-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make CVE JSON compatible with VEX #11
Comments
This proposal should perhaps be limited to provide simplified or "direct" VEX -- so that a reader can derive VEX from CVE only for directly affected (or unaffected, or unknown) products. IOW, what CVE already is able to express, that some product or range has some status, and not that CVE records would also need to be able to reference the upstream product or vulnerability. Yes: CVE-1 VEX says that producxt P is affected by CVE-1. No: CVE-1 VEX says that product P is affected by CVE-2 because P uses upstream U which is affected by CVE-2. The second case would be nice to have, but would require a way for a CVE record to reference the upstream product and vulnerability, which is a bigger change and should/could be handled separately. |
Bumping this as at least two VEX-associated topics have come up in the discussion on #12. How to clearly convey "fixed" status
It is (still) common to write prose status information in So, we can imply a version that is fixed, by setting a Whether or not we choose to become VEX-compatible, I suggest we add a |
The second VEX-associated topic from #12 (actually being discussed in at least this email thread). Referencing the upstream vulnerable software and/or vulnerabilityThere is a desire to be able, in a CVE Record, to reference either or both of the upstream vulnerable software and the vulnerability inherited (or not) from upstream. This is a core design feature of VEX. The CVE Record format discussion includes a suggestion to add (a) field(s) to be able to reference the "source affected product." This seems useful, there are numerous examples of confusion about what a CVE ID is scoped to: The downstream software, the upstream software, or the interaction between the two, or something else. Here are two examples I've looked into closely: CVE-2022-38171 and CVE-2024-21893. Relevant CNA Operational Rules:
While I appreciate the need to reference upstream, it seems that doing so could lead to many CVE Records saying "software S is affected by vulnerability V because S uses upstream software U that has V." At present, policy and rules say not to assign a new CVE ID for this case. U should have a CVE ID for V, P should (MUST) not. |
From today's SPWG meeting, the current CVE JSON format (unsurprisingly) almost implements VEX, as defined here:
https://www.cisa.gov/sites/default/files/2023-04/minimum-requirements-for-vex-508c.pdf
Should CVE JSON be compatible with VEX?
At a glance, changes would need to be made to status, and some additional VEX-specific fields would need to be added, such as:
Status justification would need a definition.
See also #8 which also includes CSAF integration, which I do not think is appropriate for CVE JSON.
The text was updated successfully, but these errors were encountered: