|
|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 12 Jul 2001 16:16:14 To : All Subject : URL: http://www.lwn.net/2001/0712/security.php3 --------------------------------------------------------------------------------
[1][LWN Logo]
[2]Click Here
[LWN.net]
Sections:
[3]Main page
Security
[4]Kernel
[5]Distributions
[6]On the Desktop
[7]Development
[8]Commerce
[9]Linux in the news
[10]Announcements
[11]Linux History
[12]Letters
[13]All in one big page
See also: [14]last week's Security page.
Security
News and Editorials
NAI Labs Announces DARPA-Funded FreeBSD Security Initiative. NAI Labs
[15]has received a $1.2 Million contract from the DARPA to develop
security extension to FreeBSD. The military, it seems, has decided
that it is dependent enough on free software to put some effort into
improving its security. This particular effort, which is expected to
take 18 months, should bring a number of improvements to FreeBSD.
Linux security developers may want to have a look at what is going on
as well.
The [16]Community-Based Open Source Security project is the recipient
of this grant. It's made up of a number of high-profile names,
including Robert Watson, Kirk McKusick, and Eivind Eklund. The aim of
the project is to target some of the "low-hanging fruit" in the
security area, including:
* "Transfer of existing security knowledge." The purpose here is to
develop a FreeBSD security architecture document and to enhance
the FreeBSD man pages with security information.
* Incorporation of existing security technology into FreeBSD. This
includes extended filesystem attributes, mandatory access control,
hardening of the network stack, incorporation of pluggable
authentication modules (PAM), filesystem and swap encryption, and,
someday, transfer of some goodies from the NSA's Security-Enhanced
Linux project.
* The development of a framework for the incorporation of new
security mechanisms into the FreeBSD kernel, much like the Linux
security module work that is happening now.
* The hardening of security-critical applications through the use of
a "privilege management toolkit."
Some of the work is simply trying to catch up with capabilities Linux
has had for years (i.e. PAM, TCP SYN cookies), but some of it is
interesting and new. The results bear watching.
Linux advocates should also, perhaps, be paying more attention to the
possibility of government funding for some development work. The money
is out there, and, often, it's looking for something interesting to
do. Given the difficulty of finding venture capital these days, sharp
people with good ideas might just want to consider taking the grant
approach instead.
Snort 1.8 is released. [17]Version 1.8 of the Snort intrusion
detection system is out. New features include a "stateful inspection
and TCP stream reassembly module," host tagging, detection of ARP
spoofing, defeats for a number of evasion techniques, and much more.
This may be the last big release for a little bit, since the author,
Martin Roesch, is about to become a father.
Security Reports
dip 3.3.7p overflow. An overflow condition [18]has been discovered in
dip on SuSE 7.0 X86 and Slackware. This is an old bug that has
resurfaced.
lmail local root exploit. Lmail is susceptible to a [19]local root
exploit that can allow attackers to overwrite and create files.
OpenSSL Pseudo-random number generator weakness. A weakness has been
discovered in the OpenSSL Pseudo random number generator that can
allow an attacker to discover the PNRG's state and predict future
values.
This week's updates:
* [20]Engarde
* [21]Trustix
Caldera security update to OpenSSH. Caldera International has released
[22]a security update to OpenSSH fixing an interesting problem: an
attacker can remove any file on the system, as long as it's called
"cookies"...
Immunix update for tetex. Immunix has posted a security update for
[23]tetex to address temporary file handling problems that can lead to
privilege elevation.
Tripwire temporary files. A [24]temporary file insecurity problem has
been discovered in Tripwire which make it possible for a local user to
overwrite files with root permissions.
Xdm cookies advisory. If xdm is compiled with the wrong options
[25]the cookie file can be guessed and a denial of service attack can
be performed using the X server.
Red Hat advisory for xloadimage. Red Hat has issued an advisory for
the [26]xloadimage package to address buffer overflow issues. The
problem is mostly limited to remote exploits if xloadimage is called
by Netscape (by 'plugger', for example).
Proprietary products.
The following proprietary products were reported to contain
vulnerabilities:
* Systems running Oracle 8i [27]are vulnerable to remote attacks
that can allow intruders to control the database server.
Updates
fetchmail buffer overflow.
Check the [28]June 21st LWN Security Summary for the original report.
This is remotely exploitable and could lead to root access if
fetchmail is run by root. An upgrade to fetchmail 5.8.6 will resolve
the problem.
This week's updates:
* [29]Mandrakesoft
Previous updates:
* [30]Caldera (June 28th)
* [31]Engarde (June 28th)
* [32]Immunix (June 21st)
* [33]Debian (June 21st)
* [34]Conectiva (June 21st)
* [35]Slackware, June 18th Changelog
Webmin environment variable inheritance vulnerability. Check the
[36]May 31st LWN Security Summary for the original report.
This week's updates:
* [37]Caldera (update now available for OpenLinux 3.1).
Previous updates:
* [38]Linux-Mandrake.
* [39]Caldera, disabling Webmin recommended, no updated packages
available yet. (May 31st)
* [40]Caldera, updated packages now available (June 7th)
xinetd buffer overflow.
Check the [41]June 14th LWN Security Summary for the initial report.
The buffer overflow is in the ident logging portion of xinetd, so one
workaround to the problem is to disable ident logging. Since then,
more extensive problems have been found in string handling in xinetd,
and the current round of updates addresses them.
This week's updates:
* [42]Mandrakesoft
* [43]RedHat
Previous updates:
* [44]Conectiva.
* [45]EnGarde Secure Linux. (No mention in advisory of string
handling problems).
* [46]Immunix (StackGuard is not fully effective against this
vulnerability).
* [47]SuSE.
* [48]Debian (June 14).
* [49]Conectiva (June 14).
Resources
Security BOF report updated. Emily Ratliff's report from the USENIX
security module BOF has seen some minor updates from the author; an
[50]updated version is now available.
Security Alerts: PHP Weaknesses? (O'Reilly). Noel Davis [51]looks at
some security vulnerabilities in PHP and discusses other current
security issues in an O'Reilly article.
A rogue's gallery of denial of service attacks (ZDNet). ZDNet
[52]looks at a few tools that can be used to thwart denial of service
(DOS) attacks.
Small TCP packets == very large overhead. Darren Reed [53]discusses
how small TCP packets can be used maliciously to bog down a server.
The minimum size for the maximum segment size field is too small for
many operating systems and the value is defined by the caller.
LinuxSecurity.com newsletter. The weekly [54]LinuxSecurity.com
newsletter has been published. Advisories for Samba, xinetd, Zope,
Scotty, and webmin are presented.
Events
Upcoming Security Events.
Date Event Location
July 12, 2001 [55]Black Hat Briefings USA '01 Las Vegas, Nevada, USA.
July 17, 2001 [56]The Open Group Security Forum briefing Austin, Texas
August 6 - 10, 2001 [57]CERT Conference 2001 Omaha, NE, USA.
August 7, 2001 [58]CIBC World Markets First Annual Security & Privacy
Conference New York, NY, USA.
August 13 - 17, 2001 [59]10th USENIX Security Symposium 2001
Conference Washington, D.C.
August 13 - 17, 2001 [60]HAL2001 Enschede, The Netherlands
September 11 - 13, 2001 [61]New Security Paradigms Workshop 2001(NSPW)
Cloudcroft, New Mexico, USA
For additional security-related events, included training courses
(which we don't list above) and events further in the future, check
out Security Focus' [62]calendar, one of the primary resources we use
for building the above list. To submit an event directly to us, please
send a plain-text message to [63]lwn@lwn.net.
Section Editor: [64]Forrest Cook
July 12, 2001
[65]Click Here
Secured Distributions:
[66]Blue Linux
[67]Engarde Secure Linux
[68]Immunix
[69]Kaladix
[70]Nexus
[71]NSA Security Enhanced
[72]Openwall GNU/Linux
[73]SLinux
[74]Trustix
Security Projects
[75]Bastille
[76]Linux Security Audit Project
[77]Linux Security Module
[78]OpenSSH
Security List Archives
[79]Bugtraq Archive
[80]Firewall Wizards Archive
[81]ISN Archive
Distribution-specific links
[82]Caldera Advisories
[83]Conectiva Updates
[84]Debian Alerts
[85]Kondara Advisories
[86]Esware Alerts
[87]LinuxPPC Security Updates
[88]Mandrake Updates
[89]Red Hat Errata
[90]SuSE Announcements
[91]Yellow Dog Errata
BSD-specific links
[92]BSDi
[93]FreeBSD
[94]NetBSD
[95]OpenBSD
Security mailing lists [96]Caldera
[97]Cobalt
[98]Conectiva
[99]Debian
[100]Esware
[101]FreeBSD
[102]Kondara
[103]LASER5
[104]Linux From Scratch
[105]Linux-Mandrake
[106]NetBSD
[107]OpenBSD
[108]Red Hat
[109]Slackware
[110]Stampede
[111]SuSE
[112]Trustix
[113]turboLinux
[114]Yellow Dog
Security Software Archives
[115]munitions
[116]ZedZ.net (formerly replay.com)
Miscellaneous Resources
[117]CERT
[118]CIAC
[119]Comp Sec News Daily
[120]Crypto-GRAM
[121]LinuxLock.org
[122]LinuxSecurity.com
[123]OpenSEC
[124]Security Focus
[125]SecurityPortal
[126]Next: Kernel
[127]Eklektix, Inc. Linux powered! Copyright Л 2001 [128]Eklektix,
Inc., all rights reserved
Linux (R) is a registered trademark of Linus Torvalds
References
1. http://lwn.net/
2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
3. http://lwn.net/2001/0712/
4. http://lwn.net/2001/0712/kernel.php3
5. http://lwn.net/2001/0712/dists.php3
6. http://lwn.net/2001/0712/desktop.php3
7. http://lwn.net/2001/0712/devel.php3
8. http://lwn.net/2001/0712/commerce.php3
9. http://lwn.net/2001/0712/press.php3
10. http://lwn.net/2001/0712/announce.php3
11. http://lwn.net/2001/0712/history.php3
12. http://lwn.net/2001/0712/letters.php3
13. http://lwn.net/2001/0712/bigpage.php3
14. http://lwn.net/2001/0704/security.php3
15. http://opensource.nailabs.com/news/20010709-cboss.html
16. http://opensource.nailabs.com/initiatives/cboss/
17. http://lwn.net/2001/0712/a/snort-1.8.php3
18. http://lwn.net/2001/0712/a/dip337p.php3
19. http://lwn.net/2001/0712/a/lmail.php3
20. http://lwn.net/2001/0712/a/eng-openssl.php3
21. http://lwn.net/2001/0712/a/trustix-openssl.php3
22. http://lwn.net/2001/0712/a/cald-openssh.php3
23. http://lwn.net/2001/0712/a/imm-tetex.php3
24. http://lwn.net/2001/0712/a/tripwiretemp.php3
25. http://lwn.net/2001/0712/a/xdmcookies.php3
26. http://lwn.net/2001/0712/a/rh-xloadimage.php3
27. http://lwn.net/2001/0712/a/oracle8i.php3
28. http://lwn.net/2001/0621/security.php3#fetchmail
29. http://lwn.net/2001/0712/a/mandfetchmail.php3
30. http://lwn.net/2001/0628/a/caldera-fetchmail.php3
31. http://lwn.net/2001/0628/a/engarde-fetchmail.php3
32. http://lwn.net/2001/0621/a/im-fetchmail.php3
33. http://lwn.net/2001/0621/a/deb-fetchmail.php3
34. http://lwn.net/2001/0621/a/con-fetchmail.php3
35. http://www.slackware.com/changelog/current.php?cpu=i386
36. http://lwn.net/2001/0531/security.php3#webmin
37. http://lwn.net/2001/0712/a/webmin1.php3
38. http://lwn.net/2001/0621/a/lm-webmin.php3
39. http://lwn.net/2001/0531/a/caldera-webmin.php3
40. http://lwn.net/2001/0607/a/caldera-webmin.php3
41. http://lwn.net/2001/0614/security.php3#xinetdbo
42. http://lwn.net/2001/0712/a/mandxinetd.php3
43. http://lwn.net/2001/0712/a/rhxinetd.php3
44. http://lwn.net/2001/0704/a/con-xinetd.php3
45. http://lwn.net/2001/0704/a/esl-xinetd.php3
46. http://lwn.net/2001/0704/a/imm-xinetd.php3
47. http://lwn.net/2001/0704/a/suse-xinetd.php3
48. http://lwn.net/2001/0621/a/deb-xinetd.php3
49. http://lwn.net/2001/0621/a/con-xinetd.php3
50. http://lwn.net/2001/0704/a/security-module-BOF.php3
51. http://linux.oreillynet.com/pub/a/linux/2001/07/09/insecurities.html
52. http://www.zdnet.com/enterprise/stories/main/0,10228,2784023,00.html
53. http://lwn.net/2001/0712/a/smalltcp.php3
54. http://lwn.net/2001/0712/a/infosecnews.php3
55. http://www.blackhat.com/
56. http://www.opengroup.org/austin2001/security_outline.htm
57. http://www.certconf.org/
58. http://www.cibcwm.com/eq/conference/security/
59. http://www.usenix.org/events/sec2001
60. http://www.hal2001.org/hal/01Home/index.html
61. http://www.nspw.org/
62. http://securityfocus.com/calendar
63. mailto:lwn@lwn.net
64. mailto:lwn@lwn.net
65. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
66. http://bluelinux.sourceforge.net/
67. http://www.engardelinux.org/
68. http://www.immunix.org/
69. http://www.maganation.com/~kaladix/
70. http://Nexus-Project.net/
71. http://www.nsa.gov/selinux/
72. http://www.openwall.com/Owl/
73. http://www.slinux.org/
74. http://www.trustix.com/
75. http://www.bastille-linux.org/
76. http://lsap.org/
77. http://lsm.immunix.org/
78. http://www.openssh.com/
79. http://www.securityfocus.com/bugtraq/archive/
80. http://www.nfr.net/firewall-wizards/
81. http://www.jammed.com/Lists/ISN/
82. http://www.calderasystems.com/support/security/
83. http://www.conectiva.com.br/atualizacoes/
84. http://www.debian.org/security/
85. http://www.kondara.org/errata/k12-security.html
86. http://www.esware.com/actualizaciones.html
87. http://linuxppc.org/security/advisories/
88. http://www.linux-mandrake.com/en/fupdates.php3
89. http://www.redhat.com/support/errata/index.html
90. http://www.suse.de/security/index.html
91. http://www.yellowdoglinux.com/resources/errata.shtml
92. http://www.BSDI.COM/services/support/patches/
93. http://www.freebsd.org/security/security.html
94. http://www.NetBSD.ORG/Security/
95. http://www.openbsd.org/security.html
96. http://www.calderasystems.com/support/forums/announce.html
97. http://www.cobalt.com/support/resources/usergroups.html
98. http://distro.conectiva.com.br/atualizacoes/
99. http://www.debian.org/MailingLists/subscribe
100. http://www.esware.com/lista_correo.html
101. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
102. http://www.kondara.org/mailinglist.html.en
103. http://l5web.laser5.co.jp/ml/ml.html
104. http://www.linuxfromscratch.org/services/mailinglistinfo.php
105. http://www.linux-mandrake.com/en/flists.php3
106. http://www.netbsd.org/MailingLists/
107. http://www.openbsd.org/mail.html
108. http://www.redhat.com/mailing-lists/
109. http://www.slackware.com/lists/
110. http://www.stampede.org/mailinglists.php3
111. http://www.suse.com/en/support/mailinglists/index.html
112. http://www.trustix.net/support/
113. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
114. http://lists.yellowdoglinux.com/ydl_updates.shtml
115. http://munitions.vipul.net/
116. http://www.zedz.net/
117. http://www.cert.org/nav/alerts.html
118. http://ciac.llnl.gov/ciac/
119. http://www.MountainWave.com/
120. http://www.counterpane.com/crypto-gram.html
121. http://linuxlock.org/
122. http://linuxsecurity.com/
123. http://www.opensec.net/
124. http://www.securityfocus.com/
125. http://www.securityportal.com/
126. http://lwn.net/2001/0712/kernel.php3
127. http://www.eklektix.com/
128. http://www.eklektix.com/
--- ifmail v.2.14.os7-aks1
* Origin: Unknown (2:4615/71.10@fidonet)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/19861a676d39b.html, оценка из 5, голосов 10
|