Skip to content

Collect SBOM information and run checks after a build#338

Open
hnez wants to merge 13 commits intolinux-automation:whinlatterfrom
hnez:sbom-cve-check
Open

Collect SBOM information and run checks after a build#338
hnez wants to merge 13 commits intolinux-automation:whinlatterfrom
hnez:sbom-cve-check

Conversation

@hnez
Copy link
Copy Markdown
Member

@hnez hnez commented Feb 25, 2026

We want to keep track of vulnerabilities in our current releases. This means the nightly testing builds and the biannual stable releases (including point releases for them).
For that to work we have started archiving SBOM information for previous builds with #343 and will have to upload SBOM information for stable releases from now on.

This PR implements the counterpart of periodically running a CVE check based on these archived SBOMs to warn up if any new vulnerabilities pop up.

@hnez hnez force-pushed the sbom-cve-check branch 17 times, most recently from 08b7d9a to 392a862 Compare February 25, 2026 14:58
@hnez hnez force-pushed the sbom-cve-check branch 4 times, most recently from 187bb0d to db6f174 Compare March 9, 2026 12:55
@hnez hnez force-pushed the sbom-cve-check branch 5 times, most recently from d970939 to 1795662 Compare March 16, 2026 13:39
@hnez hnez marked this pull request as ready for review March 16, 2026 13:39
@hnez
Copy link
Copy Markdown
Member Author

hnez commented Mar 16, 2026

I have finally finished triaging the open CVEs on the development branch and have marked the PR as ready for review.

Comment thread tools/cve/cve_whatever.py Outdated
Comment thread meta-lxatac-bsp/conf/layer.conf Outdated
@hnez hnez force-pushed the sbom-cve-check branch 2 times, most recently from 87437bc to efcefc3 Compare April 2, 2026 06:31
@hnez
Copy link
Copy Markdown
Member Author

hnez commented Apr 2, 2026

Should we fix the open CVEs as part of this PR or just merge it as-is and fix them after the fact?

@SmithChart
Copy link
Copy Markdown
Member

Should we fix the open CVEs as part of this PR or just merge it as-is and fix them after the fact?

I would be fine to limit this PR to build the infrastructure and fix / mitigate the CVE-findings afterwards.

hnez added 13 commits April 17, 2026 07:28
The openembedded project maintains a list of Linux Kernel CVEs that are
not actually relevant (because they have already been fixed) or were
incorrectly assigned.

Signed-off-by: Leonard Göhrs <[email protected]>
All of the information in this file is already contained in the SPDX file
for the whole rootfs, but the `improve_kernel_cve_report.py` script in
the openembedded-core source tree works better with the kernel-only file.

Signed-off-by: Leonard Göhrs <[email protected]>
These generate a HTML file / textual summary of the known vulnerabilities
found in a software bill of materials.

Signed-off-by: Leonard Göhrs <[email protected]>
…rt.py

This script from openembedded-core uses the kernel version and list of
compiled files from the SPDX file to filter out kernel CVEs that do
not actually affect us.

Signed-off-by: Leonard Göhrs <[email protected]>
…ocess

The cve_whatever script creates OpenVEX files for all open CVEs that then
have to be filled with information about why the vulnerability does not
affect the project, or needs to be removed.

Signed-off-by: Leonard Göhrs <[email protected]>
We use backports to locally update recipes from other layers,
i.e. to get fixes for vulnerabilities earlier or just because we want some
feature in advance.
And sometimes we need to be quicker than upstream layers and apply updates
locally. To do so we also add the updates-* directories.

Signed-off-by: Leonard Göhrs <[email protected]>
This solves a slew of open CVEs. According to openembedded core commit
af66dec1a0 ("vim: upgrade 9.2.0 -> 9.2.0110") the following:

  CVE-2026-28417, CVE-2026-28418, CVE-2026-28419, CVE-2026-28420,
  CVE-2026-28421 and CVE-2026-28422.

Signed-off-by: Leonard Göhrs <[email protected]>
This fixes various CVEs. Among them CVE-2026-3731, which can result in
an out of bounds read on sftp actions.

Signed-off-by: Leonard Göhrs <[email protected]>
These are not new CVEs by any means, but somehow they did not show up
before. Luckily these do not affect us very much.

Signed-off-by: Leonard Göhrs <[email protected]>
@hnez
Copy link
Copy Markdown
Member Author

hnez commented Apr 20, 2026

I may have lost track here. We agreed to merge this as-is, right?

@SmithChart
Copy link
Copy Markdown
Member

I may have lost track here. We agreed to merge this as-is, right?

Once we agreed on the technical details we agreed to merge with CVE-warnings in place and fix those afterwards in the usual manner.

I do not see any more technical discussion. So I guess we are good to go?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants