generated from ossf/project-template
-
Notifications
You must be signed in to change notification settings - Fork 42
Open
Description
at two most recent WG meetings, we discussed a number of issues related to the recent publication of a problematic CVE
background:
https://www.cve.org/CVERecord?id=CVE-2025-6494
GHSA-jc9r-qcgw-fxq9
https://bsky.app/profile/flavorjon.es/post/3lsttzpsilc2r
- meeting notes: https://docs.google.com/document/d/1TdxiFofLOfpHUEQILlKq7qkjSsRXVab0uApSDJ8c5rI/edit?tab=t.0
- see 2025-08-20 and 2025-07-23
The primary issues this incident raised were:
- inadequate communication with the project maintainer
- validity/utility of publishing a CVE record for unreleased code in a public/open source development branch
- potentially bad CVE data, e.g. affected versions and version type
My first thought was that the CNA rules do not mention any of the nuances regarding unreleased/unpublished code, development branch activity, etc., and therefore we should consider augmenting the rules with some level of guidance.
WG discussion also surfaced related issues:
- CVE record quality, particularly with regard to affected versions and the versionType field
- in this case, at least some security tools marked unaffected versions as being affected
- is this due to the CVE data being incorrect, or is it due to improper data interpretation by tooling?
- the CVE record did not have a versionType
- is this due to the CVE data being incorrect, or is it due to improper data interpretation by tooling?
- documentation of the versionType field appears to include 'examples' but not a prescriptive or exhaustive list
- is better guidance needed on affected version / version type? best practices, edge cases, etc.
- in this case, at least some security tools marked unaffected versions as being affected
- CNA rules seemingly say little in the way of maintainer ('supplier' in CNA rules parlance) communication
- ideally CNAs should be communicating with maintainers about how/when they will issue CVEs for their projects rather than a surprise disclosure, especially when there is any misunderstanding or ambiguity regarding a potential vulnerability
- not all CNAs are the same; they vary in their processes, CVE record quality, and due diligence
- we should be careful not to overcorrect by adding superfluous rules/guidance
- CVE information quality, value, and negative impacts to perception/reputation to the CVE program
- review/assess how tools interpret version information in various forms
- if there are pain points here, we should take steps to address
- it was mentioned that there is typically not a lot of pushback from roots/CNA-LRs when a vulnerability is disputed due to the code being in-development/unreleased
- some software is meant to be consumed directly from the repo, e.g. GitHub Actions
Metadata
Metadata
Assignees
Labels
No labels