CVE handling - how to maintain secure kernel for i.MX 6ULL over time?

取消
显示结果 
显示  仅  | 搜索替代 
您的意思是: 

CVE handling - how to maintain secure kernel for i.MX 6ULL over time?

559 次查看
astrand
Contributor I

With the upcoming EU RED 3(3)def and EN 18031 legislation, it is crucial to fix known vulnerabilites. How can this be done in practice for i.MX 6ULL based systems?

We are currently using v.LF5.15.71_2.2.0, which includes Yocto Kirkstone. However, kernel 5.15.71 has a number of security vulnerabilites: 2077 according to cvedetails.com. Patching all of them is hardly feasible, even if tools such as Vigiles is used. By using the latest kernel in this kernel series, the number of vulnerabilties is greatly reduced:  Latest 5.15 is 5.15.178 which "only" have 1019 known vulnerabilities (most probably with lower impact). Additionally, there are critical bug fixes as well. 

The 5.15 kernel series is maintained to December 2026, meaning that new releases will happen, which closes known vulnerabilities.

Unfortunately, as far as I understand, the linux-imx branch is in principle not updated with newer micro releases; 5.15.71 is still the latest one, even though 5.15.71 is ~2.5 years old. 

https://github.com/Freescale/linux-fslc/tree/5.15-2.2.x-imx is only slightly better, currently at 5.15.158.

Thus we are wondering: is it at all possible to achieve a secure i.MX 6ULL system, based on this BSP platform? Would you recommend the upstream, linux-fslc or linux-imx (BSP) kernel tree? Obviously, linux-fslc and upstream kernel have advantages in terms of security, but what is missing? 

0 项奖励
回复
1 回复

503 次查看
Manuel_Salas
NXP TechSupport
NXP TechSupport

Hello @astrand 

 

I hope you are doing very well.

Please refer to this repo to see the newer BSP version (6.6).

Actually, every quart of the year, NXP release a new BSP version, you can see it here.

 

Please take a look into this information.

 

Best regards,

Salas.

0 项奖励
回复