Gentoo security
Security in Gentoo Linux
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. The Security Project is tasked with providing timely information about security vulnerabilities in Gentoo Linux, along with patches to secure those vulnerabilities. We work directly with vendors, end users and other OSS projects to ensure all security incidents are responded to quickly and professionally.
You can find a document describing the policy the security team follows to treat the vulnerabilities found in the Gentoo Linux distribution on the Vulnerability Treatment Policy page.
Installing a secure Gentoo system
The Gentoo Security Handbook gives information and tips for building a secure system and hardening existing systems.
Keeping Gentoo secure
To stay up-to-date with the security fixes you should subscribe to receive GLSAs and apply GLSA instructions whenever you have an affected package installed. Alternatively, syncing your portage tree and upgrading every package should also keep you up-to-date security-wise.
You can use glsa-check tool (part of the gentoolkit package) to:
- Check if a specific GLSA applies to your system (-p option)
- List all GLSAs with applied/affected/unaffected status (-l option)
- Apply a given GLSA to your system (-f option).
Gentoo Linux Security Announcements (GLSAs)
Gentoo Linux Security Announcements are notifications that we send out to the community to inform them of security vulnerabilities related to Gentoo Linux or the packages contained in our portage repository.
Recent advisories
GLSA 201808-04 | WebkitGTK+: Multiple vulnerabilities | normal |
GLSA 201808-03 | NetworkManager VPNC plugin: Privilege escalation | normal |
GLSA 201808-02 | LinuX Containers user space utilities: Arbitrary file read | low |
GLSA 201808-01 | Chromium, Google Chrome: Multiple vulnerabilities | normal |
GLSA 201807-04 | cURL:Heap-based Buffer Overflow | normal |
For a full list of all published GLSAs, please see our GLSA index page.
How to receive GLSAs
GLSA announcements are sent to the gentoo-announce@gentoo.org mailing-list, and are published via RSS and Atom feeds.
Security team contact information
Gentoo Linux takes security vulnerability reports very seriously. Please file new vulnerability reports on Gentoo Bugzilla and assign them to the Gentoo Security product and Vulnerabilities component. The Gentoo Linux Security Team will ensure all security-related bug reports are responded to in a timely fashion.
If you find errors or omissions in published GLSAs, you should also file a bug in Gentoo Bugzilla in the Gentoo Security product, but with GLSA Errors component.
Report security vulnerability Report GLSA error
Confidential contacts
You have two options to submit non-public vulnerabilities to the security team. You may submit a bug in Gentoo Bugzilla using the New-Expert action, or the Enter a new bug report (advanced) link, and check the Gentoo Security checkbox in the Only users in all of the selected groups can view this bug section. You may also contact directly using encrypted mail one of the following security contacts:
Name | Responsibility | OpenPGP key ID (click to retrieve public key) | |
Christopher Diaz Riveros | Security lead | chrisadr@gentoo.org | 0x4DBBD10F0FDD2547 |
Kristian Fiskerstrand | Security lead | k_f@gentoo.org | 0x0B7F8B60E3EDFAE3 |
Jason A. Donenfeld | Security auditing lead | zx2c4@gentoo.org | 0x49FC7012A5DE03AE |
Resources
Security pages
- GLSA index page — Full list of all published GLSAs.
- GLSA RSS feed — GLSA RSS live feed.
- Vulnerability Treatment Policy — The official policy of the security team.
- Gentoo Linux Security Project — The security project page.
Links
- Gentoo Security Handbook — Step-by-step guide for hardening Gentoo Linux.
- Gentoo Hardened Project — Bringing advanced security to Gentoo Linux.
- Active Developer List — Active developer list including OpenPGP keys which can be used to verify GLSAs.