Hi,

regarding "security supported architectures" a few words from security
project:

We don't like the differentiation. And in practice, it doesn't even
matter nor does it work:

In theory, "security supported architectures" would allow us to ignore
bugs only affecting specific architectures. But examples are rare. I can
only think about a vulnerability affecting just x86
(https://security.gentoo.org/glsa/202003-13) or arm (like some
vulnerabilities in Xen hypervisor making use of specific hardware
features) in the past 24 months. So this is not really important and in
the end we don't really have the man power to differentiate. We just
bump because if we would skip a bug fix just because we thought it
doesn't affect us, this could have serious impact for no real reason.

We also always have to cc all architectures which have stable keywords
set on any affected ebuild which should be removed (cleaned up) after
security stabilization or maintainers will be unable to do the cleanup.

In the past, "security supported architecture" was also used to
determine when security team was allowed to publish a GLSA. However, we
changed this policy ~3 years ago:

Some people don't do regular world upgrades. They only pull updates when
they want a newer version or for security reasons via glsa-check tool.
Not telling amd64 users that they are using a vulnerable package where
we already have a fix for just because slacking architecture like hppa
in these days didn't stabilize this package yet was just unacceptable.

It wasn't an easy decision even in our small team because some members
had the concern that users will get warned about a vulnerability without
a solution yet available for their architecture, resulting in bug
spam/nagging. However, this never happened and some members even believe
that this is also an opportunity: Maybe some users not knowing that
their arch team is slacking would step up and join their architecture
team and help.

For the future some members even want to go one step further and release
GLSAs more often and not just for B2 or more severe vulnerabilities.

Back to "security supported architectures:

tl;dr

Security project wants to remove "security supported architectures" for
years.

Any architecture in Gentoo which is carrying stable keywords must keep
up with stabilization or keyword requests. Security stabilization
shouldn't be treated special (Because new ebuilds often depend on recent
libs. If an arch team would only focus on security bugs, calling for
stabilization will become more difficult because we would have to add
all the missing deps which are now required but already stable
everywhere else and just ignored by this arch until today).
If an architecture can no longer keep up with stabilization/keywording
demand, the entire architecture must be dropped to ~arch. No exception.
Stop pretending that this architecture is in good shape and that those
users have the same stable experience like you have on more common
architectures.

Keep in mind: You would also need to explain a user, "Yeah, you are
using something we name 'stable' but it doesn't mean what you are
expecting and BTW, while we have said we have fixed vulnerability X in
Gentoo you heard about in the media, don't forget to check on your own
if this is also true for your architecture because in theory the
maintainer could have decided to make use of arch-depending eapply for
some reason..."

=> Keep it simple: Stable should mean the same across all architectures


-- 
Regards,
Thomas Deutschmann / Gentoo Security Team
fpr: C4DD 695F A713 8F24 2AA1 5638 5849 7EE5 1D5D 74A5

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to