Linux Kernel Recency Matters, CVE Severity Doesn't, and History Fades

๐Ÿ“… 2026-01-29
๐Ÿ“ˆ Citations: 0
โœจ Influential: 0
๐Ÿ“„ PDF
๐Ÿค– AI Summary
This study investigates key factors influencing the delay in fixing vulnerabilities in the Linux kernel, with a focus on the roles of Common Vulnerability Scoring System (CVSS) severity ratings and the age of kernel versions. Leveraging survival analysis, CVE metadata mining, Git commit tracing, and patch delay statistics, the research systematically examines the dynamics of vulnerability introduction and remediation. The findings reveal that kernel version recency serves as a strong predictor of patch latency: developers prioritize fixing vulnerabilities in newer kernel versions, while older versions often retain unpatched CVEs for extended periods. In contrast, CVSS severity scores exhibit little to no correlation with repair timelines. These results highlight the distinctive nature of Linux kernel vulnerability management and challenge conventional severity-based prioritization strategies commonly adopted in software maintenance practices.

Technology Category

Application Category

๐Ÿ“ Abstract
In 2024, the Linux kernel became its own Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA), formalizing how kernel vulnerabilities are identified and tracked. We analyze the anatomy and dynamics of kernel CVEs using metadata, associated commits, and patch latency to understand what drives patching. Results show that severity and Common Vulnerability Scoring System (CVSS) metrics have a negligible association with patch latency, whereas kernel recency is a reasonable predictor in survival models. Kernel developers fix newer kernels sooner, while older ones retain unresolved CVEs. Commits introducing vulnerabilities are typically broader and more complex than their fixes, though often only approximate reconstructions of development history. The Linux kernel remains a unique open-source project -- its CVE process is no exception.
Problem

Research questions and friction points this paper is trying to address.

Linux kernel
CVE
patch latency
vulnerability severity
kernel recency
Innovation

Methods, ideas, or system contributions that make the work stand out.

patch latency
kernel recency
CVE severity
vulnerability fixing
Linux kernel
๐Ÿ”Ž Similar Papers
No similar papers found.
Piotr Przymus
Piotr Przymus
Nicolaus Copernicus University in Toruล„
software engineeringdata miningmachine learning
W
Witold Weiner
Nicolaus Copernicus University, Toruล„, Poland
K
Krzysztof Rykaczewski
Nicolaus Copernicus University, Toruล„, Poland
G
Gunnar Kudrjavets
Amazon Web Services, Seattle, WA, USA