On 08/15/2018 09:52 PM, Douglas R. Reno wrote:


On Wed, Aug 15, 2018 at 9:44 PM DJ Lucas <[email protected] <mailto:[email protected]>> wrote:

    Discussion was requested in bug to see if security issues should be
    fixed before or after release. There are two low severity security
    issues in OpenSSL-1.1.0h currently in rc1. My thoughts, there is a low
    probability of breakage, and since we need to do kernel and headers
    again (again, I assumed this was a necessity instead of discussion), I
    figured OpenSSL would be a shoe-in as a result of that. I don't see a
    problem with it, but understand that there is some risk of breakage.
    The
    same is true of all the updates, but again, all minimal risk.

    I figure at least a few of us haven't updated to the RC yet, so any
    issues would be discovered on those rebuilds (these would only be
    packages between end of LFS and Xorg in BLFS). If nobody else is
    planning on full rebuild for RC, I can commit to rebuilding everything
    that depends on them currently to validate after I complete the few
    items I've assigned to myself.

    I've updated all outstanding packages that I've slotted for 8.3,
    including the obligatory glibc rebuild for new kernel headers, and am
    proceeding with those changes in place. Unfortunately, the updates did
    not come in until after I had completed Xorg (2nd milestone on my build
    order). I intend to do a short overnight build of LFS in a different
    prefix.

    Thoughts? I guess really, do any editors intend to start from scratch
    for the RC period or is everyone up to date already?

    --DJ

-- http://lists.linuxfromscratch.org/listinfo/lfs-dev
    FAQ: http://www.linuxfromscratch.org/faq/
    Unsubscribe: See the above information page


I'm going to have to start from scratch here at the end of the week to do validation properly. I think all editors should be running an official build of the -rc (e.g. not updated), but I'm not 100% sure.

The kernel update contains the L1TF mitigation, which is critical for anyone who uses qemu or any other virtualization software on an Intel processor. That in itself is bad enough IMO.

We also need to consider the backlash possible if we do not update to the latest OpenSSL version prior to release.

In addition, the version of iproute2 in the book currently is designed to be running against 4.17 headers, not 4.18 headers. As a result, some features will not be built.

I think a new -rc based off the updates needs to be performed. The kernel level vulnerability is HIGH (last I checked), and not LOW.

We need to discuss the OpenSSH User Account Disclosure vulnerability that was just found and shipped straight to oss-security instead of going through oss-distros first as well, as that was slotted for immediate disclosure instead of an embargo as is standard [1] - we cannot release without that fix, unless we plan on making an errata and an announcement immediately after. This affects every version of OpenSSH from 2.2+ and can be used to enumerate usernames.

[1] - http://seclists.org/oss-sec/2018/q3/124

My problem is how do we get a release out when these things are popping up every few days. We need a couple of weeks to validate all the packages. I've been updating packages and tagging those that don't need updating for a couple of days now. I have 74 in my log so far.

Today is the 15th. I can start over with the new packages, but it will probably take a full day to get back to where I am now. What happens when someone pushes a change on the 20th? On the 25th? Do we continue to start over? Do we just make the changes in place and continue?

We already tell users "The latest available 4.18.x kernel version should be used" I suspect the other packages: openssl, iproute2, and even expect will not really affect our validation process, but a kernel change affects Section 6.7. Linux-4.18 API Headers and that has the potential to affect a lot of things.

I'll bet any editor a lunch that by the time we get to the scheduled release date (September 1) the kernel will be at at least 4.18.5.

I do not know the best way to proceed, but I am very concerned about the upstream churn and our ability to produce a stable LFS/BLFS release.

  -- Bruce


--
http://lists.linuxfromscratch.org/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to