|
121 | 121 | "maxLength": 2048
|
122 | 122 | },
|
123 | 123 | "collectionURL": {
|
124 |
| - "description": "URL identifying a package collection (determines meaning of packageName).", |
| 124 | + "description": "URL identifying a package collection (determines the meaning of packageName).", |
125 | 125 | "$ref": "#/definitions/uriType",
|
126 | 126 | "examples": [
|
127 | 127 | "https://access.redhat.com/downloads/content/package-browser",
|
|
197 | 197 | },
|
198 | 198 | "cpes": {
|
199 | 199 | "type": "array",
|
200 |
| - "description": "Affected products defined by CPE. This is an array of CPE values (vulnerable and not), we use an array so that we can make multiple statements about the same version and they are separate (if we used a JSON object we'd essentially be keying on the CPE name and they would have to overlap). Also this allows things like cveDataVersion or cveDescription to be applied directly to the product entry. This also allows more complex statements such as \"Product X between versions 10.2 and 10.8\" to be put in a machine-readable format. As well since multiple statements can be used multiple branches of the same product can be defined here.", |
| 200 | + "description": "Affected products defined by CPE. This is an array of CPE values (vulnerable and not), we use an array so that we can make multiple statements about the same version and they are separate (if we used a JSON object we'd essentially be keying on the CPE name and they would have to overlap). Also, this allows things like cveDataVersion or cveDescription to be applied directly to the product entry. This also allows more complex statements such as \"Product X between versions 10.2 and 10.8\" to be put in a machine-readable format. As well since multiple statements can be used multiple branches of the same product can be defined here.", |
201 | 201 | "uniqueItems": true,
|
202 | 202 | "items": {
|
203 | 203 | "title": "CPE Name",
|
|
236 | 236 | "uniqueItems": true,
|
237 | 237 | "items": {
|
238 | 238 | "type": "object",
|
239 |
| - "description": "Object describing program routine.", |
| 239 | + "description": "An object describing program routine.", |
240 | 240 | "required": [
|
241 | 241 | "name"
|
242 | 242 | ],
|
|
252 | 252 | },
|
253 | 253 | "platforms": {
|
254 | 254 | "title": "Platforms",
|
255 |
| - "description": "List of specific platforms if the vulnerability is only relevant in the context of these platforms (optional). Platforms may include execution environments, operating systems, virtualization technologies, hardware models, or computing architectures. Lack of this field or an empty array implies that the other fields are applicable for all relevant platforms.", |
| 255 | + "description": "List of specific platforms if the vulnerability is only relevant in the context of these platforms (optional). Platforms may include execution environments, operating systems, virtualization technologies, hardware models, or computing architectures. The lack of this field or an empty array implies that the other fields are applicable to all relevant platforms.", |
256 | 256 | "type": "array",
|
257 | 257 | "minItems": 1,
|
258 | 258 | "uniqueItems": true,
|
259 | 259 | "items": {
|
260 | 260 | "type": "string",
|
261 |
| - "examples": ["iOS", "Android", "Windows", "macOS", "x86", "ARM", "64 bit", "Big Endian", "iPad", "Chromebook", "Docker"], |
| 261 | + "examples": ["iOS", "Android", "Windows", "macOS", "x86", "ARM", "64 bit", "Big Endian", "iPad", "Chromebook", "Docker", "Model T"], |
262 | 262 | "maxLength": 1024
|
263 | 263 | }
|
264 | 264 | },
|
|
497 | 497 | },
|
498 | 498 | "title": {
|
499 | 499 | "type": "string",
|
500 |
| - "description": "A title, headline, or a brief phrase summarizing the of the CVE record. Eg., Buffer overflow in Example Soft.", |
| 500 | + "description": "A title, headline, or a brief phrase summarizing the CVE record. Eg., Buffer overflow in Example Soft.", |
501 | 501 | "minLength": 1,
|
502 | 502 | "maxLength": 256
|
503 | 503 | },
|
|
848 | 848 | "properties": {
|
849 | 849 | "format": {
|
850 | 850 | "type": "string",
|
851 |
| - "description": "Name of the score format. This provides a bit future proofing. Additional properties are not prohibited, so this will support inclusion of proprietary formats. It also provides an easy future conversion mechanism when future score formats become part of the schema. example: cvssV4_4, format = 'cvssV4_4', other = cvssV4_4 json object. In the future the other properties can be converted to score properties when they become part of the schema.", |
| 851 | + "description": "Name of the scoring format. This provides a bit of future proofing. Additional properties are not prohibited, so this will support the inclusion of proprietary formats. It also provides an easy future conversion mechanism when future score formats become part of the schema. example: cvssV44, format = 'cvssV44', other = cvssV4_4 JSON object. In the future, the other properties can be converted to score properties when they become part of the schema.", |
852 | 852 | "minLength": 1,
|
853 | 853 | "maxLength": 64
|
854 | 854 | },
|
|
1146 | 1146 | "$ref": "#/definitions/cveMetadataPublished"
|
1147 | 1147 | },
|
1148 | 1148 | "containers": {
|
1149 |
| - "description": "A set of structures (called containers) used to store vulnerability information related to a specific CVE ID provided by a specific organization participating in the CVE program. Each container includes information provided by a different source.\n\nAt minimum, a 'cna' container containing the vulnerability information provided by the CNA who initially assigned the CVE ID must be included.\n\nThere can only be one 'cna' container, as there can only be one assigning CNA. However, there can be multiple 'adp' containers, allowing multiple organizations participating in the CVE program to add additional information related to the vulnerability. For the most part, the 'cna' and 'adp' containers contain the same properties. The main differences are the source of the information and the 'cna' container requires the CNA include certain fields, while the 'adp' container does not.", |
| 1149 | + "description": "A set of structures (called containers) used to store vulnerability information related to a specific CVE ID provided by a specific organization participating in the CVE program. Each container includes information provided by a different source.\n\nAt a minimum, a 'cna' container containing the vulnerability information provided by the CNA who initially assigned the CVE ID must be included.\n\nThere can only be one 'cna' container, as there can only be one assigning CNA. However, there can be multiple 'adp' containers, allowing multiple organizations participating in the CVE program to add additional information related to the vulnerability. For the most part, the 'cna' and 'adp' containers contain the same properties. The main differences are the source of the information. The 'cna' container requires the CNA to include certain fields, while the 'adp' container does not.", |
1150 | 1150 | "type": "object",
|
1151 | 1151 | "properties": {
|
1152 | 1152 | "cna": {"$ref": "#/definitions/cnaPublishedContainer"},
|
|
0 commit comments