Conversation

Thorsten Leemhuis (acct. 1/4)

In case anyone wonders if the CVE team releases CVEs before the problem is fixed in stable and longterm series:

Yes, they sometimes do this when the fix hit the mainline ; not that often from a quick look, but yesterday I noticed two such cases by chance:

https://lore.kernel.org/all/2024040122-CVE-2024-26653-7903@gregkh/

https://lore.kernel.org/all/2024040142-CVE-2024-26654-aa6c@gregkh/

2
2
1
@kernellogger would you know if the fixes were in stable queues (not yet released) at the time?
1
0
0

@vbabka

good question!

For those two linked above that was easy to check, as they still are in the stable queues right now.

For the others: no idea.

0
0
1
@kernellogger When someone asks us for a CVE id for a valid issue, we assign it as the process is independent of stable kernel releases. For issues that are not yet in a Linus release, we usually just reserve the id and then publish it when it has hit a -rc release, like what happened for these two CVEs.

Now when stable releases happen, we go and updated all existing CVEs to add the needed information where the fix has landed in stable kernels, and push the updates to the cve.org website in json format.

So for CVE-2024-26653, on the cve.org site, you will see that the latest stable info is included, while the older email link you provided, only says that the -rc2 is covered. But if you look in the git archive, the mbox announcement is now updated: https://git.kernel.org/pub/scm/linux/security/vulns.git/tree/cve/published/2024/CVE-2024-26653.mbox

Such is the lifecycle of a kernel change, they get backported all the time...
1
4
10