The Linux kernel security team’s disclosure policy ignited Hacker News today, pulling 519 points and 415 comments in under 24 hours. The complaint: kernel vulnerabilities receive no advance warning to distributions before public disclosure, leaving enterprise Linux users exposed during the gap between exploit publication and patch availability.
This follows the April 29 disclosure of CVE-2026-31431, known as “Copy Fail”—a nine-year-old privilege escalation vulnerability affecting every major Linux distribution. The exploit is public, trivial (a 732-byte Python script), and grants root access in seconds. Yet weeks later, most long-term support kernels remain unpatched because distribution maintainers didn’t recognize the commit’s severity.
The Coordination Gap
The kernel team’s workflow is straightforward: researchers report vulnerabilities, fixes land in commits, and public disclosure follows the industry-standard 90+30 timeline (90 days to develop fixes, then 30 days after patch availability). But kernel commits use deliberately vague messages to avoid telegraphing security significance. Distributions monitoring thousands of daily commits can’t identify which fixes are critical.
Copy Fail illustrates the problem. Reported to the kernel team March 23, patched April 1, CVE assigned April 22, publicly disclosed April 29. During that window, the fix sat in the kernel tree unmarked. When exploit code published April 29, distributions scrambled to backport, test, and package updates while enterprises faced an impossible choice: deploy untested patches immediately or stay vulnerable.
For production environments, neither option is acceptable. Enterprise change management requires testing. Kernel updates that break systems cost more than the vulnerabilities they fix. But leaving root-level privilege escalation unpatched while exploit code circulates isn’t viable either.
Both Sides Are Right
The kernel team’s position makes sense in its context. Open source means open fixes. Maintaining a curated distribution notification list is impractable for a global project, and advance warning risks leaks that could tip off attackers. The team treats all fixes as potentially security-relevant to avoid signaling which commits matter. Distributions should monitor upstream—that’s how open source works.
Distributions counter reasonably: users depend on vetted, stable packages, not raw commits. Backporting kernel fixes across five years of long-term support branches requires analysis, testing, and packaging. Hundreds of CVEs monthly make “monitor everything” unscalable. When the kernel team doesn’t flag severity, critical fixes drown in noise.
The Hacker News discussion landed on middle ground. Vulnerability researchers followed established disclosure norms and bear no additional responsibility. The kernel team should manage downstream communication. The current system is broken and needs formal processes. The Linux Foundation could coordinate between kernel maintainers and major distributions.
The CVE Explosion Compounds the Problem
Linux kernel CVEs increased 1,117 percent when the project became its own CVE Numbering Authority in early 2024. From 1,736 CVEs in 2023, the number jumped to 3,529 in 2024, with 5,530 recorded in 2025 year-to-date. The surge doesn’t reflect code quality decline—it’s a transparency improvement. The kernel now assigns CVEs to essentially every security-relevant fix rather than only egregious vulnerabilities.
But transparency without prioritization creates CVE fatigue. Security teams can’t separate critical from minor when hundreds of advisories arrive monthly. Vulnerability scanners designed for dozens of issues per month choke on hundreds. Distribution maintainers face overwhelming triage workloads, and tools that worked at previous scales fail.
The disclosure problem that worked tolerably with dozens of monthly CVEs breaks catastrophically at hundreds. Distributions need kernel team prioritization signals more than ever, yet the no-heads-up policy remains unchanged.
No Easy Answers
Proposed solutions include severity flagging (kernel team marks critical CVEs without revealing details), tiered notification (major distributions receive advance warning), Linux Foundation coordination bodies, and automated tooling to identify security-critical commits. Each faces obstacles: philosophical disagreement between transparency and coordination advocates, decentralization that complicates centralized processes, information leak concerns, resource constraints, and kernel team resistance to changing established practices.
The fundamental tension persists: does transparency serve security, or does coordination? The kernel team prioritizes the former, distributions require the latter, and enterprise users remain caught between. Copy Fail demonstrates the system’s failure, but the 415-comment Hacker News thread reveals no consensus on fixes. Until that changes, expect more vulnerabilities public before patches are widely available.











