Replies: 5 comments 10 replies
-
Just as a point of order, what do you mean by "containerized data formats"? |
Beta Was this translation helpful? Give feedback.
-
https://github.com/ossf/osv-schema/blob/main/GUIDING_PRINCIPLES.md may be useful for comparison purposes? |
Beta Was this translation helpful? Give feedback.
-
One goal I think the project should have: Prefer structured information. This means both that CNAs should prefer to use structured fields, rather than placing things in freeform text fields, and that the QWG should work to codify structures for common patterns and then work with CNAs to adopt those structured patterns as they arive. For example, we have the ongoing discussions on introducing new |
Beta Was this translation helpful? Give feedback.
-
I'd like to explore moving away from a "record format" in favor of a system in which producers, as well as their customers and other interested parties, can submit any information that they feel is helpful, and let the CVE Program use the best available AI technologies to allow consumers to ask questions about the data, or extract all of the data in a format that the consumer specifies. This, of course, does not mean that the record format would be abruptly abandoned, but may mean that all efforts to improve the record format could be deprioritized. Often, there's a large series of questions I'd like to ask about a specific vulnerability, and I suspect that AI-generated answers will usually be good enough for my purposes, will often be better answers than are realistically achievable by having a producer's human staff type the answers into individual "record format" fields, and will be available to me much more quickly than if I have to wait for "record format" fields to be standardized. Just a few examples that I've thought about today: Is it sufficient to update to the latest version in the way that is normal for this product (e.g., it's not a situation where the latest version is 1.3, but the system is in an insecure state if 1.2 was ever installed, and the Supplier is not providing a programmatic way to fix this)? I don't know anything about this product or its use cases other than my company has it installed on a nonzero number of machines. What's the probability that we can be successfully attacked? It's expensive for us to update to the latest version. How do I explore whether we can be successfully attacked? What is the typical Total Cost of Ownership of a remediation? Is it plausible that my company has the vulnerability even though the named products are not present? For example, was the official name of the product changed? Are there forks? Is it possible that a file or function from this product was re-used elsewhere, either because a human copied it or because it is in LLM training data? Can I get the complete set of file checksums that represent all plausible instances of the vulnerable code? How would we tell whether this is complete? Is the vulnerable part of the code different depending on how I installed it (e.g., NPM versus GitHub or .msi versus .zip)? I see a CWE mentioned, but is this weakness the root cause? Is there any workaround at all, even drastic ones in which I delete a file and accept that not all of the product's functionality will still be present? Has anyone observed that something broke after an update? (the product's own functionality or any interoperability)? I don't want to update the product that was affected. Is there a replacement product? Is it plausible that I have the fixed code but a vulnerable version number? Is this CVSS score considered useful for prioritization? Why? Was any information keyed in manually by the data producer? What is the likelihood that the information is correct? Is it likely that hundreds of similar reports about this product, with the same importance, could have been submitted but weren't? Is it a mandatory update in the context of a supplier/consumer relationship? Will this automatically be updated in some or all cases? How soon? Can automated analysis of the patch tell me whether it's likely to be an incomplete fix? |
Beta Was this translation helpful? Give feedback.
-
I don't agree that the CVE Record Format is the central mechanism for influencing quality. My responses have been consistently about 'explore moving away from a "record format"' and 'submit any information that they feel is helpful,' without constraining implementation. You then stated 'your proposed path of deprecating the CVE Record Format in favor of a freeform text protocol' but I don't feel that that's equivalent. Although it's possible that a producer would rewrite information into freeform text and that an audience exists for which this is helpful, I feel it's more likely that producers would directly pass along what they already have, e.g., how they exchange information within engineering teams or how they compose information for their customers. Or, possibly they already use a different specification: https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.md has
(for "Security")
(for "Informational") https://ossf.github.io/osv-schema/ has
https://gcve.eu/bcp/gcve-bcp-03/ has
Finally, I believe that seeking answers to counterfactuals is a fundamental part of the human condition, that neither other humans nor any types of AI systems always have reliable answers to counterfactuals, but that answers still are important on the pathway to choosing a course of action. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Are there any rules or principles that we should define for the CVE Record Format? If appropriate, we can open a separate discussion for the individual ideas.
Some ideas/examples might include:
Beta Was this translation helpful? Give feedback.
All reactions