Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

5.1.0 allows use of versionType git without a repo field #280

Open
ElectricNroff opened this issue Feb 21, 2024 · 0 comments
Open

5.1.0 allows use of versionType git without a repo field #280

ElectricNroff opened this issue Feb 21, 2024 · 0 comments
Labels
bug Something isn't working Needs Discussion Discuss in a future QWG meeting or on mailing list section:affected_product Schema location is affected or product

Comments

@ElectricNroff
Copy link

https://github.com/CVEProject/cve-schema/blob/2aa608b6733cc2730a43901472ef0e706d0ef2b5/schema/v5.0/docs/versions.md says "Because the Git version identifiers cannot be understood without reference to a specific Git repository, this form adds a new repo field containing the URL of the repository" but some CNAs identify the repository in a different way, and have no valid repo field. For example:

  • CVE-2023-0045 "repo": "https://git.kernel.org" (This is a website for many repositories, not a specific repo.)
  • CVE-2023-0815 "repo": "https://github.com/OpenNMS" (Again, not a specific repo.)
  • CVE-2024-22119 "repo":"https://git.zabbix.com/" (Again, not a specific repo.)
  • CVE-2023-2163,CVE-2023-3036,CVE-2023-23556,etc. repo seems to be implied by references
  • CVE-2023-4540 repo seems to be implied by references (or collectionURL)
  • CVE-2024-0879 repo seems to be implied by references (or collectionURL and packageName)
  • CVE-2023-4504 arguably ambiguous because references has URLs associated with two repos

As far as I know, it was not intended that a provider use "versionType":"git" without a directly usable repo value, because this could break automation that, for example, tries to automatically clone the repository in order to determine whether an instance of a product (built from a specific commit) is vulnerable. However, nothing in the versions.md document directly states that a repo field is mandatory in any situation. It would be possible to identify all affected CVE Records (and their CNAs) if the decision is that it can actually be mandatory. It would be approximately 80 CVE Records from 10 CNAs.

@jayjacobs jayjacobs added bug Something isn't working section:affected_product Schema location is affected or product labels Oct 23, 2024
@ccoffin ccoffin added the Needs Discussion Discuss in a future QWG meeting or on mailing list label Jan 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working Needs Discussion Discuss in a future QWG meeting or on mailing list section:affected_product Schema location is affected or product
Projects
None yet
Development

No branches or pull requests

3 participants