From: Benjamin ROBIN <benjamin.robin@bootlin.com>
To: Ross Burton <Ross.Burton@arm.com>, Joshua Watt <jpewhacker@gmail.com>
Cc: Patches and discussions about the oe-core layer
<openembedded-core@lists.openembedded.org>,
openembedded-architecture
<openembedded-architecture@lists.openembedded.org>
Subject: Re: Comparing cve-check with sbom-cve-check
Date: Thu, 05 Feb 2026 09:50:21 +0100 [thread overview]
Message-ID: <2051957.usQuhbGJ8B@brobin-bootlin> (raw)
In-Reply-To: <CAJdd5GbqsCVjVDkLFFbpzihurQxHxTrAGjA_K1OGNPTHj=gakw@mail.gmail.com>
Hello,
On Thursday, February 5, 2026 at 12:54 AM, Joshua Watt wrote:
> Yes, I agree this should be the strategy for handling CVEs. It would
> also be really good to get this in before the LTS
Targeting Wrynose (around April 2026) is ambitious, but it might be feasible.
> I'm working on some changes to SPDX that I think will help with this.
> Specifically, I'm adding "Package" objects to describe recipes. This
> allows the recipes to be linked as build time dependencies
> independently of the build provenance (which does the same thing, but
> for builds). The data in the recipe package will contain only data
> that can be statically determined without actually building the
> recipe, so it will give us the avenue to do CVE analysis without
> actually building anything[1]. This should allow CVE analysis on the
> native and static libraries since they will be included as build time
> dependencies, even though they don't appear in the final image.
Thank you for working on this. I have a couple of requests:
- It would be helpful to distinguish between native and target packages.
The goal is to support a flag in `sbom-cve-check` that limits analysis to
packages deployed in the target (including static dependencies) or extends
it to all components.
- If possible (though not a priority), including layer information
(URL, Git version, etc.) associated with a `build_Build` object would be
valuable.
> [1]: Sadly, it _can't_ include license information because
> NO_GENERIC_LICENSE means you can have license text that you don't know
> until after do_unpack; we should consider doing something about that.
>
> On Wed, Feb 4, 2026 at 10:31 AM Ross Burton <Ross.Burton@arm.com> wrote:
> > To summarise [5] the pros and cons:
> > + sbom-cve-check can run at any point after the build
> > + has better data sources which report more issues
"Better" might be too strong, we support *more* data sources.
Sometimes, version ranges in the CVE List are incorrect, while the NVD
database may provide more accurate information. However, users can configure
their preferred data sources via a custom configuration file, so this isn’t a
major concern from my perspective.
> > - only scans the literal packages that are in a final image, so we don’t
> > get coverage of native packages or static linkage
> >
> > I wonder if the easiest fix for this gap is to enhance the SPDX generation
> > to not only generate an “image SPDX” but also a “build SPDX”, which is
> > essentially an aggregation of every recipe’s SPDX that is present. A
> > recursive execution of the SPDX generation task will mean this covers
> > both any native tools and static libraries that are in the dependency
> > graph, for maximal coverage.
> >
> > This gives a solution without needing to be more clever in the image SPDX
> > generation, for example including packages for all of the build
> > dependencies (be them native or target).
I agree with Joshua: improving the SPDX SBOM file is the right direction.
> > If this is done then I think sbom-cve-check is at least at parity with
> > cve-check, and in many ways far superior. This will allow us to merge the
> > few recipes and class from meta-sbom-cve-check into core, and delete
> > cve-check.
I concur, but we (Joshua?) need to tackle the SPDX generation improvements,
which is no small task. On my end, I’ll update `sbom-cve-check` to handle
these changes properly.
--
Benjamin Robin, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com
next prev parent reply other threads:[~2026-02-05 8:50 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-04 17:29 Comparing cve-check with sbom-cve-check Ross Burton
2026-02-04 23:54 ` Joshua Watt
2026-02-05 8:50 ` Benjamin ROBIN [this message]
2026-02-05 17:29 ` Joshua Watt
2026-02-06 12:22 ` Benjamin ROBIN
2026-02-06 15:50 ` Joshua Watt
2026-02-06 16:15 ` Benjamin ROBIN
2026-02-06 17:22 ` [Openembedded-architecture] " Mark Hatle
2026-02-06 19:34 ` Joshua Watt
2026-02-10 23:44 ` Mark Hatle
2026-02-11 0:00 ` Joshua Watt
2026-02-11 0:18 ` Mark Hatle
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2051957.usQuhbGJ8B@brobin-bootlin \
--to=benjamin.robin@bootlin.com \
--cc=Ross.Burton@arm.com \
--cc=jpewhacker@gmail.com \
--cc=openembedded-architecture@lists.openembedded.org \
--cc=openembedded-core@lists.openembedded.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox