Skip to main content

Lightweight SBOM CVE analysis tool

Project description

sbom-cve-check

sbom-cve-check is a lightweight, standalone and easy-to-use tool that parses Software Bill Of Materials (SBOM) files and using publicly available databases of security vulnerabilities (CVEs), provides a report detailing which software components are affected by known security vulnerabilities.

Key features provided by this tool:

  • Accepts an SBOM file as input: currently supports SPDXv2.2 and SPDXv3.
  • Supports multiple sources of vulnerability information: currently NVD and CVE List.
  • Can consume various annotation formats, like OpenVEX.
  • Generates exports in multiple formats, including SPDX v3.0.
  • Supports plugins to add additional features.
  • Filters affected CVEs based on compiled sources: if the source file affected by a CVE is not compiled in, this CVE is considered not applicable. Mostly useful to filter Linux kernel CVEs.
  • Has very few dependencies, is very lightweight and easy to set up and use.
  • Fully open-source, under GPLv2.

See the sbom-cve-check documentation for further details.

Motivation

This tool was started as a way of replacing the cve-check logic implemented in Yocto, which requires running a full build to perform a new CVE analysis. sbom-cve-check instead can run on the SBOM produced once by Yocto Project and can be used to regularly run the CVE analysis in less than a minute.

Getting started

Assuming you're using Yocto Project, 4 easy steps:

  1. Install the tool:
    pip install sbom-cve-check[extra]
    (You may want to do this in a Python virtual environment).

  2. Generate the SBOM with Yocto Project:
    SPDXv3.0 is generated by default since Yocto ProjectWalnascar (5.2).
    Add INHERIT += "vex" in your local.conf.

  3. Retrieve two artifacts from the Yocto Projectdeploy directory:
    ${IMAGE_NAME}.rootfs.spdx.json: The SPDX v3.0 SBOM file.
    ${IMAGE_NAME}.rootfs.json: File generated by the vex.bbclass.

  4. Run the CVE analysis:

     sbom-cve-check \
       --sbom-path ${IMAGE_NAME}.rootfs.spdx.json \
       --yocto-vex-manifest ${IMAGE_NAME}.rootfs.json \
       --export-type yocto-cve-check-manifest --export-path out.json
    

Roadmap

  • Add support of Ubuntu CVE tracker repository.
  • Automatically detect if a patch was backported.
  • Add more export formats, like for example OpenVEX.
  • Add CycloneDX (CDX) SBOM support as input.
  • Allow to generate an SBOM (CDX or SPDX 3.0) as output even if the SBOM specified as input is in another format.

Compatibility with Yocto Project

The compatibility with the SBOM generated by Yocto Project is described in the Yocto Project SBOM section.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

sbom_cve_check-1.2.1.tar.gz (133.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

sbom_cve_check-1.2.1-py3-none-any.whl (122.7 kB view details)

Uploaded Python 3

File details

Details for the file sbom_cve_check-1.2.1.tar.gz.

File metadata

  • Download URL: sbom_cve_check-1.2.1.tar.gz
  • Upload date:
  • Size: 133.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.3

File hashes

Hashes for sbom_cve_check-1.2.1.tar.gz
Algorithm Hash digest
SHA256 d7dfca05cf0cee6b439802fe10689790b9395d436d0d9af6170e23603c2ea5cb
MD5 6f8f0ca341d7b7efed52a7850c157488
BLAKE2b-256 baba59958cca1b566748330d09961e69af3dff0f3a3e4cbc9b1a5a105af674b5

See more details on using hashes here.

File details

Details for the file sbom_cve_check-1.2.1-py3-none-any.whl.

File metadata

  • Download URL: sbom_cve_check-1.2.1-py3-none-any.whl
  • Upload date:
  • Size: 122.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.3

File hashes

Hashes for sbom_cve_check-1.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 31921420cb8b6a54635cc01e0229c5c514dd7c4a3df473c8010b7fefb7260804
MD5 2040a85db4267be2cd53d3082d2883c0
BLAKE2b-256 e1718e2ad26f25a4e3eb6e61772954025e0eef8139f0e8f42ad19f9e93a6cb7c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page