Johannes, If that community does not have a CNA with it in their scope, it is open for assignment. Sometimes it is easier to have a Root CNA assign for that under the CVE Services. Just note that as the CNA, everyone can / should come back to you for the updates and the CNA vulnrichment will come back to your CNA. Pete PS I am on the CVE Board.
On Mon, Jan 27, 2025 at 11:13 AM Johannes Segitz <jseg...@suse.de> wrote: > On Sat, Jan 25, 2025 at 01:24:36AM +0000, Mark Esler wrote: > > On Wed, Jan 22, 2025 at 03:18:10PM +0100, Johannes Segitz wrote: > > > We're not empowered to do this. We are a CNA for code that we own (e.g. > > > zypper), but not for arbitrary open source projects. > > > > The text of SUSE's scope [0] is similar to Canonical's [1]. We > > understand "All Canonical issues (including Ubuntu Linux) only" as > > including all software we distribute. It does not require us to be the > > author of that code. > > Interesting. I'll reach out to MITRE to clarify this and will report back > (might take a while, I'll be away for some weeks starting tomorrow). When I > was introduced to this > 10 years ago I was told not to allocate for > anything for which we're not clearly upstream. > > Johannes > -- > GPG Key EE16 6BCE AD56 E034 BFB3 3ADD 7BF7 29D5 E7C8 1FA0 > Subkey fingerprint: 250F 43F5 F7CE 6F1E 9C59 4F95 BC27 DD9D 2CC4 FD66 > SUSE Software Solutions Germany GmbH, Frankenstraße 146, 90461 Nürnberg, > Germany > Geschäftsführer: Ivo Totev, Andrew McDonald, Werner Knoblich (HRB 36809, > AG Nürnberg) >