1 |
Excerpts from Calum's message of Sun Sep 26 19:28:01 +0200 2010: |
2 |
> On 26 September 2010 11:31, Richard Freeman <rich0@g.o> wrote: |
3 |
> > Gentoo has been vulnerable to a highly-publicized (Guardian, Slashdot, |
4 |
> > the works) local privilege escalation for almost two weeks now. (Well, |
5 |
> > it has been vulnerable for years, but of course we didn't know about it |
6 |
> > until two weeks ago.) |
7 |
> > |
8 |
> > In the bugzilla thread tracking the problem it has been mentioned a few |
9 |
> > times that the kernel does not receive GLSA support: |
10 |
> > http://bugs.gentoo.org/show_bug.cgi?id=337645 |
11 |
> |
12 |
> Kernels used to be covered in GLSAs. |
13 |
> I mourned the loss of kernel GLSAs quite a while back. |
14 |
> http://blog.gmane.org/gmane.linux.gentoo.security/month=20070401 |
15 |
|
16 |
I kindly request follow-up posters to not post +1's in this thread. |
17 |
|
18 |
> […] |
19 |
> I still don't understand why there isn't a single security alert point |
20 |
> of reference that covers everything on a Gentoo box though. |
21 |
> What would it take to get kernels included again? |
22 |
|
23 |
Kernel sources will not be included in the GLSA system again. |
24 |
The whole process was designed for userland packages, not kernel |
25 |
sources. |
26 |
|
27 |
We hope to get the kernel-check [1] utility to serve this purpose one |
28 |
day. |
29 |
|
30 |
The invitation Kurt extended to contact us and help is still standing. |
31 |
|
32 |
[1] |
33 |
http://git.overlays.gentoo.org/gitweb/?p=proj/kernel-check.git;a=summary |
34 |
-- |
35 |
Alex Legler <a3li@g.o> |
36 |
Gentoo Security/Ruby |