> > 
> > 1) either the severity assignment of this bug by the Security project as B1 
> > wrong (i.e. it should have been classified "harmless")
> >
> 
> The Gentoo model is not perfect and should be overhauled. However, it
> works for most things and sometimes bugs fall between the cracks.
> 
> The package shouldn't have been masked either based on a bug that was
> purposely ignored for many years simply because they want to disband the
> package now and found a "security reason" to add to the mask.

Well, over the last year or so every 2-3 months the (uninformed) discussion 
came up, "don't use openrc stages because you are automatically rooted". That 
leaves a rather bad impression of Gentoo, independent of whether it is true or 
not. If noone from sec team noticed the discussions...

> > 2) or the entire classification of severity levels according to the 
> > Security project pointless (i.e. you can't base any actions on them because 
> > a mystery onion needs to be taken into account).
> > 
> 
> I am not sure if this is sarcasm, but every bug must be considered
> through the correct aperture. That is, based on your environment,
> protections in place, defense in depth, and other buzzwords... hence the
> onion analogy.

It's not sarcasm. The point of the classification is to give clear rules (why 
else would you list, e.g., required response times on the vulnerability 
treatment page (no matter how illusory they are)).

If you don't take all factors into account when *making* the classification, 
then all gain you have from the classification is lost.



-- 
Andreas K. Hüttel
dilfri...@gentoo.org
Gentoo Linux developer
(council, toolchain, base-system, perl, libreoffice)

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to