[yocto-security] Yocto security responses.

Paul Eggleton paul.eggleton at linux.intel.com
Thu Oct 12 14:32:16 PDT 2017


Hi Jim,

(resending with corrected CC)

On Friday, 13 October 2017 8:56:50 AM NZDT Jim Gettys wrote:
> I'm trying to understand the Yocto response to security issues.
> 
> The OE https://patchwork.openembedded.org/project/oe/patches/ page shows
> you added a patch to fix the recent dnsmasq problems on October 3, by
> updating to dnsmasq 2.78.
> 
> But being new to Yocto, I don't know how long it takes to percolate through
> the Yocto system.
> 
> https://layers.openembedded.org/layerindex/recipe/4473/
> 
> Still says version 2.76, whereas the fixes are in 2.78.
> 
> If one built Yocto today from current head of tree, what version would be
> picked up?
> 
> Any insight on how Yocto handles security issues would be helpful.

To explain a little background - OpenEmbedded recipes are split up into 
various different layers. The layer in which dnsmasq is contained, 
meta-networking, isn't actually maintained by the Yocto Project - it's not 
part of our release/test cycle that we do for the core. I just happened to 
send a patch because I noticed the security issue announcement and it was a 
straightforward upgrade from 2.76.

Patch testing for meta-networking and other layers in the meta-openembedded 
repository in which meta-networking is contained is graciously carried out for 
the community by Martin (on CC) which involves world builds for every 
architecture we support. Usually when patches get sent it takes a few days for 
them to get through those tests. I would like to see security patches like 
this one have some kind of fast track - I'd have to agree that 10 days is 
longer than we would like. We do have a number of volunteers who work on 
security issues particularly within OE-Core (which is officially maintained by 
the Yocto Project) however not so much for recipes outside of that - we are 
largely reliant upon vendors or other community members responding to these 
issues and sending back their patches. We also unfortunately do not have 
advance embargoed notice of security issues (apart from employees of some 
vendors who are themselves bound not to discuss those embargoed issues) so we 
can only react when they are publicly announced.

I realise this is not a great answer. However until we have someone who is 
willing to step up and institute a more rigorous process for handling security 
updates, particularly for layers outside of the core that the Yocto Project 
maintains, that is where things stand.

FYI there is an alternative if you are working on something where you need 
updated recipes faster - it's pretty easy to add the updated recipes to your 
own layer on top of the OE/Yocto provided ones (or add a bbappend to apply the 
patch), and a little less messy than for example forking the original layer 
and applying the patch there. The only issue is you have to remember to remove 
it later, otherwise when the time comes that we move beyond that update you 
will still be building that same version (less of an issue with the bbappend, 
because that.

Kind regards,
Paul

-- 

Paul Eggleton
Intel Open Source Technology Centre


More information about the yocto-security mailing list