The other day me and @gregkh shot down a draft proposal to add a new role in the CVE ecosystem (SADP: "supplier ADP") that would append data to CVEs with details about dependencies and how they are or are not vulnerable to each particular CVE.

Imagine the amount of dependencies that use curl or the Linux kernel etc. These sweet innocent proposal makers thought in the terms of 5-10 dependencies per CVE. Not tens or hundreds of thousands which is far from unthinkable.

@bagder @gregkh easier to list the software that doesn't depend on curl.
@bagder @gregkh isn’t this what VEX is meant for?
@jacques @gregkh possibly sure, but that's not info inserted into the CVE records like this proposal does.

@bagder @gregkh got it. Sounds like some is trying to create the Universal Asset Graph by accident rather than on purpose.

(Relevant self-post: https://theoryof.predictable.software/articles/some-requirements-for-a-universal-asset-graph/ )

Some Requirements for a Universal Asset Graph :: Theory of Predictable Software

@jacques @gregkh yeah, I think some of us realized that which also made us immediately realize the scale it would have to support to work - and how that alone would make the proposal not work.

@bagder @jacques @gregkh

Do you think the opposite can be done? e.g. push on downstream software to declare (through VEX or otherwise) whether or not they're vulnerable to something upstream?

@mlieberman @jacques @gregkh we as producers of CVEs for a component cannot tell which users that are vulnerable nor how sever their problems are if they are vulnerable

@bagder @jacques @gregkh

Of course. Upstream has no way of knowing how downstream is using their tools/libraries. Do you think though that there should be a bigger push on downstream consumers to declare how they might/might not be vulnerable to a CVE?

I think of things like the Takata airbag recall from years ago. Manufacturers had to declare they were using the airbags.

@jacques @bagder @gregkh btw… how is it going, making the Universal Asset Graph on purpose?

@msw @bagder @gregkh I haven’t seen anything that fits the criteria, but there are partial things like Mercator, GUAC (the DB) and osv.dev (the data).

In fairness I’ve been out of this space for quite a while.

@jacques do you miss it? 😅

@msw yes and no. It was nice to have a sense of mission and doing good. Now my work focuses on making a rich guy even richer.

On the other hand: https://mastodon.chester.id.au/@jacques/113682317639998354

Jacques Chester (@[email protected])

I’m less stressed now about my work, which involves the distribution of billions of dollars of capex, than I was when I was in security-land and fretted about risks in the millions of dollars.

Jacques's Mastodon

@jacques yes, maybe dealing with the realized capital expenses of infrastructure within the context of a firm are a little easier to wrangle in one's head compared to the abundant world of digital public goods such as FOSS.

To me, there are risks introduced through widely reused public-goods software that are, in theory, limitless, not just millions of dollars. Good things the benefits outweigh them.

And of course, making FOSS better makes those with the most resource excess richer too. 😅

@msw I mean technically trillions were on the line but I was only unemployment-prevention responsible for millions of it. The rest was personal purpose.

@jacques @bagder @gregkh I'd really love to have some public database that would help us all collectively make more efficient resource allocation decisions.

Let's take CVE-2025-38352 for example. CISA added it to the KEV because Google said that there is evidence of exploitation in the context of Android.

If you use CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y the fix is not needed.

Linux distros aren't affected but release "fixes" anyway. https://forums.rockylinux.org/t/rocky-8-10-cve-2025-38352/19590/3

#PatchAllTheThings! #InfoSec

Rocky 8.10 - CVE-2025-38352

OK, I’m busy waiting. Regarding Rocky 9: We also use a machine with kernel 5.14.0-570.37.1.el9. On this machine, the kernel parameter CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y is effective. If I understand correctly, this means that the problem does not occur. Regards

Rocky Linux Forum
@msw @jacques @bagder I have no problem adding additional data like "This config option means you will not be vulnerable" to our records today, if people want to submit that information to us. We take patches and additions to the kernel cve.org records on a weekly basis from vendors that work to narrow down affected kernel ranges and add additional references.

So we could do what you want today, no changes to anything that cve.org does right now would be needed, just send us a patch! But that was not what was being proposed at all, unfortunately.
CVE Website

@jacques @bagder @gregkh

ICYMI, here's a paper that was trying to answer this research question in the context of #OpenSource #Java projects on GitHub: "What do open-source maintainers think about integrating #VEX into their existing SBOMs?"

TL;DR: "In most cases, our augmented SBOMs were not directly accepted because developers required a continuous SBOM update."

https://dl.acm.org/doi/pdf/10.1145/3696630.3728513

#SBOM #CVE #InfoSec

@msw @jacques @bagder Are people ignoring the fact that I do not think we have tools that can easily generate those SBOM files today?

Yes, I know about the REUSE tool from the FSFE, that's the best that we currently have but I don't think the output from it is what anyone seems to want these days. I've been publishing the output from that for years for usbutils and no one seems to even have noticed...

Am I just missing all of the wonderful tools out there that can simply generate a SBOM in a variety of needed formats from a project's tarball or normal autotools or meson build process?
@bagder @gregkh where was that proposal circulating?
@msw @gregkh it was presented and discussed during our most recent OSS CNA user group meeting
@bagder @msw @gregkh Ha! They weren't asking for much were they!?
@sjvn @msw @gregkh to be honest, it felt almost a little cute and innocent!
@bagder @sjvn @gregkh that’s been my experience for a lot of these things. Well intentioned ideas, but they don’t withstand contact with the realities of wide-scale reuse.
@msw @bagder @sjvn @gregkh The lack of understanding around open source is one of the biggest threats open source has I suspect