-
Notifications
You must be signed in to change notification settings - Fork 16
Require CVE ID in advisories, year portion of ID, grammar #9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: Art Manion <zmanion@protonmail.com>
|
I am cautious about adding requirements which could become roadblocks to CNA communication. However, given that there are some very low quality CNAs which are degrading the integrity of the CVE Program, I believe this is necessary. Could In my personal opinion, this would help lower the noise that VulDB adds to the CVE Program. |
Signed-off-by: Art Manion <zmanion@protonmail.com>
|
@ElectricNroff raised a good point, there are valid reasons for a CNA to assign CVE IDs and publish CVE Records but not also publish an advisory. Examples of this include a CNA LR and a coordinator CNA.
Maybe the distinction is that supplier CNAs MUST publish advisories? "Advisory" should be defined broadly to include nearly any documentation about the vulnerability (and probably the fix) such as change logs, tickets, issues, release notes. Or maybe the distinction is slightly broader than "supplier," something about "first public disclosure?" This would cover e.g., a research or coordinator CNA. CNA-LRs could be exempted. |
|
A partial CNA-LR exemption already exists:
|
@eslerm could you open a separate issue for this? I think it's worth discussing but would prefer to do so independently of this PR. |
|
At least one example where the lack of CVE ID referenced in a vendor advisory caused unnecessary confusion and cost: https://security-portal.versa-networks.com/emailbulletins/6735a300415abb89e9a8a9d3 |
Signed-off-by: Tod Beardsley <todb@packetfu.com>
Soften 4.5.2.1 to SHOULD, keep supplier MUST
|
Another example, CNA publishes advisory, fixes vulnerability, unclear if they did not assign and publish CVE or just didn't reference it: https://www.synology.com/en-us/security/advisory/Synology_SA_25_03 |
|
We may want to add rule, or guidance, that if a CNA fixes a vulnerability and optionally issues an advisory (both of which are public dislosure), the CNA MUST assign and publish CVE? This is another case where the type of CNA matters, i.e., a "supplier" CNA might be coverd, but CNA-LRs, research, coordinator, or other non-first-party CNAs may not be subject to the same rule. |
|
This PR curently does three things:
This third thing also sounds great, because it's irritating for investigators to look at a supplier's release notes and see, "Fixes security issues" with no hint as to what security issues are fixed. This change, ideally, takes all the guesswork out of matching release notes and advisories to CVEs. |
|
https://www.cve.org/About/Process#CVERecordLifecycle (expand "CVE ID +") says:
So either the CNA Rule change should add "...was reserved or..." or the text on the cve.org Process page should be changed to remove "...was reserved...". |
This is also true for research CNAs, especially when a vendor is not willing or able to publish information or not cooperating at all. |
|
Sigh. More "year" guidance to synchronize, a pending change to the CVE Record Format:
My individual and mildly preference is that the year part SHOULD be the year in which publicly disclosed, because this is what most external consumers will intuitively understand, and the SHOULD allows for other choices or vulnerability handling cases that cross calendar year boundaries. |
I believe this is best, but we may want to add "Once a vulnerability is Publicly Disclosed with a CVE ID, a CNA MUST NOT use this rule as the basis for changing the vulnerability's CVE ID to one that has better year alignment." |
Signed-off-by: Art Manion <zmanion@protonmail.com>
4.2.21 CNAs SHOULD assign the year part of a CVE ID based on the calendar year in which the vulnerability was first publicly disclosed. CNAs MUST NOT, based on this rule, change CVE IDs that have already been Publicly Disclosed. (c31b76a) Noting that the text still might change if we haven't completely decided about:
|
CNA_Rules.md
Outdated
| 4.5.2 Publishing Vulnerability Information | ||
|
|
||
| 4.5.2.1 CNA SHOULD publish Vulnerability advisories or other information about Vulnerabilities for which the CNA has assigned CVE IDs and published CVE Records. Such information SHOULD meet the public references requirements in [5.3](#53-public-references) and MAY be used as a public reference (see 5.3.1.1). | ||
| 4.5.2.1 CNA MUST publish Vulnerability advisories or other information about Vulnerabilities for which the CNA has assigned CVE IDs and published CVE Records. Such information SHOULD meet the public references requirements in [5.3](#53-public-references) and MAY be used as a public reference (see 5.3.1.1). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For a future revision:
4.5.2.1 CNAs MUST publish Vulnerability advisories or other information about Vulnerabilities for which the CNA has assigned CVE IDs and for which no other public reference exists.
(Also confirm that the rules require CNAs to publish CVE Records for CVE IDs they assign.)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For a future revision:
4.5.2.1 CNAs MUST publish Vulnerability advisories or other information about Vulnerabilities for which the CNA has assigned CVE IDs and for which no other public reference exists.
(Also confirm that the rules require CNAs to publish CVE Records for CVE IDs they assign.)
I think this is better addressed by adding "This reference MAY be one created by the CNA." as the second sentence of 5.3.1. The wording you suggested seems to imply that (for CVE Records published after the rule goes into effect) a CNA will, or can, become aware of linkrot and MUST respond to the linkrot by publishing its own reference (e.g., an advisory). I think this is not a good idea because:
- when a "no other public reference exists" event occurs because of linkrot, it may be best for the CVE Record to point to an archived copy of a previously valid reference, not a new reference published by the CNA
- the exact mechanism for an archived reference to become an official public reference hasn't been decided - it's conceivable that this would be somehow automated and not require the CNA itself to complete a "MUST publish" action
- it's also possible that (after linkrot) the previously valid reference content is online at a different URL, and again it may be best to point to the updated URL, not a new reference published by the CNA
Also:
- there always can be a legitimate CNA or CNA-LR that never, under any circumstances, creates references on its own
- even if that CNA began publishing advisories, this would have essentially no value, because such a CNA generally does not have any information about the vulnerability beyond what is in the CVE Record
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From 2025-04-22 optional Board working session meeting:
4.2.21 CNAs SHOULD assign the year part of a CVE ID based on the calendar year in which the vulnerability was first Publicly Disclosed, the CVE Record was first published, or the CVE ID was reserved for the vulnerability in question. CNAs MUST NOT, based on this rule, change CVE IDs that have already been Publicly Disclosed.
CNAs MAY assign CVE IDs in one calendar year and publish the corresponding CVE Record in the next calendar year. This commonly happens around calendar year boundaries.
Signed-off-by: Art Manion <zmanion@protonmail.com>
The current rules allow a CNA to not publish an advisory about a CVE ID they assigned, and also an advisory is not required to cite the relevant CVE ID(s).