Sheogorath on Nostr: One man's bug is another man's security flaw, especially in kernel space. I recommend ...
One man's bug is another man's security flaw, especially in kernel space.
I recommend this blog post talking about how the traditional way CVE was working isn't going to cut it any more. Not because, but despite of what the kernel team does: https://opensourcesecurity.io/2024/06/03/why-are-vulnerabilities-out-of-control-in-2024/
And if you are working on a custom kernel build, you should assess all these fixes for security anyway. And if you don't you shouldn't care and pay your vendor to handle it.
I recommend this blog post talking about how the traditional way CVE was working isn't going to cut it any more. Not because, but despite of what the kernel team does: https://opensourcesecurity.io/2024/06/03/why-are-vulnerabilities-out-of-control-in-2024/
And if you are working on a custom kernel build, you should assess all these fixes for security anyway. And if you don't you shouldn't care and pay your vendor to handle it.