What to do about CVE numbers
What to do about CVE numbers
Posted Oct 10, 2019 14:19 UTC (Thu) by msmeissn (subscriber, #13641)Parent article: What to do about CVE numbers
- Spectre variant 1 / single CVE
The Spectre 1 CVE covers actually problem of the CPU, and not the kernel. The kernel has mitigations for it.
I would consider Spectre 1 even more a "bugclass" (like "format string exploit"), so every mitigating fix would need to get its own CVE (which now would be 50-100 or more for Spectre v1 alone).
Same goes for the other Spectre flavor CVEs, like Bounds Check Bypass Store ...
- Giving government bodies like Mitre ahead knowledge of CVE.
For allocation of a CVE it is not necessary to hand out any information, depending on the CNA. Mitre as the Root CNA , or any CNA able to allocate Kernel issues could hand out a blank CVE without getting details of the issue.
- Misallocation by Mitre
If there would be a specific Linux kernel CNA, operated by more knowledgeable people, these could take decisions on what issues get what CVEs.
So far Mitre does it best effort, and as GregKH states does "too much" occasionaly.
Mitre for instance blocks any CVE requests for drivers/staging/ already.
This would need at least a fulltime position, or even more.