Author: Benjamin D. Thomas
chbg, cups, imagemagick, mysql, xpdf, xtrlock, mysql, sword, squid, gimp, dovecot,
dhcp, bind, vixie-cron, sysklogd, alsa-lib, grep, kernel-utils, ethereal, mpg123,
playmidi, and krb5. The distributors include Conectiva, Debian, Fedora, Gentoo,
Mandrake, Red Hat, SuSE, and TurboLinux.Assurance via Documentation
In all business environments management must give a certain
level of trust to staff in order for work to get done. In
security, trust is extremely important. Security managers must
trust staff to properly setup and configure systems, give
appropriate access, and fix vulnerabilities as they arise.
Trusting staff to get the job done is a fundamental part of
doing business. As a manager, how can one be sure that the
security staff is properly addressing security issues? How
can one be sure that vulnerabilities are fixed and logs are
monitored? Peter F. Drucker, a well known writer on business
management topics once wrote, “if you cannot measure it, you
cannot manage it.”
This is directly relevant to security. How can a manager be
sure that the backups are getting done? Are the IDS and
firewall logs properly monitored? A manager can easily have
trust in employees, but assurance also must be provided.
Management should require staff to log backups, log reviews,
server patching, etc. Rather than trusting staff to get the
job done, it is necessary to have assurance. All general
security maintenance tasks can be, and should be audit-able.
How will extra paper work help security? Will staff get fed
up with all of the extra documentation? The purpose of extra
documentation is not to burden staff, it is to increasingly
justify security spending. If a security department is
properly doing its job, incidents will have little affect.
However, if the department isn’t doing its job, something
catastrophic could happen. It is hard for people not in
security to see the value in spending more money when
there are no security incidents. Having audit-able
documented evidence of thwarted security attempts, log
reviews, etc. can have a huge impact on the image of the
security department. Rather than relying on trust, giving
assurance and quantifying security will help get the budget
necessary to have the appropriate level of protection.
Until next time, cheers!
Benjamin D. Thomas
LinuxSecurity.com
Feature Extras:
Encrypting
Shell Scripts – Do you have scripts that contain sensitive information
like passwords and you pretty much depend on file permissions to keep it secure?
If so, then that type of security is good provided you keep your system secure
and some user doesn’t have a “ps -ef” loop running in an attempt to capture
that sensitive info (though some applications mask passwords in “ps” output).
A 2005
Linux Security Resolution – Year 2000, the coming of the new millennium,
brought us great joy and celebration, but also brought great fear. Some believed
it would result in full-scale computer meltdown, leaving Earth as a nuclear
wasteland. Others predicted minor glitches leading only to inconvenience. The
following years (2001-2004) have been tainted with the threat of terrorism worldwide.
State
of Linux Security 2004 – In 2004, security continued to be a major
concern. The beginning of the year was plagued with several kernel flaws and
Linux vendor advisories continue to be released at an ever-increasing rate.
This year, we have seen the reports touting Window’s security superiority, only
to be debunked by other security experts immediately after release. Also, Guardian
Digital launched the new LinuxSecurity.com, users continue to be targeted by
automated attacks, and the need for security awareness and education continues
to rise.
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to security-discuss-request@linuxsecurity.com
with “subscribe” as the subject.
Thank you for reading the LinuxSecurity.com
weekly security newsletter. The purpose of this document is to provide our readers
with a quick summary of each week’s most relevant Linux security headline.
Contectiva | ||
Conectiva: twiki Fix for twiki remote vulnerability |
||
14th, January, 2005
|
||
Conectiva: xine-lib Fixes for xine-lib vulnerabilities |
||
19th, January, 2005
|
||
Conectiva: libtiff3 Fixes for libtiff vulnerabilities |
||
20th, January, 2005
|
||
Debian | ||
Debian: New mc packages fix several vulnerabilities | ||
14th, January, 2005
|
||
Debian: New gatos packages fix arbitrary code execution |
||
17th, January, 2005
|
||
New playmidi packages fix local root exploit |
||
17th, January, 2005
|
||
Debian: New gallery packages fix several vulnerabilities |
||
17th, January, 2005
|
||
Debian: New queue packages fix buffer overflows |
||
18th, January, 2005
|
||
Debian: New chbg packages fix arbitrary code execution |
||
18th, January, 2005
|
||
Debian: New CUPS packages fix arbitrary code execution |
||
19th, January, 2005
|
||
Debian: New ImageMagick packages fix arbitrary code execution |
||
19th, January, 2005
|
||
Debian: New mysql packages fix insecure temporary files |
||
19th, January, 2005
|
||
Debian: New xpdf packages fix arbitrary code execution |
||
19th, January, 2005
|
||
Debian: New xtrlock packages fix authentication bypass |
||
20th, January, 2005
|
||
Debian: New sword packages fix arbitrary command execution |
||
20th, January, 2005
|
||
Debian: New squid packages fix denial of service |
||
20th, January, 2005
|
||
Fedora | ||
Fedora Core 3 Update: kernel-2.6.10-1.741_FC3 | ||
14th, January, 2005
|
||
Fedora Core 2 Update: system-config-kickstart-2.5.19-1.fc2 | ||
14th, January, 2005
|
||
Fedora Core 3 Update: gimp-2.2.2-0.fc3.2 | ||
16th, January, 2005
|
||
Fedora: NetworkManager-0.3.3-1.cvs20050112.1.fc3 update |
||
17th, January, 2005
|
||
Fedora Core 3 Update: gimp-help-2-0.1.0.6.0.fc3.1 | ||
18th, January, 2005
|
||
Fedora Core 3 Update: gimp-2.2.2-0.fc3.3 | ||
18th, January, 2005
|
||
Fedora Core 2 Update: dovecot-0.99.13-4.FC2 | ||
18th, January, 2005
|
||
Fedora Core 3 Update: dovecot-0.99.13-3.FC3 | ||
18th, January, 2005
|
||
Fedora Core 3 Update: dhcpv6-0.10-11_FC3 | ||
19th, January, 2005
|
||
Fedora Core 3 Update: dhcp-3.0.1-30_FC3 | ||
19th, January, 2005
|
||
Fedora Core 3 Update: bind-9.2.4-8_FC3 | ||
19th, January, 2005
|
||
Fedora Core 3 Update: vixie-cron-4.1-20_FC3 | ||
19th, January, 2005
|
||
Fedora Core 3 Update: sysklogd-1.4.1-26_FC3 | ||
19th, January, 2005
|
||
Fedora Core 3 Update: gpdf-2.8.2-2.2 | ||
19th, January, 2005
|
||
Fedora Core 2 Update: gpdf-2.8.2-2.1 | ||
19th, January, 2005
|
||
Fedora Core 2 Update: cups-1.1.20-11.10 | ||
20th, January, 2005
|
||
Fedora Core 3 Update: cups-1.1.22-0.rc1.8.4 | ||
20th, January, 2005
|
||
Fedora Core 3 Update: alsa-lib-1.0.6-7.FC3 | ||
20th, January, 2005
|
||
Fedora Core 3 Update: grep-2.5.1-31.4 | ||
20th, January, 2005
|
||
Fedora Core 2 Update: xpdf-3.00-3.7 | ||
20th, January, 2005
|
||
Fedora Core 3 Update: xpdf-3.00-10.2 | ||
20th, January, 2005
|
||
Fedora Core 2 Update: kernel-utils-2.4-9.1.131_FC2 | ||
20th, January, 2005
|
||
Fedora Core 3 Update: kernel-utils-2.4-13.1.49_FC3 | ||
20th, January, 2005
|
||
Fedora Core 3 Update: hal-0.4.6-1.FC3 | ||
20th, January, 2005
|
||
Gentoo: Squid Multiple vulnerabilities | ||
16th, January, 2005
|
||
Gentoo | ||
Gentoo: ImageMagick PSD decoding heap overflow |
||
20th, January, 2005
|
||
Gentoo: Ethereal Multiple vulnerabilities | ||
20th, January, 2005
|
||
Mandrake | ||
Mandrake: CUPS multiple vulnerabilities fix |
||
17th, January, 2005
|
||
Mandrake: Updated mpg123 packages fix | ||
19th, January, 2005
|
||
Mandrake: Updated playmidi packages | ||
19th, January, 2005
|
||
Mandrake: Updated xine packages fix | ||
19th, January, 2005
|
||
Red Hat |
||
RedHat: Updated kernel packages fix security | ||
18th, January, 2005
|
||
RedHat: Updated krb5 packages fix security | ||
19th, January, 2005
|
||
RedHat: Updated php packages fix security issues |
||
19th, January, 2005
|
||
SuSE | ||
SuSE: php4, mod_php4 remote code execution | ||
17th, January, 2005
|
||
TurboLinux | ||
TurboLinux: xpdf Buffer overflow | ||
20th, January, 2005
|
||