1 |
<snip> |
2 |
> The package was masked due to a miscommunication with the Gentoo |
3 |
> Security project. |
4 |
> |
5 |
> While it is true that the way opentmpfiles is currently implemented |
6 |
> allows for certain races, from the security point of view, you always |
7 |
> have to classify the vulnerability in context of your threat model |
8 |
> because security depends on multiple layers (onion model). |
9 |
<snip> |
10 |
|
11 |
I would like to respectfully point out that this makes |
12 |
|
13 |
1) either the severity assignment of this bug by the Security project as B1 wrong (i.e. it should have been classified "harmless") |
14 |
|
15 |
2) or the entire classification of severity levels according to the Security project pointless (i.e. you can't base any actions on them because a mystery onion needs to be taken into account). |
16 |
|
17 |
https://www.gentoo.org/support/security/vulnerability-treatment-policy.html |
18 |
|
19 |
-- |
20 |
Andreas K. Hüttel |
21 |
dilfridge@g.o |
22 |
Gentoo Linux developer |
23 |
(council, toolchain, base-system, perl, libreoffice) |