[LWN Logo]
[LWN.net]

Sections:
 Main page
 Security
 Kernel
 Distributions
 Development
 Commerce
 Linux in the news
 Announcements
 Letters
All in one big page

See also: last week's Security page.

Security


News and Editorials

Stores find security in Linux (ZDNet). ZDNet has a very short article, trying to give an overview of the superiority of Linux's security over DOS (No, that's not a typo). "The inherent security of the Linux environment was a key motivation for Burlington Coat Factory in choosing the operating system for a large retail point-of-sale environment." There is a companion article that gives a little more detail.

Introduction to msec (MandrakeSecure). Here's an article that provides insight into what exactly msec is, what it does, and how it can be customized to suit your tastes and environment. "The Mandrake-Security package, more commonly known as msec, has been one of the base packages in Mandrake Linux since it was first introduced in version 7.0. Since that time, msec has undergone a lot of changes, most notably the transformation from being a series of shell scripts in 8.1 to the python-based system it is currently in 8.2."

Caldera International - Updated Caldera Public Keys. Caldera generated new security keys. Now that the new key is out, Caldera seems to be getting caught up with security alerts.

Security Reports

Debian update for analog. Debian has issued a security for the analog web log analyzer that addresses a cross-site scripting vulnerability. Updates are highly recommended.

Caldera update to XFree86. This update to XFree86, fixes a problem in which any user with local X access can exploit the MIT-SHM extension and gain read/write access to any shared memory segment on the system. Packages prior to XFree86-4.1-12 are vulnerable.

Security advisory for the Name Service Cache Daemon (nscd). Caldera issued an advisory that nscd has a default behavior that does not allow applications to validate DNS "PTR" records against "A" records. "Caldera recommends that this problem be worked around by disabling the hosts cache in the nscd configuration file."

Caldera OpenLinux 3.1.1, startkde script vulnerability. startkde sets the LD_LIBRARY_PATH environment variable to "/opt/kde2/lib:" which includes the current working directory in the library search path. This exposes users to shared library attacks.

Caldera fix for packages previous to cups-1.1.10-5. This CUPS update fixes a buffer overflow vulnerability when reading names of attributes in versions prior to 1.1.10-5. It does not appear to fix the more recent buffer overflow vulnerability found in versions prior to 1.1.14 described below under "Updates".

web scripts. The following web scripts were reported to contain vulnerabilities:

  • phpBB 1.4.4 still suffers from a variation of the cross site scripting vulnerability discovered in phpBB 1.4.2.

Proprietary products. The following proprietary products were reported to contain vulnerabilities:

Updates

Apache mod_ssl buffer overflow vulnerability. According to this announcement "modssl versions prior to 2.8.7-1.3.23 (Feb 23, 2002) make use of the underlying OpenSSL routines in a manner which could overflow a buffer within the implementation. This situation appears difficult to exploit in a production environment[...]." (First LWN report: March 7).

This week's updates:

Previous updates:

Buffer overflow in CUPS. Versions of the Common Unix Print System prior to 1.1.14 have a buffer overflow vulnerability. (First LWN report: February 14).

This week's updates:

Previous updates:

Problem loading untrusted images in imlib. Versions of imlib prior to 1.9.13 used the NetPBM package in ways which "make it possible for attackers to create image files such that when loaded via software which uses Imlib, could crash the program or potentially allow arbitrary code to be executed." (First LWN report: March 28).

This week's updates:

Previous updates:

An off-by-one error in the channel code of OpenSSH versions 2.0 to 3.0.2 has been found. Users are advised to upgrade to OpenSSH 3.1, or to apply the relevant security update. "This bug can be exploited locally by an authenticated user logging into a vulnerable OpenSSH server or by a malicious SSH server attacking a vulnerable OpenSSH client." (First LWN report: March 14).

Also see the the advisory from Pine for this vulnerability.

This week's updates:

Previous updates:

Denial of service vulnerability in squid-2.4STABLE1. The squid server can be out of service for a few seconds when it reloads after a crash caused by a burst of certain FTP requests. See the September 18th bug report for details.

This week's updates:

Previous updates:

Resources

The Common Vulnerabilities and Exposures (CVE) dictionary achieved a major milestone with over 2,000 official entries. MITRE's CVE Lexicon of Information Security Vulnerabilities aims to standardize the names for all publicly known vulnerabilities and security exposures.

Linux security week. The and publications from LinuxSecurity.com are available.

Pierre-Alain Fayolle and Vincent Glaume have written a study on buffer overflows and the existing protections a Linux system may use against them; A Buffer Overflow Study Attacks & Defenses. The authors are Computer Science students at Ecole Nationale Supérieure d'Electronique, d'Informatique et de Radiocommunications de Bordeaux. A similar paper was published in 2000 by researchers at the Oregon Graduate Institute of Science & Technology.

Events

Upcoming Security Events.
Date Event Location
April 4 - 7, 2002SANS 2002Orlando, FL., USA
April 5 - 7, 2002RubiconDetroit, Michigan, USA
April 7 - 10, 2002Techno-Security 2002 ConferenceMyrtle Beach, SC
April 14 - 15, 2002Workshop on Privacy Enhancing Technologies 2002(Cathedral Hill Hotel)San Francisco, California, USA
April 15 - 19, 2002InfoSec 2002UniNet IRC network (irc.uninet.edu) - channel #infosec
April 16 - 19, 2002The Twelfth Conference on Computers, Freedom & Privacy(Cathedral Hill Hotel)San Francisco, California, USA
April 23 - 25, 2002Infosecurity Europe 2002Olympia, London, UK
May 1 - 3, 2002cansecwest/core02Vancouver, Canada
May 4 - 5, 2002DallasConDallas, TX., USA
May 12 - 15, 20022002 IEEE Symposium on Security and Privacy(The Claremont Resort)Oakland, California, USA
May 13 - 14, 20023rd International Common Criteria Conference(ICCC)Ottawa, Ont., Canada
May 13 - 17, 200214th Annual Canadian Information Technology Security Symposium(CITSS)(Ottawa Congress Centre)Ottawa, Ontario, Canada
May 27 - 31, 20023rd International SANE Conference(SANE 2002)Maastricht, The Netherlands
May 29 - 30, 2002RSA Conference 2002 Japan(Akasaka Prince Hotel)Tokyo, Japan

For additional security-related events, included training courses (which we don't list above) and events further in the future, check out Security Focus' calendar, one of the primary resources we use for building the above list. To submit an event directly to us, please send a plain-text message to lwn@lwn.net.

Section Editor: Dennis Tenney


April 4, 2002

LWN Resources


Secured Distributions:
Astaro Security
Castle
Engarde Secure Linux
Immunix
Kaladix Linux
NSA Security Enhanced
Openwall GNU/Linux
Trustix

Security Projects
Bastille
Linux Security Audit Project
Linux Security Module
OpenSSH

Security List Archives
Bugtraq Archive
Firewall Wizards Archive
ISN Archive

Distribution-specific links
Caldera Advisories
Conectiva Updates
Debian Alerts
Kondara Advisories
Esware Alerts
LinuxPPC Security Updates
Mandrake Updates
Red Hat Errata
SuSE Announcements
Turbolinux
Yellow Dog Errata

BSD-specific links
BSDi
FreeBSD
NetBSD
OpenBSD

Security mailing lists
Caldera
Cobalt
Conectiva
Debian
Esware
FreeBSD
Kondara
LASER5
Linux From Scratch
Linux-Mandrake
NetBSD
OpenBSD
Red Hat
Slackware
Stampede
SuSE
Trustix
turboLinux
Yellow Dog

Security Software Archives
munitions
ZedZ.net (formerly replay.com)

Miscellaneous Resources
CERT
CIAC
Comp Sec News Daily
Crypto-GRAM
LinuxLock.org
LinuxSecurity.com
Security Focus
SecurityPortal

 

Next: Kernel

 
Eklektix, Inc. Linux powered! Copyright © 2002 Eklektix, Inc., all rights reserved
Linux ® is a registered trademark of Linus Torvalds