Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   12 Jul 2001  16:16:14
 To : All
 Subject : URL: http://www.lwn.net/2001/0712/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]On the Desktop
     [7]Development
     [8]Commerce
     [9]Linux in the news
     [10]Announcements
     [11]Linux History
     [12]Letters
    [13]All in one big page
    
    See also: [14]last week's Security page.
    
 Security
 
 News and Editorials
 
    NAI Labs Announces DARPA-Funded FreeBSD Security Initiative. NAI Labs
    [15]has received a $1.2 Million contract from the DARPA to develop
    security extension to FreeBSD. The military, it seems, has decided
    that it is dependent enough on free software to put some effort into
    improving its security. This particular effort, which is expected to
    take 18 months, should bring a number of improvements to FreeBSD.
    Linux security developers may want to have a look at what is going on
    as well.
    
    The [16]Community-Based Open Source Security project is the recipient
    of this grant. It's made up of a number of high-profile names,
    including Robert Watson, Kirk McKusick, and Eivind Eklund. The aim of
    the project is to target some of the "low-hanging fruit" in the
    security area, including:
      * "Transfer of existing security knowledge." The purpose here is to
        develop a FreeBSD security architecture document and to enhance
        the FreeBSD man pages with security information.
      * Incorporation of existing security technology into FreeBSD. This
        includes extended filesystem attributes, mandatory access control,
        hardening of the network stack, incorporation of pluggable
        authentication modules (PAM), filesystem and swap encryption, and,
        someday, transfer of some goodies from the NSA's Security-Enhanced
        Linux project.
      * The development of a framework for the incorporation of new
        security mechanisms into the FreeBSD kernel, much like the Linux
        security module work that is happening now.
      * The hardening of security-critical applications through the use of
        a "privilege management toolkit."
        
    Some of the work is simply trying to catch up with capabilities Linux
    has had for years (i.e. PAM, TCP SYN cookies), but some of it is
    interesting and new. The results bear watching.
    
    Linux advocates should also, perhaps, be paying more attention to the
    possibility of government funding for some development work. The money
    is out there, and, often, it's looking for something interesting to
    do. Given the difficulty of finding venture capital these days, sharp
    people with good ideas might just want to consider taking the grant
    approach instead.
    
    Snort 1.8 is released. [17]Version 1.8 of the Snort intrusion
    detection system is out. New features include a "stateful inspection
    and TCP stream reassembly module," host tagging, detection of ARP
    spoofing, defeats for a number of evasion techniques, and much more.
    This may be the last big release for a little bit, since the author,
    Martin Roesch, is about to become a father.
    
 Security Reports
 
    dip 3.3.7p overflow. An overflow condition [18]has been discovered in
    dip on SuSE 7.0 X86 and Slackware. This is an old bug that has
    resurfaced.
    
    lmail local root exploit. Lmail is susceptible to a [19]local root
    exploit that can allow attackers to overwrite and create files.
    
    OpenSSL Pseudo-random number generator weakness. A weakness has been
    discovered in the OpenSSL Pseudo random number generator that can
    allow an attacker to discover the PNRG's state and predict future
    values.
    
    This week's updates:
      * [20]Engarde
      * [21]Trustix
    
    Caldera security update to OpenSSH. Caldera International has released
    [22]a security update to OpenSSH fixing an interesting problem: an
    attacker can remove any file on the system, as long as it's called
    "cookies"...
    
    Immunix update for tetex. Immunix has posted a security update for
    [23]tetex to address temporary file handling problems that can lead to
    privilege elevation.
    
    Tripwire temporary files. A [24]temporary file insecurity problem has
    been discovered in Tripwire which make it possible for a local user to
    overwrite files with root permissions.
    
    Xdm cookies advisory. If xdm is compiled with the wrong options
    [25]the cookie file can be guessed and a denial of service attack can
    be performed using the X server.
    
    Red Hat advisory for xloadimage. Red Hat has issued an advisory for
    the [26]xloadimage package to address buffer overflow issues. The
    problem is mostly limited to remote exploits if xloadimage is called
    by Netscape (by 'plugger', for example).
    
    Proprietary products.
    The following proprietary products were reported to contain
    vulnerabilities:
      * Systems running Oracle 8i [27]are vulnerable to remote attacks
        that can allow intruders to control the database server.
        
 Updates
 
    fetchmail buffer overflow.
    Check the [28]June 21st LWN Security Summary for the original report.
    This is remotely exploitable and could lead to root access if
    fetchmail is run by root. An upgrade to fetchmail 5.8.6 will resolve
    the problem.
    
    This week's updates:
      * [29]Mandrakesoft
        
    Previous updates:
      * [30]Caldera (June 28th)
      * [31]Engarde (June 28th)
      * [32]Immunix (June 21st)
      * [33]Debian (June 21st)
      * [34]Conectiva (June 21st)
      * [35]Slackware, June 18th Changelog
        
    Webmin environment variable inheritance vulnerability. Check the
    [36]May 31st LWN Security Summary for the original report.
    
    This week's updates:
      * [37]Caldera (update now available for OpenLinux 3.1).
        
    Previous updates:
      * [38]Linux-Mandrake.
      * [39]Caldera, disabling Webmin recommended, no updated packages
        available yet. (May 31st)
      * [40]Caldera, updated packages now available (June 7th)
        
    xinetd buffer overflow.
    Check the [41]June 14th LWN Security Summary for the initial report.
    The buffer overflow is in the ident logging portion of xinetd, so one
    workaround to the problem is to disable ident logging. Since then,
    more extensive problems have been found in string handling in xinetd,
    and the current round of updates addresses them.
    
    This week's updates:
      * [42]Mandrakesoft
      * [43]RedHat
        
    Previous updates:
      * [44]Conectiva.
      * [45]EnGarde Secure Linux. (No mention in advisory of string
        handling problems).
      * [46]Immunix (StackGuard is not fully effective against this
        vulnerability).
      * [47]SuSE.
      * [48]Debian (June 14).
      * [49]Conectiva (June 14).
        
 Resources
 
    Security BOF report updated. Emily Ratliff's report from the USENIX
    security module BOF has seen some minor updates from the author; an
    [50]updated version is now available.
    
    Security Alerts: PHP Weaknesses? (O'Reilly). Noel Davis [51]looks at
    some security vulnerabilities in PHP and discusses other current
    security issues in an O'Reilly article.
    
    A rogue's gallery of denial of service attacks (ZDNet). ZDNet
    [52]looks at a few tools that can be used to thwart denial of service
    (DOS) attacks.
    
    Small TCP packets == very large overhead. Darren Reed [53]discusses
    how small TCP packets can be used maliciously to bog down a server.
    The minimum size for the maximum segment size field is too small for
    many operating systems and the value is defined by the caller.
    
    LinuxSecurity.com newsletter. The weekly [54]LinuxSecurity.com
    newsletter has been published. Advisories for Samba, xinetd, Zope,
    Scotty, and webmin are presented.
    
 Events
 
    Upcoming Security Events.
    
    Date Event Location
    July 12, 2001 [55]Black Hat Briefings USA '01 Las Vegas, Nevada, USA.
    July 17, 2001 [56]The Open Group Security Forum briefing Austin, Texas
    August 6 - 10, 2001 [57]CERT Conference 2001 Omaha, NE, USA.
    August 7, 2001 [58]CIBC World Markets First Annual Security & Privacy
    Conference New York, NY, USA.
    August 13 - 17, 2001 [59]10th USENIX Security Symposium 2001
    Conference Washington, D.C.
    August 13 - 17, 2001 [60]HAL2001 Enschede, The Netherlands
    September 11 - 13, 2001 [61]New Security Paradigms Workshop 2001(NSPW)
    Cloudcroft, New Mexico, USA
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [62]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [63]lwn@lwn.net.
    
    Section Editor: [64]Forrest Cook
    July 12, 2001
    
                               [65]Click Here 
    Secured Distributions:
    [66]Blue Linux
    [67]Engarde Secure Linux
    [68]Immunix
    [69]Kaladix
    [70]Nexus
    [71]NSA Security Enhanced
    [72]Openwall GNU/Linux
    [73]SLinux
    [74]Trustix
    Security Projects
    [75]Bastille
    [76]Linux Security Audit Project
    [77]Linux Security Module
    [78]OpenSSH
    Security List Archives
    [79]Bugtraq Archive
    [80]Firewall Wizards Archive
    [81]ISN Archive
    Distribution-specific links
    [82]Caldera Advisories
    [83]Conectiva Updates
    [84]Debian Alerts
    [85]Kondara Advisories
    [86]Esware Alerts
    [87]LinuxPPC Security Updates
    [88]Mandrake Updates
    [89]Red Hat Errata
    [90]SuSE Announcements
    [91]Yellow Dog Errata
    BSD-specific links
    [92]BSDi
    [93]FreeBSD
    [94]NetBSD
    [95]OpenBSD
    Security mailing lists [96]Caldera
    [97]Cobalt
    [98]Conectiva
    [99]Debian
    [100]Esware
    [101]FreeBSD
    [102]Kondara
    [103]LASER5
    [104]Linux From Scratch
    [105]Linux-Mandrake
    [106]NetBSD
    [107]OpenBSD
    [108]Red Hat
    [109]Slackware
    [110]Stampede
    [111]SuSE
    [112]Trustix
    [113]turboLinux
    [114]Yellow Dog
    Security Software Archives
    [115]munitions
    [116]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [117]CERT
    [118]CIAC
    [119]Comp Sec News Daily
    [120]Crypto-GRAM
    [121]LinuxLock.org
    [122]LinuxSecurity.com
    [123]OpenSEC
    [124]Security Focus
    [125]SecurityPortal
    
    
                                                         [126]Next: Kernel
    
    [127]Eklektix, Inc. Linux powered! Copyright Л 2001 [128]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
    3. http://lwn.net/2001/0712/
    4. http://lwn.net/2001/0712/kernel.php3
    5. http://lwn.net/2001/0712/dists.php3
    6. http://lwn.net/2001/0712/desktop.php3
    7. http://lwn.net/2001/0712/devel.php3
    8. http://lwn.net/2001/0712/commerce.php3
    9. http://lwn.net/2001/0712/press.php3
   10. http://lwn.net/2001/0712/announce.php3
   11. http://lwn.net/2001/0712/history.php3
   12. http://lwn.net/2001/0712/letters.php3
   13. http://lwn.net/2001/0712/bigpage.php3
   14. http://lwn.net/2001/0704/security.php3
   15. http://opensource.nailabs.com/news/20010709-cboss.html
   16. http://opensource.nailabs.com/initiatives/cboss/
   17. http://lwn.net/2001/0712/a/snort-1.8.php3
   18. http://lwn.net/2001/0712/a/dip337p.php3
   19. http://lwn.net/2001/0712/a/lmail.php3
   20. http://lwn.net/2001/0712/a/eng-openssl.php3
   21. http://lwn.net/2001/0712/a/trustix-openssl.php3
   22. http://lwn.net/2001/0712/a/cald-openssh.php3
   23. http://lwn.net/2001/0712/a/imm-tetex.php3
   24. http://lwn.net/2001/0712/a/tripwiretemp.php3
   25. http://lwn.net/2001/0712/a/xdmcookies.php3
   26. http://lwn.net/2001/0712/a/rh-xloadimage.php3
   27. http://lwn.net/2001/0712/a/oracle8i.php3
   28. http://lwn.net/2001/0621/security.php3#fetchmail
   29. http://lwn.net/2001/0712/a/mandfetchmail.php3
   30. http://lwn.net/2001/0628/a/caldera-fetchmail.php3
   31. http://lwn.net/2001/0628/a/engarde-fetchmail.php3
   32. http://lwn.net/2001/0621/a/im-fetchmail.php3
   33. http://lwn.net/2001/0621/a/deb-fetchmail.php3
   34. http://lwn.net/2001/0621/a/con-fetchmail.php3
   35. http://www.slackware.com/changelog/current.php?cpu=i386
   36. http://lwn.net/2001/0531/security.php3#webmin
   37. http://lwn.net/2001/0712/a/webmin1.php3
   38. http://lwn.net/2001/0621/a/lm-webmin.php3
   39. http://lwn.net/2001/0531/a/caldera-webmin.php3
   40. http://lwn.net/2001/0607/a/caldera-webmin.php3
   41. http://lwn.net/2001/0614/security.php3#xinetdbo
   42. http://lwn.net/2001/0712/a/mandxinetd.php3
   43. http://lwn.net/2001/0712/a/rhxinetd.php3
   44. http://lwn.net/2001/0704/a/con-xinetd.php3
   45. http://lwn.net/2001/0704/a/esl-xinetd.php3
   46. http://lwn.net/2001/0704/a/imm-xinetd.php3
   47. http://lwn.net/2001/0704/a/suse-xinetd.php3
   48. http://lwn.net/2001/0621/a/deb-xinetd.php3
   49. http://lwn.net/2001/0621/a/con-xinetd.php3
   50. http://lwn.net/2001/0704/a/security-module-BOF.php3
   51. http://linux.oreillynet.com/pub/a/linux/2001/07/09/insecurities.html
   52. http://www.zdnet.com/enterprise/stories/main/0,10228,2784023,00.html
   53. http://lwn.net/2001/0712/a/smalltcp.php3
   54. http://lwn.net/2001/0712/a/infosecnews.php3
   55. http://www.blackhat.com/
   56. http://www.opengroup.org/austin2001/security_outline.htm
   57. http://www.certconf.org/
   58. http://www.cibcwm.com/eq/conference/security/
   59. http://www.usenix.org/events/sec2001
   60. http://www.hal2001.org/hal/01Home/index.html
   61. http://www.nspw.org/
   62. http://securityfocus.com/calendar
   63. mailto:lwn@lwn.net
   64. mailto:lwn@lwn.net
   65. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
   66. http://bluelinux.sourceforge.net/
   67. http://www.engardelinux.org/
   68. http://www.immunix.org/
   69. http://www.maganation.com/~kaladix/
   70. http://Nexus-Project.net/
   71. http://www.nsa.gov/selinux/
   72. http://www.openwall.com/Owl/
   73. http://www.slinux.org/
   74. http://www.trustix.com/
   75. http://www.bastille-linux.org/
   76. http://lsap.org/
   77. http://lsm.immunix.org/
   78. http://www.openssh.com/
   79. http://www.securityfocus.com/bugtraq/archive/
   80. http://www.nfr.net/firewall-wizards/
   81. http://www.jammed.com/Lists/ISN/
   82. http://www.calderasystems.com/support/security/
   83. http://www.conectiva.com.br/atualizacoes/
   84. http://www.debian.org/security/
   85. http://www.kondara.org/errata/k12-security.html
   86. http://www.esware.com/actualizaciones.html
   87. http://linuxppc.org/security/advisories/
   88. http://www.linux-mandrake.com/en/fupdates.php3
   89. http://www.redhat.com/support/errata/index.html
   90. http://www.suse.de/security/index.html
   91. http://www.yellowdoglinux.com/resources/errata.shtml
   92. http://www.BSDI.COM/services/support/patches/
   93. http://www.freebsd.org/security/security.html
   94. http://www.NetBSD.ORG/Security/
   95. http://www.openbsd.org/security.html
   96. http://www.calderasystems.com/support/forums/announce.html
   97. http://www.cobalt.com/support/resources/usergroups.html
   98. http://distro.conectiva.com.br/atualizacoes/
   99. http://www.debian.org/MailingLists/subscribe
  100. http://www.esware.com/lista_correo.html
  101. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  102. http://www.kondara.org/mailinglist.html.en
  103. http://l5web.laser5.co.jp/ml/ml.html
  104. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  105. http://www.linux-mandrake.com/en/flists.php3
  106. http://www.netbsd.org/MailingLists/
  107. http://www.openbsd.org/mail.html
  108. http://www.redhat.com/mailing-lists/
  109. http://www.slackware.com/lists/
  110. http://www.stampede.org/mailinglists.php3
  111. http://www.suse.com/en/support/mailinglists/index.html
  112. http://www.trustix.net/support/
  113. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  114. http://lists.yellowdoglinux.com/ydl_updates.shtml
  115. http://munitions.vipul.net/
  116. http://www.zedz.net/
  117. http://www.cert.org/nav/alerts.html
  118. http://ciac.llnl.gov/ciac/
  119. http://www.MountainWave.com/
  120. http://www.counterpane.com/crypto-gram.html
  121. http://linuxlock.org/
  122. http://linuxsecurity.com/
  123. http://www.opensec.net/
  124. http://www.securityfocus.com/
  125. http://www.securityportal.com/
  126. http://lwn.net/2001/0712/kernel.php3
  127. http://www.eklektix.com/
  128. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://www.lwn.net/2001/0712/security.php3   Sergey Lentsov   12 Jul 2001 16:16:14 
Архивное /ru.linux/19861a676d39b.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional