]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
Symlink NVD CPE search 36251/head
authorDimitri John Ledkov <dimitri.ledkov@surgut.co.uk>
Mon, 3 Feb 2025 12:00:24 +0000 (12:00 +0000)
committerDimitri John Ledkov <dimitri.ledkov@surgut.co.uk>
Mon, 3 Feb 2025 12:00:24 +0000 (12:00 +0000)
docs/PACKAGE_METADATA_FOR_EXECUTABLE_FILES.md

index 46b4e00bddd92046933fe888dc98b7ea274c6f0a..21ff5d80761ec2769db37330b3030936a5dff5b2 100644 (file)
@@ -90,7 +90,7 @@ Value: a single JSON object encoded as a NUL-terminated UTF-8 string
      "version":"4711.0815.fc13",
      "architecture":"arm32",
      "osCpe": "cpe:2.3:o:fedoraproject:fedora:33",          # A CPE name for the operating system, `CPE_NAME` from os-release is a good default
-     "appCpe": "cpe:2.3:a:gnu:coreutils:5.0",               # A CPE name for the upstream application, check NVD
+     "appCpe": "cpe:2.3:a:gnu:coreutils:5.0",               # A CPE name for the upstream application, use NVD CPE search
      "debugInfoUrl": "https://debuginfod.fedoraproject.org/"
 }
 ```
@@ -136,9 +136,11 @@ A set of well-known keys is defined here, and hopefully shared among all vendors
 | version      | The source package version                                               | 4711.0815.fc13                        |
 | architecture | The binary package architecture                                          | arm32                                 |
 | osCpe        | A CPE name for the OS, typically corresponding to CPE_NAME in os-release | cpe:2.3:o:fedoraproject:fedora:33     |
-| appCpe       | A CPE name for the upstream Application, check NVD                       | cpe:2.3:a:gnu:coreutils:5.0           |
+| appCpe       | A CPE name for the upstream Application, as found in [NVD CPE search]    | cpe:2.3:a:gnu:coreutils:5.0           |
 | debugInfoUrl | The debuginfod server url, if available                                  | https://debuginfod.fedoraproject.org/ |
 
+[NVD CPE search]: https://nvd.nist.gov/products/cpe/search
+
 ### Displaying package notes
 
 The raw ELF section can be extracted using `objdump`: