public inbox for gentoo-hardened@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Kevin F. Quinn" <kevquinn@gentoo.org>
To: gentoo-hardened@lists.gentoo.org
Subject: Re: [gentoo-hardened] security updates
Date: Sun, 11 Feb 2007 13:38:25 +0100	[thread overview]
Message-ID: <20070211133825.09a41e30@c1358217.kevquinn.com> (raw)
In-Reply-To: <20070210160237.GB5317@swordfish.capgemini.hu>

[-- Attachment #1: Type: text/plain, Size: 2955 bytes --]

On Sat, 10 Feb 2007 17:02:38 +0100
Nagy Gabor Peter <linux42@freemail.hu> wrote:

> Hi list,
> 
> I have a question:
> 
> Since I am new to gentoo, I don't know how security updates work.
> 
> I know Debian. In Debian if I have stable installed on a production
> server, I get regular security fixes, often backported from the
> current bleeding edge version, where upstream has fixed the bug to
> the version that Debian stable contains.

Where a security issue is identified in a package, all versions in the
tree are either bumped (patched, backported or otherwise) or removed
from the tree.

> I have noticed that in gentoo there are many versions of a package
> that are considered stable. Take glibc as an example, according to
> http://packages.gentoo.org/search/?sstring=glibc, on x86 there are 8
> versions available, all of them stable.

Yep; that's normal.  We don't force people to always go up to the
latest version of a package.  This is especially true for central
packages like glibc, which users may well prefer not to upgrade apart
from security fixes.  If you're building a new system, you might as well
use the latest (which is what you get unless you specifically ask for
something different).

> I have now two gentoo machines, one is going to be production, the
> other is used to get me a little bit more familiar with the system.
> 
> On the playground machine I have 2006.1 installed, glibc 2.4-r3
> On the production machine I have 2006.0, switched to hardened profile,
> and then recompile, there I have glibc 2.3.6-r5
> 
> I see now that glibc 2.4-r3 should be upgraded to 2.4-r4 (by the way,
> where can I check the differences (Changelog) between two gentoo
> versions (like r3 and r4)?)
> 
> So my question: If someone finds a bug in glibc that gets corrected,
> what does the gentoo maintainers do about it? Do they backport the fix
> in all 8 versions? Or just in some of the versions and mark the not
> fixed ones ~?

For serious security issues, all versions, stable and ~, should get
patched & bumped, or removed if they're not easily patched.  For other
bugs it depends on the severity of a bug.

> Is there some mailinglist (like debian-security-announce) where such
> security fixes are announced?

See the gentoo-announce mailing list, where all GLSA (Gentoo Linux
Security Advisories) are posted.

> What is the reason that the hardened profile selects the 2.3.6 version
> instead of the 2.4? I mean not in glibc's case only, but generally.

Our toolchain modifications for >=glibc-2.4 and gcc-4.1 aren't quite
ready yet.  I just have to resolve some significant test failures on
x86, then it should be good to go.

> Does libc 2.4 have troubles with ssp?

Not really, however SSP has changed significantly from gcc-3 to
gcc-4 - RedHat have re-implemented SSP and in the process changed its
behaviour in significant ways.

-- 
Kevin F. Quinn

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

  parent reply	other threads:[~2007-02-11 12:39 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-02-10 16:02 [gentoo-hardened] security updates Nagy Gabor Peter
2007-02-10 16:43 ` Tom Hendrikx
2007-02-10 17:02 ` John Schember
2007-02-10 18:21 ` Jean-Pierre Schwickerath
2007-02-11  2:17 ` Andrew Ross
2007-02-11 12:38 ` Kevin F. Quinn [this message]
  -- strict thread matches above, loose matches on Subject: below --
2010-01-21 12:19 [gentoo-hardened] Security updates Machell, Jonathan
2010-01-21 14:05 ` klondike
2010-01-21 14:06 ` Kerin Millar
2010-01-21 14:12 ` Claes Gyllenswärd
2010-01-21 14:20 ` Andri Möll
2010-01-21 15:36 ` RB
2010-01-21 15:47   ` Machell, Jonathan
2010-01-22  6:36 ` Jonny Kent
2010-01-22 17:29 ` Michael Orlitzky

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20070211133825.09a41e30@c1358217.kevquinn.com \
    --to=kevquinn@gentoo.org \
    --cc=gentoo-hardened@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox