Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Has any one in this thread actually evaluated all ~320 CVEs since Feb 20? Because I have. And I literally just finished writing a filter script for MITRE's cve.org API output.

1. Most of the new CVEs have potential security concerns. At the very least, they would have been assigned a CVE if they were reported by an external researcher.

2. Many of them don't affect the older LTS branches.

3. I found 1 (1!) CVE that has a remote exploitation possibility. The rest are mostly local privilege exploit or DoS or crashes.

4. This Greg dude (heh) is backtracking to 2021 to flag bugs that have since been fixed. If your kernel repository is even semi up to date, you would have cut down the CVE count by 1/3.

In my company, the majority consensus amongst the kernel developers is 'patch your shit and do rolling release. We are too busy to evaluate all the CVEs.' On the opposite end, are embedded hardware kernel developers who barely had their kernels working on existing hardware. Both sides make good arguments and I don't have any opinion I'd share.

There are other ways to lessen the CVE workload.

1. Disable unused components with defconf or make menuconfig.

2. Don't stay on the bleeding edge branch (ie. 6.x)

3. Implement automatic minor version commit merges

Your mileage may vary, but with these implemented, the workload is managable imo.



> There are other ways to lessen the CVE workload.

> 1. Disable unused components with defconf or make menuconfig.

+1 for avoiding vulnerabilities, but were you saying this lessens the CVE evaluation workload? I'd love to hear about automation for evaluating CVEs based on a kernel config. I've done a fair amount of that manually and I'm not aware of any metadata in the CVE records (or in the CVE json in gregkh's new vulns repo) that includes config metadata.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: