We would like to output JSON from the cve checker, to be used for a cross check with the IP compliance file and for other possible uses (like querying for updates of our packages). This post describes the proposed schema.
This is a valid point. If we start including the complete score, we could just link to the OSV description that includes the same data. In this case it would be better to re-use OSV for that part. My idea was to include the basic information in our schema and then link for everything else to OSV and similar systems
Hello all,
Here is the example I have from the first proto. Some fields are harder to get than I was thinking, so there are some changes (vector and purl are not there). An example:
{
"version": "1",
"package": {
"name": "automake-native",
"layer": "meta",
"version": "1.16.5",
"issue": {
"CVE-2009-4029": {
"id": "CVE-2009-4029",
"summary": "The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.",
"scorev2": "4.4",
"scorev3": "0.0",
"vector": "LOCAL",
"status": "Patched",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2009-4029"
},
"CVE-2012-3386": {
"id": "CVE-2012-3386",
"summary": "The \"make distcheck\" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.",
"scorev2": "4.4",
"scorev3": "0.0",
"vector": "LOCAL",
"status": "Patched",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2012-3386"
}
}
}
}