Re: SBOM tooling CVE handling

2025-03-20 Thread Jarek Potiuk
And just to add to that: > 3. To find if a vulnerability in an application is **exploitable** is an even harder problem. IMHO, the appropriate tool for that is a Vulnerability Exploitability eXchange(VEX)[6] and it should also be handled by the community. I wrote a small example[7] on how this kin

Re: SBOM tooling CVE handling

2025-03-20 Thread Gary Gregory
I've used the OWASP dependency check Maven plugin: https://owasp.org/www-project-dependency-check/ Is this the kind of checks we're talking about? Gary On Thu, Mar 20, 2025, 06:16 Piotr P. Karwasz wrote: > Hi Craig, > > On 19.03.2025 21:11, Craig Russell wrote: > > Users use SBOMs in order to

Re: SBOM tooling CVE handling

2025-03-20 Thread Piotr P. Karwasz
Hi Craig, On 19.03.2025 21:11, Craig Russell wrote: Users use SBOMs in order to know the entire stack of software they are running. This allows them to know whether the products that they use are subject to known vulnerabilities. But in order to take advantage of this, they need to monitor CV

Re: SBOM tooling CVE handling

2025-03-19 Thread Dave Fisher
VEX files are what may be used to report vulnerabilities. It’s somewhat orthogonal to a release’s SBOM, Piotr, VP, ECMA and Arnout from Security are discussing this topic. ATR will make recommendations as Security policies evolve. Best, Dave > On Mar 19, 2025, at 1:27 PM, Dominik Psenner wrot

Re: SBOM tooling CVE handling

2025-03-19 Thread Dominik Psenner
Hi Craig At dayjob this has been part of a antivirus solution we have in production use for long. It scans computers, knows software and versions, knows what is running and aligns that with CVEs. Don't know if that is already scraping SBOMS to gain a better picture about the software. Since it is

SBOM tooling CVE handling

2025-03-19 Thread Craig Russell
I was thinking about why we have SBOMs and took it to the next level. Users use SBOMs in order to know the entire stack of software they are running. This allows them to know whether the products that they use are subject to known vulnerabilities. But in order to take advantage of this, they ne