Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   18 Feb 2002  13:16:46
 To : All
 Subject : URL: http://www.lwn.net/2002/0214/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] [No ads right now]
    [LWN.net]
 
    Sections:
     [2]Main page
     Security
     [3]Kernel
     [4]Distributions
     [5]Development
     [6]Commerce
     [7]Linux in the news
     [8]Announcements
     [9]Letters
    [10]All in one big page
 
    See also: [11]last week's Security page.
 
 Security
 
 News and Editorials
 
    Multiple security problems with SNMP. Here's [12]a CERT advisory
    warning of many problems with Simple Network Management Protocol
    (SNMP) implementations. To summarize, SNMP implementations are full of
    nasty bugs. If you are running SNMP on your Linux systems, you should
    apply the available vendor updates (we've seen them, so far, from
    [13]Red Hat and [14]Yellow Dog Linux). It is important to be aware of
    other devices on your network that may be running SNMP, however:
    routers, printers, etc. Some of those could be hard to update;
    disabling SNMP wherever possible would be a good idea.
 
    The SNMP vulnerabilities were discovered by the [15]Oulu University
    Secure Programming Group (OUSPG) of Oulu University, Finland. This is
    the same group which uncovered a wide variety of vulnerabilities
    across several LDAP products last year.
 
    OUSPG developed and applied the [16]PROTOS Test-Suite: c06-snmpv1 as a
    primary investigation tool. The test-suite's purpose is to "evaluate
    implementation level security and robustness of ... SNMP
    implementations." Licensed under version 2 of the GNU GPL, OUSPG
    encourages widespread use of the test-suite for the evaluation and
    development of SNMPv1 products.
 
    Simple Network Management Protocol (SNMP) is routinely used in
    installations all over the Earth for monitoring and controlling
    systems that include printers, routers, ATM switches, servers of all
    kinds and workstations. Designed in the late 80's and widely deployed
    in the 90's, SNMP is the most popular protocol in use to manage
    networked devices. It has been so successful that finding a practical
    alternative for a network of even moderate complexity, that can
    quickly and easily be put into service, is unlikely.
 
    CERT has received reports of SNMP port scanning and, as yet
    unverified, reports of exploitation of these vulnerabilities. If you
    are responsible for a network which uses SNMP for monitoring and
    control, you are strongly encouraged to read the [17]CERT advisory.
 
 Security Reports
 
    Debian security update to CUPS. The Debian project has released [18]a
    security update to the CUPS printing system fixing a buffer overflow
    vulnerability in that package.
 
    Debian security update to faq-o-matic. The Debian Project has issued
    what appears to be [19]the first update from a Linux distributor for
    the cross-site scripting vulnerability in faqomatic. (First LWN
    report: [20]February, 7th).
 
    Debian update to wmtv. Debian has released new packages that fix a
    symlink vulnerability in [21]wmtv.
 
    Autoresponder vulnerable to spamers. [22]Autoresponder is a script for
    answering mail. Put it in your .forward or .qmail file, and it will
    reply to all incoming messages with a specified response. On Friday,
    11 January 2002, someone reported on Bugtraq that autoresponder
    package "...could be tricked by spamers to send unsolicited mail to
    victim's address if option reply with copy of original message
    attached to response is enabled in autoresponder's configuration." The
    problem is fixed in version 1.15.0, and later, available from the
    [23]MeepZor Free Software page.
 
    GNU Ada compiler (GNAT) advisory. CERT has issued this [24]advisory
    for handling of temporary files in an unsafe manner by the GNU Ada
    compiler. All POSIX multi-user systems running GNAT-compiled binaries
    which use Ada language facilities for creating temporary files are
    affected. GNAT versions known to have this defect are 3.12p, 3.13p and
    3.14p. The advisory also notes that "the unreleased version of GNAT
    from the GCC CVS fixes this security defect on GNU/Linux, but
    introduces another one. Its use is strongly discouraged until this
    problem has been addressed."
 
 Updates
 
    Heap corruption vulnerability in at. The at command has a potentially
    exploitable heap corruption bug. (First LWN report:
    [25] January 17th).
 
    This week's updates:
      * [26]Red Hat (February 7, 2002)
 
    (update to the [27]original advisory, issued January 22, 2002, to fix
    a Red Hat 6.2 specific problem) Previous updates:
      * [28]Debian (January 16, 2002)
 
      [29]Debian (January 18, 2002) (first update did not fix the
    problem).
 
      [30]Mandrake (January 18, 2002)
 
      [31]Red Hat (January 22, 2002) Red Hat Linux 7.2 is not vulnerable;
    earlier releases are.
 
      [32]Slackware (January 22, 2002)
 
      [33]SuSE (January 16, 2001)
 
      [34]Yellow Dog (January 27, 2002)
 
    Buffer overflow in groff. The groff package has a buffer overflow
    vulnerability; if it is used with the print system, it is conceivably
    exploitable remotely.
 
    This week's updates:
      * [35]Mandrake (February 7, 2002)
 
    Previous updates:
      * [36]Red Hat (January 14, 2002)
 
      [37]Trustix (January 18, 2002)
 
      [38]Yellow Dog (January 27, 2002)
 
    Flaw in OpenLDAP. OpenLDAP versions 2.0.0 through 2.0.19 do not
    properly check permissions when using access control lists and a user
    tries to remove an attribute from an object in the directory by
    replacing it's values with an empty list. Schema checking is still
    enforced, so a user can only remove attributes that the schema does
    not require the object to possess. Please note that in 2.0 versions
    prior to 2.0.8, this flaw is not restricted to authenticated users
    (i.e., anonymous users can abuse the flaw as well).
 
    This week's updates:
      * [39]Caldera (January 16, 2002)
 
      [40]Mandrake (February 11, 2002)
 
    Previous updates:
      * [41]Conectiva (January 28, 2002)
 
      [42]Red Hat (January 22, 2002)
 
    Remotely exploitable security problem in mutt. Most of the major
    distributions have provided updates for this buffer overflow
    vulnerabilty which was [43]fixed in mutt versions 1.2.5.1 and 1.3.25.
 
    This is a remotely exploitable hole; applying the update is a very
    good idea. It was first mentioned in [44] the January 3rd LWN security
    page.
 
    This week's updates:
      * [45]Caldera (January 25, 2002)
 
    Previous updates:
      * [46]Conectiva (January 7, 2002)
 
      [47]Debian (January 2, 2002)
 
      [48]Debian (January 3, 2002) (Sparc architecture)
 
      [49]Mandrake (January 8, 2002)
 
      [50]Red Hat (January 7, 2002)
 
      [51]Slackware (January 8, 2002)
 
      [52]SuSE (January 7, 2001)
 
      [53]Trustix (January 4, 2002)
 
      [54]Yellow Dog (January 27, 2002) A remotely exploitable hole in
    rsync. A vulnerability has been found in the rsync server: it seems
    that the server did not pay enough attention to the sign of numbers it
    reads from the client connection. This oversight allows an attacker to
    write bytes containing zero almost anywhere in the stack, with results
    similar to those caused by buffer overflows. Sites running rsync in
    its daemon mode are thus vulnerable to remote root compromises.
    Versions of rsync prior to 2.5.2 are vulnerable. (First LWN report:
    [55] January 31th).
 
    This week's updates:
      * [56]Caldera (January 24, 2002)
 
    Previous updates:
      * [57]Conectiva (January 25, 2002)
 
      [58]Debian (February 3, 2002) (note: if you applied [59]the original
    update, which broke rsync, you need to update again.)
 
      [60]EnGarde (January 25, 2002)
 
      [61]Mandrake (January 28, 2002)
 
      [62]Red Hat (January 30, 2002) (note that this alert was updated; if
    you applied [63]the original version you should update again.)
 
      [64]Slackware (January 26, 2002)
 
      [65]SuSE (January 25, 2002)
 
      [66]Trustix (January 28, 2002)
 
      [67]Yellow Dog (January 27, 2002)
 
    Multiple vendor telnetd vulnerability. This vulnerability, originally
    thought to be confined to BSD-derived systems, was first covered in
    the [68]July 26th Security Summary. It is now known that Linux telnet
    daemons are vulnerable as well.
 
    This week's updates:
      * [69]Red Hat (February 7, 2002)
 
    (Update, for Red Hat 5.2, 6.2, 7.0, and 7.1, to the [70]original
    advisory, issued August 9, 2001.) Previous updates:
      * [71]Caldera (August 10, 2001)
 
      [72]Conectiva (August 24, 2001)
 
      [73]Debian (August 14, 2001) (SSL version)
 
      [74]Debian (August 14, 2001) (Update for Sparc version)
 
      [75]Mandrake (August 13, 2001)
 
      [76]Mandrake (December 17, 2001) (kerberos version)
 
      [77]Progeny (August 14, 2001)
 
      [78]Red Hat (August 9, 2001)
 
      [79]Red Hat (August 9, 2001) (kerberos version)
 
      [80]Slackware (August 9, 2001)
 
      [81]SuSE (September 3, 2001)
 
      [82]Yellow Dog (August 10, 2001)
 
      [83]Yellow Dog (August 10, 2001) (kerberos version) Uucp local user
    exploits. There is a vulnerability in the command-line argument
    handling of uucp which can be exploited by a local user to obtain
    uid/gid uucp. See [84]the September 13, 2001 LWN security page for the
    initial report.
 
    New updates:
      * [85]Debian (February 8, 2002)
 
    (update to the [86]original advisory issued September 24, 2001.)
    Previous updates:
      * [87]Caldera (September 7, 2001)
 
      [88]Conectiva (September 11, 2001)
 
      [89]Debian (September 24, 2001)
 
      [90]Mandrake (September 21, 2001)
 
      [91]Progeny (October 5, 2001)
 
      [92]SuSE (October 31, 2001)
 
 Resources
 
    Deanonymizing Users of the SafeWeb Anonymizing Service. Although
    [93]Deanonymizing Users of the SafeWeb Anonymizing Service (PDF
    Format) isn't about open source software, it is worth a read if you
    are concerned with how "fundamentally incompatible requirements" can
    jeopardize security. Written by researchers from Boston University and
    the Workplace Surveillance Project Privacy Foundation, it describes
    how "fundamentally incompatible requirements were realized in
    SafeWeb's architecture, resulting in spectacular failure modes under
    simple JavaScript attacks."
 
 Events
 
    Upcoming Security Events.
 
    Date Event Location
    February 15 - 17, 2002 [94]CODECON 2002 San Francisco, California, USA
    February 18 - 22, 2002 [95]RSA Conference 2002 San Jose, CA., USA
    February 25 - March 1, 2002 [96]Secure Trusted OS Consortium -
    Quarterly Meeting(STOS) (Hyperdigm Research)Chantilly, VA, USA
    March 11 - 14, 2002 [97]Financial Cryptography 2002 Sothhampton,
    Bermuda
    March 18 - 21, 2002 [98]Sixth Annual Distributed Objects and
    Components Security Workshop (Pier 5 Hotel at the Inner
    Harbor)Baltimore, Maryland, USA
    March 18 - 20, 2002 [99]InfoSec World Conference and Expo/2002
    Orlando, FL, USA
    April 1 - 7, 2002 [100]SANS 2002 Orlando, FL., USA
    April 5 - 7, 2002 [101]Rubicon Detroit, Michigan, USA
    April 7 - 10, 2002 [102]Techno-Security 2002 Conference Myrtle Beach,
    SC
    April 14 - 15, 2002 [103]Workshop on Privacy Enhancing Technologies
    2002 (Cathedral Hill Hotel)San Francisco, California, USA
 
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [104]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [105]lwn@lwn.net.
 
    Section Editor: [106]Dennis Tenney
    February 14, 2002
 
    LWN Resources
    [107]Security alerts archive
    Secured Distributions:
    [108]Astaro Security
    [109]Blue Linux
    [110]Castle
    [111]Engarde Secure Linux
    [112]Immunix
    [113]Kaladix Linux
    [114]NSA Security Enhanced
    [115]Openwall GNU/Linux
    [116]Trustix
    Security Projects
    [117]Bastille
    [118]Linux Security Audit Project
    [119]Linux Security Module
    [120]OpenSSH
    Security List Archives
    [121]Bugtraq Archive
    [122]Firewall Wizards Archive
    [123]ISN Archive
    Distribution-specific links
    [124]Caldera Advisories
    [125]Conectiva Updates
    [126]Debian Alerts
    [127]Kondara Advisories
    [128]Esware Alerts
    [129]LinuxPPC Security Updates
    [130]Mandrake Updates
    [131]Red Hat Errata
    [132]SuSE Announcements
    [133]Turbolinux
    [134]Yellow Dog Errata
    BSD-specific links
    [135]BSDi
    [136]FreeBSD
    [137]NetBSD
    [138]OpenBSD
    Security mailing lists
    [139]Caldera
    [140]Cobalt
    [141]Conectiva
    [142]Debian
    [143]Esware
    [144]FreeBSD
    [145]Kondara
    [146]LASER5
    [147]Linux From Scratch
    [148]Linux-Mandrake
    [149]NetBSD
    [150]OpenBSD
    [151]Red Hat
    [152]Slackware
    [153]Stampede
    [154]SuSE
    [155]Trustix
    [156]turboLinux
    [157]Yellow Dog
    Security Software Archives
    [158]munitions
    [159]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [160]CERT
    [161]CIAC
    [162]Comp Sec News Daily
    [163]Crypto-GRAM
    [164]LinuxLock.org
    [165]LinuxSecurity.com
    [166]Security Focus
    [167]SecurityPortal
                                                         [168]Next: Kernel
 
    [169]Eklektix, Inc. Linux powered! Copyright Л 2002 [170]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://lwn.net/2002/0214/
    3. http://lwn.net/2002/0214/kernel.php3
    4. http://lwn.net/2002/0214/dists.php3
    5. http://lwn.net/2002/0214/devel.php3
    6. http://lwn.net/2002/0214/commerce.php3
    7. http://lwn.net/2002/0214/press.php3
    8. http://lwn.net/2002/0214/announce.php3
    9. http://lwn.net/2002/0214/letters.php3
   10. http://lwn.net/2002/0214/bigpage.php3
   11. http://lwn.net/2002/0207/security.php3
   12. http://lwn.net/2002/0214/a/cert-snmp.php3
   13. http://lwn.net/alerts/RedHat/RHSA-2001:163-20.php3
   14. http://lwn.net/alerts/YellowDog/YDU-20020211-1.php3
   15. http://www.ee.oulu.fi/research/ouspg/
   16. http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/
   17. http://lwn.net/2002/0214/a/cert-snmp.php3
   18. http://lwn.net/alerts/Debian/DSA-110-1.php3
   19. http://lwn.net/alerts/Debian/DSA-109-1.php3
   20. http://lwn.net/2002/0207/security.php3#faqomatic
   21. http://lwn.net/alerts/Debian/DSA-108-1.php3
   22. http://meepzor.com/packages/autoresponder/
   23. http://meepzor.com/packages/autoresponder/
   24. http://lwn.net/2002/0214/a/gnuada.php3
   25. http://lwn.net/2002/0117/security.php3#at
   26. http://lwn.net/alerts/RedHat/RHSA-2002:015-15.php3
   27. http://lwn.net/alerts/RedHat/RHSA-2002:015-13.php3
   28. http://lwn.net/alerts/Debian/DSA-102-1.php3
   29. http://lwn.net/alerts/Debian/DSA-102-2.php3
   30. http://lwn.net/alerts/Mandrake/MDKSA-2002:007.php3
   31. http://lwn.net/alerts/RedHat/RHSA-2002:015-13.php3
   32. http://lwn.net/alerts/Slackware/sl-1011706104.php3
   33. http://lwn.net/alerts/SuSE/SuSE-SA:2002:003.php3
   34. http://lwn.net/alerts/YellowDog/YDU-20020127-9.php3
   35. http://lwn.net/alerts/Mandrake/MDKSA-2002:012.php3
   36. http://lwn.net/alerts/RedHat/RHSA-2002:004-06.php3
   37. http://lwn.net/alerts/Trustix/2002-0020.php3
   38. http://lwn.net/alerts/YellowDog/YDU-20020127-11.php3
   39. http://lwn.net/alerts/Caldera/CSSA-2002-001.0.php3
   40. http://lwn.net/alerts/Mandrake/MDKSA-2002:013.php3
   41. http://lwn.net/alerts/Conectiva/CLA-2002:459.php3
   42. http://lwn.net/alerts/RedHat/RHSA-2002:014-07.php3
   43. http://lwn.net/2002/0103/a/mutt.php3
   44. http://lwn.net/2002/0103/security.php3#mutt
   45. http://lwn.net/alerts/Caldera/CSSA-2002-002.0.php3
   46. http://lwn.net/alerts/Conectiva/CLA-2002:449.php3
   47. http://lwn.net/alerts/Debian/DSA-096-1.php3
   48. http://lwn.net/alerts/Debian/DSA-096-2.php3
   49. http://lwn.net/alerts/Mandrake/MDKSA-2002:002.php3
   50. http://lwn.net/alerts/RedHat/RHSA-2002:003-10.php3
   51. http://lwn.net/alerts/Slackware/sl-1010504811.php3
   52. http://lwn.net/alerts/SuSE/SuSE-SA:2002:001.php3
   53. http://lwn.net/alerts/Trustix/2002-0003.php3
   54. http://lwn.net/alerts/YellowDog/YDU-20020127-4.php3
   55. http://lwn.net/2002/0131/security.php3#rsync
   56. http://lwn.net/alerts/Caldera/CSSA-2002-003.0.php3
   57. http://lwn.net/alerts/Conectiva/CLA-2002:458.php3
   58. http://lwn.net/alerts/Debian/DSA-106-2.php3
   59. http://lwn.net/alerts/Debian/DSA-106-1.php3
   60. http://lwn.net/alerts/EnGarde/ESA-20020125-004.php3
   61. http://lwn.net/alerts/Mandrake/MDKSA-2002:009.php3
   62. http://lwn.net/alerts/RedHat/RHSA-2002:018-10.php3
   63. http://lwn.net/alerts/RedHat/RHSA-2002:018-05.php3
   64. http://lwn.net/alerts/Slackware/sl-1012057608.php3
   65. http://lwn.net/alerts/SuSE/SuSE-SA:2002:004.php3
   66. http://lwn.net/alerts/Trustix/2002-0025.php3
   67. http://lwn.net/alerts/YellowDog/YDU-20020127-3.php3
   68. http://lwn.net/2001/0726/security.php3#mtelnetd
   69. http://lwn.net/alerts/RedHat/RHSA-2001:099-09.php3
   70. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
   71. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3
   72. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3
   73. http://lwn.net/alerts/Debian/DSA-075-1.php3
   74. http://lwn.net/alerts/Debian/DSA-075-2.php3
   75. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3
   76. http://lwn.net/alerts/Mandrake/MDKSA-2001:093.php3
   77. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3
   78. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
   79. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3
   80. http://lwn.net/alerts/Slackware/sl-997726350.php3
   81. http://lwn.net/alerts/SuSE/SuSE-SA:2001:029.php3
   82. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3
   83. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3
   84. http://lwn.net/2001/0913/security.php3#uucp
   85. http://lwn.net/alerts/Debian/DSA-079-2.php3
   86. http://lwn.net/alerts/Debian/DSA-079-1.php3
   87. http://lwn.net/alerts/Caldera/CSSA-2001-033.0.php3
   88. http://lwn.net/alerts/Conectiva/CLA-2001:425.php3
   89. http://lwn.net/alerts/Debian/DSA-079-1.php3
   90. http://lwn.net/alerts/Mandrake/MDKSA-2001:078.php3
   91. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-36.php3
   92. http://lwn.net/alerts/SuSE/SuSE-SA:2001:38.php3
   93. http://www.cs.bu.edu/techreports/pdf/2002-003-deanonymizing-safeweb.pdf
   94. http://www.codecon.org/
   95. http://www.rsaconference.com/
   96. http://www.stosdarwin.org/
   97. http://www.fc02.ai/
   98. http://www.omg.org/news/meetings/docsec2002/call.htm
   99.
 http://www.misti.com/northamerica.asp?page=4&subpage=2&disp=showconf&id=os02®
 ion=1
  100. http://www.sans.org/SANS2002.php
  101. http://www.rubi-con.org/
  102. http://www.TECHSEC.com/
  103. http://www.pet2002.org/
  104. http://securityfocus.com/calendar
  105. mailto:lwn@lwn.net
  106. mailto:lwn@lwn.net
  107. http://lwn.net/alerts/
  108. http://www.astaro.com/products/index.html
  109. http://bluelinux.sourceforge.net/
  110. http://castle.altlinux.ru/
  111. http://www.engardelinux.org/
  112. http://www.immunix.org/
  113. http://www.kaladix.org/
  114. http://www.nsa.gov/selinux/
  115. http://www.openwall.com/Owl/
  116. http://www.trustix.com/
  117. http://www.bastille-linux.org/
  118. http://lsap.org/
  119. http://lsm.immunix.org/
  120. http://www.openssh.com/
  121. http://www.securityfocus.com/archive/1
  122. http://www.nfr.net/firewall-wizards/
  123. http://www.jammed.com/Lists/ISN/
  124. http://www.calderasystems.com/support/security/
  125. http://www.conectiva.com.br/atualizacoes/
  126. http://www.debian.org/security/
  127. http://www.kondara.org/errata/k12-security.html
  128. http://www.esware.com/actualizaciones.html
  129. http://linuxppc.org/security/advisories/
  130. http://www.linux-mandrake.com/en/fupdates.php3
  131. http://www.redhat.com/support/errata/index.html
  132. http://www.suse.de/security/index.html
  133. http://www.turbolinux.com/security/
  134. http://www.yellowdoglinux.com/resources/
  135. http://www.BSDI.COM/services/support/patches/
  136. http://www.freebsd.org/security/security.html
  137. http://www.NetBSD.ORG/Security/
  138. http://www.openbsd.org/security.html
  139. http://www.calderasystems.com/support/forums/announce.html
  140. http://www.cobalt.com/support/resources/usergroups.html
  141. http://distro.conectiva.com.br/atualizacoes/
  142. http://www.debian.org/MailingLists/subscribe
  143. http://www.esware.com/lista_correo.html
  144. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  145. http://www.kondara.org/mailinglist.html.en
  146. http://l5web.laser5.co.jp/ml/ml.html
  147. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  148. http://www.linux-mandrake.com/en/flists.php3
  149. http://www.netbsd.org/MailingLists/
  150. http://www.openbsd.org/mail.html
  151. http://www.redhat.com/mailing-lists/
  152. http://www.slackware.com/lists/
  153. http://www.stampede.org/mailinglists.php3
  154. http://www.suse.com/en/support/mailinglists/index.html
  155. http://www.trustix.net/support/
  156. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  157. http://lists.yellowdoglinux.com/ydl_updates.shtml
  158. http://munitions.vipul.net/
  159. http://www.zedz.net/
  160. http://www.cert.org/nav/alerts.html
  161. http://ciac.llnl.gov/ciac/
  162. http://www.MountainWave.com/
  163. http://www.counterpane.com/crypto-gram.html
  164. http://linuxlock.org/
  165. http://linuxsecurity.com/
  166. http://www.securityfocus.com/
  167. http://www.securityportal.com/
  168. http://lwn.net/2002/0214/kernel.php3
  169. http://www.eklektix.com/
  170. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://www.lwn.net/2002/0214/security.php3   Sergey Lentsov   18 Feb 2002 13:16:46 
Архивное /ru.linux/198612754fd93.html, оценка 2 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional