LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-08-2010, 09:51 AM   #1
back40
LQ Newbie
 
Registered: May 2010
Posts: 12

Rep: Reputation: 0
how are security alerts for packages found?


I'm curious how various distros handle discovery of security alerts that affect their packages. Is it all up to a package maintainer to follow one of the security alert mailing lists or the source project's mailing list? Or is there a way that it is more automated, such as a script for comparing package names and versions against some security alert service?

The reason I'm wondering is that I have some apps that I compile myself, either for specific options or to get a specific version. And sometimes I have to compile their dependencies too. This means I'm now responsible for watching for security updates of all these things instead of my distro's default security checking of installed packages. It seems like a lot of work to track something like this manually.

any thoughts or experience with this? thanks!
 
Old 12-08-2010, 10:27 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by back40 View Post
(..) I have some apps that I compile myself, (..) This means I'm now responsible
IMO that's not as much a distribution issue as it is your freedom to choose: you chose to pass up on on what your distribution offered and take on responsibility yourself. Many distributions provide a security email list so subscribing and setting up filtering rules in your MUA should be real easy.
 
Old 12-08-2010, 01:23 PM   #3
never say never
Member
 
Registered: Sep 2009
Location: Indiana, USA
Distribution: SLES, SLED, OpenSuse, CentOS, ubuntu 10.10, OpenBSD, FreeBSD
Posts: 195

Rep: Reputation: 37
Here is how I keep up.

www.us-cert.gov

The government puts out weekly Vulnerability Summaries for Technical and Non-technical people. They are currently rated by threat level High, Medium, Low. It lists the "Primary Vendor -- Product" a Description, the date it was published, a score, and source and patch info links.You can subscribe to a mailing list or be notified via RSS or Atom feeds.

There is no automated system I know of, because there are just too many forks, versions . . .

Though you could probably use RSS feeds and some filters to get pretty close to just what you need.

Hope this helps.
 
1 members found this post helpful.
Old 12-09-2010, 09:08 AM   #4
back40
LQ Newbie
 
Registered: May 2010
Posts: 12

Original Poster
Rep: Reputation: 0
@unSpawn - I agree that when you do this you take on that responsibility yourself, that's why I'm curious how people do this in general, so I can do the same for my self-installed apps. Seems like a lot of work, which makes me appreciate all the effort that goes into providing a distro even more.

@never say never - I see what you mean about all the variations. Just version numbers and application names would be ok, but it occurs to me now that distros split applications into different packages, they may patch source code or make other changes, they could be compiled with different options that may or may not affect the vulnerability, etc.

Thanks for the responses.
 
Old 12-27-2010, 05:15 PM   #5
back40
LQ Newbie
 
Registered: May 2010
Posts: 12

Original Poster
Rep: Reputation: 0
I came across this tool that looks like it would be very helpful in this:
https://cassandra.cerias.purdue.edu/main/index.html

You can add Vendors or Products and it will scan various lists like secunia for alerts that match your custom list.
 
Old 12-27-2010, 10:02 PM   #6
never say never
Member
 
Registered: Sep 2009
Location: Indiana, USA
Distribution: SLES, SLED, OpenSuse, CentOS, ubuntu 10.10, OpenBSD, FreeBSD
Posts: 195

Rep: Reputation: 37
Gonna check that out, looks like it could save me some time. Thanks for posting what you found.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
This weeks Security Alerts jeremy Linux - Security 0 05-13-2002 07:15 PM
This weeks Security Alerts jeremy Linux - Security 0 11-21-2001 11:19 AM
This weeks Security Alerts jeremy Linux - Security 0 07-11-2001 11:07 AM
This weeks Security Alerts jeremy Linux - Security 0 07-04-2001 10:07 AM
Security Alerts jeremy Linux - Security 0 06-27-2001 08:03 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:55 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration