On Tue, Jan 06, 2015 at 05:47:10PM -0600, William Hubbs wrote:
> All,
> 
> these packages have been masked in the tree for months - years with no
> signs of fixes.
> 
> I am particularly concerned about packages with known security
> vulnerabilities staying in the main tree masked. If people want to keep
> using those packages, I don't want to stop them, but packages like this
> should not be in the main tree.
> 
> # Mask gentoo-sources ebuilds that are affected with security bug 
> CVE-2014-3153.
> #
> # Pinkie Pie discovered an issue in the futex subsystem that allows a
> # local user to gain ring 0 control via the futex syscall. An
> # unprivileged user could use this flaw to crash the kernel (resulting
> # in denial of service) or for privilege escalation.
> #
> # https://bugs.gentoo.org/show_bug.cgi?id=CVE-2014-3153
> =sys-kernel/gentoo-sources-3.2.58-r2
> ~sys-kernel/gentoo-sources-3.4.90
> =sys-kernel/gentoo-sources-3.4.91
> ~sys-kernel/gentoo-sources-3.10.40
> =sys-kernel/gentoo-sources-3.10.41
> ~sys-kernel/gentoo-sources-3.12.20
> =sys-kernel/gentoo-sources-3.12.21
> ~sys-kernel/gentoo-sources-3.14.4
> =sys-kernel/gentoo-sources-3.14.5

Hello,

What's the feeling for how long a package.mask entry should stay in the
file in the event that a package can cause physical damage to a user's 
system.

For certain types of hardware, kernel 3.17.0 could cause some
filesystem corruption. Of couse, 3.17.0 is out of the tree but when is
it appropiate to say that a user has had enough time to upgarde their
systems and we can remove this entry?

Mike


-- 
Mike Pagano
Gentoo Developer - Kernel Project
Gentoo Sources - Lead 
E-Mail     : mpag...@gentoo.org
GnuPG FP   : EEE2 601D 0763 B60F 848C  9E14 3C33 C650 B576 E4E3
Public Key : http://pgp.mit.edu:11371/pks/lookup?search=0xB576E4E3&op=index

Reply via email to