Skip to content

cloud-lts/linux-cve-analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Linux CVE analysis

This repository contains a list of assessments for Common Vulnerabilities and Exposures (CVEs) issued by the kernel.org CNA. Anyone is welcome to submit analysis to the linux-cve-analysis project, and those analysis will be reviewed by the Linux CVE Workgroup.

The linux-cve-analysis project aims to be used as an amendment to and not a replacement for the kernel.org vulns.git repository. Because it's an amendment to that repo, information which is already present in vulns.git such as files affected and fixed or broken commits are not included in this repo.

The Workgroup's objective is to let engineers from different companies come together and collaborate on CVE analysis, rather than having them work in isolation. With the Linux kernel becoming a CNA, the volume of CVEs has increased significantly, and the community showed interest in having an intermediate layer between the linux-cve-announce mailing list, and downstream vulnerability ingestors.

List of the CVEs published by the kernel CNA: All assessments are generated by the Linux CVE Workgroup. kernel-CVEs

Format

All CVEs are analyzed in separate files, under the vulns/ folder. The format for the analysis is a set of labels expressed in a YML file, with a structure documented in template.yml. This is inspired by the cip-project, but aims at being more technical-oriented.

Audience and Guidelines

The audience for the linux-cve-analysis project is human reviewers who are responsible for determining subjective and use-case-specific determinations about those vulnerabilities.

While the impact of a particular vulnerability will vary based on how the kernel is being used, we have found that there is factual, objective information which describes the effect of code defects and is generic across use cases. This project seeks to compile those factual, objective descriptions while avoiding vendor-specific or subjective evaluations of those vulnerabilities. Inclusion of subjective or use-case specific analysis is generally discouraged but may be included in the Notes field. CVSS Scores are considered use-case specific and therefore discouraged for this repo.

The following guidelines may be helpful in filling out the template.yml description:

  • Strict adherence to the yaml format is not required, but following the template is generally encouraged.
  • Any field may be left blank
  • Use the Notes field for information which does not otherwise fit the template
  • Inclusion of use-case or implementation specific analysis is reserved for the Notes field

Versioning

template.yml includes a field for versioning. Versioning should be incremented when non-compatible changes are introduced to the template; the version number will not change if template updates are otherwise compatible. When the template versioning increases, it is expected that newer reviews will use the updated template; existing reviews should only be updated to the newer format if new information is available.

Contributing

The group is open and anyone can join and help, either with CVE assessments, reviews, or feedback. Feel free to join the #linux-cve-workgroup IRC channel on libera.chat, to get in touch.

How to submit CVE assessments

Simply push your assessment files to the repository. Should there be any merge conflict, please resolve it taking into account what the previous analyzer wrote.

Use of Automated Tooling

The use of LLMs or similar automated tools for generating assessments is not encouraged. Assessments should be manually analyzed and reviewed to maintain accuracy and consistency. Any use of automated tools should be proposed and approved via workgroup.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 16

Languages