Skip to content

Conversation

@timlegge
Copy link
Contributor

No description provided.


# Creating a CVE Request

This is an example of how to create a CVE with an older vulnerability from Mojolicious that did not have one previously assigned.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we use a general example like Foobar or something like that, rather than Mojolicious?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can change it it an example but likely should be generic

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@stigtsp the thing I like about using this example is that it exists and you can review the source info

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@stigtsp I looked at it but the example is likely best. The point was to give an example that someone could follow

Copy link
Contributor

@Tux Tux Dec 30, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we use a general example like Foobar or something like that, rather than Mojolicious?

Then please use Foo::Bar or Foo-Bar to make the distinction clear in what to use

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I use Foo-Bar in the security policy guide.

You can provide additional information that you may have if it is relevant.

Some possible additional information:
1. If the vulnerability is embargoed (not publicly acknowledged or under a non disclosure of some sort) mention it here
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also, maybe worth mentioning that a vuln that has been discussed in public is by default public and not embargoed.

So References should not be given for anything embargoed

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixing

@timlegge timlegge force-pushed the cve branch 2 times, most recently from 6209ce7 to 8d99138 Compare October 27, 2024 23:53
@sjn
Copy link
Contributor

sjn commented Dec 12, 2024

Can we have this branch updated and see what's left before merging? :-)

@thibaultduponchelle
Copy link
Member

Where we are here?

@stigtsp
Copy link
Contributor

stigtsp commented Apr 1, 2025

Since we've become CNA, this description has likely become a bit outdated. We are going to work on the CVE workflow at PTS, maybe this is a good time to discuss how to document this and make it more accessible.

@timlegge timlegge changed the title Add a guide for creating CVE entries Add a guide for submitting CVE requests May 2, 2025
@timlegge timlegge requested review from Tux, garu, robrwo, sjn and stigtsp May 2, 2025 09:47
@timlegge
Copy link
Contributor Author

timlegge commented May 2, 2025

I shortened this substantially now that we have a CNA

Copy link
Contributor

@robrwo robrwo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks alright. Some minor nits about wording.

Send an email to cve-request@security.metacpan.org

# Reserving a CVE Identifier
If you have found a potential vulnerability in the scope of the CNA you can
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You should define what the scope of the CNA is.

before a CVE identifier will be issued. However, a CPAN author or Perl
Security may **reserve** a CVE number without providing details. The CVE
identifier will be reserved and the requester will be recorded.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would reword this to improve clarity

The Perl Security Team may reserve CVE identifiers, as may CPAN authors for the modules that they maintain. All others may be asked to provide the details of the vulnerability before a CVE identifier will be issued.

The CVE identifier will be reserved and the requester will be recorded.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants