RPM security (a newbie question)

Todd Zullinger tmz at pobox.com
Thu Apr 2 13:03:32 UTC 2009


Rahul Sundaram wrote:
> Todd Zullinger wrote:
>> While the review guidelines do make sure that the source code
>> matches upstream¹, that doesn't ensure that upstream doesn't have
>> backdoors, holes, malicious content, etc.
>
> That's a totally different question IMO.

No doubt.  I was only mentioning this because I _think_ it is what
Stanisław was getting at.

> We at the distribution level can only check whether there is a
> packaging level attempt at introducing a security hole. Doing a
> complete security audit of all the code that is being included is
> not feasible at all at the distribution level. This btw, has nothing
> to do with RPM or any other packaging method. All distributions work
> on the principle that upstream projects are responsible at the code
> level for their own security. We can add things like compiler
> options and firewalls but that doesn't prevent a upstream security
> hole from being exploited, whether introduced accidentally or not.

I fully agree. :)

And, of course, on top of compiler options and firewalls, SELinux is
one more layer that is added to protect against problems in upstream
code.  If upstream code has some hole that tries to mail off
/etc/passwd somewhere, this is very likely to be denied by SELinux.
And when someone reports the denial, Dan, Miroslav, and the other
SELinux maintainers aren't too likely to allow it without asking what
good reason the upstream code would have to take such an action.

But as you say, it's not possible for any distro to find and fix every
security hole, just as it's not possible to find and fix every bug.
More help is always welcome.

-- 
Todd        OpenPGP -> KeyID: 0xBEAF0CE3 | URL: www.pobox.com/~tmz/pgp
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I always keep a supply of stimulant handy in case I see a snake -
which I also keep handy.
    -- W. C. Fields

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 542 bytes
Desc: not available
URL: <http://listman.redhat.com/archives/fedora-list/attachments/20090402/b6d01e03/attachment-0001.sig>


More information about the fedora-list mailing list