Skip to content

Commit 6a18061

Browse files
authored
Merge pull request #32 from RedHatProductSecurity/csaf-vex-guidelines
Csaf vex guidelines
2 parents 9f98acf + e531e52 commit 6a18061

File tree

5 files changed

+756
-0
lines changed

5 files changed

+756
-0
lines changed

.gitignore

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
11
.cache
22
*.egg-info/
33
.tox
4+
/.idea/
5+

README.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,3 +12,9 @@ source venv/bin/activate
1212
pip install -r requirements/docs-requirements.txt
1313
mkdocs serve
1414
```
15+
16+
If you're running on MacOS and experience issues with the `cairo` dependency, try adding the following:
17+
18+
```
19+
brew install cairo
20+
```

csaf-vex/csaf-vex.json

Lines changed: 217 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,217 @@
1+
{
2+
"document": {
3+
"aggregate_severity": {
4+
"namespace": "https://access.redhat.com/security/updates/classification/",
5+
"text": ""
6+
},
7+
"category": "csaf_vex",
8+
"csaf_version": "2.0",
9+
"distribution": {
10+
"text": "Copyright © Red Hat, Inc. All rights reserved.",
11+
"tlp": {
12+
"label": "WHITE",
13+
"url": "https://www.first.org/tlp/"
14+
}
15+
},
16+
"lang": "en",
17+
"notes": [
18+
{
19+
"category": "legal_disclaimer",
20+
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
21+
"title": "Terms of Use"
22+
}
23+
],
24+
"publisher": {
25+
"category": "vendor",
26+
"contact_details": "https://access.redhat.com/security/team/contact/",
27+
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.",
28+
"name": "Red Hat Product Security",
29+
"namespace": "https://www.redhat.com"
30+
},
31+
"references": [
32+
{
33+
"category": "self",
34+
"summary": "Canonical URL",
35+
"url": ""
36+
}
37+
],
38+
"title": "",
39+
"tracking": {
40+
"current_release_date": "",
41+
"generator": {
42+
"date": "",
43+
"engine": {
44+
"name": "",
45+
"version": ""
46+
}
47+
},
48+
"id": "",
49+
"initial_release_date": "",
50+
"revision_history": [
51+
{
52+
"date": "",
53+
"number": "",
54+
"summary": ""
55+
}
56+
],
57+
"status": "",
58+
"version": ""
59+
}
60+
},
61+
"product_tree": {
62+
"branches": [
63+
{
64+
"branches": [
65+
{
66+
"branches": [
67+
{
68+
"category": "product_name",
69+
"name": "",
70+
"product": {
71+
"name": "",
72+
"product_id": "",
73+
"product_identification_helper": {
74+
"cpe": ""
75+
}
76+
}
77+
}
78+
],
79+
"category": "product_family",
80+
"name": "Red Hat Enterprise Linux 6"
81+
},
82+
{
83+
"category": "product_version",
84+
"name": "kernel",
85+
"product": {
86+
"name": "kernel",
87+
"product_id": "kernel",
88+
"product_identification_helper": {
89+
"purl": "pkg:rpm/redhat/kernel?arch=src"
90+
}
91+
}
92+
},
93+
],
94+
"category": "vendor",
95+
"name": "Red Hat"
96+
}
97+
],
98+
"relationships": [
99+
{
100+
"category": "default_component_of",
101+
"full_product_name": {
102+
"name": "",
103+
"product_id": ""
104+
},
105+
"product_reference": "",
106+
"relates_to_product_reference": ""
107+
}
108+
]
109+
},
110+
"vulnerabilities": [
111+
{
112+
"acknowledgments": [
113+
{
114+
"names": [
115+
116+
]
117+
}
118+
],
119+
"cve": "",
120+
"cwe": {
121+
"id": "",
122+
"name": ""
123+
},
124+
"discovery_date": "",
125+
"flags": [
126+
{
127+
"label": "",
128+
"product_ids": [
129+
]
130+
}
131+
],
132+
"ids": [
133+
{
134+
"system_name": "Red Hat Bugzilla ID",
135+
"text": ""
136+
}
137+
],
138+
"notes": [
139+
{
140+
"category": "description",
141+
"text": "",
142+
"title": "Vulnerability description"
143+
},
144+
{
145+
"category": "summary",
146+
"text": "",
147+
"title": "Vulnerability summary"
148+
},
149+
{
150+
"category": "other",
151+
"text": "",
152+
"title": "Statement"
153+
},
154+
{
155+
"category": "general",
156+
"text": "",
157+
"title": "CVSS score applicability"
158+
}
159+
],
160+
"product_status": {
161+
"fixed": [
162+
],
163+
"known_affected": [
164+
],
165+
"known_not_affected": [
166+
],
167+
"under_investigation": [
168+
]
169+
},
170+
"references": [
171+
{
172+
"category": "self",
173+
"summary": "Canonical URL",
174+
"url": ""
175+
}
176+
],
177+
"release_date": "",
178+
"remediations": [
179+
{
180+
"category": "",
181+
"details": "",
182+
"product_ids": [
183+
]
184+
}
185+
],
186+
"scores": [
187+
{
188+
"cvss_v3": {
189+
"attackComplexity": "",
190+
"attackVector": "",
191+
"availabilityImpact": "",
192+
"baseScore": ,
193+
"baseSeverity": "",
194+
"confidentialityImpact": "",
195+
"integrityImpact": "",
196+
"privilegesRequired": "",
197+
"scope": "",
198+
"userInteraction": "",
199+
"vectorString": "",
200+
"version": "3.1"
201+
},
202+
"products": [
203+
]
204+
}
205+
],
206+
"threats": [
207+
{
208+
"category": "impact",
209+
"details": "",
210+
"product_ids": [
211+
]
212+
}
213+
],
214+
"title": ""
215+
}
216+
]
217+
}

0 commit comments

Comments
 (0)