
Open-source Software is software with source code that anyone can inspect, copy, modify, share, enhance, and learn from. On the other hand, there is “proprietary” or “closed source” software that has source code that only the person, team, or organization who created it can modify; the originators maintain exclusive control over it.
When we talk about “open-source software,” there are two terms that are commonly used across the industry: upstream and downstream. Within information technology, these terms refer to the flow of data. “Upstream” in open source is the source repository and project where contributions happen, and releases are made. Contributions flow from upstream to downstream.
One of the best examples is the Linux kernel, which is an upstream project for many Linux distributions. Distributors like Red Hat take the unmodified kernel source and add patches and opinionated configuration to build the kernel with the options that they want to offer their users. The source code that the distributors maintain, and release, is often referred to as “downstream.”
CVE Records for Open-Source Software
CNAs are organizations that are authorized to reserve CVE IDs and publish CVE Records for vulnerabilities within their scope. For the CVE Program to be successful, one critical requirement is that there needs to be one CVE Record for each vulnerability in the catalog, regardless of the source code being open-source or proprietary.
The CVE Program is structured to help upstream communities assign the CVE ID for their code, which is then shared and referred to by downstream entities. Many open-source projects and organizations are Red Hat partners who discover, assign, and publish the vulnerabilities independently.
Some open-source projects prefer to get assistance from expert organizations for CNA activities, specifically assigning and publishing CVEs. The success and inclusion of these open-source projects in the CNA program are critical for the overall program. Organizations like Red Hat have been extending their support to these open-source projects that request assistance, assigning and publishing CVE Records that are not covered by a specific CNA.

Red Hat OpenShift Container Platform gives us the ability to safely manage tens of thousands of microservices at scale. I don’t see any other container platforms that can do that as safely and securely.
Red Hat and the CVE Program
Red Hat actively participates in the Common Vulnerabilities and Exposures (CVE) program, which is a community-driven initiative aimed at identifying and assigning unique identifiers to publicly known vulnerabilities
CVE Identification: When Red Hat discovers a vulnerability in its products or the open-source software it supports, it collaborates with the CVE program to request and obtain a CVE ID. The CVE ID is a unique identifier assigned to the vulnerability, which helps in tracking and referencing it across different platforms and security databases.
Vulnerability Tracking and Reporting: Red Hat closely monitors CVEs to stay updated on the latest vulnerabilities affecting its products and the broader open-source ecosystem. Red Hat’s Security Response Team analyzes these vulnerabilities and assesses their potential impact on its products and customers.
Vulnerability Management: Once vulnerabilities are identified and assigned CVE IDs, Red Hat works on managing and addressing them. This involves developing patches, updates, or workarounds to mitigate the vulnerabilities and minimize the risk to users. Red Hat follows a responsible disclosure process to ensure that fixes are provided to affected users in a coordinated and timely manner.
Security Advisories: Red Hat publishes security advisories to provide detailed information about vulnerabilities, their impact, and the necessary remediation steps. These advisories are made available to Red Hat customers and the wider open-source community. They include information about the CVE IDs associated with the vulnerabilities, helping users easily track and reference them.
Collaboration with the CVE Program: Red Hat collaborates with the CVE program and its community of researchers, vendors, and users to share information, expertise, and best practices related to vulnerability management and disclosure. This collaboration helps in improving the overall security of open-source software and ensuring the effectiveness of the CVE program
Red Hat is a leading provider of open-source solutions, and it actively supports the open-source community in various ways, including addressing vulnerabilities within the Common Vulnerabilities and Exposures (CVE) program
CVE Assignments: Red Hat actively participates in the CVE program, which is a community-driven initiative for assigning unique identifiers to publicly known vulnerabilities. Red Hat collaborates with the CVE program to request and obtain CVE IDs for vulnerabilities affecting its products and the open-source software it supports.
Timely Disclosure: Red Hat follows a responsible disclosure process for vulnerabilities. Once a vulnerability is identified and a fix is developed, Red Hat coordinates with relevant stakeholders to ensure that information about the vulnerability and the corresponding fixes are disclosed in a coordinated and timely manner. This allows users and administrators to apply the necessary patches or updates to secure their systems.
Security Advisories: Red Hat publishes security advisories, which provide detailed information about vulnerabilities, their impact, and the necessary remediation steps. These advisories are made available to Red Hat customers and the wider open-source community, ensuring that users are aware of the vulnerabilities and have access to the required fixes.
Collaboration with the Community: Red Hat actively engages with the open-source community, including upstream projects, to contribute patches and fixes for vulnerabilities. By collaborating and sharing their expertise, Red Hat helps address vulnerabilities not only in its own products but also in the broader open-source ecosystem.
Security Response Team: Red Hat maintains a dedicated Security Response Team comprising security experts who specialize in identifying and addressing vulnerabilities. This team works closely with upstream projects, other vendors, and the broader security community to coordinate efforts and share information related to open-source vulnerabilities