Hacker News new | past | comments | ask | show | jobs | submit login

(2024).

Assigning a CVE to every second commit and refusing to assign CVEs to unfixed issues doesn't seem like correct usage of the CVE system. I expect that most Linux CVEs will never get a proper analysis or a CVSS rating.

To me it sounds plausible that the design goal of the Linux CNA is to show that CVEs don't meaningfully apply to the Linux kernel. Given how dependent on context the impact of some kernel bugs can be, if we were assigning CVSS scores for the worst case, practically all kernel bugs would be at least a 9.8/10.




> I expect that most Linux CVEs will never get a proper analysis or a CVSS rating.

You're free to contribute your own analysis and CVSS rating.


No, the problem needs to be fixed. Adding more noise isn't helpful at this point.


Ah, you're paying for some enterprise Linux subscription, then? So that the vendor can on your (and others') behalf influence the kernel devs that they are funding?


What? No, the kernel devs just have stop acting like idiot children in this regard.


Ah, yes, of course!

I hope you're aware this says a lot more about you than it does about kernel devs :)


Honestly, I think your reactions just show that you don't really understand why the kernels devs behavior in this context is so childish and irresponsible.

Looks like you have some reading to do :)


k so I'm writing a blog post on the whole #Linux Kernel #CVE/#CNA thing. And I actually looked at the data. For those of you complaining about the Linux Kernel issuing improper CVEs my response is "cool. If they're not security vulns get them rejected".

So far in 2024 the Linux Kernel error rate is 3.21%.

Is that bad or good?

Let's compare to the top 25 CNA's by error rate for 2024:

f5 49.32%

atlassian 44.44%

Esri 43.75%

freebsd 40.00%

canonical 32.61%

Gallagher 25.00%

SNPS 25.00%

intel 19.74%

Anolis 18.75%

Dragos 18.18%

rapid7 14.29%

@huntr_ai 12.27%

Google 10.00%

directcyber 8.33%

CERTVDE 8.11%

Go 7.69%

lenovo 6.25%

mitre 5.53%

schneider 4.35%

GitHub_P 4.35%

Fluid Attacks 4.35%

Wordfence 3.56%

Linux 3.21%

snyk 2.94%

So... Linux is in at 24th place for error rate. But wait, surely those numbers are skewed towards some smaller CNAs that reject a handful of issues driving up their error rate?

Nope. Several of the mature CNAs like F5, Atlassian, Canonical, Google, Intel, Red Hat, Lenovo, MITRE all issue tens to hundreds to thousands of CVEs a year and have much higher error rates. Actually the worst CNA by raw numbers is MITRE (159).

Spamming this multiple times since people don't seem to read.


Turns out F5 and Intel were just clearing out old reservations, but the other data is correct.


> To me it sounds plausible that the design goal of the Linux CNA is to show that CVEs don't meaningfully apply to the Linux kernel.

I think it's hostile in nature. The core kernel devs have a horrible attitude toward security vulnerabilities.


Yes, my original wording was "to make the CVE system burn", but that got lost during my tone-down edits.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: