On Tuesday 07 January 2014 21:04:28 Samuel Damashek wrote: > At the moment, we don't have an accepted and documented way to handle > Kernel CVEs. Right now, they're just being filed and then maybe being > resolved when upstream commits a patch. > > I believe we need some way of judging priority and severity of kernel > vulnerabilities to improve bug handling and make sure that we stay > up-to-date with current patches being released. Linux kernel > development is very fast paced, so we should set up a clear system, > much like we have right now for packages in Portage, to facilitate the > filing and management of these bugs. > > I'm not really a kernel guy, but there are some things that I can > figure out and propose without knowing much about kernel internals. > First, we could classify priority (giving it a letter grade) by > considering whether the issue is in kernel code that is enabled by > default, or whether the user has to enable the vulnerable code in the > kernel config. We could also use the tilde (~) as a grade when the > vulnerable code is marked EXPERIMENTAL in the config, much like we do > for unstable packages. > > As far as severity goes, I think that severity would be similar to > what we have at the moment for packages, with maybe some minor > improvements to make the descriptions relevant. Priority and severity > could then be translated to an appropriate Whiteboard grade for better > tracking. > > We need to develop and agree on solid criteria so that bug wranglers > can classify security issues efficiently. > > Since the general workflow for handling kernel issues is report to > upstream -> patch -> patch included in next release, we can have three > statuses in the Whiteboard field to represent these. Just as a > proposal, those could be "upstream" and "patch", and then close the > bug as Resolved Fixed when the next version is released. An > alternative is to close the bug when the patch is committed to the > kernel repositories instead of when the next version is released. > > Something else to consider is whether GLSAs will be released after a > release is available. I have varying opinions on the matter, as while > the Kernel is not a part of Gentoo persay, it is still a security > issue that should be reported to users and spread for wide > distribution. I'm open to opinions on this matter. > > -- > Samuel Damashek
I filed this time ago: https://bugs.gentoo.org/show_bug.cgi?id=444149 Anyway for now, we just fast stabilize the versions that fix the privilege escalation especially when is out a known exploit. -- Agostino Sarubbo Gentoo Linux Developer