[Openembedded-architecture] Yocto post-release CVE and package uprev policy - openssl, ffmpeg, etc.
Martin Jansa
martin.jansa at gmail.com
Fri Jan 27 18:59:25 UTC 2017
On Fri, Jan 27, 2017 at 09:43:42AM -0800, Khem Raj wrote:
>
>
> On 1/26/17 8:04 PM, Paul Eggleton wrote:
> > On Thursday, 26 January 2017 3:10:57 PM NZDT Randy MacLeod wrote:
> >> Yocto seems to have a policy not to update packages once a
> >> release is generally available. I think that rule should be
> >> broken for certain packages that have been reviewed and tested
> >> properly.
> >
> > We have made exceptions in the past for exactly the reasons you outline.
> > Unfortunately I know at least for OpenSSL when we have done so on at least one
> > occasion we have been bitten by compatibility issues :(
> >
> > If we can introduce more rigorous runtime testing (and by that I don't just
> > mean tests for the package itself - runtime tests for functionality in other
> > applications that rely on that package would be preferred) then we would be in
> > a much better place. Being able to measure ABI compatibility is a good start
> > but doesn't cover any internal changes in behaviour that might be problematic.
> >
> >> See:
> >> https://bugzilla.yoctoproject.org/show_bug.cgi?id=10707
> >> for additional background.
> >>
> >> For some packages, the upstream development team fixes CVE and
> >> other bugs on their released version and by YP only cherry-picking back
> >> specific fixes, we expose users to additional risk and incur higher
> >> costs of maintenance.
> >>
> >> At least two packages that I know of have released
> >> "bug fix only" updates to fix CVEs and other defects for packages
> >> that are in morty:
> >>
> >> - openssl 1.0.2j -> 1.0.2k
> >> - ffmpeg 3.1.3 -> 3.1.5
> >>
> >> Should we continue to cherry-pick back only the CVEs fixes
> >> or should we review, test, and release the full minor release?
> >>
> >>
> >> I've done a review of openssl below but
> >> before I proceed with more evaluation or sending the
> >> uprev to the list for morty, I'd like to know if the upgrade
> >> policy will block such a change. From my analysis, there's only
> >> one change that seems like an upgrade blocker and I need help
> >> to evaluate that since I'm not an openssl maintainer.
>
> I think we can contexualize it based upon amount of work, openssl has
> violated ABI within same major release in past see 1.0.2f -> 1.0.2g
>
> For complete list
>
> https://abi-laboratory.pro/tracker/timeline/openssl/
And when the upstream didn't break the ABI, we did with seemingly safe
change of version-script.patch:
http://git.openembedded.org/openembedded-core/commit/?h=jethro&id=528541845df34843c14be5de62e9f53004d292ac
http://git.openembedded.org/openembedded-core/commit/?h=krogoth&id=08f85da10b3a7fc6165f163fd0f23784a2c9c8e4
So I agree that we should be very careful and make as few exceptions as
possible at least until there is strong testing for API/ABI
compatibility for release branches.
> We may use that as guiding light to make a decision for backporting CVEs
> or do a minor upgrade.
>
> >
> > I would say we're not hard-blocked by the policy - we can make exceptions, but
> > we really do need to be careful, and I don't think we're prepared to make a
> > continuing exception for specific packages yet. The better idea we can get
> > that there won't be regressions, hopefully in an automated or semi-automated
> > manner, the safer position we'll be in.
> >
> > Cheers,
> > Paul
> >
> _______________________________________________
> Openembedded-architecture mailing list
> Openembedded-architecture at lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-architecture
--
Martin 'JaMa' Jansa jabber: Martin.Jansa at gmail.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 195 bytes
Desc: Digital signature
URL: <http://lists.openembedded.org/pipermail/openembedded-architecture/attachments/20170127/c94b9a6f/attachment-0002.sig>
More information about the Openembedded-architecture
mailing list