-
-
Notifications
You must be signed in to change notification settings - Fork 130
Description
I had a discussion @dadinolfi from Mitre about the options for managing CVE's for Node.js.
There are 2 options that we have:
- Act as a CNA
- Use the web form to request CVE's as a one off.
Some open source projects already acting as a CNA
- OpenSSL
- Apache (covers all of apache)
- Drupal
- DWF (give CVEs for open source)
There are pros/cons as outlined in the sections which follows.
From my read of he rules and my discussion with @dadinolfi I think the extra work in being a CNA will be relatively small and have the community being able to control the CVE's assigned for Node.js would be good so I'd lean towards the option of Acting as a CNA.
Acting as CNA
When we act as a CNA, we get a block of CVE's at the start of the year and then assign these ourselves. When publicly disclose the vulnerability we use the web form (and other methods like json in the future) to provide info to Mitre which get published in the CVE. This information is relatively minimal
If any other entity wants a CVE for Node.js they will be referred to us and we decide based on the CNA rules if we believe a CVE should be assigned and if appropriate provide one to the requesting entity.
The full rules for acting as a CNA are here: http://cve.mitre.org/cve/cna/CNA_Rules_v1.1.pdf
-
Pros
- We can quickly assign CVE's
- We have full control over the CVE's assigned for Node.js
-
Cons
- Some additional reporting requirements
- We need to make sure those in the community implementing the process follow the rules
-
misc
- We need to be responsive to requests for CVE's
- We need to provide Mitre with at least a couple of primary contacts that will respond to their enquiries
- We need to plan to request our block of CVE's once a year.
CVE only public once public, don't publish number until public, release when embargo is lifted.
Web form
-
Pros:
- No pre-planning
- Minimum work
-
Cons
- Longer cycle time to get CVE assigned and details published
- Third parties could request/get assigned CVE's on Node.js that we may not agree with.