Conversation

@kurtseifried @gregkh or, you know… just don’t run Linux.

1
0
0
@kurtseifried Yeah, it's only about 60 a week, a bit more than I originally guessed, but not out of the expected range at all.
0
0
1
@mathaetaes @kurtseifried No one is forcing you to! But note, if other operating systems are not reporting these same types of numbers, then they just aren't reporting things that actually get fixed, or nothing is being fixed at all in them. It's up to you to determine which is the case for those systems :)
2
0
8
@kurtseifried Note, 3000 includes the "old" things we are backfilling from the GSD database, not just the ones that have shown up this year since we started in February. So while 3000 sounds big, if you are using a modern kernel (i.e. something from this year), it's only 1500+ issues to be assigned so far.

Sorry to nit-pick, just wanted to be specific as 3000 in 6 months originally seemed like a lot to me before I went back and looked at these numbers.

Also, for those who want to play along on their own, just clone our vulns.git repo at git.kernel.org and look at the information directly there yourself, it's all being reviewed and assigned in the open, unlike other projects...
0
0
4

@kurtseifried @gregkh isnt that partly because the kernel devs are kinda trolling the cve community (or rather the weird corpos profiting of the community)?

I mean, every kernel bug is worth a cve, just update your stuff and you dont need to "manage your vulnerabilities"

1
0
1

@gregkh @kurtseifried @mathaetaes this must be a troll or a case of survivorship bias

0
0
1

A CVE does not mean a high risk. Companies should upgrade only when it's worth it, not only because there are known defects that could potentially be exploited. I totally agree companies should invest in automating upgrades, but not because there are many CVEs and always evaluating cost vs benefit.

0
0
0
@brahms @kurtseifried We are not "trolling" anyone, we are doing explicitly what the CVE.org board and staff have required us to do in order for us to be a CNA.
2
1
1
@gregkh @mathaetaes @kurtseifried Yeah, other operating systems actually do the sane thing of only reporting security bugs as CVE. Greg decided to be "special" :-(.
0
0
1

@gregkh @kurtseifried just to clarify: wasnt meant in a negative way.

This is something you have to do (as you made clear in your post back then), I personally just think that it is mostly work for you with little gain. The "trolling" was more a reference to the "every bug is a bug, [so its also a cve]" philosophy resulting in a huge amount of cve`s being created, maybe not the best wording on my site :s

0
0
0

@kurtseifried @gregkh that's ten CVE per day? 🤯 I know the kernel is a complex beast but that number feels totally bonkers

0
0
0

@kurtseifried While I can agree with "run current", note that as of now, my understanding is that *every* kernel bug gets a CVE. Every single one. No matter how remote a possibility exploitation of it would be. So the number of CVEs assigned maps fairly well to the number of bugs fixed; not to the number of actual *known* security issues.

0
0
0

@kurtseifried @gregkh

after talking with a collegue about it I realized that im not the target group for this change, so I most likely misunderstood the reasoning behind it!

i will get back after listening through the episode, thanks for the link!

0
0
0
@kurtseifried That's a really good point, the "open source" ecosystem being a CNA is very new, I don't think this was even possible until less than a year ago when python blazed that trail.

And it's nice to see we aren't alone here with "big numbers", it's going to be an interesting thing to watch shake out as "take responsibility" rules/laws come into being in different locations. I agree with you in that the quantity is just going to get larger over time.
0
0
1

@kurtseifried @gregkh @joshbressers I mean, they probably did, but we did not knew about it :D

0
0
0
@kurtseifried @joshbressers Your TV (i.e. all TVs) was running Linux for 15+ years now, it's always been there, just no one noticed...
1
0
0

@gregkh @joshbressers @kurtseifried exactly. It is just that it takes time to get all the vulnerabilities shoved in your face

0
0
0

@kurtseifried @gregkh I would assume "current" also applies to supported longterm kernels that get included in point release distributions like @alpinelinux ?

0
0
0

@kurtseifried in this regard, I wonder about the plan of companies such as Red Hat or Canonical selling long term support.

(note: I don't know much about their exact offering, I'm into embedded stuff, building everything from sources anyhow.).

0
0
0