From: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
To: buildroot@busybox.net
Subject: [Buildroot] Buildroot LTS?
Date: Fri, 6 Nov 2015 16:50:46 +0100 [thread overview]
Message-ID: <20151106165046.0fd56197@free-electrons.com> (raw)
In-Reply-To: <563CC8D3.1010202@zacarias.com.ar>
Hello,
On Fri, 6 Nov 2015 12:35:47 -0300, Gustavo Zacarias wrote:
> A bit late to the talk, but still relevant i think.
> I think this is the biggest issue, at least for me it doesn't sound too
> interesting, i generally live with the bleeding-edge (master), and
> recommend people to use the latest release or master.
Right, but it's very often not do-able to real-life projects/products.
I gave a Buildroot training this week for a company, and they are stuck
with Buildroot 2012.05. No BR2_EXTERNAL, no dependency graph, no legal
info, none of the goodness we've added over the last 3 years. And of
course, almost no security updates (though they fixed some of the big
ones).
> Security bumps are, in general, well tagged with i think my defacto
> standard:
>
> $ git log --grep="security bump"|grep Author|sort|uniq
> Author: Baruch Siach <xxx>
> Author: Bernd Kuhls <xxx>
> Author: Gustavo Zacarias <xxx>
> Author: J?rg Krause <xxx>
> Author: Peter Korsgaard <xxx>
> Author: Yann E. MORIN <xxx>
>
> That being said it's just a first step towards LTS releases.
> Though some other security fixes might sneak-in via regular bumps
> without being tagged or looking close enough at the release notes.
Yes, but to me very much like how current package bumps are done, those
LTS releases could simply be based on feedback/contribution. In those
LTS releases, we do not guarantee that *all* packages have been fixed
for *all* known security problems. We only releases an updated
Buildroot which has fixes for the security issues which were reported
to the Buildroot community and for which patches were submitted.
Basically, it's just to avoid having everybody duplicating the same
work, and have a central place to push the security fixes.
> With some previous experience with these things it depends very much on
> the package and how long-term the release support window is to choose if
> it's best to patch or bump.
> And also what would constitute grounds for a release? One security fix?
> If it's periodic it might be too late for a security fix, hence possibly
> some cumulative periodic release plus some way of notifying when patches
> are applied (separate ML? rss feed? users checking the git repo?).
I don't think it's needed to have a super strict policy on this. We
could act a bit like the LTS kernel releases: release from time to
time, unless there is some kind of urgent/major security issue, in
which case you can do a release sooner.
Thomas
--
Thomas Petazzoni, CTO, Free Electrons
Embedded Linux, Kernel and Android engineering
http://free-electrons.com
prev parent reply other threads:[~2015-11-06 15:50 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-10-30 9:22 [Buildroot] Buildroot LTS? Chris Simmonds
2015-10-30 13:58 ` Thomas Petazzoni
2015-10-30 16:14 ` Arnout Vandecappelle
2015-10-31 9:01 ` Peter Korsgaard
2015-11-06 15:35 ` Gustavo Zacarias
2015-11-06 15:50 ` Thomas Petazzoni [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20151106165046.0fd56197@free-electrons.com \
--to=thomas.petazzoni@free-electrons.com \
--cc=buildroot@busybox.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox