public inbox for openembedded-core@lists.openembedded.org
 help / color / mirror / Atom feed
From: Benjamin ROBIN <benjamin.robin@bootlin.com>
To: Ross Burton <Ross.Burton@arm.com>, Joshua Watt <jpewhacker@gmail.com>
Cc: Patches and discussions about the oe-core layer
	<openembedded-core@lists.openembedded.org>,
	openembedded-architecture
	<openembedded-architecture@lists.openembedded.org>
Subject: Re: Comparing cve-check with sbom-cve-check
Date: Thu, 05 Feb 2026 09:50:21 +0100	[thread overview]
Message-ID: <2051957.usQuhbGJ8B@brobin-bootlin> (raw)
In-Reply-To: <CAJdd5GbqsCVjVDkLFFbpzihurQxHxTrAGjA_K1OGNPTHj=gakw@mail.gmail.com>

Hello,

On Thursday, February 5, 2026 at 12:54 AM, Joshua Watt wrote:
> Yes, I agree this should be the strategy for handling CVEs. It would
> also be really good to get this in before the LTS

Targeting Wrynose (around April 2026) is ambitious, but it might be feasible.

> I'm working on some changes to SPDX that I think will help with this.
> Specifically, I'm adding "Package" objects to describe recipes. This
> allows the recipes to be linked as build time dependencies
> independently of the build provenance (which does the same thing, but
> for builds). The data in the recipe package will contain only data
> that can be statically determined without actually building the
> recipe, so it will give us the avenue to do CVE analysis without
> actually building anything[1]. This should allow CVE analysis on the
> native and static libraries since they will be included as build time
> dependencies, even though they don't appear in the final image.

Thank you for working on this. I have a couple of requests:
 - It would be helpful to distinguish between native and target packages.
   The goal is to support a flag in `sbom-cve-check` that limits analysis to 
   packages deployed in the target (including static dependencies) or extends
   it to all components.
 - If possible (though not a priority), including layer information
   (URL, Git version, etc.) associated with a `build_Build` object would be
   valuable.
 
> [1]: Sadly, it _can't_ include license information because
> NO_GENERIC_LICENSE means you can have license text that you don't know
> until after do_unpack; we should consider doing something about that.
> 
> On Wed, Feb 4, 2026 at 10:31 AM Ross Burton <Ross.Burton@arm.com> wrote:

> > To summarise [5] the pros and cons:
> > + sbom-cve-check can run at any point after the build
> > + has better data sources which report more issues

"Better" might be too strong, we support *more* data sources.
Sometimes, version ranges in the CVE List are incorrect, while the NVD 
database may provide more accurate information. However, users can configure 
their preferred data sources via a custom configuration file, so this isn’t a 
major concern from my perspective.

> > - only scans the literal packages that are in a final image, so we don’t
> > get coverage of native packages or static linkage
> > 
> > I wonder if the easiest fix for this gap is to enhance the SPDX generation
> > to not only generate an “image SPDX” but also a “build SPDX”, which is
> > essentially an aggregation of every recipe’s SPDX that is present. A
> > recursive execution of the SPDX generation task will mean this covers
> > both any native tools and static libraries that are in the dependency
> > graph, for maximal coverage.
> > 
> > This gives a solution without needing to be more clever in the image SPDX
> > generation, for example including packages for all of the build
> > dependencies (be them native or target).

I agree with Joshua: improving the SPDX SBOM file is the right direction.

> > If this is done then I think sbom-cve-check is at least at parity with
> > cve-check, and in many ways far superior. This will allow us to merge the
> > few recipes and class from meta-sbom-cve-check into core, and delete
> > cve-check.

I concur, but we (Joshua?) need to tackle the SPDX generation improvements, 
which is no small task. On my end, I’ll update `sbom-cve-check` to handle 
these changes properly.

-- 
Benjamin Robin, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com





  reply	other threads:[~2026-02-05  8:50 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-04 17:29 Comparing cve-check with sbom-cve-check Ross Burton
2026-02-04 23:54 ` Joshua Watt
2026-02-05  8:50   ` Benjamin ROBIN [this message]
2026-02-05 17:29     ` Joshua Watt
2026-02-06 12:22       ` Benjamin ROBIN
2026-02-06 15:50         ` Joshua Watt
2026-02-06 16:15           ` Benjamin ROBIN
2026-02-06 17:22 ` [Openembedded-architecture] " Mark Hatle
2026-02-06 19:34   ` Joshua Watt
2026-02-10 23:44 ` Mark Hatle
2026-02-11  0:00   ` Joshua Watt
2026-02-11  0:18     ` Mark Hatle

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2051957.usQuhbGJ8B@brobin-bootlin \
    --to=benjamin.robin@bootlin.com \
    --cc=Ross.Burton@arm.com \
    --cc=jpewhacker@gmail.com \
    --cc=openembedded-architecture@lists.openembedded.org \
    --cc=openembedded-core@lists.openembedded.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox