|
|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 03 Mar 2002 15:39:33 To : All Subject : URL: http://www.lwn.net/2002/0221/security.php3 --------------------------------------------------------------------------------
[1][LWN Logo] [No ads right now]
[LWN.net]
Sections:
[2]Main page
Security
[3]Kernel
[4]Distributions
[5]Development
[6]Commerce
[7]Linux in the news
[8]Announcements
[9]Letters
[10]All in one big page
See also: [11]last week's Security page.
Security
News and Editorials
Defining a reasonable disclosure process. Steve Christey and Chris
Wysopal have [12]released a draft document titled "Reasonable
Disclosure Process;" which is in the process to become an IETF
standard. This document attempts to lay out the responsibilities of
all those who have to deal with security vulnerabilities. Since it
touches on the controversial topic of disclosure, there is likely to
be some disagreement on what the document says.
As might be expected, the draft tries to balance the interests of
vendors, customers, and those who discover security holes. It provides
a detailed and formal set of events that is supposed to happen:
1. Avoidance of vulnerabilities in the first place.
2. Discovery of the problem.
3. Vendor notification.
4. Acknowledgement of the notification from the vendor (within seven
days).
5. Verification of the problem by the vendor.
6. Resolution of the problem (within 30 days).
7. General release of information on the problem.
8. Follow-up.
In general, people who discover vulnerabilities are not supposed to
announce them generally until the release stage has been achieved. The
vendor is supposed to provide a status update to the reporter every
seven days, and the reporter should keep silence as long as the vendor
appears to be making a good faith effort toward a solution. This
process could drag on for some time:
The Reporter SHOULD recognize that it may be difficult for a Vendor
to resolve a vulnerability within 30 days if (1) the problem is
related to insecure design, (2) the Vendor has a diverse set of
hardware, operating systems, and/or product versions to support, or
(3) the Vendor is not skilled in security.
What happens if the vendor is not serious? The draft calls for a
"coordinator" role; the coordinator should arbitrate between the
reporter and the vendor, and help decide if a disclosure of the
vulnerability is called for.
Who are these coordinators? The draft is vague:
A Coordinator is an individual or organization who works with the
Reporter and the Vendor to analyze and address the vulnerability.
Coordinators are often well-known third parties. Coordinators may
have resources, credibility, or working relationships that exceed
those of the reporter or vendors. Coordinators may serve as proxies
for reporters, help to verify the reporter's claims, resolve
conflicts, and work with all parties to resolve the vulnerability
in a satisfactory manner.
A role which is so vaguely defined seems unlikely to be filled in a
manner that is satisfactory to all parties.
Even when a security vulnerability is released, the draft allows a
vendor to sit on the details of the problem for 30 additional days.
The idea, of course, is to allow time for patches to be applied before
more detailed information becomes available. Such a delay may be
useful for closed-source code; it won't help much for free software,
however.
There is currently an open comment period on this draft; see [13]the
announcement for information on how to send in your suggestions.
CRYPTO-GRAM Newsletter. Here's [14]Bruce Schneier's CRYPTO-GRAM
Newsletter for February. The main topics covered are Microsoft's
security PR and Oracle's not-so-unbreakable system. "In addition to
making its protocols and interfaces public, we suggest that Microsoft
consider making its entire source code public. We're not advocating
that Microsoft make its products open source, but if they really want
to impress everyone about their newfound security religion, they will
make their code available for inspection."
Security Reports
Debian security updates to hanterm, ncurses. The Debian Project has
issued security updates to [15]hanterm (fixing a set of buffer
overflow problems) and [16]ncurses (also fixing a buffer overflow).
Buffer overflow in exim. Ehud Tenenbaum has [17]reported a buffer
overflow in the exim mailer, versions 3.34 and prior. No known
exploits exist at this time.
web scripts.
The following web scripts were reported to contain vulnerabilities:
* The "slash" weblog package [18]has a cross-site scripting
vulnerability affecting versions prior to 2.2.5. Sites running
older versions should upgrade to 2.2.5, which has been out for a
couple of weeks.
Updates
Buffer overflow in CUPS. Versions of the Common Unix Print System
prior to 1.1.14 have a buffer overflow vulnerability. (First LWN
report: [19]February 14).
This week's updates:
* [20]SuSE (February 27, 2002)
[21]SuSE (February 23, 2002) (Later [22]withdrawn due to the
introduction of an unrelated bug).
Previous updates:
* [23]Debian (February 13, 2002)
[24]Mandrake (February 15, 2002)
Multiple vulnerabilities in SNMP implementations. Most SNMP
implementations out there have a variety of buffer overflow
vulnerabilities and should be upgraded at first opportunity. See
[25]this CERT advisory for more. (First LWN report: [26]February 14).
This week's updates:
* [27]Eridani Linux (February 22, 2002)
Previous updates:
* [28]Caldera (January 22, 2002)
[29]Conectiva (February 14, 2002)
[30]Debian (February 14, 2002)
[31]Mandrake (February 15, 2002)
[32]Red Hat (February 12, 2002)
[33]Yellow Dog (February 11, 2002)
Multiple vendor telnetd vulnerability. This vulnerability, originally
thought to be confined to BSD-derived systems, was first covered in
the [34]July 26th Security Summary. It is now known that Linux telnet
daemons are vulnerable as well.
This week's updates:
* [35]HP (February 12, 2002)
Previous updates:
* [36]Caldera (August 10, 2001)
[37]Conectiva (August 24, 2001)
[38]Debian (August 14, 2001) (SSL version)
[39]Debian (August 14, 2001) (Update for Sparc version)
[40]Mandrake (August 13, 2001)
[41]Mandrake (December 17, 2001) (kerberos version)
[42]Progeny (August 14, 2001)
[43]Red Hat (February 7, 2002) (Update, for Red Hat 5.2, 6.2, 7.0,
and 7.1, to the [44]original advisory, issued August 9, 2001.)
[45]Red Hat (August 9, 2001)
[46]Red Hat (August 9, 2001) (kerberos version)
[47]Slackware (August 9, 2001)
[48]SuSE (September 3, 2001)
[49]Yellow Dog (August 10, 2001)
[50]Yellow Dog (August 10, 2001) (kerberos version)
Remote command execution vulnerability in uucp. The uuxqt utility in
the uucp package does not properly check its options, allowing an
attacker to run arbitrary commands. (First LWN report: [51]January 24,
2002).
This week's updates:
* [52]Conectiva (February 18, 2002)
Previous updates:
* [53]HP (January 22, 2002)
[54]Red Hat (January 15, 2002)
[55]Yellow Dog (January 27, 2002)
Resources
Security: Key Players - HP (IT-Director). IT-Director [56]sees HP as a
growing force in computer security. "HP development in the Linux area
is concentrated on providing secure compartmentalisation. The target
market for this is primarily service providers, who are keen to deploy
high specification servers that can support multiple clients. Plainly,
there must be strong security separating individual clients. Linux is
popular in the service provider market, and there is also interest
from SAP."
Linux security week. The [57]Linux Security Week and [58]Linux
Advisory Watch publications from LinuxSecurity.com are available.
Events
Upcoming Security Events.
Date Event Location
February 20 - 22, 2002 [59]RSA Conference 2002 San Jose, CA., USA
February 25 - March 1, 2002 [60]Secure Trusted OS Consortium -
Quarterly Meeting(STOS) (Hyperdigm Research)Chantilly, VA, USA
March 11 - 14, 2002 [61]Financial Cryptography 2002 Sothhampton,
Bermuda
March 18 - 21, 2002 [62]Sixth Annual Distributed Objects and
Components Security Workshop (Pier 5 Hotel at the Inner
Harbor)Baltimore, Maryland, USA
March 18 - 20, 2002 [63]InfoSec World Conference and Expo/2002
Orlando, FL, USA
April 1 - 7, 2002 [64]SANS 2002 Orlando, FL., USA
April 5 - 7, 2002 [65]Rubicon Detroit, Michigan, USA
April 7 - 10, 2002 [66]Techno-Security 2002 Conference Myrtle Beach,
SC
April 14 - 15, 2002 [67]Workshop on Privacy Enhancing Technologies
2002 (Cathedral Hill Hotel)San Francisco, California, USA
April 16 - 19, 2002 [68]The Twelfth Conference on Computers, Freedom &
Privacy (Cathedral Hill Hotel)San Francisco, California, USA
For additional security-related events, included training courses
(which we don't list above) and events further in the future, check
out Security Focus' [69]calendar, one of the primary resources we use
for building the above list. To submit an event directly to us, please
send a plain-text message to [70]lwn@lwn.net.
Section Editor: [71]Jonathan Corbet
February 21, 2002
LWN Resources
[72]Security alerts archive
Secured Distributions:
[73]Astaro Security
[74]Blue Linux
[75]Castle
[76]Engarde Secure Linux
[77]Immunix
[78]Kaladix Linux
[79]NSA Security Enhanced
[80]Openwall GNU/Linux
[81]Trustix
Security Projects
[82]Bastille
[83]Linux Security Audit Project
[84]Linux Security Module
[85]OpenSSH
Security List Archives
[86]Bugtraq Archive
[87]Firewall Wizards Archive
[88]ISN Archive
Distribution-specific links
[89]Caldera Advisories
[90]Conectiva Updates
[91]Debian Alerts
[92]Kondara Advisories
[93]Esware Alerts
[94]LinuxPPC Security Updates
[95]Mandrake Updates
[96]Red Hat Errata
[97]SuSE Announcements
[98]Turbolinux
[99]Yellow Dog Errata
BSD-specific links
[100]BSDi
[101]FreeBSD
[102]NetBSD
[103]OpenBSD
Security mailing lists
[104]Caldera
[105]Cobalt
[106]Conectiva
[107]Debian
[108]Esware
[109]FreeBSD
[110]Kondara
[111]LASER5
[112]Linux From Scratch
[113]Linux-Mandrake
[114]NetBSD
[115]OpenBSD
[116]Red Hat
[117]Slackware
[118]Stampede
[119]SuSE
[120]Trustix
[121]turboLinux
[122]Yellow Dog
Security Software Archives
[123]munitions
[124]ZedZ.net (formerly replay.com)
Miscellaneous Resources
[125]CERT
[126]CIAC
[127]Comp Sec News Daily
[128]Crypto-GRAM
[129]LinuxLock.org
[130]LinuxSecurity.com
[131]Security Focus
[132]SecurityPortal
[133]Next: Kernel
[134]Eklektix, Inc. Linux powered! Copyright Л 2002 [135]Eklektix,
Inc., all rights reserved
Linux (R) is a registered trademark of Linus Torvalds
References
1. http://lwn.net/
2. http://lwn.net/2002/0221/
3. http://lwn.net/2002/0221/kernel.php3
4. http://lwn.net/2002/0221/dists.php3
5. http://lwn.net/2002/0221/devel.php3
6. http://lwn.net/2002/0221/commerce.php3
7. http://lwn.net/2002/0221/press.php3
8. http://lwn.net/2002/0221/announce.php3
9. http://lwn.net/2002/0221/letters.php3
10. http://lwn.net/2002/0221/bigpage.php3
11. http://lwn.net/2002/0214/security.php3
12. http://lwn.net/2002/0221/a/disclosure-process.php3
13. http://lwn.net/2002/0221/a/disclosure-process.php3
14. http://lwn.net/2002/0221/a/crypto-gram.php3
15. http://lwn.net/alerts/Debian/DSA-112-1.php3
16. http://lwn.net/alerts/Debian/DSA-113-1.php3
17. http://lwn.net/2002/0221/a/exim.php3
18. http://lwn.net/2002/0221/a/slash.php3
19. http://lwn.net/2002/0214/security.php3#cups
20. http://lwn.net/alerts/SuSE/SuSE-SA:2002:006.php3
21. http://lwn.net/alerts/SuSE/SuSE-SA:2002:005.php3
22. http://lwn.net/2002/0221/a/suse-cups.php3
23. http://lwn.net/alerts/Debian/DSA-110-1.php3
24. http://lwn.net/alerts/Mandrake/MDKSA-2002:015.php3
25. http://lwn.net/2002/0214/a/cert-snmp.php3
26. http://lwn.net/2002/0214/security.php3
27. http://lwn.net/2002/0228/a/el-sec.php3
28. http://lwn.net/alerts/Caldera/CSSA-2002-004.0.php3
29. http://lwn.net/alerts/Conectiva/CLA-2002:462.php3
30. http://lwn.net/alerts/Debian/DSA-111-1.php3
31. http://lwn.net/alerts/Mandrake/MDKSA-2002:014.php3
32. http://lwn.net/alerts/RedHat/RHSA-2001:163-20.php3
33. http://lwn.net/alerts/YellowDog/YDU-20020211-1.php3
34. http://lwn.net/2001/0726/security.php3#mtelnetd
35. http://lwn.net/alerts/HP/HPSBTL0202-023.php3
36. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3
37. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3
38. http://lwn.net/alerts/Debian/DSA-075-1.php3
39. http://lwn.net/alerts/Debian/DSA-075-2.php3
40. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3
41. http://lwn.net/alerts/Mandrake/MDKSA-2001:093.php3
42. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3
43. http://lwn.net/alerts/RedHat/RHSA-2001:099-09.php3
44. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
45. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
46. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3
47. http://lwn.net/alerts/Slackware/sl-997726350.php3
48. http://lwn.net/alerts/SuSE/SuSE-SA:2001:029.php3
49. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3
50. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3
51. http://lwn.net/2002/0124/security.php3#uucp
52. http://lwn.net/alerts/Conectiva/CLA-2002:463.php3
53. http://lwn.net/alerts/HP/HPSBTL0201-018.php3
54. http://lwn.net/alerts/RedHat/RHSA-2001:165-08.php3
55. http://lwn.net/alerts/YellowDog/YDU-20020127-10.php3
56. http://www.it-director.com/article.php?id=2616
57. http://lwn.net/2002/0221/a/security-week.php3
58. http://lwn.net/2002/0221/a/advisory-watch.php3
59. http://www.rsaconference.com/
60. http://www.stosdarwin.org/
61. http://www.fc02.ai/
62. http://www.omg.org/news/meetings/docsec2002/call.htm
63.
http://www.misti.com/northamerica.asp?page=4&subpage=2&disp=showconf&id=os02®
ion=1
64. http://www.sans.org/SANS2002.php
65. http://www.rubi-con.org/
66. http://www.TECHSEC.com/
67. http://www.pet2002.org/
68. http://www.cfp2002.org/
69. http://securityfocus.com/calendar
70. mailto:lwn@lwn.net
71. mailto:lwn@lwn.net
72. http://lwn.net/alerts/
73. http://www.astaro.com/products/index.html
74. http://bluelinux.sourceforge.net/
75. http://castle.altlinux.ru/
76. http://www.engardelinux.org/
77. http://www.immunix.org/
78. http://www.kaladix.org/
79. http://www.nsa.gov/selinux/
80. http://www.openwall.com/Owl/
81. http://www.trustix.com/
82. http://www.bastille-linux.org/
83. http://lsap.org/
84. http://lsm.immunix.org/
85. http://www.openssh.com/
86. http://www.securityfocus.com/archive/1
87. http://www.nfr.net/firewall-wizards/
88. http://www.jammed.com/Lists/ISN/
89. http://www.calderasystems.com/support/security/
90. http://www.conectiva.com.br/atualizacoes/
91. http://www.debian.org/security/
92. http://www.kondara.org/errata/k12-security.html
93. http://www.esware.com/actualizaciones.html
94. http://linuxppc.org/security/advisories/
95. http://www.linux-mandrake.com/en/fupdates.php3
96. http://www.redhat.com/support/errata/index.html
97. http://www.suse.de/security/index.html
98. http://www.turbolinux.com/security/
99. http://www.yellowdoglinux.com/resources/
100. http://www.BSDI.COM/services/support/patches/
101. http://www.freebsd.org/security/security.html
102. http://www.NetBSD.ORG/Security/
103. http://www.openbsd.org/security.html
104. http://www.calderasystems.com/support/forums/announce.html
105. http://www.cobalt.com/support/resources/usergroups.html
106. http://distro.conectiva.com.br/atualizacoes/
107. http://www.debian.org/MailingLists/subscribe
108. http://www.esware.com/lista_correo.html
109. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
110. http://www.kondara.org/mailinglist.html.en
111. http://l5web.laser5.co.jp/ml/ml.html
112. http://www.linuxfromscratch.org/services/mailinglistinfo.php
113. http://www.linux-mandrake.com/en/flists.php3
114. http://www.netbsd.org/MailingLists/
115. http://www.openbsd.org/mail.html
116. http://www.redhat.com/mailing-lists/
117. http://www.slackware.com/lists/
118. http://www.stampede.org/mailinglists.php3
119. http://www.suse.com/en/support/mailinglists/index.html
120. http://www.trustix.net/support/
121. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
122. http://lists.yellowdoglinux.com/ydl_updates.shtml
123. http://munitions.vipul.net/
124. http://www.zedz.net/
125. http://www.cert.org/nav/alerts.html
126. http://ciac.llnl.gov/ciac/
127. http://www.MountainWave.com/
128. http://www.counterpane.com/crypto-gram.html
129. http://linuxlock.org/
130. http://linuxsecurity.com/
131. http://www.securityfocus.com/
132. http://www.securityportal.com/
133. http://lwn.net/2002/0221/kernel.php3
134. http://www.eklektix.com/
135. http://www.eklektix.com/
--- ifmail v.2.14.os7-aks1
* Origin: Unknown (2:4615/71.10@fidonet)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/19861ea1656a1.html, оценка из 5, голосов 10
|