[CentOS] A good Centos CVE FAQ entry being born here Was: RE: CVE-2014-0196 and upgrade of Centos 6
Jason Pyeron
jpyeron at pdinc.us
Thu May 29 12:59:20 UTC 2014
> -----Original Message-----
> From: Johnny Hughes
> Sent: Thursday, May 29, 2014 8:46
>
> I want to be very clear on CVE's and the way they are tested
> at CentOS.
>
> First, I want to ensure everyone knows that CentOS does NOT usually do
> any verification with respect to CVE issues. We build what Red Hat
> releases when they release it. Their security and
> engineering teams are
> the ones that research the problem, develop a plan, write code, build
> the new packages and test to verify that:
>
> 1) There was a problem that needs fixing.
> 2) The fix proposed actually fixes the vulnerability (in RHEL).
>
> We then grab the released code after Red Hat publicly releases it and
> build it for CentOS.
>
> What does this mean for CentOS users ... it means that YOU are
> responsible to test the there is no longer an issue in YOUR
> environment
> after you do the install. If you want a CERTIFIED fix that has been
> tested, that is what Red Hat provides in RHEL. The reason
> they charge a
> subscription price is because the do all this testing and they provide
> assurance that the issues are known, fixed, tested, and certified as
> mitigated.
>
> All of that being said, If you are concerned with the Security aspects
> of an update, you have to have ALL updates before that one also
> installed.
E.g.
> If you have an older glibc then why would you think that
> something that calls that library would necessarily be secure
> by adding
> an update to the Kernel.
> All libraries (so ALL PREVIOUS PACKAGES),
> INCLUDING the package in question that fixes the CVE, need to be
> installed to be confident that you have mitigated a problem. This is
> CLEARLY stated on every Red Hat security page ... here is a quote from
an exemplar CVE from the upstream provider:
>
> "Before applying this update, make sure all previously released errata
> relevant to your system have been applied."
>
> You can't JUST install the package that has the CVE fix and leave
> everything else at an older level. Certainly if you do, you must
> validate that in THAT scenario (old packageZ, older packageY, new
> packageX). Even in RHEL, if you only install one Security update and
> none of the preceding updates, you would need to test that
> the issue was
> mitigated in that scenario as that would NOT have been tested or
> certified by any team.
>
<snip/>
>
> To be clear, installing only Security Updates and not also all updates
> preceding that Security Update is not (nor has it ever been)
> recommended
> ... if you do it, you are not using a tested configuration. This is
> true of ANY operating system, not just CentOS.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- -
- Jason Pyeron PD Inc. http://www.pdinc.us -
- Principal Consultant 10 West 24th Street #100 -
- +1 (443) 269-1555 x333 Baltimore, Maryland 21218 -
- -
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
This message is copyright PD Inc, subject to license 20080407P00.
More information about the CentOS
mailing list