Author: Benjamin D. Thomas
SELinux Making Progress
First released in December 2000,
SELinux has continued making progress in development. It was introduced containing
mandatory access controls and an example security policy demonstrating its usage.
Over the past three years, the NSA and a team of volunteers have continued making
improvements on a consistent basis.
SELinux can provide access control
for kernel objects, services, processes, files, directories, sockets, network
interfaces, and others. It provides protection mechanisms against many well-known
problems because it eliminates the dependence on setuid/setgid binaries. In
a nutshell, mandatory access control provides a finer and more in-depth level
of control for administrators. Rather than being bound to the rules established
by software, effectively an administrator can fully set the security policy.
The latest release of SELinux includes
an updated base kernel and enhanced policy language. SELinux is a patch that
can be applied to the kernel of virtually any Linux system. At the moment, many
of the major Linux distributions are developing patches that will give users
the ability to easily take advantage of SELinux. When used correctly, SELinux
can provide administrators with a greater level of assurance.
Although the technology that SELinux
takes advantage of can provide many benefits, if used incorrectly a system can
still remain vulnerable. Poor administration practices and uninformed staff
can be problematic. For example, incorrectly implementing the software could
give a false impression of security, when in reality problems still exist. When
evaluating a new tool or kernel patch it is important to take each step slowly.
The system should be setup in a test environment and fully evaluated. Also,
before moving a system into production, everyone involved should be fully trained
to deal with incidents if they arise.
If you are interested in finding
out more about SELinux, please see the following link.
Until next time, cheers!
Benjamin D. Thomas
LinuxSecurity
Feature Extras:
Interview
with Vincenzo Ciaglia, Founder of Netwosix
– In this article, a brief introduction of Netwosix is given and the project
founder Vincenzo Ciaglia is interviewed. Netwosix is light Linux distribution
for system administrators and advanced users.Introduction
to Netwox and Interview with Creator Laurent Constantin
– In this article Duane Dunston gives a brief introduction to Netwox, a combination
of over 130 network auditing tools. Also, Duane interviews Laurent Constantin,
the creator of Netwox.Managing
Linux Security Effectively in 2004
– This article examines the process of proper Linux security management in
2004. First, a system should be hardened and patched. Next, a security routine
should be established to ensure that all new vulnerabilities are addressed.
Linux security should be treated as an evolving process.[ Linux
Advisory Watch ] – [ Linux
Security Week ] – [ PacketStorm
Archive ] – [ Linux Security
Documentation ]
Linux Advisory Watch
is a comprehensive newsletter that outlines the security vulnerabilities that
have been announced throughout the week. It includes pointers to updated packages
and descriptions of each vulnerability.
[ Subscribe
]
Distribution: | Conectiva | ||
2/23/2004 | kernel | ||
Privilege escalation vulnerability Bug can be used by local attackers to obtain root privileges. |
|||
2/23/2004 | XFree86 | ||
Multiple vulnerabilities Greg MacManus from iDEFENSE Labs discovered[3][5] two vulnerabilities in |
|||
Distribution: | Debian | ||
2/20/2004 | XFree86 | ||
Multiple vulnerabilities Various buffer-overflow and input-non-validation vulnerabilities are fixed |
|||
2/20/2004 | kernel | ||
Privilege escalation vulnerability This patch is for the ia64 architecture. |
|||
2/23/2004 | lbreakout2 | ||
Environment non-sanitation vulnerability This bug could be exploited by a local attacker to gain the privileges of |
|||
2/23/2004 | mailman | ||
Multiple vulnerabilities Patch for cross-site scripting and denial of service vulnerabilities. |
|||
2/23/2004 | synaesthesia | ||
Insecure file creation This type of vulnerability can usually be easily exploited to execute arbitary |
|||
2/23/2004 | hsftp | ||
Format string vulnerability An attacker, able to create files on a remote server, could potentially |
|||
2/23/2004 | pwlib | ||
Multiple vulnerabilities This library is most notably used in several applications implementing the |
|||
2/24/2004 | metamail | ||
Multiple vulnerabilities An attacker could create a carefully-crafted mail message which will execute |
|||
Distribution: | Fedora | ||
2/26/2004 | libxml2 | ||
Buffer overflow vulnerability Updated libxml2 packages are available to fix an overflow when parsing the |
|||
Distribution: | Immunix | ||
2/26/2004 | kernel | ||
Privilege escalation vulnerability While they found the flaw on the 2.4 series of Linux kernels, the 2.2 series |
|||
Distribution: | Mandrake | ||
2/24/2004 | kernel | ||
Privilege escalation vulnerability A flaw in the Linux kernel, versions 2.4.24 and previous, could allow a |
|||
2/25/2004 | mtools | ||
Inappropriate use of privilege The mformat program can be used to gain root privileges when run suid root. |
|||
2/26/2004 | kernel | ||
Privilege escalation vulnerabilities This patches one mremap() and several driver vulnerabilites, each capable |
|||
Distribution: | NetBSD | ||
2/20/2004 | Multiple | ||
Addendums to recent advisories Here are three mailings from the NetBSD announce list that discuss various |
|||
2/20/2004 | OpenSSL | ||
Denial of service vulnerability OpenSSL 0.9.6k ASN.1 parser had a possible denial-of-service vulnerability. |
|||
Distribution: | Red Hat |
||
2/26/2004 | mod_python | ||
Denial of service vulnerability Updated mod_python packages that fix a denial of service vulnerability are |
|||
2/26/2004 | libxml2 | ||
Buffer overflow vulernability Updated libxml2 packages that fix an overflow when parsing remote resources |
|||
2/26/2004 | mod_python | ||
Denial of service vulnerability Updated mod_python packages that fix a denial of service vulnerability are |
|||
2/26/2004 | libxml2 | ||
Improper parse vulnerability Updated libxml2 packages that fix an overflow when parsing remote resources |
|||
Distribution: | Suse | ||
2/23/2004 | XFree86 | ||
Multiple vulnerabilities Successful exploitation of these bugs leads to local root access. |
|||
Distribution: | Trustix | ||
2/23/2004 | kernel | ||
2.2.25 Privilege escalation vulnerability Through this hole, it is possible for anyone with a local account on the |
|||
Distribution: | Turbolinux | ||
2/23/2004 | kernel | ||
Privilege escalation vulnerability A Linux memory management subsystem (mremap) issue has been discovered in |
|||