Gentoo Archives: gentoo-security

From: William Kenworthy <billk@×××××××××.au>
To: Matt Hallmark <matt@×××××××××××××.com>
Cc: gentoo-security@l.g.o
Subject: Re: [gentoo-security] courier-imap
Date: Sat, 27 Mar 2004 01:57:09
Message-Id: 1080352048.7842.2.camel@rattus.Localdomain
In Reply to: Re: [gentoo-security] courier-imap by Matt Hallmark
1 appears its got a way to go yet: it warms on xfree and a number of other
2 packages that have been updated to the secure versions, so dont rely on
3 it yet! I worry that if its reporting packages that have been fixed,
4 what is it missing? However, its early days yet and maybe the next
5 version will improve.
6
7 BillK
8
9 On Fri, 2004-03-26 at 23:09, Matt Hallmark wrote:
10 > As someone interested in these happenings, I might point you at the most
11 > recent Gentoo Weekly Newsletter.
12 >
13 > http://www.gentoo.org/news/en/gwn/20040322-newsletter.xml
14 >
15 > In it glsa-check is mentioned as a new means to identify security issues
16 > in gentoo. It'll eventually me merged into emerge (heh) in the future.
17 >
18 > This doesn't do us much good if the issue is never declared as a GLSA
19 > though, which seems to be Ben's main problem here.
20 >
21 > Matt Hallmark
22 >
23 > Ben Cressey wrote:
24 >
25 > > Kurt Lieber wrote:
26 > >
27 > >>This would only be done in the most extreme cases, of which this is not
28 > >>one.
29 > >
30 > >
31 > > That policy makes sense, I admit. I'm not trying to blow this out of
32 > > proportion (and I notice that the new courier-imap ebuild is available in
33 > > stable at the moment), just trying to realign my assumptions about gentoo
34 > > and security with the reality of the process.
35 > >
36 > > I've been giving it some thought this morning, and I have a question. Would
37 > > it be feasible to add architecture-specific "security" keywords, such as
38 > > +x86 alongside ~x86 and x86? +x86 would have the following differences over
39 > > mainline x86:
40 > >
41 > > 1) Any ebuild with a known security flaw would be removed immediately.
42 > > 2) Old ebuilds would never "age out" of this keyword.
43 > >
44 > > Users could then set this keyword instead of the default x86, and could run
45 > > emerge with a "--securityupdate" option that would only suggest upgrading
46 > > packages that were installed and no longer part of +x86.
47 > >
48 > > Point #2 seems to be the most problematic, simply because older ebuilds are
49 > > routinely deleted as the portage tree is updated and new versions become
50 > > available. Two solutions come to mind for this difficulty:
51 > >
52 > > 1) A "stub" of the old ebuild could be left in portage; this ebuild would
53 > > not be enough to install the package, but would have the minimum set of
54 > > information required to act as a valid ebuild for that version, for the
55 > > purposes of the emerge --securityupdate check.
56 > >
57 > > 2) Alternatively, users with the +x86 keyword set would not have old ebuilds
58 > > deleted from their portage tree during the rsync process.
59 > >
60 > > The difficulty with point #2 would be that package maintainers would have no
61 > > way to go back and remove the +x86 keyword from an old version of the ebuild
62 > > if that ebuild was no longer in portage. The problem with #1 seems to be
63 > > that the number of ebuilds in the portage tree would continue to grow over
64 > > time, and if a vulnerability was found, maintainers would potentially have
65 > > dozens of old ebuilds to remove from +x86. #2 is probably the best
66 > > approach, if the difficulty can be overcome.
67 > >
68 > > Perhaps a "security.mask" could be added alongside package.mask, and older,
69 > > out of tree versions of ebuilds affected by a security vulnerability could
70 > > be masked from +x86 that way.
71 > >
72 > > Ben
73 > >
74 > >
75 > > --
76 > > gentoo-security@g.o mailing list
77 > >
78 >
79 > --
80 > gentoo-security@g.o mailing list
81 >
82 >
83
84
85 --
86 gentoo-security@g.o mailing list

Replies

Subject Author
Re: [gentoo-security] courier-imap Paul de Vrieze <pauldv@g.o>