html | 
|  |  | 
|  | Disputes of assigned CVEs | 
|  | ========================= | 
|  |  | 
|  | The authority to dispute or modify an assigned CVE for a specific kernel | 
|  | change lies solely with the maintainers of the relevant subsystem | 
|  | affected.  This principle ensures a high degree of accuracy and | 
|  | accountability in vulnerability reporting.  Only those individuals with | 
|  | deep expertise and intimate knowledge of the subsystem can effectively | 
|  | assess the validity and scope of a reported vulnerability and determine | 
|  | its appropriate CVE designation.  Any attempt to modify or dispute a CVE | 
|  | outside of this designated authority could lead to confusion, inaccurate | 
|  | reporting, and ultimately, compromised systems. | 
|  |  | 
|  | Invalid CVEs | 
|  | ============ | 
|  |  | 
|  | If a security issue is found in a Linux kernel that is only supported by | 
|  | a Linux distribution due to the changes that have been made by that | 
|  | distribution, or due to the distribution supporting a kernel version | 
|  | that is no longer one of the kernel.org supported releases, then a CVE | 
|  | can not be assigned by the Linux kernel CVE team, and must be asked for | 
|  | from that Linux distribution itself. | 
|  |  | 
|  | Any CVE that is assigned against the Linux kernel for an actively | 
|  | supported kernel version, by any group other than the kernel assignment | 
|  | CVE team should not be treated as a valid CVE.  Please notify the | 
|  | kernel CVE assignment team at <cve@kernel.org> so that they can work to | 
|  | invalidate such entries through the CNA remediation process. | 
|  |  | 
|  | Applicability of specific CVEs | 
|  | ============================== | 
|  |  | 
|  | As the Linux kernel can be used in many different ways, with many | 
|  | different ways of accessing it by external users, or no access at all, | 
|  | the applicability of any specific CVE is up to the user of Linux to | 
|  | determine, it is not up to the CVE assignment team.  Please do not | 
|  | contact us to attempt to determine the applicability of any specific | 
|  | CVE. | 
|  |  | 
|  | Also, as the source tree is so large, and any one system only uses a | 
|  | small subset of the source tree, any users of Linux should be aware that | 
|  | large numbers of assigned CVEs are not relevant for their systems. | 
|  |  | 
|  | In short, we do not know your use case, and we do not know what portions | 
|  | of the kernel that you use, so there is no way for us to determine if a | 
|  | specific CVE is relevant for your system. | 
|  |  | 
|  | As always, it is best to take all released kernel changes, as they are | 
|  | tested together in a unified whole by many community members, and not as | 
|  | individual cherry-picked changes.  Also note that for many bugs, the | 
|  | solution to the overall problem is not found in a single change, but by | 
|  | the sum of many fixes on top of each other.  Ideally CVEs will be | 
|  | assigned to all fixes for all issues, but sometimes we will fail to | 
|  | notice fixes, therefore assume that some changes without a CVE assigned | 
|  | might be relevant to take. | 
|  |  |