|
|
Subscribe / Log in / New account

Security

SLIDE into SELinux policy development

February 7, 2007

This article was contributed by Jake Edge.

Complaints about SELinux often center around its overall complexity and the difficulty in developing policies for applications that run on the system. The SELinux Policy IDE (SLIDE) is an Eclipse plug-in that provides a framework for developing and testing policies that should help reduce some of these problems.

SELinux is a security framework that uses the Linux Security Module (LSM) kernel interface to implement mandatory access control (MAC) mechanism. MAC controls the capabilities that a particular process can have based on the policies installed by the administrator. Those policies govern much more than traditional UNIX-style permissions and for that reason can be difficult to generate and especially to test. Readers of this page will remember an overview that covers a bit more detail about SELinux internals.

SLIDE is an effort to ease the process of developing policies with an eye towards applications and daemons that have policy support. To do that, it uses the popular Eclipse integrated development environment (IDE) as a way to organize and control policy development. It provides all of the expected capabilities within Eclipse: syntax highlighting, auto-completion, integrated searching, etc. One of the biggest hurdles that developers face is keeping track of the various interfaces, types, roles, and modules and how they interact; SLIDE organizes and indexes them, along with their comments, and makes that available in a nice GUI.

The testing features are particularly useful; one can set up a remote machine (or local virtual machine) that can accept policy updates from SLIDE. Once the updates have been accepted, various tests can be kicked off on the remote machine and the audit log can be monitored to determine whether the policies covered all of the required resources. If not, the policy can be modified in SLIDE, pushed out to the remote machine and tested again.

SLIDE is a project of Tresys Technology, which has released it under the GPL. It does not appear to have attracted much of a development community, at least yet and the SourceForge project page has not been updated in quite some time. The documentation and trac site provided by Tresys are excellent. Perhaps the SourceForge project was an attempt to enlist community aid which did not attract the level of interest that they might have hoped for. It is a fairly esoteric subject that does not cause too many open source developers to itch. Many of those developers, perhaps, simply turn SELinux off.

As with most complex tools, SLIDE will not be terribly helpful to those who know little about SELinux policies. It has a steep learning curve even if you have a bit of that background, but for experts it is probably quite intuitive. For those reasons, it probably will not help other projects to generate policies for their software. In order to foster more applications with SELinux policies, it is likely that experts in policy development will have to join forces with these other projects to produce and maintain the policies. Using SLIDE will likely speed up that process and it is a welcome addition to a fairly sparse toolkit.

Comments (4 posted)

New vulnerabilities

bcfg2: local password disclosure

Package(s):bcfg2 CVE #(s):
Created:February 1, 2007 Updated:February 7, 2007
Description: The bcfg2 configuration file has incorrect permissions, this can be used for a local password disclosure to unprivileged users.
Alerts:
Debian-Testing DTSA-32-1 bcfg2 2007-02-01

Comments (none posted)

gd: buffer overflow

Package(s):gd CVE #(s):CVE-2007-0455
Created:February 7, 2007 Updated:November 18, 2009
Description: The gd graphics library contains a buffer overflow which could enable a remote attacker to execute arbitrary code. Note that various other packages include code from gd and could also be vulnerable.
Alerts:
Arch Linux ASA-201701-1 libwmf 2017-01-01
Debian DSA-1936-1 libgd2 2009-11-17
Red Hat RHSA-2008:0146-01 gd 2008-02-28
Ubuntu USN-473-1 libgd2 2007-06-11
OpenPKG OpenPKG-SA-2007.016 gd 2007-05-18
Trustix TSLSA-2007-0007 fetchmail, gd, php, postgresql, samba 2007-02-13
Fedora FEDORA-2007-150 gd 2007-02-12
Fedora FEDORA-2007-149 gd 2007-02-12
rPath rPSA-2007-0028-1 gd 2007-02-08
Mandriva MDKSA-2007:038 php 2006-02-06
Mandriva MDKSA-2007:036 libwmf 2006-02-06
Mandriva MDKSA-2007:035 gd 2006-02-06

Comments (2 posted)

kdelibs: cross-site scripting

Package(s):kdelibs konqeror CVE #(s):CVE-2007-0537
Created:February 5, 2007 Updated:August 13, 2007
Description: Konqueror 3.5.5 does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment, a related issue to CVE-2007-0478.
Alerts:
Mandriva MDKSA-2007:157 kdelibs 2007-08-10
Gentoo 200703-10 kdelibs 2007-03-10
rPath rPSA-2007-0052-1 kdelibs 2007-03-07
Ubuntu USN-420-1 kdelibs 2007-02-06
Mandriva MDKSA-2007:031 kdelibs 2007-02-02

Comments (none posted)

mpg123: denial of service

Package(s):mpg123 CVE #(s):CVE-2007-0578
Created:February 5, 2007 Updated:February 7, 2007
Description: The http_open function in httpget.c in mpg123 before 0.64 allows remote attackers to cause a denial of service (infinite loop) by closing the HTTP connection early.
Alerts:
Mandriva MDKSA-2007:032 mpg123 2006-02-02

Comments (none posted)

postgresql: insufficient verification

Package(s):postgresql CVE #(s):CVE-2007-0555 CVE-2007-0556
Created:February 5, 2007 Updated:March 19, 2007
Description: PostgreSQL has two vulnerabilities that allow an authenticated attacker with the permissions to run arbitrary SQL to launch a denial-of-service attack or possibly read out random chunks of memory. Since attacks to require authenticated access, the security hole is only considered medium risk. See announcement for additional information.
Alerts:
Gentoo 200703-15 postgresql 2007-03-16
Red Hat RHSA-2007:0068-02 postgresql 2007-03-14
Debian DSA-1261-1 postgresql 2007-02-15
Ubuntu USN-417-3 postgresql 2007-02-09
Mandriva MDKSA-2007:037-1 postgresql 2007-02-08
Red Hat RHSA-2007:0067-01 postgresql 2007-02-07
Red Hat RHSA-2007:0064-01 postgresql 2007-02-07
rPath rPSA-2007-0025-2 postgresql 2007-02-06
Ubuntu USN-417-2 postgresql 2007-02-06
Mandriva MDKSA-2007:037 postgresql 2006-02-06
rPath rPSA-2007-0025-1 postgresql 2007-02-06
Fedora FEDORA-2007-198 postgresql 2007-02-05
Fedora FEDORA-2007-197 postgresql 2007-02-05
Ubuntu USN-417-1 postgresql-7.4/-8.0/-8.1 2007-02-05

Comments (none posted)

samba: several vulnerabilities

Package(s):samba CVE #(s):CVE-2007-0452 CVE-2007-0453 CVE-2007-0454
Created:February 6, 2007 Updated:March 14, 2007
Description: Three vulnerabilities have been fixed in Samba 3.0.24: a potential denial of service bug, a buffer overrun in the NSS host lookup Winbind library on Solaris and a format string bug in the afsacl.so VFS plugin.
Alerts:
Red Hat RHSA-2007:0061-02 samba 2007-03-14
Red Hat RHSA-2007:0060-01 samba 2007-02-15
SuSE SUSE-SA:2007:016 samba 2007-02-15
Gentoo 200702-01 samba 2007-02-13
Fedora FEDORA-2007-220 samba 2007-02-08
Fedora FEDORA-2007-219 samba 2007-02-08
Slackware SSA:2007-038-01 samba 2007-02-07
Ubuntu USN-419-1 samba 2007-02-06
rPath rPSA-2007-0026-1 samba 2007-02-07
Mandriva MDKSA-2007:034 samba 2006-02-05
Debian DSA-1257-1 samba 2007-02-05

Comments (none posted)

thttpd: remote file access

Package(s):thttpd CVE #(s):
Created:February 1, 2007 Updated:February 7, 2007
Description: The start-stop-daemon command from thttpd performs a chdir / command, this allows all files that are readable by the thttpd process to be remotely accessed by unauthenticated users.
Alerts:
Gentoo 200701-28 thttpd 2007-01-31

Comments (none posted)

wireshark: multiple vulnerabilities

Package(s):wireshark CVE #(s):CVE-2007-0456 CVE-2007-0457 CVE-2007-0458 CVE-2007-0459
Created:February 5, 2007 Updated:March 14, 2007
Description: There are multiple problems in Wireshark versions 0.10.14 to 0.99.4.
Alerts:
Red Hat RHSA-2007:0066-01 wireshark 2007-03-14
Fedora FEDORA-2007-216 wireshark 2007-02-08
Fedora FEDORA-2007-207 wireshark 2007-02-06
rPath rPSA-2007-0023-1 wireshark 2007-02-03
Mandriva MDKSA-2007:033 wireshark 2007-02-02

Comments (6 posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2007, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds