This Yocto layer provides scripts for image manifest generation used for security monitoring and notification as part of the Timesys Vigiles product offering.
Vigiles is a vulnerability management tool that provides build-time Yocto CVE Analysis of target images. It does this by collecting metadata about packages to be installed and uploading it to be compared against the Timesys CVE database.A high-level overview of the detected vulnerabilities is returned and a full detailed analysis can be viewed online.
Register (free) and download the API key to access the full feature set based on Vigiles Basic, Plus or Prime: https://linuxlink.timesys.com/docs/wiki/engineering/LinuxLink_Key_File
A BitBake build environment is required for the Vigiles CVE Scanner to evaluate the potential risk of a target system.
The fastest way to use the Vigiles CVE Scanner is to integrate it into your existing BSP (clone alongside other layers, add to bblayers.conf).
If you do not already have an environment configured, please use the following to boot-strap a minimal setup.
https://docs.yoctoproject.org/dev/ref-manual/system-requirements.html#system-requirements
git clone git://git.yoctoproject.org/poky.git
git clone https://github.com/TimesysGit/meta-timesys.git
source poky/oe-init-build-env
Follow format of the file, just add meta-timesys after the default poky/meta, etc.
BBLAYERS += "${TOPDIR}/../meta-timesys"
INHERIT += "vigiles"
When you build any image, the Vigiles CVE Scanner will execute automatically:
bitbake core-image-minimal
An overview will be printed to the console after the check is complete and a persistent local summary will be created in the vigiles/<image name>/ directory for that build. A symlink is created to the latest report at vigiles/<image name>-report.txt:
$ readlink vigiles/core-image-minimal-report.txt
core-image-minimal/core-image-minimal-2019-06-07_19.22.40-report.txt
The output will differ based on whether you are running with a LinuxLink subscription or in Demo Mode.
Vigiles: Requesting image analysis from LinuxLink ...
-- Vigiles CVE Report --
View detailed online report at:
https://linuxlink.timesys.com/cves/reports/ODUzOA.D9xLIQ.KKiK2E76n---q6_-KmJrsZ9ap9Y
Unfixed: 62 (0 RFS, 60 Kernel, 2 Toolchain)
Unfixed, Patch Available: 7 (2 RFS, 0 Kernel, 5 Toolchain)
Fixed: 0 (0 RFS, 0 Kernel, 0 Toolchain)
High CVSS: 30 (2 RFS, 24 Kernel, 4 Toolchain)
Local summary written to:
vigiles/core-image-minimal/core-image-minimal-2019-06-07_19.22.40-report.txt
-- Vigiles Demo Mode Notice --
No API keyfile was found, or the contents were invalid.
Please see this document for API key information:
https://linuxlink.timesys.com/docs/wiki/engineering/LinuxLink_Key_File
The script will continue in demo mode, which will link you to temporarily available online results only.
You will need to login or register for a free account in order to see the report.
For more information on the security notification service, please visit:
https://www.timesys.com/security/vulnerability-patch-notification/
Vigiles: Requesting image analysis from LinuxLink ...
-- Vigiles CVE Report --
Complete online report at:
https://linuxlink.timesys.com/cves/reports/ODUyMA.D9wwnQ.9MTUnSVk6Xi-Q1kO0ea--e4wVJ4
NOTE: Running in Demo Mode will cause this URL to expire after one day.
-- Vigiles CVE Overview --
Unfixed: 62
Unfixed, Patch Available: 7
Fixed: 0
CPU: 0
Local summary written to:
vigiles/core-image-minimal/core-image-minimal-2019-06-07_17.29.31-report.txt
A CVE summary is printed in both Subscription and Demo modes and contains the following.
-
"Unfixed" CVEs are existing CVEs that have been reported against packages to be installed.
-
"Patch Available" CVEs have a fix available in the meta-timesys-security layer. If the layer is already included, then you may need to update your copy.
-
"Fixed" CVEs are those that originally existed in packages to be installed, but have been fixed/mitigated by subsequent patches.
-
"CPU" CVEs are filed against the hardware. They may be fixed or mitigated in other components such as the kernel or compiler.
-
"High CVSS" (Subscription Mode Only) CVEs are those that are of utmost priority and require immediate attention, based on their Common Vulnerability Scoring System (v3) ranking.
Additionally, in Subscription Mode, the distribution of the vulnerabilities across system components will be displayed.
The Vigiles CVE online report specified in the output provides a dashboard interface for examining all known details about each CVE detected, including the affected version ranges, priority and existing mitigations.
In both operating modes, the local summary will include the console output as well as descriptive information about the report instance. In Subscription Mode, additional information is included about each CVE that the scan detects, as well as any fixes that have been applied. This is an example from the reports generated above.
-- Recipe CVEs --
Recipe: glibc
Version: 2.28
CVE ID: CVE-2019-9192
URL: https://nvd.nist.gov/vuln/detail/CVE-2019-9192
CVSSv3: 7.5
Vector: NETWORK
Status: Unfixed
Recipe: glibc
Version: 2.28
CVE ID: CVE-2016-10739
URL: https://nvd.nist.gov/vuln/detail/CVE-2016-10739
CVSSv3: 5.3
Vector: LOCAL
Status: Unfixed, Patch Available
Patched in meta-timesys-security commit(s):
* bfb9cf83582e4cffd6c9cdbadddc68302fa350cc
Recipe: linux-yocto
Version: 4.18.27
CVE ID: CVE-2019-9162
URL: https://nvd.nist.gov/vuln/detail/CVE-2019-9162
CVSSv3: 7.8
Vector: LOCAL
Status: Unfixed
The Vigiles CVE Scanner creates and sends a manifest describing your build to the LinuxLink Server. This manifest is located at
$ readlink vigiles/core-image-minimal-cve.json
core-image-minimal/core-image-minimal-2019-09-09_23.08.28-cve.json
In the event that something goes wrong, or if the results seem incorrect, this file may offer insight as to why. It's important to include this file with any support request.
By default, the Vigiles Manifest and CVE Report files are named after the base image that is built (from the Yocto variable "IMAGE_BASENAME"). This can be overridden with by setting the configuration variable "VIGILES_MANIFEST_NAME" in conf/local.conf:
VIGILES_MANIFEST_NAME = "Custom-Build-Name"
Instead of e.g.
./vigiles
├── core-image-minimal/
├── core-image-minimal-cve.json
└── core-image-minimal-report.txt
.. this will be the result:
./vigiles
├── Custom-Build-Name/
├── Custom-Build-Name-cve.json -> Custom-Build-Name/Custom-Build-Name-2020-11-25_20.28.09-cve.json
└── Custom-Build-Name-report.txt -> Custom-Build-Name/Custom-Build-Name-2020-11-25_20.28.09-report.txt
"Whitelist" Recipes and CVEs are listed in the "VIGILES_WHITELIST" variable. They are NOT included in the report.
The Whitelist can be adjusted in conf/local.conf by appending VIGILES_WHITELIST:
VIGILES_WHITELIST += "\
CVE-1234-ABCD \
"
The Vigiles CVE Scanner can be configured to upload a Linux Kernel .config file to LinuxLink along with the image manifest. This filter will reduce the number of kernel CVEs reported by removing those related to features which are not being built for your kernel. There are 2 ways to enable this feature -- Automatic Detection or Manual Specification
- Automatic Detection
This will use the .config for the kernel specified in PREFERRED_PROVIDER_virtual/kernel
once the yocto task do_configure
is executed.
VIGILES_KERNEL_CONFIG = "auto"
- Manual Specification
NOTE: This must be a full kernel config, not a defconfig!
VIGILES_KERNEL_CONFIG = "/projects/kernel/linux-4.14-ts+imx-1.0/.config"
The Vigiles CVE Scanner can be configured to upload a U-Boot .config file to LinuxLink along with the image manifest. This filter will reduce the number of U-Boot CVEs reported by removing those related to features which are not being built for your U-Boot. There are 2 ways to enable this feature -- Automatic Detection or Manual Specification
- Automatic Detection
This will use the .config for the U-Boot specified in PREFERRED_PROVIDER_virtual/bootloader
once the Yocto task do_configure
is executed.
VIGILES_UBOOT_CONFIG = "auto"
- Manual Specification
NOTE: This must be a full U-Boot config, not a defconfig!
VIGILES_UBOOT_CONFIG = "</projects/uboot/uboot-2020.04/.config>"
Full CVE reporting requires a LinuxLink License Key, though the Vigiles CVE Scanner will still execute in Demo Mode and produce an abbreviated report if one is not configured.
To use an alternate key, or a key in a non-default location, you can specify the location in conf/local.conf with a statement like the following:
VIGILES_KEY_FILE = "/tools/timesys/linuxlink_key"
If set, this option can be overridden on the command line by setting the environment variable VIGILES_KEY_FILE to the location of an alternate Key File. This feature can be used by developers to use a personal/local key without having to change a shared local.conf for a board.
By default your manifest will be uploaded to the top-level folder of your "Private Workspace" Product on the Vigiles Dashboard. This can be changed by downloading the "Dashboard Config" for an alternative Product and/or Folder and specifying it in your local.conf file.
If set, this option can be overridden on the command line by setting the environment variable VIGILES_DASHBOARD_CONFIG to the location of an alternate Dashboard Config file. This feature can be used by developers to use a personal/local key without having to change a shared local.conf for a board.
New Products can be defined by clicking on the "New Product" product link and specifying a name. To download the Dashboard Config for the top-level folder of that Product, click on the "Product Settings" link and you will see a preview of the dashboard config file. You can copy the contents and create the file for yourself or choose to download it with the buttons on the right.
Once a new product is created, sub-folders may be created by clicking on the "Create Folder" and specifying a name. The Dashboard Config for that Folder (in that Product) may be downloaded by first clicking on/opening the Folder, then clicking the "Folder Settings" link and choosing to copy or download the config for that folder.
Dashboard Config files will be downloaded by default to e.g. "${HOME}/Downloads/<product name>_<folder name>_dashboard_config"
. Once moving and/or renaming it as necessary, you can control the behavior of Vigiles with meta-timesys by modifying conf/local.conf
to set the appropriate variable:
VIGILES_DASHBOARD_CONFIG = "${HOME}/timesys/dashboard_config"
If a Dashboard Config is used, a subfolder name can be specified for dynamic folder creation. Manifests will be uploaded to a subfolder with this name within the location specified in the Dashbord Config. If one does not exist, it will be created. This option will be overridden by the environment variable VIGILES_SUBFOLDER_NAME
. You can control the behavior of Vigiles with meta-timesys by modifying conf/local.conf
to set the appropriate variable:
VIGILES_SUBFOLDER_NAME = "Release X.x"
In some cases, a BSP may want to include packages that are built outside of
the Bitbake/Yocto process. If this is required, VIGILES_EXTRA_PACKAGES
may be used to specify one or more CSV (comma-separated-value) files that
describe the extra packages to include in the CVE check.
For example, one may set this in their local.conf:
VIGILES_EXTRA_PACKAGES = "${HOME}/projects/this-bsp/non-yocto/yocto-extra.csv"
or perhaps:
VIGILES_EXTRA_PACKAGES = " \
${HOME}/projects/this-bsp/non-yocto/yocto-extra-boot.csv \
${HOME}/projects/this-bsp/non-yocto/yocto-extra-ui.csv \
"
The CSV files consist of an optional header and the following fields:
- Product - the CPE Name that packages use in CVEs
- (optional) Version - the version of the package used.
- (optional) License - the license of the package used
The following example shows the accepted syntax for expressing extra packages:
$ cat yocto-extra.csv
product,version,license
avahi,0.6
bash,4.0
bash,4.1,GPL 3.0
busybox,
udev,,"GPLv2.0+, LGPL-2.1+"
In some cases, a BSP may want to exclude packages from the Vigiles Report; for instance to condense the output by removing packages that are 'installed' but have no files (e.g. packagegroups or those that only install data files).
This can be done by setting VIGILES_EXCLUDE
to a space-separated list
of one or more CSV files that contain a list of packages to drop from the
generated manifest before it is submitted for the CVE check.
For example, in conf/local.conf
:
VIGILES_EXCLUDE = "${TOPDIR}/vigiles-exclude.csv"
And in ${TOPDIR}/vigiles-exclude.csv
:
linux-libc-headers
opkg-utils
packagegroup-core-boot
Note: filtering of packages is performed as the final step in constructing the manifest, after any additional packages are included.
In some cases, it may be desired to upload the Vigiles Manifest for a build without generating a CVE Report. This can speed up build times and ease reporting of automated bulk builds.
This behavior can be enabled by setting the boolean variable
VIGILES_UPLOAD_ONLY
to '1' or 'True' in conf/local.conf
VIGILES_UPLOAD_ONLY = "1"
Instead of a text report and a link to the online report, a link to the Vigiles Dashboard Product Workspace (as specified with VIGILES_DASHBOARD_CONFIG) will be displayed, from where it can be then be scanned by the Vigiles Service.
Packages that have a closed license are included in the SBOM by default.
To exclude these packages, set VIGILES_INCLUDE_CLOSED_LICENSES
to "0" or "False" in conf/local.conf
.
VIGILES_INCLUDE_CLOSED_LICENSES = "0"
SBOM and report generation for the initramfs image can be disabled in local conf. Both Initramfs SBOM and report are generated by default if INITRAMFS_IMAGE is set.
To disable initramfs SBOM generation set VIGILES_DISABLE_INITRAMFS_SBOM = "1"
Note: If Generating initramfs SBOM is disabled it will disable initramfs report generation by default.
VIGILES_DISABLE_INITRAMFS_SBOM = "1"
To disable initramfs report generation only, set VIGILES_DISABLE_INITRAMFS_REPORT = "1"
VIGILES_DISABLE_INITRAMFS_REPORT = "1"
The Vigiles CVE Scanner and meta-timesys are maintained by The Timesys Security team.
For Updates, Support and More Information, please see:
and