|
|
Subscribe / Log in / New account

CentOS 5, RHEL 5.6, and security updates

By Jake Edge
February 23, 2011

CentOS is forever in catch-up mode. That's because it repackages Red Hat's Enterprise Linux (RHEL) for those who would prefer an enterprise distribution without the costs associated with RHEL. That regularly puts the distribution in something of a pinch, because Red Hat, quite reasonably, follows its own schedule for updates. That pinch is being felt strongly right now with two RHEL releases in quick succession (6.0 followed by 5.6). But it isn't just the distribution developers who are being pinched, as the security updates for CentOS 5 have also been held up by the ongoing work to release CentOS 5.6 and 6.0.

CentOS had already been struggling for a bit in its efforts to put out CentOS 6 after the release of RHEL 6 in November. Then, on January 13, Red Hat released its latest update for RHEL 5, 5.6. At that point, CentOS was faced with a bit of a dilemma: should it focus on 6.0 or work on 5.6 first? The decision was made to work on 5.6 and 6.0 in parallel more or less. That meant that CentOS had two fairly large jobs at hand.

With each Red Hat release, the CentOS developers need to go through the packages and remove any Red Hat-specific elements: artwork, trademarks, %description lines in RPM spec files, and so on. Once that's done, there is a QA process that the packages go through before a final release can be done. Turning RHEL 6 into CentOS 6 is a time-consuming process, but that's also true with 5.6. But there is an additional problem with 5.6: security updates.

Normally, CentOS follows along with Red Hat security updates, releasing its versions as quickly as it can after the RHEL update is released. But 5.6 (or any "point" release of RHEL) comes with a whole slew of updated packages, any of which might have a security update—or be a dependency of a package updated for security reasons. Since there are no CentOS 5.6 packages (yet), these security updates fall into a crack in the CentOS development process. CentOS can either backport the fixes into the 5.5 package, or release an updated 5.6 package along with all of its dependencies, some of which may not have passed the QA process yet.

Except for those updates that Red Hat has marked as "critical", CentOS has chosen to do neither of the above, according to lead developer Karanbir Singh. That may leave its users vulnerable to a number of potentially exploitable security holes. In email, Singh said that the CentOS team is looking at Red Hat's security updates to fix those that are deemed "remotely-exploitable", but that doesn't seem to jibe with what is getting released for CentOS 5. Since the release of RHEL 5.6, there have been no CentOS 5 security updates.

In fact, the last CentOS 5 security update was for the kernel on January 6, a week before RHEL 5.6 dropped. In the interim, Red Hat has released 22 updates, most with "low" or "moderate" impact, but a few that are "important" (two for the kernel, and one each for openoffice.org, krb5, and java-1.6.0-openjdk), and three "critical" bugs (java-1.5.0-ibm, flash-plugin, and java-1.6.0-sun). [Update: As pointed out in the comments (and by Singh), those last three packages are closed source and thus not distributed by CentOS.] There is also a pre-5.6 wireshark vulnerability that has yet to be patched. The full list can be seen here.

It may well be that some of those vulnerabilities only apply to the updated packages that came with RHEL 5.6, but it is extremely unlikely that's true of all of them. The critical Java updates are perhaps the most worrisome, since they come with vague vulnerability descriptions (e.g. "Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors."). The critical flash-plugin update is also of concern, but one would guess that there aren't all that many CentOS users running browsers with Flash on a server-oriented distribution.

It's also not at all clear that none of these vulnerabilities are remotely exploitable, as there are, at least, some remote denial of service flaws (which can sometimes be turned into remote exploits). For CentOS installations with untrusted users, there are plenty of locally exploitable flaws in the list. Even without untrusted users, a flaw in a content management system or other web application, for example, may provide an attacker the local access they need to use a local exploit to potentially compromise the entire system.

CentOS is pretty clearly dropping the ball on security updates here, which is probably not what its users expect. While the project is understaffed and is always looking for additional contributors, CentOS 5 users may not be aware that nearly two-dozen security updates (so far) have gone by the wayside while the QA process for 5.6 is ongoing. The CentOS FAQ clearly states that the goal is to have updates available in 72 hours after Red Hat puts them out and, by and large, the project meets that goal—except during the point-release gap.

That gap has stretched longer than the project would like, as Singh notes:

Our goal is to meet the 2 - 4 weeks for a point release. And we have slipped a bit for the last couple of releases. There are plans underfoot to make sure that this sort of a thing is reduced as much as possible, but make changes within a framework that does not break user trust, process and machine integrity.

According to Singh, the 5.6 release is imminent ("within the next few days"), which will allow the project to release the updates soon after. There have been complaints in the past about updates that didn't exactly track the upstream RHEL release (i.e. changes for CentOS 5.5 that are not in RHEL 5.5), but doing so in previous releases (e.g. the 5.4 to 5.5 transition) "was the right thing to do" and when there is a "serious threat to user deployed machines, we would do it again", he said.

There has been some discussion of the problem on the centos-devel mailing list, with former CentOS developer Dag Wieers being particularly critical of the delays. He is concerned that users are being misled: "I don't think most of the users ever expected to be without security updates for 10 weeks or more when choosing CentOS, and that is an important characteristic." Singh and others agree that there are things that the project could be doing better, but do not see this as the right time to address those problems. As Singh puts it:

The fact that there are disfunctional setups in place is not something that anyone ( I for one ) are [denying]. But the fact that a call for help got zero traction for weeks is also worth considering. We could go back, stop everything that is going on at the moment and try to process engineer a better setup before we again start working on CentOS-6, I'd say a target of 2 to 3 months would be reasonable if we did that.

On the other hand, we can just get this done out of the door and then look at process engineering for the future. We are better, stronger as a group with a much larger contributor base than ever before - I see no reason why we could not strengthen that even further and split the roles out.

As part of that discussion, though, Singh muddies the waters further about which kinds of security fixes are actually being considered for CentOS 5:

all updates to the /5/ tree are monitored and anything which has a remote or local exploit will get pushed into the /5/ tree; things in 5.6 and against 5.6 that [don't] meet that criteria wait for 5.6 release. build order, linking, inheriting upstream testing etc etc to blame.

But the reality seems to be rather different, as all manner of vulnerabilities are still languishing in the CentOS 5 tree.

It is a difficult situation for the project. It must necessarily trail the Red Hat releases, and keeping up with security updates while trying to push two releases out is difficult. Doing so would likely push back the releases even further. On the other hand, though, CentOS users may well be unaware that there have been potentially significant updates while they wait for CentOS 5.6. Unless those users follow the RHEL update announcements, they don't even know that there are vulnerabilities they may need to be aware of.

While there are no guarantees about security updates for CentOS (or any other community distribution for that matter), enterprise distribution users tend to expect regular updates, without significant, somewhat arbitrary, gaps. The biggest problem here is really one of communication as the CentOS team should try to make it widely known that security updates are being held back. It probably also makes sense for the project to try to figure out a way to keep up with the update stream even in the point release gap.

Another alternative would be to put CentOS 6 on hold, while focusing on CentOS 5.6. There are, after all, no CentOS 6 users yet, while CentOS 5 has many. It would also be nice to see some of the companies that benefit from CentOS (like various hosting providers, for example) put some effort into helping the project. Those companies are getting an awful lot from CentOS without, visibly at least, putting much back in.

Index entries for this article
SecurityDistribution security


to post comments

CentOS 5, RHEL 5.6, and security updates

Posted Feb 24, 2011 3:06 UTC (Thu) by dowdle (subscriber, #659) [Link] (4 responses)

As mentioned in the article... this does typically happen during the gap of time when CentOS is trying to put out new releases (and now 3 with 6.0, 5.6, and 4.9) out so this is nothing new.

I wish the article had covered how well the other RHEL clones are doing.

Scientific Linux - SL has released several betas and a RC for 6... so it is close but still not done. I haven't heard a peep about 5.6 yet... nor 4.9... but I'm not very attuned to their community.

Oracle - This commercial clone of RHEL/CentOS only released 6 a little over a week ago. I haven't heard anything about 5.6 or 4.9. Hmmm, does Oracle even have a 4 series? I'm not sure.

To clarify about 4.9, Red Hat didn't release refreshed .iso images... just packages. I'm not sure how each of the clone makers are going to handle 4.9. .isos or just packages?

Any any event, I think criticism of CentOS isn't really called for when they seem to be pulling their weight relative to the others. That isn't to say that I think this LWN article was critical (mainly informative) but I don't really agree with DAG or others who might feel otherwise. The CentOS developers are clearly aware of their issues and aren't trying to mislead anyone.

The advice goes... if you need updates faster than the community project can provide them and you can't build them yourself, you should probably buy one or more RHN entitlements.

At least CentOS is distinguishing between critical updates and less important ones as I think they should. I'm not trying to wave my hands and say security updates aren't important... because they certainly are. How have all of the other, non-clone distros, faired in updating the issues that also affect them? I'd chance a guess and say that almost all of them are doing better than many of the commercial OS vendors.

CentOS 5, RHEL 5.6, and security updates

Posted Feb 24, 2011 4:20 UTC (Thu) by ESRI (guest, #52806) [Link] (2 responses)

Oracle released Unbreakable Linux 5.6 on January 20th. Scientific Linux has a rolling 5.6 release (as they do with 6.0).

Obviously, Oracle has a lot of resources to devote to their releases, and I'm not really sure how SL does their work, but I believe they have some financial backing (full-time people?).

For CentOS it seems to be a manpower shortage... how to solve it remains to be seen (it's not easy to become a member of the "core" group where likely the most help is needed). I think it might not hurt them to recruit or bring in someone who isn't focused as much on doing the technical work, but can instead target documenting, organizing and publicizing work flows and procedures and making a concerted effort to allow more people to participate and help CentOS out during the point release period. This way things don't necessarily slow down while Johnny or Karanbir are having to deal with restless mailing list complainers or issues at $DAYJOB.

CentOS 5, RHEL 5.6, and security updates

Posted Feb 24, 2011 4:43 UTC (Thu) by dowdle (subscriber, #659) [Link] (1 responses)

Checking SL's front page it says their latest releases are 5.5 and 4.8. Checking their FTP directories, it says 5.5 and 4.8. The document you linked to says, "Linux ALPHA" so I'm guessing it is an alpha release just like they have released test releases for 6. With CentOS 5.6 supposedly only a few days away... that seems more advanced than an alpha release but I don't want to count those chickens before they are hatched.

Oracle was my bad. I hadn't seen their 5.6 release noted on distrowatch.com and didn't hunt down the info on their site.

CentOS 5, RHEL 5.6, and security updates

Posted Feb 24, 2011 14:35 UTC (Thu) by ESRI (guest, #52806) [Link]

I actually haven't tried SL's 5.6 "alpha", so I don't know how far along it is (I have been using their 6.0 rolling release for a few weeks now without problems). They do seem to make their dog food available immediately for the masses to consume whereas CentOS uses a more private QA process (no public release until final).

Note -- I don't mean any of this as a slight to the CentOS crew. I agree with you -- if you need quicker turnaround on any of this, you should be paying RH money.

CentOS 5, RHEL 5.6, and security updates

Posted Feb 25, 2011 19:22 UTC (Fri) by oak (guest, #2786) [Link]

Maybe they could put up a list of the security updates that aren't handle yet and regularly update it with information which packages are being processed / already done, so that others can help with packages that are important for them?

CentOS 5, RHEL 5.6, and security updates

Posted Feb 24, 2011 14:04 UTC (Thu) by clugstj (subscriber, #4020) [Link]

If you are short on manpower and care about your users, IMHO, you would ignore 6.0 (you have no users running that since it doesn't yet exist) until you had 5.6 buttoned up.

CentOS 5, RHEL 5.6, and security updates

Posted Feb 24, 2011 15:30 UTC (Thu) by thoger (guest, #51049) [Link] (1 responses)

RH does not make Extras/Supplementary SRPMS (java-*-sun, java-*-ibm, flash-plugin) available so they are not re-distributed by CentOS, AFAIK.

CentOS 5, RHEL 5.6, and security updates

Posted Feb 25, 2011 0:45 UTC (Fri) by jake (editor, #205) [Link]

> RH does not make Extras/Supplementary SRPMS (java-*-sun, java-*-ibm,
> flash-plugin) available so they are not re-distributed by CentOS, AFAIK.

Indeed. That was an error in the article, which I have updated to reflect.

jake

CentOS 5, RHEL 5.6, and security updates

Posted Mar 1, 2011 19:05 UTC (Tue) by gnu_andrew (guest, #49515) [Link]

I'm the maintainer of IcedTea6 which is used to create the java-1.6.0-openjdk packages for Fedora and RHEL. One of the OpenJDK updates will be the floating point bug fix which has beem publicised recently. Unpatched, certain floating point numbers will hang the VM (and hence javac as it is written in Java) and this could be triggered by user input. Both packages correspond to IcedTea6 1.7.x releases which were made for these updates and do not require 5.6 to my knowledge. I would get these updates ASAP and leave 6 for now.


Copyright © 2011, Eklektix, Inc.
This article may be redistributed under the terms of the Creative Commons CC BY-SA 4.0 license
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds