-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 18-Sep-2002/13:22 -0400, Jason Costomiris <[EMAIL PROTECTED]> wrote:
>On Wed, Sep 18, 2002 at 01:14:19PM -0400, Anthony E. Greene wrote:
>: Specifically 0.9.6b-28. Earlier 0.9.6b packages (ie; 0.9.6b-24 and
>: 0.9.6b-8) may not have the fix for this vulnerability.
>: 
>: I really wish RH would make some kind of explicit announcement about this.
>
>You mean, like this:
>
>http://rhn.redhat.com/errata/RHSA-2002-160.html

Not quite. That announcement does not _explicitly_ say that "The
vulnerability exploited by the linux.slapper.worm was fixed in [errata
RHSA-2002-160 | openssl RPM package 0.9.6b-28]" or something very similar.

While it's possible for users to read and understand the implications of
RHSA-2002-160, a major incident like this should be specifically addressed
by a Red Hat announcement. It does not take an genius to anticipate the
number of questions that were bound to be asked in the absence of an
explicit statement by the largest Linux vendor in the U.S. market.

I went looking for just such an announcement at the RH web site, but ended
up at the wrong page. The announcement is posted at:

  http://www.redhat.com/support/alerts/linux_slapper_worm.html

What I would like to have seen is a short statement in the original CERT
advisory. CERT advisories are routinely read by thousands of system
administrators. They provide a small space for comments by vendors. This
CERT advisory <http://www.cert.org/advisories/CA-2002-27.html> contains
comments by Apple, Covalent, and Inktomi. The Apple comment is similar to
what I would like to have seen from Red Hat:

- -----------------------------------------------------------------------
Apple Computer, Inc.

The vulnerability described in this report has been addressed by

    * Security Update 2002-08-23 for Mac OS X 10.2 (Jaguar), and by
    * Security Update 2002-08-02 for Mac OS X 10.1.5. 
- -----------------------------------------------------------------------

A similar comment by Red Hat might look like this:

- -----------------------------------------------------------------------
Red Hat, Inc.

The vulnerability described in this report was addressed by RHSA-2002:160
on 2002-08-05 for Red Hat Linux 6.2, 7.0, 7.1, 7.2, and 7.3. For details
see <http://www.redhat.com/support/alerts/linux_slapper_worm.html>.
- ------------------------------------------------------------------------


The CERT advisory states that vendor comments are added as they are
received. It's a little late now, but it would be nice if RH actually
included comments in these types of CERT advisories in the future.


Tony
- -- 
Anthony E. Greene <mailto:[EMAIL PROTECTED]>
OpenPGP Key: 0x6C94239D/7B3D BD7D 7D91 1B44 BA26  C484 A42A 60DD 6C94 239D
AOL/Yahoo Chat: TonyG05      HomePage: <http://www.pobox.com/~agreene/>
Linux: the choice of a GNU Generation. <http://www.linux.org/>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Anthony E. Greene 0x6C94239D <[EMAIL PROTECTED]>

iD8DBQE9iNTWpCpg3WyUI50RAokDAKDM40o2qOqs3OdXLv/WKa9cuxcUKwCg2BSe
BmWq0wzS6RLZoiBz12BSGmM=
=pax/
-----END PGP SIGNATURE-----



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to