Posts
361
Following
95
Followers
4002
@manx @bagder @defnull @pierstoval Your proposal seems to match what is currently available to you by asking for a CVE id from the existing CNAs that offer them (red hat and github). You always need a person involved in the process, and those two CNAs are giving you their time and resources to do this for you, for free. If you don't want the delay involved in using that resource, then again, you can spend a bit of your own resources (i.e. time, one time) to become a CNA so that you don't have to rely on others in the future.

Any system of "global identifiers" is going to do the same exact thing, this isn't unique to cve.org at all. It's just that cve.org actually allows you to take ownership of your own destiny, instead of being forced to rely on others, if you so desire.
1
0
1
@manx @defnull @bagder @pierstoval If there are steps involved that you feel are unneeded or "too much effort", let them know, they are responsive to making this process easy to work with.

Personally, I didn't find it took that long at all.
0
0
0
@manx @defnull @bagder @pierstoval There will always be something that has to be a "gatekeeper" to get access so that you can assign identifiers, otherwise the system is useless and will be flooded with junk.

There are other alternatives to CVE, if you don't want to go through the "hoops" that cve.org puts up, but all of those alternatives also require a basic "here's how you work with our system and let's verify you are a real person/group to be using it", which all amount to pretty much the identical effort involved.

So it's fun to wish for free ponies, but someone has to be responsible for taking care of it :)
1
0
2
8 minutes video of commuting in the snow by bike here in the Netherlands earlier this week:
https://www.youtube.com/watch?v=SmMRVeRs3vU
(note, not my video, but I was out in that mess, taking a tram and walking to where I needed to go that day.)
4
1
13
@pierstoval @defnull @manx @bagder Again, we have that today, there is a "one click submission to assign a CVE web form" that a CNA can use (and many do.)

So I really don't understand what you are wanting to see created that isn't already here for you to use today.
2
0
1
@pierstoval @defnull @manx @bagder Um, we have that today, with the CVE infrastructure. Any open source project can become a CNA now, and once that is done, they have access to do everything you are asking for.

There is always going to be a "hurdle" of signing up to get that token/oath/whatever, which is what the process is for in becoming a CNA (proof you know how to issue a cve properly, using the tools). So no matter who "hosts" this thing, it's going to be the same.

Try it yourself and see!
0
0
0
@manx @bagder There is no work involved in "maintaining" a CNA, other than actually doing the normal work of being a CNA by assigning CVEs to your project when needed.
Yes, it takes a small bit of time to become a CNA, but it's really painless and it involves a small amount of homework to show that you know how the process works, which is a good thing for everyone involved. Once completed, being a CNA is trivial.

But if you don't want to be one, fine, just hit up a CNA that can give you a CVE id if needed for your project (Red Hat and Github do this for open source projects), but then you are at the mercy of their workloads, not yours. It all depends on who you wish to depend on, someone else, or yourself :)
0
0
1
@manx @bagder It does not take longer than that, it's a "simple" api call (i.e. a scripted curl command) that any CNA can do to get a CVE number, and you can allocate any amount at once (within reason, CNAs have a max they are allowed to request and "hold" without assigning at any point in time, usually around 500 or so.)
1
2
8
Another post in my Linux kernel CVE process series, "How the Linux kernel security process works": http://www.kroah.com/log/blog/2026/01/02/linux-kernel-security-work/
1
15
27
repeated
Edited 16 days ago

I've been trying to quit Google for years, and I finally did it: https://jimmunroe.net/writing/divestment-december.html
Anger at the techno-fascists wasn't enough on its own:
I got a big boost of inspiration and mutual aid from the brilliant community at @yunohost who provide ways to install and maintain -- with very little technical knowledge --
digital services like forums, cloud services and media streaming apps. Check them out at https://YunoHost.org !

0
4
0
All 5960 GSD kernel security reports are now finally processed and CVE ids have been assigned for those that meet the cve.org criteria. Only took me almost 2 years of manual review, ugh, that was a grind:

https://lore.kernel.org/r/2025123055-directory-hemlock-a282@gregkh
3
12
30

The kernel CNA assigned their 10000th CVE last week, CVE-2025-68750

So far the “stats” look like:

 Year	Reserved	Assigned	Rejected	 A+R		Returned	Total
  2019:	   0		   2		   1		   3		  47		  50
  2020:	   0		  17		   0		  17		  33		  50
  2021:	   0		 732		  24		 756		  16		 772
  2022:	   3		2041		  47		2088		   0		2091
  2023:	   1		1464		  47		1511		   0		1512
  2024:	   6		3069		  96		3165		   0		3171
  2025:	  73		2421		  39		2460		   0		2533
 Total:	  83		9746		 254		10000		  96		10179

Note, the “year” is the year the bug was fixed in the kernel tree, NOT the year the CVE was applied for/assigned.

1
6
19
repeated

@trashheap The “argument” by the SFC is complete garbage, and always has been. There has been no question about the license, and I have made it very clear over the years. And the SFC knows that.

So when they argue their incorrect reading of the GPLv2 in court, they are absolutely not doing GPLv2 enforcement. They are trying to further an agenda that is invalid, and always has been, and is explicitly against the wishes of the actual copyright holders.

So the SFC is just pure trash.

If they want to “protect” some project, let them protect a project that asks for it - not one that is known to not want their kind of protection.

Because what they are doing is a racket, plain and simple.

0
6
10
repeated
Edited 23 days ago

Rare footage of @gregkh signing an autograph with the phrase "do not use old kernels!" at Open Source Summit Korea 2025, after one of his sessions.

1
2
2
repeated

Just found that the 2026 edition of the Linux Plumbers Conference will be in Prague 🇨🇿 , Oct. 5-7, on the same week as Open Source Summit Europe and Embedded Linux Conference Europe.

Save the dates and see you there! That's too early to book my train tickets though 🤔

https://lpc.events/event/20/

0
14
2
repeated

Whenever I see a “rice my Arch w/hyprland” video, I’m like:

You think that’s badass? You should’ve tried getting X11 running on a Linux machine in the mid-90s. You needed your monitor & video card manuals & a calculator (seriously) so you could calculate “modelines” for your X11 config file.

If you got the math wrong you’d fry your monitor by driving it at too high a frequency (back then nearly all monitors were fixed-frequency).

Typing “startx” for the first time was *so* stressful.

2
5
0
repeated

Thorsten Leemhuis (acct. 1/4)

Stephen Rothwell is "stepping down as -Next maintainer on Jan 16, 2026. Mark Brown [@broonie] has generously volunteered to take up the challenge.":

https://lore.kernel.org/linux-next/20251218180721.20eb878e@canb.auug.org.au/T/#u

To quote: ""It seems a long time since I read Andrew Morton's "I have a dream" email and decided that I could help out there - little did I know what I was heading for.""

Many many thx Stephen for all your really hard work on this over all those years, it helped a tremendous lot!

2
19
4
repeated

Interesting tidbit about Rust as used in the Android OS: to prevent the trusting trust attack, and not rely on rust-lang.org build, they bootstrapped rustc 1.19 with mrustc (0.8.0), and then built all following rustc versions with their previous version.

https://cs.android.com/android/platform/superproject/main/+/main:prebuilts/rust/bootstrap/README.md

2
4
0
Rust is is not a "silver bullet" that can solve all security problems, but it sure helps out a lot and will cut out huge swatches of Linux kernel vulnerabilities as it gets used more widely in our codebase.

That being said, we just assigned our first CVE for some Rust code in the kernel: https://lore.kernel.org/all/2025121614-CVE-2025-68260-558d@gregkh/ where the offending issue just causes a crash, not the ability to take advantage of the memory corruption, a much better thing overall.

Note the other 159 kernel CVEs issued today for fixes in the C portion of the codebase, so as always, everyone should be upgrading to newer kernels to remain secure overall.
3
129
190
repeated

Because you don't have a "network interface card", you have an ARM cpu, maybe even a whole-ass ARM SOC, handling ethernet frames on one side and talking PCI on the other.

You don't even have SD cards, because "memory cards" don't exist. That terabyte of storage the size of your thumbnail you bought? That's an ARM CPU managing the wear levels on its crap-ass flash backing storage while pretending to be a hard drive on the other side.

You don't know how many computers are in your computer.

7
10
0
Show older