Package: linux-image-amd64
Version: 4.8+77~bpo8+1
Severity: critical
Tags: security
Justification: root security hole

Hi,

As of now two flavours of Linux kernels are released. The default ones are
signed ones while other unsigned kernels are available.

The problem is that there's a significant delay between the release of the
two
flavours, often more than one week, which exposes users of signed kernels to
critical vulnerabilities addressed in the newer kernel releases. The only
possible workaround is to switch on
-unsigned linux kernels, but this is messy and clearly unwanted.

I've raised an issue on BPO mailing list here : https://lists.debian.org
/debian-backports/2017/01/msg00033.html (the issue also applies to testing
and
unstable).

The answer is basically that :
1/ - unsigned kernels are only available for testing purposes
2/ - it is not possible to build simultaneously signed and unsigned kernels.

I'm okay with the latter as long as there's only a couple of hours between
the
two kernel releases. Now if we must wait more than one week to get the
signed
image it clearly reveals there's an issue in the signed image build process
which must be addressed before Stretch release.

Otherwise a possibility would be to use by default -unsigned image and
create
an optional linux-image-amd64-signed metapackage like the one which exists
for
grsec.



-- System Information:
Debian Release: 8.7
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.8.0-0.bpo.2-amd64 (SMP w/8 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-image-amd64 depends on:
ii  linux-image-4.8.0-0.bpo.2-amd64-unsigned [linux-image-4.8.
 4.8.15-2~bpo8+1

linux-image-amd64 recommends no packages.

linux-image-amd64 suggests no packages.

-- no debconf information

Reply via email to