Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   03 Mar 2002  15:39:33
 To : All
 Subject : URL: http://www.lwn.net/2002/0221/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] [No ads right now]
    [LWN.net]
 
    Sections:
     [2]Main page
     Security
     [3]Kernel
     [4]Distributions
     [5]Development
     [6]Commerce
     [7]Linux in the news
     [8]Announcements
     [9]Letters
    [10]All in one big page
 
    See also: [11]last week's Security page.
 
 Security
 
 News and Editorials
 
    Defining a reasonable disclosure process. Steve Christey and Chris
    Wysopal have [12]released a draft document titled "Reasonable
    Disclosure Process;" which is in the process to become an IETF
    standard. This document attempts to lay out the responsibilities of
    all those who have to deal with security vulnerabilities. Since it
    touches on the controversial topic of disclosure, there is likely to
    be some disagreement on what the document says.
 
    As might be expected, the draft tries to balance the interests of
    vendors, customers, and those who discover security holes. It provides
    a detailed and formal set of events that is supposed to happen:
     1. Avoidance of vulnerabilities in the first place.
     2. Discovery of the problem.
     3. Vendor notification.
     4. Acknowledgement of the notification from the vendor (within seven
        days).
     5. Verification of the problem by the vendor.
     6. Resolution of the problem (within 30 days).
     7. General release of information on the problem.
     8. Follow-up.
 
    In general, people who discover vulnerabilities are not supposed to
    announce them generally until the release stage has been achieved. The
    vendor is supposed to provide a status update to the reporter every
    seven days, and the reporter should keep silence as long as the vendor
    appears to be making a good faith effort toward a solution. This
    process could drag on for some time:
 
      The Reporter SHOULD recognize that it may be difficult for a Vendor
      to resolve a vulnerability within 30 days if (1) the problem is
      related to insecure design, (2) the Vendor has a diverse set of
      hardware, operating systems, and/or product versions to support, or
      (3) the Vendor is not skilled in security.
 
    What happens if the vendor is not serious? The draft calls for a
    "coordinator" role; the coordinator should arbitrate between the
    reporter and the vendor, and help decide if a disclosure of the
    vulnerability is called for.
 
    Who are these coordinators? The draft is vague:
 
      A Coordinator is an individual or organization who works with the
      Reporter and the Vendor to analyze and address the vulnerability.
      Coordinators are often well-known third parties. Coordinators may
      have resources, credibility, or working relationships that exceed
      those of the reporter or vendors. Coordinators may serve as proxies
      for reporters, help to verify the reporter's claims, resolve
      conflicts, and work with all parties to resolve the vulnerability
      in a satisfactory manner.
 
    A role which is so vaguely defined seems unlikely to be filled in a
    manner that is satisfactory to all parties.
 
    Even when a security vulnerability is released, the draft allows a
    vendor to sit on the details of the problem for 30 additional days.
    The idea, of course, is to allow time for patches to be applied before
    more detailed information becomes available. Such a delay may be
    useful for closed-source code; it won't help much for free software,
    however.
 
    There is currently an open comment period on this draft; see [13]the
    announcement for information on how to send in your suggestions.
 
    CRYPTO-GRAM Newsletter. Here's [14]Bruce Schneier's CRYPTO-GRAM
    Newsletter for February. The main topics covered are Microsoft's
    security PR and Oracle's not-so-unbreakable system. "In addition to
    making its protocols and interfaces public, we suggest that Microsoft
    consider making its entire source code public. We're not advocating
    that Microsoft make its products open source, but if they really want
    to impress everyone about their newfound security religion, they will
    make their code available for inspection."
 
 Security Reports
 
    Debian security updates to hanterm, ncurses. The Debian Project has
    issued security updates to [15]hanterm (fixing a set of buffer
    overflow problems) and [16]ncurses (also fixing a buffer overflow).
 
    Buffer overflow in exim. Ehud Tenenbaum has [17]reported a buffer
    overflow in the exim mailer, versions 3.34 and prior. No known
    exploits exist at this time.
 
    web scripts.
    The following web scripts were reported to contain vulnerabilities:
      * The "slash" weblog package [18]has a cross-site scripting
        vulnerability affecting versions prior to 2.2.5. Sites running
        older versions should upgrade to 2.2.5, which has been out for a
        couple of weeks.
 
 Updates
 
    Buffer overflow in CUPS. Versions of the Common Unix Print System
    prior to 1.1.14 have a buffer overflow vulnerability. (First LWN
    report: [19]February 14).
 
    This week's updates:
      * [20]SuSE (February 27, 2002)
 
      [21]SuSE (February 23, 2002) (Later [22]withdrawn due to the
    introduction of an unrelated bug).
 
    Previous updates:
      * [23]Debian (February 13, 2002)
 
      [24]Mandrake (February 15, 2002)
 
    Multiple vulnerabilities in SNMP implementations. Most SNMP
    implementations out there have a variety of buffer overflow
    vulnerabilities and should be upgraded at first opportunity. See
    [25]this CERT advisory for more. (First LWN report: [26]February 14).
 
    This week's updates:
      * [27]Eridani Linux (February 22, 2002)
 
    Previous updates:
      * [28]Caldera (January 22, 2002)
 
      [29]Conectiva (February 14, 2002)
 
      [30]Debian (February 14, 2002)
 
      [31]Mandrake (February 15, 2002)
 
      [32]Red Hat (February 12, 2002)
 
      [33]Yellow Dog (February 11, 2002)
 
    Multiple vendor telnetd vulnerability. This vulnerability, originally
    thought to be confined to BSD-derived systems, was first covered in
    the [34]July 26th Security Summary. It is now known that Linux telnet
    daemons are vulnerable as well.
 
    This week's updates:
      * [35]HP (February 12, 2002)
 
    Previous updates:
      * [36]Caldera (August 10, 2001)
 
      [37]Conectiva (August 24, 2001)
 
      [38]Debian (August 14, 2001) (SSL version)
 
      [39]Debian (August 14, 2001) (Update for Sparc version)
 
      [40]Mandrake (August 13, 2001)
 
      [41]Mandrake (December 17, 2001) (kerberos version)
 
      [42]Progeny (August 14, 2001)
 
      [43]Red Hat (February 7, 2002) (Update, for Red Hat 5.2, 6.2, 7.0,
    and 7.1, to the [44]original advisory, issued August 9, 2001.)
 
      [45]Red Hat (August 9, 2001)
 
      [46]Red Hat (August 9, 2001) (kerberos version)
 
      [47]Slackware (August 9, 2001)
 
      [48]SuSE (September 3, 2001)
 
      [49]Yellow Dog (August 10, 2001)
 
      [50]Yellow Dog (August 10, 2001) (kerberos version)
 
    Remote command execution vulnerability in uucp. The uuxqt utility in
    the uucp package does not properly check its options, allowing an
    attacker to run arbitrary commands. (First LWN report: [51]January 24,
    2002).
 
    This week's updates:
      * [52]Conectiva (February 18, 2002)
 
    Previous updates:
      * [53]HP (January 22, 2002)
 
      [54]Red Hat (January 15, 2002)
 
      [55]Yellow Dog (January 27, 2002)
 
 Resources
 
    Security: Key Players - HP (IT-Director). IT-Director [56]sees HP as a
    growing force in computer security. "HP development in the Linux area
    is concentrated on providing secure compartmentalisation. The target
    market for this is primarily service providers, who are keen to deploy
    high specification servers that can support multiple clients. Plainly,
    there must be strong security separating individual clients. Linux is
    popular in the service provider market, and there is also interest
    from SAP."
 
    Linux security week. The [57]Linux Security Week and [58]Linux
    Advisory Watch publications from LinuxSecurity.com are available.
 
 Events
 
    Upcoming Security Events.
 
    Date Event Location
    February 20 - 22, 2002 [59]RSA Conference 2002 San Jose, CA., USA
    February 25 - March 1, 2002 [60]Secure Trusted OS Consortium -
    Quarterly Meeting(STOS) (Hyperdigm Research)Chantilly, VA, USA
    March 11 - 14, 2002 [61]Financial Cryptography 2002 Sothhampton,
    Bermuda
    March 18 - 21, 2002 [62]Sixth Annual Distributed Objects and
    Components Security Workshop (Pier 5 Hotel at the Inner
    Harbor)Baltimore, Maryland, USA
    March 18 - 20, 2002 [63]InfoSec World Conference and Expo/2002
    Orlando, FL, USA
    April 1 - 7, 2002 [64]SANS 2002 Orlando, FL., USA
    April 5 - 7, 2002 [65]Rubicon Detroit, Michigan, USA
    April 7 - 10, 2002 [66]Techno-Security 2002 Conference Myrtle Beach,
    SC
    April 14 - 15, 2002 [67]Workshop on Privacy Enhancing Technologies
    2002 (Cathedral Hill Hotel)San Francisco, California, USA
    April 16 - 19, 2002 [68]The Twelfth Conference on Computers, Freedom &
    Privacy (Cathedral Hill Hotel)San Francisco, California, USA
 
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [69]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [70]lwn@lwn.net.
 
    Section Editor: [71]Jonathan Corbet
    February 21, 2002
 
    LWN Resources
    [72]Security alerts archive
    Secured Distributions:
    [73]Astaro Security
    [74]Blue Linux
    [75]Castle
    [76]Engarde Secure Linux
    [77]Immunix
    [78]Kaladix Linux
    [79]NSA Security Enhanced
    [80]Openwall GNU/Linux
    [81]Trustix
    Security Projects
    [82]Bastille
    [83]Linux Security Audit Project
    [84]Linux Security Module
    [85]OpenSSH
    Security List Archives
    [86]Bugtraq Archive
    [87]Firewall Wizards Archive
    [88]ISN Archive
    Distribution-specific links
    [89]Caldera Advisories
    [90]Conectiva Updates
    [91]Debian Alerts
    [92]Kondara Advisories
    [93]Esware Alerts
    [94]LinuxPPC Security Updates
    [95]Mandrake Updates
    [96]Red Hat Errata
    [97]SuSE Announcements
    [98]Turbolinux
    [99]Yellow Dog Errata
    BSD-specific links
    [100]BSDi
    [101]FreeBSD
    [102]NetBSD
    [103]OpenBSD
    Security mailing lists
    [104]Caldera
    [105]Cobalt
    [106]Conectiva
    [107]Debian
    [108]Esware
    [109]FreeBSD
    [110]Kondara
    [111]LASER5
    [112]Linux From Scratch
    [113]Linux-Mandrake
    [114]NetBSD
    [115]OpenBSD
    [116]Red Hat
    [117]Slackware
    [118]Stampede
    [119]SuSE
    [120]Trustix
    [121]turboLinux
    [122]Yellow Dog
    Security Software Archives
    [123]munitions
    [124]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [125]CERT
    [126]CIAC
    [127]Comp Sec News Daily
    [128]Crypto-GRAM
    [129]LinuxLock.org
    [130]LinuxSecurity.com
    [131]Security Focus
    [132]SecurityPortal
                                                         [133]Next: Kernel
 
    [134]Eklektix, Inc. Linux powered! Copyright Л 2002 [135]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://lwn.net/2002/0221/
    3. http://lwn.net/2002/0221/kernel.php3
    4. http://lwn.net/2002/0221/dists.php3
    5. http://lwn.net/2002/0221/devel.php3
    6. http://lwn.net/2002/0221/commerce.php3
    7. http://lwn.net/2002/0221/press.php3
    8. http://lwn.net/2002/0221/announce.php3
    9. http://lwn.net/2002/0221/letters.php3
   10. http://lwn.net/2002/0221/bigpage.php3
   11. http://lwn.net/2002/0214/security.php3
   12. http://lwn.net/2002/0221/a/disclosure-process.php3
   13. http://lwn.net/2002/0221/a/disclosure-process.php3
   14. http://lwn.net/2002/0221/a/crypto-gram.php3
   15. http://lwn.net/alerts/Debian/DSA-112-1.php3
   16. http://lwn.net/alerts/Debian/DSA-113-1.php3
   17. http://lwn.net/2002/0221/a/exim.php3
   18. http://lwn.net/2002/0221/a/slash.php3
   19. http://lwn.net/2002/0214/security.php3#cups
   20. http://lwn.net/alerts/SuSE/SuSE-SA:2002:006.php3
   21. http://lwn.net/alerts/SuSE/SuSE-SA:2002:005.php3
   22. http://lwn.net/2002/0221/a/suse-cups.php3
   23. http://lwn.net/alerts/Debian/DSA-110-1.php3
   24. http://lwn.net/alerts/Mandrake/MDKSA-2002:015.php3
   25. http://lwn.net/2002/0214/a/cert-snmp.php3
   26. http://lwn.net/2002/0214/security.php3
   27. http://lwn.net/2002/0228/a/el-sec.php3
   28. http://lwn.net/alerts/Caldera/CSSA-2002-004.0.php3
   29. http://lwn.net/alerts/Conectiva/CLA-2002:462.php3
   30. http://lwn.net/alerts/Debian/DSA-111-1.php3
   31. http://lwn.net/alerts/Mandrake/MDKSA-2002:014.php3
   32. http://lwn.net/alerts/RedHat/RHSA-2001:163-20.php3
   33. http://lwn.net/alerts/YellowDog/YDU-20020211-1.php3
   34. http://lwn.net/2001/0726/security.php3#mtelnetd
   35. http://lwn.net/alerts/HP/HPSBTL0202-023.php3
   36. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3
   37. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3
   38. http://lwn.net/alerts/Debian/DSA-075-1.php3
   39. http://lwn.net/alerts/Debian/DSA-075-2.php3
   40. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3
   41. http://lwn.net/alerts/Mandrake/MDKSA-2001:093.php3
   42. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3
   43. http://lwn.net/alerts/RedHat/RHSA-2001:099-09.php3
   44. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
   45. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
   46. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3
   47. http://lwn.net/alerts/Slackware/sl-997726350.php3
   48. http://lwn.net/alerts/SuSE/SuSE-SA:2001:029.php3
   49. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3
   50. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3
   51. http://lwn.net/2002/0124/security.php3#uucp
   52. http://lwn.net/alerts/Conectiva/CLA-2002:463.php3
   53. http://lwn.net/alerts/HP/HPSBTL0201-018.php3
   54. http://lwn.net/alerts/RedHat/RHSA-2001:165-08.php3
   55. http://lwn.net/alerts/YellowDog/YDU-20020127-10.php3
   56. http://www.it-director.com/article.php?id=2616
   57. http://lwn.net/2002/0221/a/security-week.php3
   58. http://lwn.net/2002/0221/a/advisory-watch.php3
   59. http://www.rsaconference.com/
   60. http://www.stosdarwin.org/
   61. http://www.fc02.ai/
   62. http://www.omg.org/news/meetings/docsec2002/call.htm
   63.
 http://www.misti.com/northamerica.asp?page=4&subpage=2&disp=showconf&id=os02®
 ion=1
   64. http://www.sans.org/SANS2002.php
   65. http://www.rubi-con.org/
   66. http://www.TECHSEC.com/
   67. http://www.pet2002.org/
   68. http://www.cfp2002.org/
   69. http://securityfocus.com/calendar
   70. mailto:lwn@lwn.net
   71. mailto:lwn@lwn.net
   72. http://lwn.net/alerts/
   73. http://www.astaro.com/products/index.html
   74. http://bluelinux.sourceforge.net/
   75. http://castle.altlinux.ru/
   76. http://www.engardelinux.org/
   77. http://www.immunix.org/
   78. http://www.kaladix.org/
   79. http://www.nsa.gov/selinux/
   80. http://www.openwall.com/Owl/
   81. http://www.trustix.com/
   82. http://www.bastille-linux.org/
   83. http://lsap.org/
   84. http://lsm.immunix.org/
   85. http://www.openssh.com/
   86. http://www.securityfocus.com/archive/1
   87. http://www.nfr.net/firewall-wizards/
   88. http://www.jammed.com/Lists/ISN/
   89. http://www.calderasystems.com/support/security/
   90. http://www.conectiva.com.br/atualizacoes/
   91. http://www.debian.org/security/
   92. http://www.kondara.org/errata/k12-security.html
   93. http://www.esware.com/actualizaciones.html
   94. http://linuxppc.org/security/advisories/
   95. http://www.linux-mandrake.com/en/fupdates.php3
   96. http://www.redhat.com/support/errata/index.html
   97. http://www.suse.de/security/index.html
   98. http://www.turbolinux.com/security/
   99. http://www.yellowdoglinux.com/resources/
  100. http://www.BSDI.COM/services/support/patches/
  101. http://www.freebsd.org/security/security.html
  102. http://www.NetBSD.ORG/Security/
  103. http://www.openbsd.org/security.html
  104. http://www.calderasystems.com/support/forums/announce.html
  105. http://www.cobalt.com/support/resources/usergroups.html
  106. http://distro.conectiva.com.br/atualizacoes/
  107. http://www.debian.org/MailingLists/subscribe
  108. http://www.esware.com/lista_correo.html
  109. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  110. http://www.kondara.org/mailinglist.html.en
  111. http://l5web.laser5.co.jp/ml/ml.html
  112. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  113. http://www.linux-mandrake.com/en/flists.php3
  114. http://www.netbsd.org/MailingLists/
  115. http://www.openbsd.org/mail.html
  116. http://www.redhat.com/mailing-lists/
  117. http://www.slackware.com/lists/
  118. http://www.stampede.org/mailinglists.php3
  119. http://www.suse.com/en/support/mailinglists/index.html
  120. http://www.trustix.net/support/
  121. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  122. http://lists.yellowdoglinux.com/ydl_updates.shtml
  123. http://munitions.vipul.net/
  124. http://www.zedz.net/
  125. http://www.cert.org/nav/alerts.html
  126. http://ciac.llnl.gov/ciac/
  127. http://www.MountainWave.com/
  128. http://www.counterpane.com/crypto-gram.html
  129. http://linuxlock.org/
  130. http://linuxsecurity.com/
  131. http://www.securityfocus.com/
  132. http://www.securityportal.com/
  133. http://lwn.net/2002/0221/kernel.php3
  134. http://www.eklektix.com/
  135. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://www.lwn.net/2002/0221/security.php3   Sergey Lentsov   03 Mar 2002 15:39:33 
Архивное /ru.linux/19861ea1656a1.html, оценка 2 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional