Thanks. Can you link to a few “major CVEs” you fixed?
For example, CVE-2022-0492 is a privilege escalation vulnerability from Mar 2022. It’s present in Linux before (<) 4.9.301. OSMC has has Linux 4.9.269. There are public exploits. Is this fixed in OSMC?
I never said I “want latest and greatest”. I said “My ‘specific need’ is to use software that’s supported.”
While I generally share your security concerns, I think in this context you are just totally have not understood that the kernel should be your last concern if you use OSMC in an environment that has high security requirements.
The OSMC user as well as the Media Center (Kodi) has full root access on OSMC. So a “privilege escalation” is kind of meaningless
If you want privilege escalation you can just run sudo -s as the OSMC user.
Kodi is running with elevated privileges too..
CVEs are back ported by Android maintainers, SoC vendor and us. Some CVEs are also patched in user space (sysctl tightening for example).
Keep in mind that the kernel we use doesn’t come from kernel.org. It’s a downstream of a downstream (Android base). That’s why LTS and versioning is different. A bit like how Red Hat were maintaining 2.6.x kernels as late as 2020s.
To be Honest, @sam_nazarko @ Team are supporting their devices for years.
If compared to all the other devices I have at home, this is the one I care least about.
(Running linux since end 1992, build own distributions and created the C.I.T - Cluster installation tookit → predecessor of the Kickstart installer @ redhat 4 - at that time, not enterprise editions ).
The reason I never bothered to do anything special with the Vero devices, is that the guys here know what they are doing that will get things fixed IF required - AND - the Vero is a device that is supposed to run in an Enclave network (secured) anyway.