Skip to content

Latest commit

 

History

History
51 lines (38 loc) · 5.31 KB

update-2023-11.md

File metadata and controls

51 lines (38 loc) · 5.31 KB

Update 2023-11

Highlight: Python Software Foundation response to US Government RFI

The Python Software Foundation submitted a response to the US Government RFI on "Open-Source Software Security: Areas of Long-Term Focus and Prioritization" with the help of the Security Developer-in-Residence and other staff. The full RFI response can be downloaded here.

Seth primarily authored the sections on memory safety, build provenance and reproducibility, and non-technical solutions to supply chain challenges.

Highlight: Guide and blog post for becoming a CNA as an Open Source project

When the Python Software Foundation became a CVE Numbering Authority there wasn't much already published support answering the questions we had about becoming a CNA as an Open Source foundation and project. Organizations like the PSF aren't structured like typical businesses and instead are made of very few staff and many volunteer maintainers. This unique situation led to us wanting to learn more and to not have what we learned be redone for other Open Source projects looking to become CNAs themselves.

Towards preserving that knowledge I drafted a guide alongside contributions from the OpenSSF Vulnerability Disclosures working group and multiple CVE working groups. This guide was published this month alongside an announcement blog post to the OpenSSF blog coauthored with Art Manion of the CVE Board.

Highlight: Proposal for Software Bill of Materials for CPython

Continuing to make improvements to the CPython release process, I've put together a proposal for Software Bill of Materials being shipped with CPython releases. CPython uses many different dependencies and those dependencies can vary depending on which artifact is being used (source, Windows installer, macOS installer, etc). The proposal has been positively received by core developers so far.

I've submitted the initial PR for keeping a SBOM up-to-date for vendored dependencies in the CPython source code and will be submitted more PRs for other dependencies and then bringing them all together during the CPython release and exposing the files for download.

To avoid putting more stress on CPython core developers and release managers after SBOMs begin to be published (thus making subcomponents and their vulnerabilities more visible) I've also started investigating how VEX can be used with SBOM tooling like Grype in order to automatically take VEX statements into account during SBOM scanning. This process would mean that CVEs which CPython isn't affected by wouldn't show up as false-positives within a consumers scanning results.

SBOM and VEX architecture for CPython

Other items