From: Greg Kroah-Hartman Date: Fri, 30 Jun 2023 07:14:21 +0000 (+0200) Subject: Documentation: security-bugs.rst: clarify CVE handling X-Git-Tag: v6.6.17~4283^2~3 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=3c1897ae4b6bc7cc586eda2feaa2cd68325ec29c;p=platform%2Fkernel%2Flinux-rpi.git Documentation: security-bugs.rst: clarify CVE handling The kernel security team does NOT assign CVEs, so document that properly and provide the "if you want one, ask MITRE for it" response that we give on a weekly basis in the document, so we don't have to constantly say it to everyone who asks. Link: https://lore.kernel.org/r/2023063022-retouch-kerosene-7e4a@gregkh Signed-off-by: Greg Kroah-Hartman --- diff --git a/Documentation/process/security-bugs.rst b/Documentation/process/security-bugs.rst index f12ac23..5a69937 100644 --- a/Documentation/process/security-bugs.rst +++ b/Documentation/process/security-bugs.rst @@ -79,13 +79,12 @@ not contribute to actually fixing any potential security problems. CVE assignment -------------- -The security team does not normally assign CVEs, nor do we require them -for reports or fixes, as this can needlessly complicate the process and -may delay the bug handling. If a reporter wishes to have a CVE identifier -assigned ahead of public disclosure, they will need to contact the private -linux-distros list, described above. When such a CVE identifier is known -before a patch is provided, it is desirable to mention it in the commit -message if the reporter agrees. +The security team does not assign CVEs, nor do we require them for +reports or fixes, as this can needlessly complicate the process and may +delay the bug handling. If a reporter wishes to have a CVE identifier +assigned, they should find one by themselves, for example by contacting +MITRE directly. However under no circumstances will a patch inclusion +be delayed to wait for a CVE identifier to arrive. Non-disclosure agreements -------------------------