|
|
Hi
Kurt, Kurt wrote: > What is the purpose of CVE? Excellent question. The short answer is that having a comprehensive official list of all assigned CVEs is a “must-have,” otherwise security product vendors and other “CVE integrators”
wouldn’t be able to effectively find all assigned CVEs, much less integrate them into their products.
The longer answer is that we should collectively review the CVE use cases. To that end, I’ve updated the list of issues and topics for us to discuss in more
detail. I recommend we dig into this further immediately after we get through a review of the priority products and sources needed to give effective full coverage of the U.S. IT sector. Updated list discussion topics & tasks 0. The operation of CVE 1. The prioritized scope of coverage for CVE and the associated Sources and Products
2. A review of CVE’s major use cases (added) 3. A re-examination and simplification of the way CVE counts vulnerabilities 4. The required “quality” of final CVE entries 5. Clear, redefined rules and guidelines for the operation and management of CNAs 6. Clear, redefined and more inclusive rules for becoming a CNA 7. Continuing revisions regarding Board membership and the process for adding members Best Regards, Steve
From: Kurt Seifried [mailto:kseifried@redhat.com]
One major comment: What is the purpose of CVE? My understanding was to provide an identifier for vulnerabilities. Essentially a serial number to make handling inventory easier. I don't care what's in most of those boxes, but I do need to be able to track
them down as needed. That we have an official database at
cve.mitre.org/NVD is nice, but not needed as evidenced by the fact that something on the order of 11,000+ CVE's have been assigned and not written up and listed in the database (I know of at least 1000+ from myself personally). I even updated the Wikipedia
entry to cover this because I kept getting people asking me why I had not updated the CVE database after assigning them a CVE privately/publicly. Personally for me the official CVE database at this point is the search engines. When I plug CVE-YEAR-FOOO in I expect to get something resembling a trusted site (e.g.
bugzilla.redhat.com,
bugs.debian.org, launchpad.net, upstream bug trackers, OSS-Security archives, etc.) with an entry that contains the CVE string I'm looking for. I think we should really split the problem into: 1) assigning CVEs 2) the CVE database as #1 can happily exist with or without #2. On Tue, Dec 22, 2015 at 10:55 AM, Boyle, Stephen V. <sboyle@mitre.org> wrote:
-- -- |