But no seriously what the fuck is @gregkh trying to achieve here? Before, I could use a CVE count as an argument to spend time upgrading #Linux: "there have been found 5 vulnerabilities in the version we use, we should upgrade to the latest". These days, CVEs are useless for that purpose, everyone knows that pretty much every single one of the thousands of "CVEs" affecting the kernel version we're on is bogus so they aren't useful for that purpose any more so we stay on old kernels for longer
Of course it has. CVE identifiers have been misinterpreted/misused/misunderstood this way for years.
@mort @Foxboron i scrolled briefly through the list of cves assigned last friday and it looks like the largest chunk are memory safety issues. maybe you should update your kernel... though most of them are in optional components. maybe it would be useful to include metadata on the cve describing what kconfig you need for the affected code to be compiled in
@mcepl That's not what I'm saying. I'm saying that if there are enough exploitable vulnerabilities in Linux to fix a hundred of them every single day consistently, clearly it's not a very secure operating system
If there's not enough exploitable vulnerabilities to do that but they're publishing a hundred CVEs per day regardless, that's just a DDOS attack against a deeply imperfect yet useful vulnerability reporting system
And yet until yesterday you were using it happily persuaded that it is secure, and if Greg took over FreeBSD and start reporting CVEs on it, you would be persuaded that it is insecure as well? It is just reporting!
@mcepl Well I knew there were issues, nothing is perfect, but I was under the impression that it was secure enough that you couldn't fix a hundred exploitable vilnerabilities per day and still go strong a month later, yeah.
@mcepl If FreeBSD started publishing a hundred CVEs about exploitable vulnerabilities per day I would have the same reaction to that
And of course @BrodieOnLinux@linuxrocks.online published very detailed analysis of the issue on https://youtu.be/g_yrk7BXLRI
@ljs sorry for jumping in, there was another thread discussing this: https://pony.social/@thephd/112479768565249999
@ljs @mcepl @mort @gregkh @vbabka he does explain it
The Linux kernel is one of the most widely used pieces of software on the planet. It’s in phones, space ships, and milking machines
They tag anything they think could be a problem without understanding the use case
As one would expect, this is a very wide net
@gregkh @mcepl @mort @joshbressers @ljs @vbabka I think the problem is mostly faced by maintainers of their own LTS kernel by simply applying CVE fixes, and that isn't working it anymore. Perhaps having an additional database on vulnerabilities exploited in the wild could help such downstream maintainers and those who prefer the old approach. Probably such a solution already exists :-)
@ljs @mcepl @mort @joshbressers @gregkh @vbabka Yes, workloads have increased for enterprise distros (I'm directly affected). But blaming that on GregKH I think is shooting the messenger. Enterprise distros have ALWAYS had a duty to evaluate what they are shipping or not shipping. If anything, the kernel CNA is doing a great job of highlighting exactly how many bugs there are in the kernel.
I proposed that distros could collaborate and got essentially zero response: https://lore.kernel.org/all/20240311150054.2945210-2-vegard.nossum@oracle.com/
@ljs @shironeko
Just to correct a misconception here, the Linux CNA hasn't contributed to a huge uptick in CVEs.
So far in 2024 there has been published 17k CVE entries and downstreams are perfectly capable of filtering this information.
The issue is that enterprise distros are dealing with more CVEs in the kernel specifically, which is problematic from a compliance perspective.
Ah! I read the sentence as the Linux CNA caused a huge uptick in CVEs in *general*, as in all issued CVEs.