Frequently Asked Question

What is a CVE and how should I follow Linux security advisories?

A CVE, Common Vulnerabilities and Exposures, is a globally unique identifier for a single security flaw, issued by MITRE and a network of CVE Numbering Authorities. The ID looks like CVE-2024-3094 (the xz backdoor) and acts as a portable label: every vendor advisory, scanner report, exploit write-up, and patch note refers to the same bug by the same name, so an administrator can correlate "is my system affected?" across many sources. CVSS, a separate but related standard, assigns each CVE a base severity score from 0.0 to 10.0.

The hard part is keeping up. The pragmatic flow for a defender is: subscribe to your distribution's security announcement list (debian-security-announce, Fedora security-announce, Ubuntu USNs, RHSA), let unattended-upgrades or dnf-automatic apply the bulk of fixes automatically, and read the announcements yourself for anything that needs a manual restart or workaround. The NIST National Vulnerability Database (NVD) is the canonical lookup for the technical detail of any particular CVE.

A handful of CVEs each year deserve immediate manual attention rather than waiting for the nightly run: kernel local-privilege-escalation bugs, anything in OpenSSH or OpenSSL, and any "in the wild exploitation" advisory. Knowing where to look the day a CVE drops is the difference between patching first and patching after the incident.

Further reading and video