Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   12 Jan 2001  02:34:31
 To : All
 Subject : URL: http://lwn.net/2001/0111/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [security.png]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]Development
     [7]Commerce
     [8]Linux in the news
     [9]Announcements
     [10]Back page
    [11]All in one big page
    
    See also: [12]last week's Security page.
    
 Security
 
 News and Editorials
 
    Free Intrusion Detection Software. Snort developer Martin Roesch sent
    us [13]a note on the [14]snort 1.7 release, bringing it to our
    attention because, with the new release, he felt snort now had a
    feature set competitive with commercial Intrusion Detection Systems
    (IDS). His note inspired us to go out to take a look at snort, its
    commercial IDS competitors, and other free software IDS systems.
    
    The commercial IDS systems we examined included products from
    [15]Symantec, [16]Cisco and [17]ISS, just to get an overview of the
    common features included in these systems. Then we went back to snort,
    checking out its features, both old and new. With the addition of
    dynamic rules, a Statistical Anomaly Detection preprocessor, Oracle
    database support support (MySQL and PostgreSQL have been supported for
    some time) and more, we had to agree that snort is now comparable to
    its commercial competitors.
    
    What about free software competitors? We took a long walk through
    various software databases (Freshmeat, Appwatch, etc.) looking for
    free software intrusion detection systems other than snort. We found
    that the term "intrusion detection system" has many meanings.
    
    One common interpretation was monitoring data integrity: the detection
    of modifications to files on a system, which was pioneered by
    [18]Tripwire. There are a lot of projects in that arena, [19]samhain,
    [20]AIDE, [21]claymore and [22]Toby IDS, to name a few.
    
    Then there was a scattering of others, such as [23]LIDS, the Linux
    Intrusion Detection System. LIDS is actually a patch to the Linux
    kernel which brings Mandatory Access Control to Linux, allowing
    fine-grained control of file permissions (e.g., even root can't modify
    or delete files without the proper permissions), process permissions
    and more. [24]LIDS 1.0.4 was announced this week, providing support
    for the just-released Linux 2.4.0 kernel.
    
    Various other projects termed "intrusion detection systems" provide
    monitoring of login behaviors, syslog replacements and other
    functionalities.
    
    So what definition of intrusion detection fits snort? From our reading
    of the webpage (and that of the similar commercial products we
    mentioned), snort is intended to detect network-based security
    attacks. Given this definition, it does not have many free software
    competitors.
    
    Worthy of note, however, is [25]FreeVeracity. FreeVeracity claims to
    provide both data integrity (like Tripwire) and network intrusion
    detection. It is actually a version of the commercial product
    [26]Veracity, from Rocksoft, released under the [27]Free World
    License, a controversial topic in and of itself. Its intent is to
    provide a method whereby commercial companies can provide source code
    for their software freely to Linux and BSD users, yet restrict its use
    (and their licensing revenue) on commercial operating systems. Since
    it restricts the systems on which the covered software can be used,
    the FWL is not a free software license.
    
    So, take a look at your personal ideology. For the purists, snort is
    available and now more full-featured than ever. If you agree with the
    intent of the FreeWorld license (to promote free operating systems
    over commercial ones) and can live with its use of a Point-and-Click
    contract, you may also want to check out FreeVeracity. If neither yet
    meets your needs, then you'll need to continue using a commercial
    product, at least for now.
    
 Security Reports
 
    ReiserFS long-file-name vulnerability.
    [28]Extremely long directory names under ReiserFS have been reported
    to cause the Linux kernel to crash. This bug is also potentially
    exploitable to gain local root access, though that has not yet been
    confirmed. In fact, the vulnerability itself has proven very difficult
    to reproduce. Nonetheless, both ReiserFS and VFS are getting an audit
    for this and possibly other buffer overrun problems. Patches to
    temporarily disable long directory names (just in case) have been made
    available. Check our coverage of this problem in this week's
    [29]kernel page for more details and expect an update on the problem
    next week.
    
    Immunix reports tmp file race problems in twelve packages.
    Immunix sent out [30]an advisory covering potential temporary file
    race conditions in twelve different packages that they uncovered as a
    result of a new warning message from glibc whenever mktemp(),
    tempname(), etc., is used. Affected packages include:
    
    apache 1.3.14 and also 2.0a9, the htpasswd and htdigest helper
    programs
    tcpdump arpwatch version 2.1a4
    squid 2.3 STABLE and 2.4
    linuxconf 1.19r through 1.23r, the vpop3d program
    mgetty 1.1.22 and 1.1.23
    gpm 1.19.3
    wu-ftpd 2.6.1, the privatepw program
    inn 2.2.3
    diffutils 2.7, the sdiff program
    getty_ps 2.0.7j
    rdist 6.1.5
    shadow-utils 19990827 and 20000902, the useradd program
    
    Since Immunix is based on Red Hat 7.0, all the same problems should be
    present in that version of Red Hat. Other distributions may be
    impacted as well.
    
    This week's updates:
      * [31]Immunix, all packages
      * [32]Debian, mgetty
        
    IBM HTTP Server denial-of-service vulnerability.
    A [33]denial-of-service vulnerability has been reported in the IBM
    HTTP server, which is based on Apache. In turn, IBM's WebSphere
    product is based on the IBM HTTP server and is reported to also be
    vulnerable. The problem lies in the Apfa cache used in the IBM HTTP
    server. Disabling the Apfa cache is one work-around to the problem.
    Since Apache does not use the Apfa cache, it should not be affected.
    Check BugTraq ID [34]2175 for more details.
    
    cgi-bin scripts.
    The following cgi-bin scripts were reported to contain
    vulnerabilities:
      * [35]Ibrow newsdesk.cgi is reported to contain a file disclosure
        vulnerability. No vendor update is currently available.
      * [36]Multiple Fastgraf cgi scripts, including whois.cg,
        [37]ping.cgi, traceroute.cgi and finger.cgi, contain poor
        meta-character checking, allowing them to be exploited to remotely
        execute commands under the uid of the webserver. A workaround is
        provided and the author has been notified.
      * [38]eXtropia bbs_forum.cgi, a perl-based script, is reported to
        contain a vulnerability which can allow remote execute of
        arbitrary commands, due to insufficient input validation. A patch
        to correct the problem is provided. Check BugTraq ID [39]2177 for
        more details.
        
    Commercial products.
    The following commercial products were reported to contain
    vulnerabilities:
      * Macromedia's Flash Player, reported [40]last week to contain a
        buffer overflow. This week, [41]Macromedia responded,
        acknowledging the problem but explaining why the security impact
        was "not significant". Unfortunately, significant or not, they did
        not provide a patch or an update for the problem.
      * [42]StorageSoft ImageCast IC3 is reported to contain a
        denial-of-service vulnerability. A fix is promised in an upcoming
        release; no date is provided.
      * [43]NetScreen Firewall network appliance contains a
        denial-of-service vulnerability. Updated versions of the software
        have been released by the vendor to resolve the problem. Check
        BugTraq ID [44]2176 for more details.
        
 Updates
 
    Secure Locate buffer overflow.
    Check the [45]November 30th, 2000 LWN Security Summary for the
    original report of this problem.
    
    This week's updates:
      * [46]Conectiva
        
    Previous updates:
      * [47]Debian (December 21st, 2000)
      * [48]Linux-Mandrake (December 21st, 2000)
      * [49]Red Hat (December 21st, 2000)
        
    xchat URL handler bug.
    Originally reported in the [50]August 24th, 2000 LWN Security Summary.
    Versions of xchat from 1.3.9 through and including 1.4.2 can allow
    commands to be passed from IRC to a shell. Check [51]BugTraq ID 1601
    for more details.
    
    This week's updates:
      * [52]LinuxPPC
        
    Older updates:
      * [53]Red Hat (August 24th, 2000)
      * [54]Linux-Mandrake (August 31st, 2000)
      * [55]Conectiva (August 31st, 2000)
      * [56]Debian (August 31st, 2000)
      * [57]Helix GNOME (September 7th, 2000)
      * Slackware current upgraded to xchat 1.5.7 (see [58]Changelogs)
        (September 14th, 2000)
      * [59]FreeBSD (September 21st, 2000)
      * [60]Slackware, official advisory (September 21st, 2000)
      * [61]TurboLinux (September 21st, 2000)
        
    perl/mailx. Check the [62]August 10th, 2000 LWN Security Summary for
    details.
    
    This week's updates:
    [63]LinuxPPC
        
    Previous updates:
      * [64]Red Hat (August 8th, 2000)
      * [65]Debian (August 8th, 2000)
      * [66]Caldera (August 9th, 2000)
      * [67]Linux-Mandrake (August 9th, 2000)
      * [68]SuSE Linux (August 17th, 2000)
      * [69]Conectiva (August 17th, 2000)
      * Yellow Dog Linux (two updates: [70]mailx, and [71]perl).
      * [72]Slackware (September 7th, 2000)
        
    Red Hat umb-scheme permissions problem.
    Red Hat reported a file permissions problem with umb-scheme, believed
    to be Red Hat specific, in the [73]August 10th, 2000 LWN Security
    Summary.
    
    This week's updates:
      * [74]LinuxPPC
        
    Previous updates:
      * [75]Red Hat (August 10th, 2000)
      * Conectiva, not vulnerable (August 10th, 2000)
      * Linux-Mandrake, not vulnerable (August 10th, 2000)
        
    man/makewhatis vulnerability.
    A /tmp file vulnerability was reported in makewhatis versions 1.5e and
    higher. Check the [76]July 6th LWN Security Summary for the original
    report.
    
    This week's updates:
      * [77]LinuxPPC
        
    Previous updates:
      * [78]Red Hat (July 6th, 2000)
      * [79]Linux-Mandrake (July 13th, 2000)
      * [80]Caldera (July 13th, 2000)
      * [81]SuSE (not vulnerable) (July 13th, 2000)
      * [82]Trustix (July 13th, 2000)
      * [83]Kondara (November 23rd)
        
    GNU emacs inadequate PTY permissions vulnerability.
    Check the [84]June 22nd, 2000 LWN Security Summary for the initial
    report of this problem, affecting GNU emacs 20.6 and earlier. GNU
    emacs 20.7 contains a fix for the problem. xemacs was not affected.
    
    This week's updates:
      * [85]LinuxPPC
        
    Previous updates:
      * [86]Red Hat (June 22nd, 2000)
      * [87]Linux-Mandrake (January 4th)
        
    wu-ftp vulnerability.
    Check the [88]June 15th, 2000 LWN Security Summary for the original
    report of this problem. An upgrade to wu-ftpd 2.6.1 should fix the
    problem.
    
    This week's updates:
      * [89]LinuxPPC
        
    Previous updates:
      * [90]WU-FTPD source code patch (June 29th, 2000)
      * [91]Debian (June 29th, 2000)
      * [92]Caldera (June 29th, 2000)
      * [93]Connectiva (June 29th, 2000)
      * [94]Red Hat (June 29th, 2000)
      * [95]SuSE (June 29th, 2000)
      * [96]Slackware (June 29th, 2000)
      * [97]Linux-Mandrake (July 6th, 2000)
      * [98]NetBSD (July 13th, 2000)
      * [99]TurboLinux (July 27th, 2000)
      * [100]CERT Advisory CA-2000-13 (October 5th, 2000)
      * [101]Slackware (October 5th, 2000)
        
    openldap tmplink vulnerability.
    A tmplink vulnerability was reported in openlap the week of the
    [102]April 27th, 2000. Check [103]Red Hat Bugzilla ID 10714 for more
    details.
    
    This week's updates:
      * [104]LinuxPPC
        
    Previous updates:
      * [105]Red Hat (April 27th, 2000)
      * [106]Linux-Mandrake (April 27th, 2000)
      * [107]Caldera (May 11th, 2000)
      * [108]Yellow Dog (May 11th, 2000)
      * [109]Independence (May 11th, 2000)
      * [110]TurboLinux (May 25th, 2000)
      * [111]Debian (June 1st, 2000)
      * [112]Conectiva (June 1st, 2000, updated July 27th, 2000)
        
    piranha.
    Issues with the piranha packages were covered in the main editorial of
    the [113]April 27th LWN Security Summary.
    
    This week's updates:
      * [114]LinuxPPC
        
    Previous updates:
      * [115]Red Hat (April 27th, 2000)
      * [116]Independence (April 27th, 2000)
      * [117]Yellow Dog (May 11th, 2000)
        
    ircii buffer overflow.
    On March 10th, a remotely exploitable buffer overflow was reported in
    ircii, an irc client, with all versions prior to 4.4M. Check the
    [118]April 6th LWN Security Summary for our first report of this
    problem or BugTraq ID [119]1046 for more details.
    
    This week's updates:
      * [120]LinuxPPC
        
    Previous updates:
      * [121]SuSE (April 6th, 2000)
      * [122]Red Hat (April 6th, 2000)
      * [123]Yellow Dog (May 11th, 2000)
        
    gpm improper permissions handling.
    Improper permissions handling in gpm, the virtual console cut and
    paste utility and mouse server, was discussed in the [124]March 30th
    LWN Security Summary.
    
    This week's updates:
      * [125]LinuxPPC
        
    Previous updates:
      * [126]SuSE (April 6th, 200)
      * [127]Red Hat (April 20th, 2000)
      * [128]Linux-Mandrake (April 20th, 2000)
      * [129]Slackware (April 27th, 2000)
      * [130]Independence (May 11th, 2000)
      * [131]TurboLinux (June 1st, 2000)
        
 Resources
 
    Analysis of Auditable Port Scanning Techniques. Guido Bakker posted
    his [132]whitepaper examining port scan methods, in particular,
    analysis of auditable techniques.
    
 Events
 
    Summercon 2001. The announcement for this year's [133]Summercon 2001
    event has been released. Summercon 2001 will be held June 1-3, 2001,
    in Amsterdam, the Netherlands. This is the first year that Summercon
    will be held outside of the United States. In addition, a small fee
    for entrance will be charged and the press will be allowed to attend.
    Summercon is one of the oldest living security/hacker conferences,
    with origins tied to early years of Phrack Magazine.
    
    Upcoming security events.
    
    Date Event Location
    February 7-8, 2001. [134]Network and Distributed System Security
    Symposium San Diego, CA, USA.
    February 13-15, 2001. [135]PKC 2001 Cheju Island, Korea.
    February 19-22, 2001. [136]Financial Cryptography 2001 Grand Cayman,
    BWI.
    February 24-March 1, 2001. [137]InfoSec World 2001 Orlando, FL, USA.
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [138]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [139]lwn@lwn.net.
    
    Section Editor: [140]Liz Coolbaugh
    January 11, 2001
    
                               [141]Click Here 
    Secure Linux Projects [142]Bastille Linux
    [143]Immunix
    [144]Nexus
    [145]SLinux [146]NSA Security-Enhanced
    [147]Trustix
    Security List Archives
    [148]Bugtraq Archive
    [149]Firewall Wizards Archive
    [150]ISN Archive
    Distribution-specific links
    [151]Caldera Advisories
    [152]Conectiva Updates
    [153]Debian Alerts
    [154]Kondara Advisories
    [155]Esware Alerts
    [156]LinuxPPC Security Updates
    [157]Mandrake Updates
    [158]Red Hat Errata
    [159]SuSE Announcements
    [160]Yellow Dog Errata
    BSD-specific links
    [161]BSDi
    [162]FreeBSD
    [163]NetBSD
    [164]OpenBSD
    Security mailing lists [165]Caldera
    [166]Cobalt
    [167]Conectiva
    [168]Debian
    [169]Esware
    [170]FreeBSD
    [171]Kondara
    [172]LASER5
    [173]Linux From Scratch
    [174]Linux-Mandrake
    [175]NetBSD
    [176]OpenBSD
    [177]Red Hat
    [178]Slackware
    [179]Stampede
    [180]SuSE
    [181]Trustix
    [182]turboLinux
    [183]Yellow Dog
    Security Software Archives
    [184]munitions
    [185]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [186]CERT
    [187]CIAC
    [188]Comp Sec News Daily
    [189]Crypto-GRAM
    [190]LinuxLock.org
    [191]Linux Security Audit Project
    [192]LinuxSecurity.com
    [193]OpenSSH
    [194]OpenSEC
    [195]Security Focus
    [196]SecurityPortal
    
    
                                                         [197]Next: Kernel
    
    [198]Eklektix, Inc. Linux powered! Copyright Щ 2001 [199]Eklektix,
    Inc., all rights reserved
    Linux Ю is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=132-000-001-001
    3. http://lwn.net/2001/0111/
    4. http://lwn.net/2001/0111/kernel.php3
    5. http://lwn.net/2001/0111/dists.php3
    6. http://lwn.net/2001/0111/devel.php3
    7. http://lwn.net/2001/0111/commerce.php3
    8. http://lwn.net/2001/0111/press.php3
    9. http://lwn.net/2001/0111/announce.php3
   10. http://lwn.net/2001/0111/backpage.php3
   11. http://lwn.net/2001/0111/bigpage.php3
   12. http://lwn.net/2001/0104/security.php3
   13. http://lwn.net/2001/0111/a/snort.php3
   14. http://www.snort.org/
   15. http://www.symantec.com/
   16. http://www.cisco.com/
   17. http://www.iss.net/
   18. http://www.tripwire.com/
   19. http://www.la-samhna.de/samhain/index.html
   20. http://www.cs.tut.fi/~rammer/aide.html
   21. http://linux.rice.edu/magic/claymore/
   22. http://www.buttsoft.com/~thumper/software/sysadmin/Toby/
   23. http://www.lids.org/
   24. http://lwn.net/2001/0111/a/lidsannounce.php3
   25. http://freeveracity.com/
   26. http://www.rocksoft.com/rocksoft/
   27. http://www.freeworldlicence.org/
   28. http://lwn.net/2001/0111/a/reiserfs-bug.php3
   29. http://lwn.net/2001/0111/kernel.php3#reiserfs
   30. http://lwn.net/2001/0111/a/sec-immunix-tmprace.php3
   31. http://lwn.net/2001/0111/a/sec-immunix-tmprace.php3
   32. http://lwn.net/2001/0111/a/sec-debian-mgetty.php3
   33. http://securityfocus.com/frames/?content=/vdb/bottom.html%3Fvid%3D2175
   34. http://www.securityfocus.com/bid/2175
   35. http://www.securityfocus.com/bid/2172
   36. http://lwn.net/2001/0111/a/sec-fastgraf1.php3
   37. http://lwn.net/2001/0111/a/sec-fastgraf2.php3
   38.
 http://securityfocus.com/frames/?content=/templates/archive.pike%3Fthreads%3D1%2
 6list%3D1%26start%3D2001-01-07%26fromthread%3D0%26tid%3D155252%26end%3D2001-01-1
 3%26
   39. http://www.securityfocus.com/bid/2177
   40. http://lwn.net/2001/0104/security.php3#flash
   41. http://lwn.net/2001/0111/a/flashupdate.php3
   42. http://www.securityfocus.com/bid/2174
   43. http://www.securityfocus.com/archive/1/155149
   44. http://www.securityfocus.com/bid/2176
   45. http://lwn.net/2000/1130/security.php3#slocate
   46. http://lwn.net/2001/0111/a/con-slocate.php3
   47. http://lwn.net/2000/1221/a/deb-slocate.php3
   48. http://lwn.net/2000/1221/a/sec-lm-slocate.php3
   49. http://lwn.net/2000/1221/a/sec-rh-slocate.php3
   50. http://lwn.net/2000/0824/security.php3#xchat
   51. http://www.securityfocus.com/bid/1601
   52. http://linuxppc.org/security/advisories/xchat-1.6.1-1.php3
   53. http://lwn.net/2000/0824/a/rh-xchat.php3
   54. http://lwn.net/2000/0831/a/lm-xchat-2.php3
   55. http://lwn.net/2000/0831/a/con-xchat.php3
   56. http://lwn.net/2000/0831/a/deb-xchat.php3
   57. http://lwn.net/2000/0907/a/hx-xchat.php3
   58. http://www.slackware.com/changelog/current.php3
   59. http://lwn.net/2000/0921/a/fb-xchat.php3
   60. http://lwn.net/2000/0921/a/sl-xchat2.php3
   61. http://lwn.net/2000/0921/a/tl-xchat.php3
   62. http://lwn.net/2000/0810/security.php3
   63. http://linuxppc.org/security/advisories/perl-5.6.0-1.php3
   64. http://lwn.net/2000/0810/a/rh-mailx.php3
   65. http://lwn.net/2000/0810/a/deb-mailx.php3
   66. http://lwn.net/2000/0810/a/cald-sperl.php3
   67. http://lwn.net/2000/0810/a/lm-perl.php3
   68. http://lwn.net/2000/0817/a/suse-perl.php3
   69. http://lwn.net/2000/0817/a/con-perl.php3
   70. http://www.yellowdoglinux.com/resources/errata/YDU-20000810-2.txt
   71. http://www.yellowdoglinux.com/resources/errata/YDU-20000810-1.txt
   72. http://lwn.net/2000/0907/a/sl-perl.php3
   73. http://lwn.net/2000/0810/security.php3#umb-scheme
   74. http://linuxppc.org/security/advisories/umb-scheme-3.2-16.php3
   75. http://lwn.net/2000/0810/a/rh-scheme.php3
   76. http://lwn.net/2000/0706/security.php3#man/makewhatis
   77. http://linuxppc.org/security/advisories/man-1.5h1-2.6.x.php3
   78. http://lwn.net/2000/0706/a/rh-makewhatis.php3
   79. http://lwn.net/2000/0713/a/lm-makewhatis.php3
   80. http://lwn.net/2000/0713/a/cald-makewhatis.php3
   81. http://lwn.net/2000/0713/a/su-makewhatis.php3
   82. http://lwn.net/2000/0713/a/tr-makewhatis.php3
   83. http://lwn.net/2000/1123/a/sec-kondara-man.php3
   84. http://lwn.net/2000/0622/security.php3#emacs
   85. http://linuxppc.org/security/advisories/emacs-20.7-10a.php3
   86. http://lwn.net/2000/0622/a/rh-emacs.php3
   87. http://lwn.net/2001/0104/a/lm-emacs.php3
   88. http://lwn.net/2000/0615/security.php3#wu-ftpd
   89. http://linuxppc.org/security/advisories/wu-ftpd-2.6.1-6.php3
   90.
 ftp://ftp.wu-ftpd.org/pub/wu-ftpd/quickfixes/apply_to_2.6.0/lreply-buffer-overfl
 ow.patch
   91. http://lwn.net/2000/0629/a/db-wu-ftpd.php3
   92. http://lwn.net/2000/0629/a/caldwuftp.php3
   93. http://lwn.net/2000/0629/a/conwuftp2.php3
   94. http://lwn.net/2000/0629/a/rh-wuftpd.php3
   95. http://lwn.net/2000/0629/a/su-wuftpd.php3
   96. http://lwn.net/2000/0629/a/sl-wuftpd.php3
   97. http://lwn.net/2000/0706/a/mdrake-wu-ftpd.php3
   98.
 http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%
 26date%3D2000-07-8%26msg%3D20000710161802.91E032A43%40orchard.arlington.ma.us
   99. http://lwn.net/2000/0727/a/tl-ftpd.php3
  100. http://www.cert.org/advisories/CA-2000-13.html
  101. http://lwn.net/2000/1005/a/sec-wuftpd-slackware.php3
  102. http://lwn.net/2000/0427/security.php3#openldap
  103. http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=10714
  104. http://linuxppc.org/security/advisories/openldap_1.2.9-6.php3
  105. http://lwn.net/2000/0427/a/rh-openldap.html
  106. http://lwn.net/2000/0427/a/mand-ldap.html
  107. ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt
  108. http://www.yellowdoglinux.com/resources/errata/YDU-2000502-2.txt
  109. http://independence.seul.org/security/2000/files/PISA-21-APR-00-004
  110. http://lwn.net/2000/0525/a/tl-openldap.html
  111. http://lwn.net/2000/0601/a/db-many2.html
  112. http://lwn.net/2000/0727/a/cn-openldap.php3
  113. http://lwn.net/2000/0427/security.phtml
  114. http://linuxppc.org/security/advisories/piranha_0.4.14-1.php3
  115. http://lwn.net/2000/0427/a/rh-piranha2.html
  116. http://independence.seul.org/security/2000/files/PISA-24-APR-00-005
  117. http://www.yellowdoglinux.com/resources/errata/YDU-2000502-1.txt
  118. http://lwn.net/2000/0406/security.php3#ircii
  119. http://www.securityfocus.com/vdb/bottom.html?vid=1046
  120. http://linuxppc.org/security/advisories/ircii_4.4M.php3
  121. http://lwn.net/2000/0406/a/su-ircii.html
  122. http://lwn.net/2000/0406/a/rh-ircii.html
  123. http://www.yellowdoglinux.com/resources/errata/YDU-20000507-2.txt
  124. http://lwn.net/2000/0330/security.php3#gpm
  125. http://linuxppc.org/security/advisories/gpm_1.19.3-0.6.php3
  126. http://lwn.net/2000/0406/a/suse-gpm.html
  127. http://lwn.net/2000/0420/a/rh-gpm.html
  128. http://lwn.net/2000/0420/a/lm-gpmimwheel.html
  129. http://lwn.net/2000/0427/a/sl-emacsgpm.html
  130. http://independence.seul.org/security/2000/files/PISA-13-APR-00-003
  131. http://lwn.net/2000/0601/a/tl-gpm.html
  132.
 http://securityfocus.com/frames/?content=/templates/archive.pike%3Fthreads%3D1%2
 6list%3D1%26start%3D2000-12-31%26fromthread%3D0%26tid%3D154894%26end%3D2001-01-0
 6%26
  133. http://lwn.net/2001/0111/a/summercon.php3
  134. http://www.isoc.org/ndss01/
  135. http://caislab.icu.ac.kr/pkc01/
  136. http://fc01.ai/
  137. http://www.misti.com/conference_show.asp?id=OS01
  138. http://securityfocus.com/calendar
  139. mailto:lwn@lwn.net
  140. mailto:lwn@lwn.net
  141. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
  142. http://bastille-linux.sourceforge.net/
  143. http://www.immunix.org/
  144. http://Nexus-Project.net/
  145. http://www.slinux.org/
  146. http://www.nsa.gov/selinux/
  147. http://www.trustix.com/
  148. http://www.securityfocus.com/bugtraq/archive/
  149. http://www.nfr.net/firewall-wizards/
  150. http://www.jammed.com/Lists/ISN/
  151. http://www.calderasystems.com/support/security/
  152. http://www.conectiva.com.br/atualizacoes/
  153. http://www.debian.org/security/
  154. http://www.kondara.org/errata/k12-security.html
  155. http://www.esware.com/actualizaciones.html
  156. http://www.linuxppc.com/security/
  157. http://www.linux-mandrake.com/en/fupdates.php3
  158. http://www.redhat.com/support/errata/index.html
  159. http://www.suse.de/security/index.html
  160. http://www.yellowdoglinux.com/resources/errata.shtml
  161. http://www.BSDI.COM/services/support/patches/
  162. http://www.freebsd.org/security/security.html
  163. http://www.NetBSD.ORG/Security/
  164. http://www.openbsd.org/security.html
  165. http://www.calderasystems.com/support/forums/announce.html
  166. http://www.cobalt.com/support/resources/usergroups.html
  167. http://distro.conectiva.com.br/atualizacoes/
  168. http://www.debian.org/MailingLists/subscribe
  169. http://www.esware.com/lista_correo.html
  170. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  171. http://www.kondara.org/mailinglist.html.en
  172. http://l5web.laser5.co.jp/ml/ml.html
  173. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  174. http://www.linux-mandrake.com/en/flists.php3
  175. http://www.netbsd.org/MailingLists/
  176. http://www.openbsd.org/mail.html
  177. http://www.redhat.com/mailing-lists/
  178. http://www.slackware.com/lists/
  179. http://www.stampede.org/mailinglists.php3
  180. http://www.suse.com/en/support/mailinglists/index.html
  181. http://www.trustix.net/support/
  182. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  183. http://lists.yellowdoglinux.com/ydl_updates.shtml
  184. http://munitions.vipul.net/
  185. http://www.zedz.net/
  186. http://www.cert.org/nav/alerts.html
  187. http://ciac.llnl.gov/ciac/
  188. http://www.MountainWave.com/
  189. http://www.counterpane.com/crypto-gram.html
  190. http://linuxlock.org/
  191. http://lsap.org/
  192. http://linuxsecurity.com/
  193. http://www.openssh.com/
  194. http://www.opensec.net/
  195. http://www.securityfocus.com/
  196. http://www.securityportal.com/
  197. http://lwn.net/2001/0111/kernel.php3
  198. http://www.eklektix.com/
  199. http://www.eklektix.com/
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://lwn.net/2001/0111/security.php3   Sergey Lentsov   12 Jan 2001 02:34:31 
Архивное /ru.linux/12666e82ac643.html, оценка 2 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional