|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 31 Aug 2001 15:51:57 To : All Subject : URL: http://www.lwn.net/2001/0830/security.php3 -------------------------------------------------------------------------------- [1][LWN Logo] [2]Click Here [LWN.net] Sections: [3]Main page Security [4]Kernel [5]Distributions [6]On the Desktop [7]Development [8]Commerce [9]Linux in the news [10]Announcements [11]Linux History [12]Letters [13]All in one big page See also: [14]last week's Security page. Security News and Editorials New NSA SELinux release. A new release of the NSA's Security Enhanced Linux has been [15]announced. This version is based on the 2.4.9 kernel; the most interesting new feature, though, is likely to be that this release is built on the new Linux security module architecture. It's the first release of this work as part of an integrated product, and thus it gives an indication of how future secure Linux releases will look. The security module project, remember, started after the [16]Kernel Summit last March. Linus Torvalds had stated that he wanted the various security projects to agree on a framework for hooking security extensions into the kernel, so that users could easily experiment with (and switch between) them. Work on the security module project has been proceeding quickly, to the point that the developers are beginning to consider proposing it for inclusion in the 2.5 kernel. Assuming there ever is a 2.5 kernel, of course. The SELinux release is a good step in that direction, since it provides a demonstration of a security-enhanced kernel using the new architecture. It will also allow for wider testing of the security module code and help to shake out the remaining problems. See the [17]NSA Security-Enhanced Linux pages for more information. The generic security module code can be found on the [18]Linux Security Module page. CERT's quarterly summary is [19]available; as usual, it points out the security vulnerabilities that (in CERT's opinion) people should be most worried about. It is dominated this time around by Windows-specific problems - Code Red, Sircam, etc. There is one issue in the list that is relevant for Linux users, though: the telnetd vulnerability. The current list of telnetd updates appears in the "Updates" section below; anybody who is still running telnet should be sure to apply the relevant update to their systems. Security Reports Buffer overflow in AOLserver. The AOLserver web server has been [20]reported to crash when fed a long authorization string as input. Such problems are usually exploitable, though no exploit has yet been reported in this case. Older versions of AOLserver (3.0, 3.2) are vulnerable; the current version (3.4) is not. String handling problems in xinetd. A new set of problems has been found in xinetd, having to do with how it handles strings. Versions prior to 2.3.1 are vulnerable, and should be upgraded. As of this writing, the only distributor update available is from [21]Conectiva. web scripts. The following web scripts were reported to contain vulnerabilities: * The PHProjekt groupware suite [22]contains a vulnerability allowing any user to view and modify other users' data. The fix is to upgrade to version 2.4a. Proprietary products. The following proprietary products were reported to contain vulnerabilities: * Cisco has [23]reported a vulnerability in its CBOS operating system that runs on its 600-series routers - such as its widely-used DSL routers. A denial of service is possible through excessive traffic to the router's web-based configuration port, which is enabled by default. * Netscape 6.01a [24]has a temp file vulnerability which could be used by a suitably talented and lucky local attacker to overwrite system files. Updates Linux Kernel 2.4 Netfilter/IPTables vulnerability. Check the [25]April 19 LWN Security Summary for the original report. The NetFilter team has provided [26]a patch for Linux 2.4.3. This week's updates: * [27]Mandrake (August 28, 2001) Previous updates: * [28]Progeny (May 17) * [29]Red Hat (June 21), 7.1, default configuration not vulnerable Denial of service vulnerability in OpenLDAP This problem was first identified in [30]a CERT advisory issued in July, 2001. It was covered in the [31]July 19, 2001 LWN security page. This week's updates: * [32]Conectiva (August 29, 2001) Previous updates: * [33]Debian (August 9, 2001) [34]Mandrake (August 13, 2001) [35]Progeny (August 14, 2001) [36]Red Hat (August 9, 2001) [37]Yellow Dog (August 10, 2001) Input validation problem with sendmail. An input validation error exists in versions of sendmail prior to 8.11.6 (or 8.12.0Beta19) which may be exploited by local users to obtain root access. See [38]the August 23 Security Page for the initial report. This week's updates: * [39]Caldera (August 24, 2001) [40]Conectiva (August 23, 2001) [41]Immunix (August 23, 2001) [42]Slackware (August 27, 2001) [43]SuSE (August 23, 2001) Multiple vendor telnetd vulnerability. This vulnerability, originally thought to be confined to BSD-derived systems, was first covered in the [44]July 26th Security Summary. It is now known that Linux telnet daemons are vulnerable as well. This week's updates: * [45]Conectiva (August 24, 2001) Previous updates: * [46]Caldera (August 10, 2001) [47]Debian (August 14, 2001) (SSL version) [48]Debian (August 14, 2001) (Update for Sparc version) [49]Mandrake (August 13, 2001) [50]Progeny (August 14, 2001) [51]Red Hat (August 9, 2001) [52]Red Hat (August 9, 2001) (kerberos version). [53]Slackware (August 9, 2001) [54]Yellow Dog (August 10, 2001) [55]Yellow Dog (August 10, 2001) (kerberos version). Buffer overflows in xloadimage This problem was first covered in the [56]July 12 Security page. This week's updates: * [57]Conectiva (August 28, 2001) Previous updates: * [58]Debian (August 9, 2001) [59]Progeny (August 14, 2001) [60]Red Hat (July 12) [61]SuSE (July 26) [62]Yellow Dog (July 25, 2001) Resources LinuxSecurity.com's weekly newsletters ([63]Linux Security Week and [64]Linux Advisory Watch are available. Events RAID 2001, the Fourth International Symposium on Recent Advances in Intrusion Detection, will happen in Davis, California, on October 10 to 12. A [65]call for participation has been posted. The 14th Annual Computer Security Incident Handling Conference will be held on June 24 to 28 at the Hilton Waikoloa Village in Hawaii. The [66]call for papers has been issued; the submission deadline is November 16. Upcoming Security Events. Date Event Location September 11 - 13, 2001 [67]New Security Paradigms Workshop 2001(NSPW) Cloudcroft, New Mexico, USA September 28 - 30, 2001 [68]Canadian Association for Security and Intelligence Studies(CASIS 2001) (Dalhousie University)Halifax, Nova Scotia, Canada. October 10 - 12, 2001 [69]Fourth International Symposium on Recent Advances in Intrusion Detection(RAID 2001) Davis, CA For additional security-related events, included training courses (which we don't list above) and events further in the future, check out Security Focus' [70]calendar, one of the primary resources we use for building the above list. To submit an event directly to us, please send a plain-text message to [71]lwn@lwn.net. Section Editor: [72]Jonathan Corbet August 30, 2001 [73]Click Here LWN Resources [74]Security alerts archive Secured Distributions: [75]Blue Linux [76]Castle [77]Engarde Secure Linux [78]Immunix [79]Kaladix [80]NSA Security Enhanced [81]Openwall GNU/Linux [82]Trustix Security Projects [83]Bastille [84]Linux Security Audit Project [85]Linux Security Module [86]OpenSSH Security List Archives [87]Bugtraq Archive [88]Firewall Wizards Archive [89]ISN Archive Distribution-specific links [90]Caldera Advisories [91]Conectiva Updates [92]Debian Alerts [93]Kondara Advisories [94]Esware Alerts [95]LinuxPPC Security Updates [96]Mandrake Updates [97]Red Hat Errata [98]SuSE Announcements [99]Yellow Dog Errata BSD-specific links [100]BSDi [101]FreeBSD [102]NetBSD [103]OpenBSD Security mailing lists [104]Caldera [105]Cobalt [106]Conectiva [107]Debian [108]Esware [109]FreeBSD [110]Kondara [111]LASER5 [112]Linux From Scratch [113]Linux-Mandrake [114]NetBSD [115]OpenBSD [116]Red Hat [117]Slackware [118]Stampede [119]SuSE [120]Trustix [121]turboLinux [122]Yellow Dog Security Software Archives [123]munitions [124]ZedZ.net (formerly replay.com) Miscellaneous Resources [125]CERT [126]CIAC [127]Comp Sec News Daily [128]Crypto-GRAM [129]LinuxLock.org [130]LinuxSecurity.com [131]OpenSEC [132]Security Focus [133]SecurityPortal [134]Next: Kernel [135]Eklektix, Inc. Linux powered! Copyright Л 2001 [136]Eklektix, Inc., all rights reserved Linux (R) is a registered trademark of Linus Torvalds References 1. http://lwn.net/ 2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012 3. http://lwn.net/2001/0830/ 4. http://lwn.net/2001/0830/kernel.php3 5. http://lwn.net/2001/0830/dists.php3 6. http://lwn.net/2001/0830/desktop.php3 7. http://lwn.net/2001/0830/devel.php3 8. http://lwn.net/2001/0830/commerce.php3 9. http://lwn.net/2001/0830/press.php3 10. http://lwn.net/2001/0830/announce.php3 11. http://lwn.net/2001/0830/history.php3 12. http://lwn.net/2001/0830/letters.php3 13. http://lwn.net/2001/0830/bigpage.php3 14. http://lwn.net/2001/0823/security.php3 15. http://lwn.net/2001/0830/a/selinux.php3 16. http://lwn.net/2001/features/KernelSummit/ 17. http://www.nsa.gov/selinux/ 18. http://lsm.immunix.org/ 19. http://lwn.net/2001/0830/a/cert-quarterly.php3 20. http://lwn.net/2001/0830/a/aolserver.php3 21. http://lwn.net/alerts/Conectiva/CLA-2001:416.php3 22. http://lwn.net/2001/0830/a/phprojekt.php3 23. http://lwn.net/2001/0830/a/cbos.php3 24. http://lwn.net/2001/0830/a/netscape.php3 25. http://lwn.net/2001/0419/security.php3#iptables 26. http://lwn.net/2001/0419/a/sec-iptables.php3 27. http://lwn.net/alerts/Mandrake/MDKSA-2001:071.php3 28. http://lwn.net/2001/0517/a/progeny-netfilter.php3 29. http://lwn.net/2001/0628/a/rh-2.4.php3 30. http://lwn.net/2001/0719/a/cert-ldap.php3 31. http://lwn.net/2001/0719/security.php3#ldap 32. http://lwn.net/alerts/Conectiva/CLA-2001:417.php3 33. http://lwn.net/alerts/Debian/DSA-068-1.php3 34. http://lwn.net/alerts/Mandrake/MDKSA-2001:069.php3 35. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-30.php3 36. http://lwn.net/alerts/RedHat/RHSA-2001:098-05.php3 37. http://lwn.net/alerts/YellowDog/YDU-20010810-3.php3 38. http://lwn.net/2001/0823/security.php3#sendmail 39. http://lwn.net/alerts/Caldera/CSSA-2001-032.0.php3 40. http://lwn.net/alerts/Conectiva/CLA-2001:412.php3 41. http://lwn.net/alerts/Immunix/IMNX-2001-70-032-01.php3 42. http://lwn.net/alerts/Slackware/sl-998919787.php3 43. http://lwn.net/alerts/SuSE/SuSE-SA:2001:028.php3 44. http://lwn.net/2001/0726/security.php3#mtelnetd 45. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3 46. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3 47. http://lwn.net/alerts/Debian/DSA-075-1.php3 48. http://lwn.net/alerts/Debian/DSA.php3 49. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3 50. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3 51. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3 52. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3 53. http://lwn.net/alerts/Slackware/sl-997726350.php3 54. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3 55. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3 56. http://lwn.net/2001/0712/security.php3#xloadimage 57. http://lwn.net/alerts/Conectiva/CLA-2001:415.php3 58. http://lwn.net/alerts/Debian/DSA-069-1.php3 59. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-31.php3 60. http://lwn.net/2001/0712/a/rh-xloadimage.php3 61. http://lwn.net/2001/0726/a/suse-xli.php3 62. http://lwn.net/alerts/YellowDog/YDU-20010725-11.php3 63. http://lwn.net/2001/0830/a/security-week.php3 64. http://lwn.net/2001/0830/a/advisory-watch.php3 65. http://lwn.net/2001/0830/a/raid.php3 66. http://lwn.net/2001/0830/a/first.php3 67. http://www.nspw.org/ 68. http://www.sfu.ca/igs/CASIS/ 69. http://www.raid-symposium.org/Raid2001 70. http://securityfocus.com/calendar 71. mailto:lwn@lwn.net 72. mailto:lwn@lwn.net 73. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity 74. http://lwn.net/alerts/ 75. http://bluelinux.sourceforge.net/ 76. http://castle.altlinux.ru/ 77. http://www.engardelinux.org/ 78. http://www.immunix.org/ 79. http://www.maganation.com/~kaladix/ 80. http://www.nsa.gov/selinux/ 81. http://www.openwall.com/Owl/ 82. http://www.trustix.com/ 83. http://www.bastille-linux.org/ 84. http://lsap.org/ 85. http://lsm.immunix.org/ 86. http://www.openssh.com/ 87. http://www.securityfocus.com/bugtraq/archive/ 88. http://www.nfr.net/firewall-wizards/ 89. http://www.jammed.com/Lists/ISN/ 90. http://www.calderasystems.com/support/security/ 91. http://www.conectiva.com.br/atualizacoes/ 92. http://www.debian.org/security/ 93. http://www.kondara.org/errata/k12-security.html 94. http://www.esware.com/actualizaciones.html 95. http://linuxppc.org/security/advisories/ 96. http://www.linux-mandrake.com/en/fupdates.php3 97. http://www.redhat.com/support/errata/index.html 98. http://www.suse.de/security/index.html 99. http://www.yellowdoglinux.com/resources/errata.shtml 100. http://www.BSDI.COM/services/support/patches/ 101. http://www.freebsd.org/security/security.html 102. http://www.NetBSD.ORG/Security/ 103. http://www.openbsd.org/security.html 104. http://www.calderasystems.com/support/forums/announce.html 105. http://www.cobalt.com/support/resources/usergroups.html 106. http://distro.conectiva.com.br/atualizacoes/ 107. http://www.debian.org/MailingLists/subscribe 108. http://www.esware.com/lista_correo.html 109. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL 110. http://www.kondara.org/mailinglist.html.en 111. http://l5web.laser5.co.jp/ml/ml.html 112. http://www.linuxfromscratch.org/services/mailinglistinfo.php 113. http://www.linux-mandrake.com/en/flists.php3 114. http://www.netbsd.org/MailingLists/ 115. http://www.openbsd.org/mail.html 116. http://www.redhat.com/mailing-lists/ 117. http://www.slackware.com/lists/ 118. http://www.stampede.org/mailinglists.php3 119. http://www.suse.com/en/support/mailinglists/index.html 120. http://www.trustix.net/support/ 121. http://www.turbolinux.com/mailman/listinfo/tl-security-announce 122. http://lists.yellowdoglinux.com/ydl_updates.shtml 123. http://munitions.vipul.net/ 124. http://www.zedz.net/ 125. http://www.cert.org/nav/alerts.html 126. http://ciac.llnl.gov/ciac/ 127. http://www.MountainWave.com/ 128. http://www.counterpane.com/crypto-gram.html 129. http://linuxlock.org/ 130. http://linuxsecurity.com/ 131. http://www.opensec.net/ 132. http://www.securityfocus.com/ 133. http://www.securityportal.com/ 134. http://lwn.net/2001/0830/kernel.php3 135. http://www.eklektix.com/ 136. http://www.eklektix.com/ --- ifmail v.2.14.os7-aks1 * Origin: Unknown (2:4615/71.10@fidonet) Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/19861bf57be9d.html, оценка из 5, голосов 10
|