CVE Board Meeting Notes February 21, 2024 (2:00 pm - 4:00 pm EST) Agenda
* Introduction * Topics * Working Group Updates * Open Discussion * Review of Action Items * Closing Remarks New Action Items from Today's Meeting New Action Item Responsible Party Due None to report Working Group Updates * AWG * CVE Services 2.2.0 was released in early January. Version 2.2.1 patch to be released this week. There is a backlog of issues AWG is working through. * The current big rock is CVE Record format version 5.1. Our target is to release it into the test environment in the middle of March. At that time, the CNA community can begin building their frameworks and tooling. * Website search capability prototype is targeted for release to testing for community review later in the Spring. The ADP production infrastructure will be part of that release. * CNACWG * Welcome, MegaZone, as the new CNA Board Liaison, and thank you to MegaZone for participating in multiple working groups. * At the end of January, CISA attended a CNACWG meeting and did an excellent job of explaining their approach to recruiting CNAs. * OCWG * Have been planning communications around upcoming milestones like VulnCon, legacy downloads, deprecation, rules update, 25th anniversary. * In 2024, we want to improve communication with downstream consumers, and our international communications reach (e.g., podcasts in languages other than English). * Have published eight blogs this year about legacy download format deprecation, VulnCon, new Board members, and clarification of the disputed tag in CVE Records. * This Friday, another CVE 101-style podcast about new definitions of CVE records, states, and tags will be recorded. * QWG * Have been discussing CVE Record format 5.1.0 schema and the release plan. The target for release to the test environment is mid-March. * In the next couple of meetings, we will probably start looking at the plan for CVE Record format 5.2.0 schema, which will include some identified quality improvements. * Going forward, we really need to start working on a better plan for how we deal with record format updates, and ensure minimal burden on downstream consumers. * It is not clear when you go to the current CVE schema in GitHub, what the current version is, where you get it, and what files to use because there are multiple schema files. * SPWG * Working on the rules update. After that, will re-engage with some other documents, e.g., end-of-life (EOL) processes. * VCEWG * The VulnCon agenda should be set for Monday. The AI topic made it in. * We have 118 in-person registrations, 55 virtual. Registration is still open. * Working with CNACWG about how we take care of either a Slack or Discord set of channels for conversations. * Working on ironing out the problem of recording all three sessions concurrently; might need some help from others running some computers. Open Discussion * AI Discussion after VulnCon * We have an opportunity on the Thursday following VulnCon to spend a full day with some AI people to begin to establish our guardrails for AI-related assignment and publication. They are coming to the table with a strawman to work from. * The conference room is large (20-25 people), and we should be able to include a virtual attendance option. Review of Action Items * Out of time. Next CVE Board Meetings * Wednesday, March 6, 2024, 9:00am - 11:00am (EST) * Wednesday, March 20, 2024, 2:00pm - 4:00pm (EDT) * Wednesday, April 3, 2024, 9:00am - 11:00am (EDT) * Wednesday, April 17, 2024, 2:00pm - 4:00pm (EDT) * Wednesday, May 1, 2024, 9:00am - 11:00am (EDT) * Wednesday, May 15, 2024, 2:00pm - 4:00pm (EDT) Discussion Topics for Future Meetings * Organization Board Liaison strawman discussion * End user working group write-up discussion * Board discussions and voting process * ADP discussion * Sneak peek/review of annual report template SPWG is working on * Bulk download response from community about Reserved IDs * CVE Services updates and website transition progress (as needed) * Working Group updates (every other meeting) * Council of Roots update (every other meeting) * Researcher Working Group proposal for Board review * Vision Paper and Annual Report * Secretariat review of all CNA scope statements * Proposed vote to allow CNAs to assign for insecure default configurations * CVE Communications Strategy