Hi Gyorgy,

On 12/5/25 10:16 AM, Gyorgy Sarvari via lists.openembedded.org wrote:
Hello,

tl;dr: This is a proof of concept about using an LLM to enrich CVE feeds.
Links are somewhere down below to see the difference. If you think it's
useful, please say so. If you think it's not useful, please say so too.

Motivation: the CVE checker associates CVEs with recipes based on the
CPE information in the CVE entry. Unfortunately there are quite a few
CVE entries missing this information entirely, making it impossible to
associate them with any recipes. Looking at this year so far there are
over 66000 CVE's opened, of which over 15000 are missing CPEs. Though
older entries seem to have better CPE-to-CVE ratio, but for this PoC
I'm mostly interested in the latest vulnerabilities.

The idea: in case CPE information is missing, try to derive it from
the human language description and the reference links of the CVE,
using an LLM. The intuition would be that a good portion of the derived
data would be usable, and even though it wouldn't be perfect, it would
catch more valid CVEs than without it.

[...]
This patch is just a proof of concept.
I'm not sure if/how it could be integrated in the project's
infra - especially the initial load is very heavy, and the patch requires 
GPU(s).


I've no interest in the technical implementation of this, just commenting on the reason for this to exist in the first place.

This all comes from "CVEs without CPE exist". This is not a Yocto problem, and it doesn't seem right for Yocto to be the one fixing it. Someone should fix the database everyone is using. This suggested approach may be a way to fix the current content of the database, though I don't know if *we* want this in Yocto for helping and maintain it to some degree, or if living outside of it in a fork or something is better suited.

I don't know what will be the stance of NIST, MITRE or whatever entity is responsible for the database(s) wrt using LLMs to identify CPE for CVEs. I don't understand how they can even accept CVEs without a CPE: "here's a vuln, figure out which piece of software in the world this applies to" is madness to me.

I'm Cc'ing the security folks as that would probably be the people with the most to say about this and with some idea on how to fix processes or bring up issues with the impacted entities.

Cheers,
Quentin
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#227588): 
https://lists.openembedded.org/g/openembedded-core/message/227588
Mute This Topic: https://lists.openembedded.org/mt/116745075/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to