cve-check-map.conf 1.7 KB

12345678910111213141516171819202122232425262728
  1. # Possible options for CVE statuses
  2. # used by this class internally when fix is detected (NVD DB version check or CVE patch file)
  3. CVE_CHECK_STATUSMAP[patched] = "Patched"
  4. # use when this class does not detect backported patch (e.g. vendor kernel repo with cherry-picked CVE patch)
  5. CVE_CHECK_STATUSMAP[backported-patch] = "Patched"
  6. # use when NVD DB does not mention patched versions of stable/LTS branches which have upstream CVE backports
  7. CVE_CHECK_STATUSMAP[cpe-stable-backport] = "Patched"
  8. # use when NVD DB does not mention correct version or does not mention any verion at all
  9. CVE_CHECK_STATUSMAP[fixed-version] = "Patched"
  10. # used internally by this class if CVE vulnerability is detected which is not marked as fixed or ignored
  11. CVE_CHECK_STATUSMAP[unpatched] = "Unpatched"
  12. # use when CVE is confirmed by upstream but fix is still not available
  13. CVE_CHECK_STATUSMAP[vulnerable-investigating] = "Unpatched"
  14. # used for migration from old concept, do not use for new vulnerabilities
  15. CVE_CHECK_STATUSMAP[ignored] = "Ignored"
  16. # use when NVD DB wrongly indicates vulnerability which is actually for a different component
  17. CVE_CHECK_STATUSMAP[cpe-incorrect] = "Ignored"
  18. # use when upstream does not accept the report as a vulnerability (e.g. works as designed)
  19. CVE_CHECK_STATUSMAP[disputed] = "Ignored"
  20. # use when vulnerability depends on build or runtime configuration which is not used
  21. CVE_CHECK_STATUSMAP[not-applicable-config] = "Ignored"
  22. # use when vulnerability affects other platform (e.g. Windows or Debian)
  23. CVE_CHECK_STATUSMAP[not-applicable-platform] = "Ignored"
  24. # use when upstream acknowledged the vulnerability but does not plan to fix it
  25. CVE_CHECK_STATUSMAP[upstream-wontfix] = "Ignored"