Chewy@discuss.tchncs.de to Linux@lemmy.ml · 4 months agoHow kernel CVE numbers are assignedlwn.netexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow kernel CVE numbers are assignedlwn.netChewy@discuss.tchncs.de to Linux@lemmy.ml · 4 months agomessage-square1fedilink
minus-squareSkull giver@popplesburger.hilciferous.nllinkfedilinkarrow-up0·edit-24 months agoCVEs are not just used by the kernel. They’re allocated by a central numbering authority to prevent numbers from being reused. If you’ve found a vulnerability, you can request a CVE number. Various authorities are allowed to hand out numbers, which are then centrally collected again. You can find out more here about this process.
CVEs are not just used by the kernel. They’re allocated by a central numbering authority to prevent numbers from being reused.
If you’ve found a vulnerability, you can request a CVE number.
Various authorities are allowed to hand out numbers, which are then centrally collected again. You can find out more here about this process.