-
Notifications
You must be signed in to change notification settings - Fork 42
Description
There is growing recognition in the CVE community that there needs to be an alternative software identifier to CPE available for use in CVE Records. Along with CPE, one of the most widely used software identifiers is purl (which stands for “Product URL”). Coming from nowhere ten years ago, it is now heavily used to identify open source software packages.
In December, the leaders of the CVE Quality Working Group (QWG) requested a “proposal” to implement use of purl as a second identifier in the CVE ecosystem, along with CPE. The OSSF VDWG has prepared this draft Implementation plan.
However, there are three issues that need to be addressed before that plan can be set in motion:
- To move ahead on implementing use of purl in the CVE Program, there needs to be evidence of good support for this move among the CNAs and other members of the CVE community.
- Even though purl became “legal” in CVE Records when CVE Record Format v5.1 came into effect last May, CNAs are not using that capability today. This is partly because of how purl was included in the CVE Record Format, but also because the CNAs clearly aren’t comfortable with purl yet. This is most likely because they have so far received no training on purl or how to use it.
-
Some small changes to how purl is included in the current CVE v5.1.1 format may be required.
To address these issues, the VDWG has developed a project plan titled “Discussions regarding purl implementation in the CVE Program”. That plan includes:
- Training on purl and its proposed implementation in CVE. We will deliver a webinar aimed mostly at CNAs, as well as a white paper on this topic. The goal will be to provide enough training to the CNAs that we will not have to spend much time on training during the purl workshop to be conducted during VulnCon 2025.
-
Conduct Q&A sessions with CNAs, in web meetings and emails. The goal of these will be to enumerate outstanding questions that CNAs have regarding purl and how it will be helpful to them.
- Discussions with vulnerability database operators. There are three vulnerability databases, one "for pay" and two free, that can most likely ingest CVE Records that include purls and make the purls searchable in the database. We will ask all of them whether they wish to participate in the Proof of Concept that will be the main feature of the Implementing project, as well as what they will provide with their database lookup service.
- Discussions with software developers, end users and vulnerability management service providers. The goal will be to learn what each of these groups needs regarding purl.
- “Purl workshop” at VulnCon. This workshop (still being scheduled) will hopefully bring together members of all the above groups. The goal of the workshop will be to answer unanswered questions, as well as address concerns that any participants may have about purl or how it can be implemented in the CPE Program.
-
Prepare project documentation. The results of the "purl workshop" will be summarized and presented in a new webinar, with video available on YouTube.