Posts
290
Following
87
Followers
3133
@larsmb The EU is already doing this, as part of the CRA, the tender for the system implementation went out a few months ago for companies to bid on, so it's already in the works. So it was planned for already, just implementation might take a bit longer than "tomorrow" :)
1
0
3

More fun with CVE numbers:

=== CVEs Published Per Year ===
2024: 4451 CVEs
2025: 1502 CVEs

=== CVEs Published in Last 6 Months ===
  November 2024:  280 CVEs
  December 2024:  358 CVEs
   January 2025:  234 CVEs
  February 2025:  929 CVEs
     March 2025:  214 CVEs
     April 2025:  125 CVEs

=== Overall Averages ===
Average CVEs per month: 401.95
Average CVEs per week: 92.40
Average CVEs per day: 13.19
Statistics calculated from 2024-01-21 to 2025-04-16
0
4
15

And for those curious, here’s the current stats for kernel CVEs reserved/assigned/rejected since we started just over a year ago:

 Year	Reserved	Assigned	Rejected	 A+R		Total
  2019:	  47		   2		   1		   3		  50
  2020:	  36		  14		   0		  14		  50
  2021:	  20		 728		  23		 751		 771
  2022:	  20		1098		  16		1114		1134
  2023:	  20		 493		  28		 521		 541
  2024:	  20		3067		  84		3151		3171
  2025:	1837		 384		  12		 396		2233
 Total:	2000		5786		 164		5950		7950
1
5
10
Given the news of the potential disruption of the CVE main server, I've reserved 1000 or so ids for the kernel now, which should last us a few weeks.
1
59
85
My KubeCon "keynote" about Linux and Rust is now online: https://www.youtube.com/watch?v=d5umzdT90HU
0
21
47
@BlackIkeEagle email the stable@vger.kernel.org list for things like this, bug reports in social media doesn't really work.
0
0
1
repeated
I'm sad to say that we're following the lead of many others and putting in proof-of-work proxies into place to protect ourselves against "AI" crawler bots. Yes, I hate this as much as you, but all other options are currently worse (such as locking us into specific vendors).

We'll be rolling it out on lore.kernel.org and git.kernel.org in the next week or so.
9
142
168
@sjvn @bagder @joshbressers @TheNewStack It's not a formal group within cve.org, just a semi-regular meeting of open source projects who are CNAs to discuss things about being a CNA.
1
0
2
repeated

How Kernel Deals With Tracking CVE Issues: https://thenewstack.io/how-linux-kernel-deals-with-tracking-cve-security-issues/ via @TheNewStack & @sjvn

And why, all too soon, most projects must also manage their own Common Vulnerabilities and Exposures.

1
1
1
@joshbressers @sjvn @TheNewStack I'm with @badger Linux is a CNA to help fix the CVE process, and so far we have already achieved some change, more to hopefully come.

And the CRA is going to cause other software projects to come to terms with their reporting process, so becoming a CNA is a good step forward in the whole thing.

And besides, what open source project doesn't want to actually control what other people are saying about your project? Just this week we "took back" a CVE issued by a rogue CNA against Linux when they shouldn't have done so. If we weren't a CNA we would never have been able to do so at all.
1
1
5
repeated

Excellent by @gregkh at on why we need in the kernel, including:

➡️ Standardize, "automate" error handling
➡️ Enforce lock acquisition, automate release
➡️ Type safety

As an important side-effect, switching from C to Rust requires you to ensure APIs fit the cleaner error handling/locking/type paradigms.

To ensure Linux stays secure and maintainers sane.

He also recommended the following 90-minute presentation: https://newsletter.pragmaticengineer.com/p/how-linux-is-built-with-greg-kroah

1
2
0
@jduck We assign on average, 13 CVEs a day for the kernel, what's one more? :)

Seriously, nice job, thanks for seeing the issue through. syzbot finds loads of stuff, we have a lack of people doing the work to fix everything it finds.
0
0
1
repeated

Many in open source are still unaware of how the Cyber Resilience Act will impact projects and businesses. This blog breaks it down.

Stay informed: https://www.linuxfoundation.org/blog/unaware-and-uncertain-is-the-open-source-community-prepared-for-the-new-regulatory-reality-of-the-cyber-resilience-act

1
1
0
repeated

The initial set of speakers and talks for ER is now published. A few highlights:
- @gregkh on the EU Cyber Resiliency Act (CRA)
- barriers to security on embedded systems
- Steam OS impact on Linux ecosystem
- Functional Safety on Linux
- writing real-time applications
- fully open source CNC and 3D printing

and many more: https://embedded-recipes.org/2025/speakers/

0
11
0
Fun, but long, interview with me about how the Linux development process works was just released: https://newsletter.pragmaticengineer.com/p/how-linux-is-built-with-greg-kroah

It's not all boring, I talk about Rust and our lack of project managers (both good things IMO) so there's lots for people to be grumpy about if you are so inclined.
2
25
57
repeated

Registration is now open for ER 2025! We hope you can join us this year in Nice, France.
https://embedded-recipes.org/2025/attend/

0
6
0
@AugierLe42e Hopefully yes, but it depends on the firmware on the hub itself, it's not under control of the operating system at all.
1
0
1
@AugierLe42e Look at how the "port" is found when you do something like 'lsusb -t', I think that should help out here. Good luck!
1
0
0
Show older