|
|
Subscribe / Log in / New account

Security

Brief items

When being explicit is too much hassle

One of the cardinal rules for security-oriented programming is to deny anything that you have not decided, explicitly, to allow. The Linux Security Modules project, which has its code partially merged into the 2.5 development kernel, was designed around this rule: the author of a security module is required to provide an implementation for every one of the (many) hooks provided by LSM. The LSM designers were worried that module authors could miss the addition of new hooks in the future, and thus unwittingly allow actions that their security regime was intended to prevent. By requiring an implementation of every hook, LSM ensured that module authors would always see - and deal with - any changes.

The real result, however, was that real-world security modules were bloated by boilerplate stub implementations of dozens of unused hooks. It also was difficult to make modules portable across multiple kernel versions. Greg Kroah-Hartman finally got tired of all this, and posted a patch which removes the "implement all hooks" requirement. There has not been any real opposition to this change; it will likely go to Linus soon.

Security issues often go this way. The real-world costs of proposed security regimes reach a level where they outweigh the benefits. At that point, the best thing to do can be to back off before people start to develop unofficial ways around overly onerous requirements.

Comments (1 posted)

Quarterly CERT Summary

The latest quarterly CERT Summary is out; this advisory points out what CERT sees as the most significant outstanding security issues. Four of the five listed issues relate to free software: the mod_ssl worm, the sendmail and tcpdump trojans, and the BIND vulnerabilities. Evidently, the current problems with IE and IIS, and which expose a large portion of the net, are less significant than trojan horses which persisted for a few days (or hours) and affected very few users.

Full Story (comments: 1)

New vulnerabilities

freeswan: Denial of Service

Package(s):freeswan CVE #(s):
Created:December 4, 2002 Updated:December 4, 2002
Description: Bindview discovered a problem in several IPSEC implementations that do not properly handle certain very short packets. IPSEC is a set of security extensions to IP which provide authentication and encryption. Debian's FreeS/WAN package contains this vulnerability, which can lead to kernel crashes.
Alerts:
Debian DSA-201-1 freeswan 2002-12-02

Comments (none posted)

IM: creates temporary files insecurely

Package(s):im CVE #(s):CAN-2002-1395
Created:December 3, 2002 Updated:March 6, 2003
Description: Tatsuya Kinoshita discovered that IM, which contains interface commands and Perl libraries for E-mail and NetNews, creates temporary files insecurely.
  1. The impwagent program creates a temporary directory in an insecure manner in /tmp using predictable directory names without checking the return code of mkdir, so it's possible to seize a permission of the temporary directory by local access as another user.

  2. The immknmz program creates a temporary file in an insecure manner in /tmp using a predictable filename, so an attacker with local access can easily create and overwrite files as another user.
Alerts:
Red Hat RHSA-2003:039-06 im 2003-03-06
Debian DSA-202-2 im 2002-12-06
Debian DSA-202-1 im 2002-12-03

Comments (none posted)

pine: buffer overflow parsing "From:" addresses

Package(s):pine CVE #(s):CAN-2002-1320
Created:November 27, 2002 Updated:January 3, 2003
Description: A malicious user could send a message with a specially crafted "From:" address and cause a segmentation fault on the client. Pine 4.50 fixes this vulnerability (CAN-2002-1320) and several others. Read the full advisory here.
Alerts:
Red Hat RHSA-2002:270-16 pine 2003-01-02
Conectiva CLA-2002:551 pine 2002-12-04
Mandrake MDKSA-2002:084 pine 2002-12-02
Gentoo 200212-1 pine 2002-12-02
EnGarde ESA-20021127-032 pine 2002-11-27

Comments (none posted)

Resources

Linux Security Week

The December 2 Linux Security Week newsletter from LinuxSecurity.com is available.

Full Story (comments: none)

Events

Annual Computer Security Applications Conference

The Annual Computer Security Applications Conference is happening December 9 to 13 in Las Vegas; click below for more information.

Full Story (comments: none)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2002, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds