File: group.yml

package info (click to toggle)
scap-security-guide 0.1.65-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 71,936 kB
  • sloc: xml: 179,374; sh: 69,771; python: 23,819; makefile: 23
file content (23 lines) | stat: -rw-r--r-- 1,323 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
documentation_complete: true

title: 'Minimize Software to Minimize Vulnerability'

description: |-
    The simplest way to avoid vulnerabilities in software is to avoid
    installing that software. On {{{ full_name }}},
    {{%- if pkg_system == "rpm" -%}}
        the RPM Package Manager (originally Red Hat Package Manager, abbreviated RPM)
    {{%- elif pkg_system == "dpkg" -%}}
        the Package Manager (originally {{{ weblink(link="https://www.debian.org/doc/manuals/debian-faq/pkgtools.en.html", text="apt") }}} ),
    {{%- endif %}}
    allows for careful management of
    the set of software packages installed on a system. Installed software
    contributes to system vulnerability in several ways. Packages that
    include setuid programs may provide local attackers a potential path to
    privilege escalation. Packages that include network services may give
    this opportunity to network-based attackers. Packages that include
    programs which are predictably executed by local users (e.g. after
    graphical login) may provide opportunities for trojan horses or other
    attack code to be run undetected. The number of software packages
    installed on a system can almost always be significantly pruned to include
    only the software for which there is an environmental or operational need.