123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214 |
- .. SPDX-License-Identifier: CC-BY-SA-2.0-UK
- Checking for Vulnerabilities
- ****************************
- Vulnerabilities in Poky and OE-Core
- ===================================
- The Yocto Project has an infrastructure to track and address unfixed
- known security vulnerabilities, as tracked by the public
- :wikipedia:`Common Vulnerabilities and Exposures (CVE) <Common_Vulnerabilities_and_Exposures>`
- database.
- The Yocto Project maintains a `list of known vulnerabilities
- <https://autobuilder.yocto.io/pub/non-release/patchmetrics/>`__
- for packages in Poky and OE-Core, tracking the evolution of the number of
- unpatched CVEs and the status of patches. Such information is available for
- the current development version and for each supported release.
- Security is a process, not a product, and thus at any time, a number of security
- issues may be impacting Poky and OE-Core. It is up to the maintainers, users,
- contributors and anyone interested in the issues to investigate and possibly fix them by
- updating software components to newer versions or by applying patches to address them.
- It is recommended to work with Poky and OE-Core upstream maintainers and submit
- patches to fix them, see ":ref:`dev-manual/changes:submitting a change to the yocto project`" for details.
- Vulnerability check at build time
- =================================
- To enable a check for CVE security vulnerabilities using :ref:`cve-check <ref-classes-cve-check>` in the specific image
- or target you are building, add the following setting to your configuration::
- INHERIT += "cve-check"
- The CVE database contains some old incomplete entries which have been
- deemed not to impact Poky or OE-Core. These CVE entries can be excluded from the
- check using build configuration::
- include conf/distro/include/cve-extra-exclusions.inc
- With this CVE check enabled, BitBake build will try to map each compiled software component
- recipe name and version information to the CVE database and generate recipe and
- image specific reports. These reports will contain:
- - metadata about the software component like names and versions
- - metadata about the CVE issue such as description and NVD link
- - for each software component, a list of CVEs which are possibly impacting this version
- - status of each CVE: ``Patched``, ``Unpatched`` or ``Ignored``
- The status ``Patched`` means that a patch file to address the security issue has been
- applied. ``Unpatched`` status means that no patches to address the issue have been
- applied and that the issue needs to be investigated. ``Ignored`` means that after
- analysis, it has been deemed to ignore the issue as it for example affects
- the software component on a different operating system platform.
- After a build with CVE check enabled, reports for each compiled source recipe will be
- found in ``build/tmp/deploy/cve``.
- For example the CVE check report for the ``flex-native`` recipe looks like::
- $ cat poky/build/tmp/deploy/cve/flex-native
- LAYER: meta
- PACKAGE NAME: flex-native
- PACKAGE VERSION: 2.6.4
- CVE: CVE-2016-6354
- CVE STATUS: Patched
- CVE SUMMARY: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
- CVSS v2 BASE SCORE: 7.5
- CVSS v3 BASE SCORE: 9.8
- VECTOR: NETWORK
- MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2016-6354
- LAYER: meta
- PACKAGE NAME: flex-native
- PACKAGE VERSION: 2.6.4
- CVE: CVE-2019-6293
- CVE STATUS: Ignored
- CVE SUMMARY: An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service.
- CVSS v2 BASE SCORE: 4.3
- CVSS v3 BASE SCORE: 5.5
- VECTOR: NETWORK
- MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2019-6293
- For images, a summary of all recipes included in the image and their CVEs is also
- generated in textual and JSON formats. These ``.cve`` and ``.json`` reports can be found
- in the ``tmp/deploy/images`` directory for each compiled image.
- At build time CVE check will also throw warnings about ``Unpatched`` CVEs::
- WARNING: flex-2.6.4-r0 do_cve_check: Found unpatched CVE (CVE-2019-6293), for more information check /poky/build/tmp/work/core2-64-poky-linux/flex/2.6.4-r0/temp/cve.log
- WARNING: libarchive-3.5.1-r0 do_cve_check: Found unpatched CVE (CVE-2021-36976), for more information check /poky/build/tmp/work/core2-64-poky-linux/libarchive/3.5.1-r0/temp/cve.log
- It is also possible to check the CVE status of individual packages as follows::
- bitbake -c cve_check flex libarchive
- Fixing CVE product name and version mappings
- ============================================
- By default, :ref:`cve-check <ref-classes-cve-check>` uses the recipe name :term:`BPN` as CVE
- product name when querying the CVE database. If this mapping contains false positives, e.g.
- some reported CVEs are not for the software component in question, or false negatives like
- some CVEs are not found to impact the recipe when they should, then the problems can be
- in the recipe name to CVE product mapping. These mapping issues can be fixed by setting
- the :term:`CVE_PRODUCT` variable inside the recipe. This defines the name of the software component in the
- upstream `NIST CVE database <https://nvd.nist.gov/>`__.
- The variable supports using vendor and product names like this::
- CVE_PRODUCT = "flex_project:flex"
- In this example the vendor name used in the CVE database is ``flex_project`` and the
- product is ``flex``. With this setting the ``flex`` recipe only maps to this specific
- product and not products from other vendors with same name ``flex``.
- Similarly, when the recipe version :term:`PV` is not compatible with software versions used by
- the upstream software component releases and the CVE database, these can be fixed using
- the :term:`CVE_VERSION` variable.
- Note that if the CVE entries in the NVD database contain bugs or have missing or incomplete
- information, it is recommended to fix the information there directly instead of working
- around the issues possibly for a long time in Poky and OE-Core side recipes. Feedback to
- NVD about CVE entries can be provided through the `NVD contact form <https://nvd.nist.gov/info/contact-form>`__.
- Fixing vulnerabilities in recipes
- =================================
- If a CVE security issue impacts a software component, it can be fixed by updating to a newer
- version of the software component or by applying a patch. For Poky and OE-Core master branches, updating
- to a newer software component release with fixes is the best option, but patches can be applied
- if releases are not yet available.
- For stable branches, it is preferred to apply patches for the issues. For some software
- components minor version updates can also be applied if they are backwards compatible.
- Here is an example of fixing CVE security issues with patch files,
- an example from the :oe_layerindex:`ffmpeg recipe</layerindex/recipe/47350>`::
- SRC_URI = "https://www.ffmpeg.org/releases/${BP}.tar.xz \
- file://0001-libavutil-include-assembly-with-full-path-from-sourc.patch \
- file://fix-CVE-2020-20446.patch \
- file://fix-CVE-2020-20453.patch \
- file://fix-CVE-2020-22015.patch \
- file://fix-CVE-2020-22021.patch \
- file://fix-CVE-2020-22033-CVE-2020-22019.patch \
- file://fix-CVE-2021-33815.patch \
- A good practice is to include the CVE identifier in both the patch file name
- and inside the patch file commit message using the format::
- CVE: CVE-2020-22033
- CVE checker will then capture this information and change the CVE status to ``Patched``
- in the generated reports.
- If analysis shows that the CVE issue does not impact the recipe due to configuration, platform,
- version or other reasons, the CVE can be marked as ``Ignored`` using the :term:`CVE_CHECK_IGNORE` variable.
- As mentioned previously, if data in the CVE database is wrong, it is recommend to fix those
- issues in the CVE database directly.
- Recipes can be completely skipped by CVE check by including the recipe name in
- the :term:`CVE_CHECK_SKIP_RECIPE` variable.
- Implementation details
- ======================
- Here's what the :ref:`cve-check <ref-classes-cve-check>` class does to
- find unpatched CVE IDs.
- First the code goes through each patch file provided by a recipe. If a valid CVE ID
- is found in the name of the file, the corresponding CVE is considered as patched.
- Don't forget that if multiple CVE IDs are found in the filename, only the last
- one is considered. Then, the code looks for ``CVE: CVE-ID`` lines in the patch
- file. The found CVE IDs are also considered as patched.
- Then, the code looks up all the CVE IDs in the NIST database for all the
- products defined in :term:`CVE_PRODUCT`. Then, for each found CVE:
- - If the package name (:term:`PN`) is part of
- :term:`CVE_CHECK_SKIP_RECIPE`, it is considered as ``Patched``.
- - If the CVE ID is part of :term:`CVE_CHECK_IGNORE`, it is
- set as ``Ignored``.
- - If the CVE ID is part of the patched CVE for the recipe, it is
- already considered as ``Patched``.
- - Otherwise, the code checks whether the recipe version (:term:`PV`)
- is within the range of versions impacted by the CVE. If so, the CVE
- is considered as ``Unpatched``.
- The CVE database is stored in :term:`DL_DIR` and can be inspected using
- ``sqlite3`` command as follows::
- sqlite3 downloads/CVE_CHECK/nvdcve_1.1.db .dump | grep CVE-2021-37462
- When analyzing CVEs, it is recommended to:
- - study the latest information in `CVE database <https://nvd.nist.gov/vuln/search>`__.
- - check how upstream developers of the software component addressed the issue, e.g.
- what patch was applied, which upstream release contains the fix.
- - check what other Linux distributions like `Debian <https://security-tracker.debian.org/tracker/>`__
- did to analyze and address the issue.
- - follow security notices from other Linux distributions.
- - follow public `open source security mailing lists <https://oss-security.openwall.org/wiki/mailing-lists>`__ for
- discussions and advance notifications of CVE bugs and software releases with fixes.
|