1 |
appears its got a way to go yet: it warms on xfree and a number of other |
2 |
packages that have been updated to the secure versions, so dont rely on |
3 |
it yet! I worry that if its reporting packages that have been fixed, |
4 |
what is it missing? However, its early days yet and maybe the next |
5 |
version will improve. |
6 |
|
7 |
BillK |
8 |
|
9 |
On Fri, 2004-03-26 at 23:09, Matt Hallmark wrote: |
10 |
> As someone interested in these happenings, I might point you at the most |
11 |
> recent Gentoo Weekly Newsletter. |
12 |
> |
13 |
> http://www.gentoo.org/news/en/gwn/20040322-newsletter.xml |
14 |
> |
15 |
> In it glsa-check is mentioned as a new means to identify security issues |
16 |
> in gentoo. It'll eventually me merged into emerge (heh) in the future. |
17 |
> |
18 |
> This doesn't do us much good if the issue is never declared as a GLSA |
19 |
> though, which seems to be Ben's main problem here. |
20 |
> |
21 |
> Matt Hallmark |
22 |
> |
23 |
> Ben Cressey wrote: |
24 |
> |
25 |
> > Kurt Lieber wrote: |
26 |
> > |
27 |
> >>This would only be done in the most extreme cases, of which this is not |
28 |
> >>one. |
29 |
> > |
30 |
> > |
31 |
> > That policy makes sense, I admit. I'm not trying to blow this out of |
32 |
> > proportion (and I notice that the new courier-imap ebuild is available in |
33 |
> > stable at the moment), just trying to realign my assumptions about gentoo |
34 |
> > and security with the reality of the process. |
35 |
> > |
36 |
> > I've been giving it some thought this morning, and I have a question. Would |
37 |
> > it be feasible to add architecture-specific "security" keywords, such as |
38 |
> > +x86 alongside ~x86 and x86? +x86 would have the following differences over |
39 |
> > mainline x86: |
40 |
> > |
41 |
> > 1) Any ebuild with a known security flaw would be removed immediately. |
42 |
> > 2) Old ebuilds would never "age out" of this keyword. |
43 |
> > |
44 |
> > Users could then set this keyword instead of the default x86, and could run |
45 |
> > emerge with a "--securityupdate" option that would only suggest upgrading |
46 |
> > packages that were installed and no longer part of +x86. |
47 |
> > |
48 |
> > Point #2 seems to be the most problematic, simply because older ebuilds are |
49 |
> > routinely deleted as the portage tree is updated and new versions become |
50 |
> > available. Two solutions come to mind for this difficulty: |
51 |
> > |
52 |
> > 1) A "stub" of the old ebuild could be left in portage; this ebuild would |
53 |
> > not be enough to install the package, but would have the minimum set of |
54 |
> > information required to act as a valid ebuild for that version, for the |
55 |
> > purposes of the emerge --securityupdate check. |
56 |
> > |
57 |
> > 2) Alternatively, users with the +x86 keyword set would not have old ebuilds |
58 |
> > deleted from their portage tree during the rsync process. |
59 |
> > |
60 |
> > The difficulty with point #2 would be that package maintainers would have no |
61 |
> > way to go back and remove the +x86 keyword from an old version of the ebuild |
62 |
> > if that ebuild was no longer in portage. The problem with #1 seems to be |
63 |
> > that the number of ebuilds in the portage tree would continue to grow over |
64 |
> > time, and if a vulnerability was found, maintainers would potentially have |
65 |
> > dozens of old ebuilds to remove from +x86. #2 is probably the best |
66 |
> > approach, if the difficulty can be overcome. |
67 |
> > |
68 |
> > Perhaps a "security.mask" could be added alongside package.mask, and older, |
69 |
> > out of tree versions of ebuilds affected by a security vulnerability could |
70 |
> > be masked from +x86 that way. |
71 |
> > |
72 |
> > Ben |
73 |
> > |
74 |
> > |
75 |
> > -- |
76 |
> > gentoo-security@g.o mailing list |
77 |
> > |
78 |
> |
79 |
> -- |
80 |
> gentoo-security@g.o mailing list |
81 |
> |
82 |
> |
83 |
|
84 |
|
85 |
-- |
86 |
gentoo-security@g.o mailing list |