Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   01 Feb 2002  14:56:32
 To : All
 Subject : URL: http://www.lwn.net/2002/0131/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] [No ads right now]
    [LWN.net]
 
    Sections:
     [2]Main page
     Security
     [3]Kernel
     [4]Distributions
     [5]Development
     [6]Commerce
     [7]Linux in the news
     [8]Announcements
     [9]Letters
    [10]All in one big page
 
    See also: [11]last week's Security page.
 
 Security
 
 News and Editorials
 
    How are distributors doing with security updates? Below you'll find
    the writeup of the rsync vulnerability, along with a large number of
    distributor updates which fix the problem. The rsync vulnerability is
    severe; relatively few sites run globally available rsync servers, but
    those which do are open to a remote root exploit. So it is good to see
    that most distributors are responding quickly to the problem.
 
    A look at the list of updates reveals, however, that a couple of the
    major distributors have not issued updates. This delay, if it
    continues much longer, will be hard to justify. The fix is known and
    available; why would a distributor want to leave its customers open to
    a vulnerability of this magnitude?
 
    One of the missing distributors is Turbolinux. We are pleased to note
    that the company did come out with a few security updates this week
    (but not for rsync). We are less pleased to note that these updates
    were (according to [12]The Turbolinux security page) the first from
    Turbolinux since June, 2001. It will be a nice day when a distributor
    need not issue a single security update for six months, but that is
    not where we are at now.
 
    Distributors have a responsibility to fix known security problems in
    their distributions. Anybody who is trying to choose between
    distributions for an important application would do well to consider
    how well the candidate distributors are living up to that
    responsibility. Security response is a very direct indication of how
    much importance a distributor places on security, and on the integrity
    of its customers' systems.
 
    (For more information, see the distributor's security pages, linked in
    the right-hand column of this page, or the [13]LWN Security Alert
    Archive).
 
 Security Reports
 
    A remotely exploitable hole in rsync. A vulnerability has been found
    in the rsync server: it seems that the server did not pay enough
    attention to the sign of numbers it reads from the client connection.
    This oversight allows an attacker to write bytes containing zero
    almost anywhere in the stack, with results similar to those caused by
    buffer overflows. Sites running rsync in its daemon mode are thus
    vulnerable to remote root compromises. Versions of rsync prior to
    2.5.2 are vulnerable.
 
    Here are the vendor updates we have seen so far:
      * [14]Conectiva (January 25, 2002)
      * [15]Debian (January 26, 2002) (note: we seen reports that this fix
        breaks rsync's daemon mode).
      * [16]EnGarde (January 25, 2002)
      * [17]Mandrake (January 28, 2002)
      * [18]Red Hat (January 30, 2002) (note that this alert was updated;
        if you applied [19]the original version you should update again.
      * [20]Slackware (January 26, 2002)
      * [21]SuSE (January 25, 2002)
      * [22]Trustix (January 28, 2002)
      * [23]Yellow Dog (January 27, 2002)
 
    Trouble with OpenLDAP object protection rules. OpenLDAP (and,
    specifically, slapd prior to 2.0.20) [24]has a vulnerability which
    allows an attacker to delete attributes from the database.
 
    Updates seen so far:
      * [25]Conectiva (January 28, 2002)
 
    Temporary file handling vulnerability in sane. Yellow Dog Linux has
    [26]a security update to its sane-backends package fixing a temporary
    file vulnerability.
 
    web scripts.
    The following web scripts were reported to contain vulnerabilities:
 
    Proprietary products.
    The following proprietary products were reported to contain
    vulnerabilities:
 
 Updates
 
    Heap corruption vulnerability in at. The at command has a potentially
    exploitable heap corruption bug. (First LWN report:
    [27] January 17th).
 
    This week's updates:
      * [28]Yellow Dog (January 27, 2002)
 
    Previous updates:
      * [29]Debian (January 16, 2002)
      * [30]Debian (January 18, 2002) (first update did not fix the
        problem).
      * [31]Mandrake (January 18, 2002)
      * [32]Red Hat (January 22, 2002) Red Hat Linux 7.2 is not
        vulnerable; earlier releases are.
      * [33]Slackware (January 22, 2002)
      * [34]SuSE (January 16, 2001)
 
    Denial of service vulnerability in CIPE. The CIPE VPN package has a
    vulnerability which can cause the hosting system to crash. (First LWN
    report: [35]January 17, 2002).
 
    This week's updates:
      * [36]Red Hat (January 22, 2002)
 
    Previous updates:
      * [37]Debian (January 14, 2002)
 
    Temporary file handling bug in enscript Enscript has a temporary file
    handling bug. (First LWN report: [38]January 24, 2002).
 
    This week's updates:
      * [39]HP (January 22, 2002)
      * [40]Mandrake (January 28, 2002)
      * [41]Yellow Dog (January 27, 2002)
 
    Previous updates:
      * [42]Debian (January 21, 2002)
      * [43]Red Hat (January 17, 2002)
 
    Format string vulnerability in groff
    . A format string problem exists in groff; apparently it could be
    remotely exploited when it is configured to be used with the lpd
    printing system. (First LWN report: [44]August 16, 2001).
 
    The stable release of Debian [45]is not vulnerable.
 
    New updates:
      * [46]Debian (January 30, 2002) (Japanese version)
 
    Previous updates:
      * [47]Conectiva (October 2, 2001)
      * [48]Debian (August 10, 2001)
      * [49]Progeny (August 16, 2001)
      * [50]Red Hat (January 14, 2002)
      * [51]Trustix (January 18, 2002)
 
    Buffer overflow in groff. The groff package has a buffer overflow
    vulnerability; if it is used with the print system, it is conceivably
    exploitable remotely.
 
    This week's updates:
      * [52]Yellow Dog (January 27, 2002)
 
    Previous updates:
      * [53]Red Hat (January 14, 2002)
      * [54]Trustix (January 18, 2002)
 
    Remotely exploitable security problem in mutt. Most of the major
    distributions have provided updates for this buffer overflow
    vulnerabilty which was [55]fixed in mutt versions 1.2.5.1 and 1.3.25.
 
    This is a remotely exploitable hole; applying the update is a very
    good idea. It was first mentioned in [56] the January 3rd LWN security
    page.
 
    This week's updates:
      * [57]Yellow Dog (January 27, 2002)
 
    Previous updates:
      * [58]Conectiva (January 7, 2002)
      * [59]Debian (January 2, 2002)
      * [60]Debian (January 3, 2002) (Sparc architecture)
      * [61]Mandrake (January 8, 2002)
      * [62]Red Hat (January 7, 2002)
      * [63]Slackware (January 8, 2002)
      * [64]SuSE (January 7, 2001)
      * [65]Trustix (January 4, 2002)
 
    OpenSSH UseLogin vulnerability. This obscure vulnerability is not of
    concern to most sites. This problem first appeared in [66] the
    December 6th LWN security page.
 
    This week's updates:
      * [67]Turbolinux (January 23, 2002)
 
    Previous updates:
      * [68]Caldera (December 11, 2001)
      * [69]Caldera (December 14, 2001) (correct December 11th update)
      * [70]Conectiva (December 13, 2001)
      * [71]Debian (December 5, 2001) (backport from OpenSSH 3.0.2)
      * [72]Mandrake (December 13, 2001)
      * [73]Red Hat (December 4, 2001) (backport from OpenSSH 3.0.2)
      * [74]Trustix (December 19, 2001)
 
    Remotely exploitable vulnerability in pine. Pine has an unpleasant
    vulnerability in URL handling vulnerability which can lead to command
    execution by remote attackers. (First LWN report: [75] January 17th).
 
    This vulnerability is remotely exploitable; updating is a good idea.
 
    Note: If an update isn't yet available for your distribution, setting
    enable-msg-view-urls to "off" in pine's setup will avoid the
    vulnerability. (Thanks to Greg Herlein).
 
    This week's updates:
      * [76]Yellow Dog (January 27, 2002)
 
    Previous updates:
      * [77]EnGarde (January 14, 2002)
      * [78]Red Hat (January 14, 2002)
      * [79]Slackware (January 13, 2002)
 
    Denial of service vulnerability in squid-2.4STABLE1. The squid server
    can be out of service for a few seconds when it reloads after a crash
    caused by a burst of certain FTP requests. See the [80]September 18th
    bug report for details.
 
    This week's updates:
      * [81]Turbolinux (January 24, 2002)
 
    Previous updates:
      * [82]Mandrake (November 21, 2001)
 
    Nasty security hole in sudo. The sudo package, used to provide limited
    administrator access to systems, has an unpleasant vulnerability which
    makes it relatively easy for a local attacker to obtain root access.
    If you have sudo on a system with untrusted users, you probably want
    to disable it until you can get a fix installed. (First LWN report:
    [83] January 17th).
 
    This week's updates:
      * [84]Yellow Dog (January 27, 2002)
 
    Previous updates:
      * [85]Conectiva (January 15, 2002)
      * [86]Debian (January 14, 2002)
      * [87]EnGarde (January 14, 2002)
      * [88]Mandrake (January 15, 2002)
      * [89]Red Hat (January 15, 2002)
      * [90]Red Hat (January 14, 2002) (Powertools)
      * [91]Slackware (January 22, 2002)
      * [92]SuSE (January 14, 2002)
 
    Remote command execution vulnerability in uucp. The uuxqt utility in
    the uucp package does not properly check its options, allowing an
    attacker to run arbitrary commands. (First LWN report:[93]January 24,
    2002).
 
    This week's updates:
      * [94]HP (January 22, 2002)
      * [95]Yellow Dog (January 27, 2002)
 
    Previous updates:
      * [96]Red Hat (January 15, 2002)
 
    wu-ftpd buffer overflow. The wu-ftpd FTP server contains a remotely
    exploitable buffer overflow vulnerability; anybody running this
    package should already have upgraded. Versions up through 2.6.1 are
    vulnerable, as are 2.7.0 testing snapshots. (First LWN report:
    [97]November 29).
 
    This week's updates:
      * [98]Turbolinux (January 23, 2002)
 
    Previous updates:
      * [99]Caldera (November 28, 2001)
      * [100]Conectiva (November 30, 2001)
      * [101]Debian (December 3, 2001)
      * [102]Immunix (November 29, 2001)
      * [103]Mandrake (November 29, 2001)
      * [104]Red Hat (November 26, 2001)
      * [105]SuSE (November 28, 2001)
 
    XChat session hijacking vulnerability. The XChat IRC client has a
    vulnerabilty that allows an attacker to take over the users IRC
    session. (First LWN report: [106] January 17th).
 
    This week's updates:
      * [107]Yellow Dog (January 27, 2002)
 
    Previous updates:
      * [108]Conectiva (January 18, 2002)
      * [109]Debian (January 12, 2002)
      * [110]Red Hat (January 14, 2002)
      * [111]Slackware (January 22, 2002)
 
    Security audit of xinetd and resulting fixes. Solar Designer has
    performed an extensive audit of xinetd, looking for certain types of
    security vulnerabilities. So many problems were found in the code that
    the resulting patch weighed in at over 100KB. This patch was only
    fully merged as of xinetd 2.3.3. See [112]the September 6, 2001 LWN
    security page for the initial report.
 
    This week's updates:
      * [113]Turbolinux (January 24, 2002)
 
    Previous updates:
      * [114]EnGarde (October 19, 2001)
      * [115]Immunix (August 29, 2001)
      * [116]Mandrake (August 31, 2001)
      * [117]Red Hat (September 7, 2001)
 
 Resources
 
    White paper on SQL injection. SPI Labs has released a white paper
    ([118]in PDF format) on SQL injection attacks.
 
 Events
 
    Upcoming Security Events.
 
    Date Event Location
    January 31 - February 2, 2002 [119]Second Annual Privacy and Data
    Protection Summit Washington D.C., USA
    February 15 - 17, 2002 [120]CODECON 2002 San Francisco, California,
    USA
    February 18 - 22, 2002 [121]RSA Conference 2002 San Jose, CA., USA
    March 11 - 14, 2002 [122]Financial Cryptography 2002 Sothhampton,
    Bermuda
    March 18 - 21, 2002 [123]Sixth Annual Distributed Objects and
    Components Security Workshop (Pier 5 Hotel at the Inner
    Harbor)Baltimore, Maryland, USA
 
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [124]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [125]lwn@lwn.net.
 
    Section Editor: [126]Jonathan Corbet
    January 31, 2002
 
    LWN Resources
    [127]Security alerts archive
    Secured Distributions:
    [128]Astaro Security
    [129]Blue Linux
    [130]Castle
    [131]Engarde Secure Linux
    [132]Immunix
    [133]Kaladix Linux
    [134]NSA Security Enhanced
    [135]Openwall GNU/Linux
    [136]Trustix
    Security Projects
    [137]Bastille
    [138]Linux Security Audit Project
    [139]Linux Security Module
    [140]OpenSSH
    Security List Archives
    [141]Bugtraq Archive
    [142]Firewall Wizards Archive
    [143]ISN Archive
    Distribution-specific links
    [144]Caldera Advisories
    [145]Conectiva Updates
    [146]Debian Alerts
    [147]Kondara Advisories
    [148]Esware Alerts
    [149]LinuxPPC Security Updates
    [150]Mandrake Updates
    [151]Red Hat Errata
    [152]SuSE Announcements
    [153]Turbolinux
    [154]Yellow Dog Errata
    BSD-specific links
    [155]BSDi
    [156]FreeBSD
    [157]NetBSD
    [158]OpenBSD
    Security mailing lists
    [159]Caldera
    [160]Cobalt
    [161]Conectiva
    [162]Debian
    [163]Esware
    [164]FreeBSD
    [165]Kondara
    [166]LASER5
    [167]Linux From Scratch
    [168]Linux-Mandrake
    [169]NetBSD
    [170]OpenBSD
    [171]Red Hat
    [172]Slackware
    [173]Stampede
    [174]SuSE
    [175]Trustix
    [176]turboLinux
    [177]Yellow Dog
    Security Software Archives
    [178]munitions
    [179]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [180]CERT
    [181]CIAC
    [182]Comp Sec News Daily
    [183]Crypto-GRAM
    [184]LinuxLock.org
    [185]LinuxSecurity.com
    [186]Security Focus
    [187]SecurityPortal
                                                         [188]Next: Kernel
 
    [189]Eklektix, Inc. Linux powered! Copyright Л 2002 [190]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://lwn.net/2002/0131/
    3. http://lwn.net/2002/0131/kernel.php3
    4. http://lwn.net/2002/0131/dists.php3
    5. http://lwn.net/2002/0131/devel.php3
    6. http://lwn.net/2002/0131/commerce.php3
    7. http://lwn.net/2002/0131/press.php3
    8. http://lwn.net/2002/0131/announce.php3
    9. http://lwn.net/2002/0131/letters.php3
   10. http://lwn.net/2002/0131/bigpage.php3
   11. http://lwn.net/2002/0124/security.php3
   12. http://www.turbolinux.com/security/
   13. http://lwn.net/alerts/
   14. http://lwn.net/alerts/Conectiva/CLA-2002:458.php3
   15. http://lwn.net/alerts/Debian/DSA-106-1.php3
   16. http://lwn.net/alerts/EnGarde/ESA-20020125-004.php3
   17. http://lwn.net/alerts/Mandrake/MDKSA-2002:009.php3
   18. http://lwn.net/alerts/RedHat/RHSA-2002:018-10.php3
   19. http://lwn.net/alerts/RedHat/RHSA-2002:018-05.php3
   20. http://lwn.net/alerts/Slackware/sl-1012057608.php3
   21. http://lwn.net/alerts/SuSE/SuSE-SA:2002:004.php3
   22. http://lwn.net/alerts/Trustix/2002-0025.php3
   23. http://lwn.net/alerts/YellowDog/YDU-20020127-3.php3
   24. http://www.openldap.org/lists/openldap-bugs/200201/msg00049.html
   25. http://lwn.net/alerts/Conectiva/CLA-2002:459.php3
   26. http://lwn.net/alerts/YellowDog/YDU-20020127-6.php3
   27. http://lwn.net/2002/0117/security.php3#at
   28. http://lwn.net/alerts/YellowDog/YDU-20020127-9.php3
   29. http://lwn.net/alerts/Debian/DSA-102-1.php3
   30. http://lwn.net/alerts/Debian/DSA-102-2.php3
   31. http://lwn.net/alerts/Mandrake/MDKSA-2002:007.php3
   32. http://lwn.net/alerts/RedHat/RHSA-2002:015-13.php3
   33. http://lwn.net/alerts/Slackware/sl-1011706104.php3
   34. http://lwn.net/alerts/SuSE/SuSE-SA:2002:003.php3
   35. http://lwn.net/2002/0117/security.php3#cipe
   36. http://lwn.net/alerts/RedHat/RHSA-2002:007-16.php3
   37. http://lwn.net/alerts/Debian/DSA-104-1.php3
   38. http://lwn.net/2002/0124/security.php3#enscript
   39. http://lwn.net/alerts/HP/HPSBTL0201-019.php3
   40. http://lwn.net/alerts/Mandrake/MDKSA-2002:010.php3
   41. http://lwn.net/alerts/YellowDog/YDU-20020127-5.php3
   42. http://lwn.net/alerts/Debian/DSA-105-1.php3
   43. http://lwn.net/alerts/RedHat/RHSA-2002:012-06.php3
   44. http://lwn.net/2001/0816/security.php3#groff
   45. http://lwn.net/2002/0117/a/debiangroffok.php3
   46. http://lwn.net/alerts/Debian/DSA-107-1.php3
   47. http://lwn.net/alerts/Conectiva/CLA-2001:428.php3
   48. http://lwn.net/alerts/Debian/DSA-072-1.php3
   49. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-33.php3
   50. http://lwn.net/alerts/RedHat/RHSA-2002:004-06.php3
   51. http://lwn.net/alerts/Trustix/2002-0020.php3
   52. http://lwn.net/alerts/YellowDog/YDU-20020127-11.php3
   53. http://lwn.net/alerts/RedHat/RHSA-2002:004-06.php3
   54. http://lwn.net/alerts/Trustix/2002-0020.php3
   55. http://lwn.net/2002/0103/a/mutt.php3
   56. http://lwn.net/2002/0103/security.php3#mutt
   57. http://lwn.net/alerts/YellowDog/YDU-20020127-4.php3
   58. http://lwn.net/alerts/Conectiva/CLA-2002:449.php3
   59. http://lwn.net/alerts/Debian/DSA-096-1.php3
   60. http://lwn.net/alerts/Debian/DSA-096-2.php3
   61. http://lwn.net/alerts/Mandrake/MDKSA-2002:002.php3
   62. http://lwn.net/alerts/RedHat/RHSA-2002:003-10.php3
   63. http://lwn.net/alerts/Slackware/sl-1010504811.php3
   64. http://lwn.net/alerts/SuSE/SuSE-SA:2002:001.php3
   65. http://lwn.net/alerts/Trustix/2002-0003.php3
   66. http://lwn.net/2001/1206/security.php3#openssh
   67. http://lwn.net/alerts/Turbolinux/TLSA2002001.php3
   68. http://lwn.net/alerts/Caldera/CSSA-2001-042.0.php3
   69. http://lwn.net/alerts/Caldera/CSSA-2001-042.1.php3
   70. http://lwn.net/alerts/Conectiva/CLA-2001:446.php3
   71. http://lwn.net/alerts/Debian/DSA-091-1.php3
   72. http://lwn.net/alerts/Mandrake/MDKSA-2001:092.php3
   73. http://lwn.net/alerts/RedHat/RHSA-2001:161-08.php3
   74. http://lwn.net/alerts/Trustix/2001-0030.php3
   75. http://lwn.net/2002/0117/security.php3#pine
   76. http://lwn.net/alerts/YellowDog/YDU-20020127-8.php3
   77. http://lwn.net/alerts/EnGarde/ESA-20020114-002.php3
   78. http://lwn.net/alerts/RedHat/RHSA-2002:009-06.php3
   79. http://lwn.net/alerts/Slackware/sl-1010936849.php3
   80. http://www.squid-cache.org/bugs/show_bug.cgi?id=233
   81. http://lwn.net/alerts/Turbolinux/TLSA2002003.php3
   82. http://lwn.net/alerts/Mandrake/MDKSA-2001:088.php3
   83. http://lwn.net/2002/0117/security.php3#sudo
   84. http://lwn.net/alerts/YellowDog/YDU-20020127-7.php3
   85. http://lwn.net/alerts/Conectiva/CLA-2002:451.php3
   86. http://lwn.net/alerts/Debian/DSA-101-1.php3
   87. http://lwn.net/alerts/EnGarde/ESA-20020114-001.php3
   88. http://lwn.net/alerts/Mandrake/MDKSA-2002:003.php3
   89. http://lwn.net/alerts/RedHat/RHSA-2002:011-06.php3
   90. http://lwn.net/alerts/RedHat/RHSA-2002:013-03.php3
   91. http://lwn.net/alerts/Slackware/sl-1011706104.php3
   92. http://lwn.net/alerts/SuSE/SuSE-SA:2002:002.php3
   93. http://lwn.net/2002/0124/security.php3#uucp
   94. http://lwn.net/alerts/HP/HPSBTL0201-018.php3
   95. http://lwn.net/alerts/YellowDog/YDU-20020127-10.php3
   96. http://lwn.net/alerts/RedHat/RHSA-2001:165-08.php3
   97. http://lwn.net/2001/1129/security.php3#ftpd
   98. http://lwn.net/alerts/Turbolinux/TLSA2002002.php3
   99. http://lwn.net/alerts/Caldera/CSSA-2001-041.0.php3
  100. http://lwn.net/alerts/Conectiva/CLA-2001:443.php3
  101. http://lwn.net/alerts/Debian/DSA-087-1.php3
  102. http://lwn.net/alerts/Immunix/IMNX-2001-70-036-02.php3
  103. http://lwn.net/alerts/Mandrake/MDKSA-2001:090.php3
  104. http://lwn.net/alerts/RedHat/RHSA-2001:157-06.php3
  105. http://lwn.net/alerts/SuSE/SuSE-SA:2001:043.php3
  106. http://lwn.net/2002/0117/security.php3#xchat
  107. http://lwn.net/alerts/YellowDog/YDU-20020127-2.php3
  108. http://lwn.net/alerts/Conectiva/CLA-2002:453.php3
  109. http://lwn.net/alerts/Debian/DSA-099-1.php3
  110. http://lwn.net/alerts/RedHat/RHSA-2002:005-09.php3
  111. http://lwn.net/alerts/Slackware/sl-1011706104.php3
  112. http://lwn.net/2001/0906/security.php3#xinetd
  113. http://lwn.net/alerts/Turbolinux/TLSA2002004.php3
  114. http://lwn.net/alerts/EnGarde/ESA-20011019-03.php3
  115. http://lwn.net/alerts/Immunix/IMNX-2001-70-033-01.php3
  116. http://lwn.net/alerts/Mandrake/MDKSA-2001:076.php3
  117. http://lwn.net/alerts/RedHat/RHSA-2001:109-05.php3
  118. http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf
  119. http://www.privacyassociation.org/html/conferences.html
  120. http://www.codecon.org/
  121. http://www.rsaconference.com/
  122. http://www.fc02.ai/
  123. http://www.omg.org/news/meetings/docsec2002/call.htm
  124. http://securityfocus.com/calendar
  125. mailto:lwn@lwn.net
  126. mailto:lwn@lwn.net
  127. http://lwn.net/alerts/
  128. http://www.astaro.com/products/index.html
  129. http://bluelinux.sourceforge.net/
  130. http://castle.altlinux.ru/
  131. http://www.engardelinux.org/
  132. http://www.immunix.org/
  133. http://www.kaladix.org/
  134. http://www.nsa.gov/selinux/
  135. http://www.openwall.com/Owl/
  136. http://www.trustix.com/
  137. http://www.bastille-linux.org/
  138. http://lsap.org/
  139. http://lsm.immunix.org/
  140. http://www.openssh.com/
  141. http://www.securityfocus.com/archive/1
  142. http://www.nfr.net/firewall-wizards/
  143. http://www.jammed.com/Lists/ISN/
  144. http://www.calderasystems.com/support/security/
  145. http://www.conectiva.com.br/atualizacoes/
  146. http://www.debian.org/security/
  147. http://www.kondara.org/errata/k12-security.html
  148. http://www.esware.com/actualizaciones.html
  149. http://linuxppc.org/security/advisories/
  150. http://www.linux-mandrake.com/en/fupdates.php3
  151. http://www.redhat.com/support/errata/index.html
  152. http://www.suse.de/security/index.html
  153. http://www.turbolinux.com/security/
  154. http://www.yellowdoglinux.com/resources/
  155. http://www.BSDI.COM/services/support/patches/
  156. http://www.freebsd.org/security/security.html
  157. http://www.NetBSD.ORG/Security/
  158. http://www.openbsd.org/security.html
  159. http://www.calderasystems.com/support/forums/announce.html
  160. http://www.cobalt.com/support/resources/usergroups.html
  161. http://distro.conectiva.com.br/atualizacoes/
  162. http://www.debian.org/MailingLists/subscribe
  163. http://www.esware.com/lista_correo.html
  164. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  165. http://www.kondara.org/mailinglist.html.en
  166. http://l5web.laser5.co.jp/ml/ml.html
  167. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  168. http://www.linux-mandrake.com/en/flists.php3
  169. http://www.netbsd.org/MailingLists/
  170. http://www.openbsd.org/mail.html
  171. http://www.redhat.com/mailing-lists/
  172. http://www.slackware.com/lists/
  173. http://www.stampede.org/mailinglists.php3
  174. http://www.suse.com/en/support/mailinglists/index.html
  175. http://www.trustix.net/support/
  176. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  177. http://lists.yellowdoglinux.com/ydl_updates.shtml
  178. http://munitions.vipul.net/
  179. http://www.zedz.net/
  180. http://www.cert.org/nav/alerts.html
  181. http://ciac.llnl.gov/ciac/
  182. http://www.MountainWave.com/
  183. http://www.counterpane.com/crypto-gram.html
  184. http://linuxlock.org/
  185. http://linuxsecurity.com/
  186. http://www.securityfocus.com/
  187. http://www.securityportal.com/
  188. http://lwn.net/2002/0131/kernel.php3
  189. http://www.eklektix.com/
  190. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://www.lwn.net/2002/0131/security.php3   Sergey Lentsov   01 Feb 2002 14:56:32 
Архивное /ru.linux/19861b9bcac65.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional