You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This commit updates the SPEC to incorporate the changes approved
in the OpenVEX Enhancement Proposal 0015: Expansion of the
Vulnerability Field.
Signed-off-by: Adolfo García Veytia (Puerco) <puerco@chainguard.dev>
Copy file name to clipboardExpand all lines: OPENVEX-SPEC.md
+74-11Lines changed: 74 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,9 @@
4
4
5
5
OpenVEX is an implementation of Vulnerability Exploitability eXchange (VEX)
6
6
designed to be lightweight, and embeddable while meeting all requirements of
7
-
a valid VEX implementation as defined in the [Minimum Requirements for VEX] document published on April 2023 as defined by the VEX Working Group coordinated by the [Cybersecurity & Infrastructure Security
8
-
Agency](https://www.cisa.gov/) (CISA).
7
+
a valid VEX implementation as defined in the [Minimum Requirements for VEX]
8
+
document published on April 2023 as defined by the VEX Working Group coordinated
9
+
by the [Cybersecurity & Infrastructure Security Agency](https://www.cisa.gov/) (CISA).
9
10
10
11
11
12
## The VEX Statement
@@ -133,7 +134,9 @@ Here is a sample of a minimal OpenVEX document:
@@ -190,8 +195,7 @@ The following table lists the fields of the OpenVEX statement struct.
190
195
| --- | --- | --- |
191
196
|@id| ✕ | Optional IRI identifying the statement to make it externally referenceable. |
192
197
| version | ✕ | Optional integer representing the statement's version number. Defaults to zero, required when incremented. |
193
-
| vulnerability | ✓ | Vulnerability SHOULD use existing and well known identifiers. For example: [CVE](https://cve.mitre.org/), [OSV](https://osv.dev/), [GHSA](https://github.com/advisories), a supplier's vulnerability tracking system such as [RHSA](https://access.redhat.com/security/security-updates/#/) or a propietary system. It is expected that vulnerability identification systems are external to and maintained separately from VEX.<br>`vulnerability` MAY be an IRI and MAY be arbitrary, created by the VEX document `author`. |
194
-
| vuln_description | ✕ | Optional free-form text describing the vulnerability |
198
+
| vulnerability | ✓ | A struct identifying the vulnerability. See the [Vulnerability Data Structure] section below for the complete data structure reference. |
195
199
| timestamp | ✕ | Timestamp is the time at which the information expressed in the Statement was known to be true. Cascades down from the document, see [Inheritance](#Inheritance). |
196
200
| last_updated | ✕ | Timestamp when the statement was last updated. |
197
201
| products | ✕ | List of product structs that the statement applies to. See the [Product Data Structure] section below for the full description. While a product is required to have a complete statement, this field is optional as it can cascade down from the encapsulating document, see [Inheritance](#Inheritance). |
@@ -217,7 +221,9 @@ readable justification labels and optionally enrich the statement with an
@@ -536,6 +598,7 @@ alert and dashboards could present users with the official guidance from the pro
536
598
537
599
| Date | Revision |
538
600
| --- | --- |
601
+
| 2023-07-18 | Updated spec to reflect changes in [OPEV-0015: Expansion of the Vulnerability Field](https://github.com/openvex/community/blob/main/enhancements/opev-0015.md)|
539
602
| 2023-07-18 | Updated spec to reflect changes in [OPEV-0014: Expansion of the VEX Product Field](https://github.com/openvex/community/blob/main/enhancements/opev-0014.md)|
540
603
| 2023-07-18 | Bumped version of the spec to v0.0.2 after update to meet the VEX-WG doc. |
541
604
| 2023-06-01 | Removed supplier from the document level (following VEX-WG doc). |
0 commit comments