|
|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 31 Aug 2001 15:51:57 To : All Subject : URL: http://www.lwn.net/2001/0830/security.php3 --------------------------------------------------------------------------------
[1][LWN Logo]
[2]Click Here
[LWN.net]
Sections:
[3]Main page
Security
[4]Kernel
[5]Distributions
[6]On the Desktop
[7]Development
[8]Commerce
[9]Linux in the news
[10]Announcements
[11]Linux History
[12]Letters
[13]All in one big page
See also: [14]last week's Security page.
Security
News and Editorials
New NSA SELinux release. A new release of the NSA's Security Enhanced
Linux has been [15]announced. This version is based on the 2.4.9
kernel; the most interesting new feature, though, is likely to be that
this release is built on the new Linux security module architecture.
It's the first release of this work as part of an integrated product,
and thus it gives an indication of how future secure Linux releases
will look.
The security module project, remember, started after the [16]Kernel
Summit last March. Linus Torvalds had stated that he wanted the
various security projects to agree on a framework for hooking security
extensions into the kernel, so that users could easily experiment with
(and switch between) them. Work on the security module project has
been proceeding quickly, to the point that the developers are
beginning to consider proposing it for inclusion in the 2.5 kernel.
Assuming there ever is a 2.5 kernel, of course.
The SELinux release is a good step in that direction, since it
provides a demonstration of a security-enhanced kernel using the new
architecture. It will also allow for wider testing of the security
module code and help to shake out the remaining problems.
See the [17]NSA Security-Enhanced Linux pages for more information.
The generic security module code can be found on the [18]Linux
Security Module page.
CERT's quarterly summary is [19]available; as usual, it points out the
security vulnerabilities that (in CERT's opinion) people should be
most worried about. It is dominated this time around by
Windows-specific problems - Code Red, Sircam, etc. There is one issue
in the list that is relevant for Linux users, though: the telnetd
vulnerability. The current list of telnetd updates appears in the
"Updates" section below; anybody who is still running telnet should be
sure to apply the relevant update to their systems.
Security Reports
Buffer overflow in AOLserver. The AOLserver web server has been
[20]reported to crash when fed a long authorization string as input.
Such problems are usually exploitable, though no exploit has yet been
reported in this case. Older versions of AOLserver (3.0, 3.2) are
vulnerable; the current version (3.4) is not.
String handling problems in xinetd. A new set of problems has been
found in xinetd, having to do with how it handles strings. Versions
prior to 2.3.1 are vulnerable, and should be upgraded. As of this
writing, the only distributor update available is from [21]Conectiva.
web scripts.
The following web scripts were reported to contain vulnerabilities:
* The PHProjekt groupware suite [22]contains a vulnerability
allowing any user to view and modify other users' data. The fix is
to upgrade to version 2.4a.
Proprietary products.
The following proprietary products were reported to contain
vulnerabilities:
* Cisco has [23]reported a vulnerability in its CBOS operating
system that runs on its 600-series routers - such as its
widely-used DSL routers. A denial of service is possible through
excessive traffic to the router's web-based configuration port,
which is enabled by default.
* Netscape 6.01a [24]has a temp file vulnerability which could be
used by a suitably talented and lucky local attacker to overwrite
system files.
Updates
Linux Kernel 2.4 Netfilter/IPTables vulnerability.
Check the [25]April 19 LWN Security Summary for the original report.
The NetFilter team has provided [26]a patch for Linux 2.4.3.
This week's updates:
* [27]Mandrake (August 28, 2001)
Previous updates:
* [28]Progeny (May 17)
* [29]Red Hat (June 21), 7.1, default configuration not vulnerable
Denial of service vulnerability in OpenLDAP This problem was first
identified in [30]a CERT advisory issued in July, 2001. It was covered
in the [31]July 19, 2001 LWN security page.
This week's updates:
* [32]Conectiva (August 29, 2001)
Previous updates:
* [33]Debian (August 9, 2001)
[34]Mandrake (August 13, 2001)
[35]Progeny (August 14, 2001)
[36]Red Hat (August 9, 2001)
[37]Yellow Dog (August 10, 2001) Input validation problem with
sendmail. An input validation error exists in versions of sendmail
prior to 8.11.6 (or 8.12.0Beta19) which may be exploited by local
users to obtain root access. See [38]the August 23 Security Page for
the initial report.
This week's updates:
* [39]Caldera (August 24, 2001)
[40]Conectiva (August 23, 2001)
[41]Immunix (August 23, 2001)
[42]Slackware (August 27, 2001)
[43]SuSE (August 23, 2001)
Multiple vendor telnetd vulnerability. This vulnerability, originally
thought to be confined to BSD-derived systems, was first covered in
the [44]July 26th Security Summary. It is now known that Linux telnet
daemons are vulnerable as well.
This week's updates:
* [45]Conectiva (August 24, 2001)
Previous updates:
* [46]Caldera (August 10, 2001)
[47]Debian (August 14, 2001) (SSL version)
[48]Debian (August 14, 2001) (Update for Sparc version)
[49]Mandrake (August 13, 2001)
[50]Progeny (August 14, 2001)
[51]Red Hat (August 9, 2001)
[52]Red Hat (August 9, 2001) (kerberos version).
[53]Slackware (August 9, 2001)
[54]Yellow Dog (August 10, 2001)
[55]Yellow Dog (August 10, 2001) (kerberos version). Buffer
overflows in xloadimage This problem was first covered in the [56]July
12 Security page.
This week's updates:
* [57]Conectiva (August 28, 2001)
Previous updates:
* [58]Debian (August 9, 2001)
[59]Progeny (August 14, 2001)
[60]Red Hat (July 12)
[61]SuSE (July 26)
[62]Yellow Dog (July 25, 2001)
Resources
LinuxSecurity.com's weekly newsletters ([63]Linux Security Week and
[64]Linux Advisory Watch are available.
Events
RAID 2001, the Fourth International Symposium on Recent Advances in
Intrusion Detection, will happen in Davis, California, on October 10
to 12. A [65]call for participation has been posted.
The 14th Annual Computer Security Incident Handling Conference will be
held on June 24 to 28 at the Hilton Waikoloa Village in Hawaii. The
[66]call for papers has been issued; the submission deadline is
November 16.
Upcoming Security Events.
Date Event Location
September 11 - 13, 2001 [67]New Security Paradigms Workshop 2001(NSPW)
Cloudcroft, New Mexico, USA
September 28 - 30, 2001 [68]Canadian Association for Security and
Intelligence Studies(CASIS 2001) (Dalhousie University)Halifax, Nova
Scotia, Canada.
October 10 - 12, 2001 [69]Fourth International Symposium on Recent
Advances in Intrusion Detection(RAID 2001) Davis, CA
For additional security-related events, included training courses
(which we don't list above) and events further in the future, check
out Security Focus' [70]calendar, one of the primary resources we use
for building the above list. To submit an event directly to us, please
send a plain-text message to [71]lwn@lwn.net.
Section Editor: [72]Jonathan Corbet
August 30, 2001
[73]Click Here
LWN Resources
[74]Security alerts archive
Secured Distributions:
[75]Blue Linux
[76]Castle
[77]Engarde Secure Linux
[78]Immunix
[79]Kaladix
[80]NSA Security Enhanced
[81]Openwall GNU/Linux
[82]Trustix
Security Projects
[83]Bastille
[84]Linux Security Audit Project
[85]Linux Security Module
[86]OpenSSH
Security List Archives
[87]Bugtraq Archive
[88]Firewall Wizards Archive
[89]ISN Archive
Distribution-specific links
[90]Caldera Advisories
[91]Conectiva Updates
[92]Debian Alerts
[93]Kondara Advisories
[94]Esware Alerts
[95]LinuxPPC Security Updates
[96]Mandrake Updates
[97]Red Hat Errata
[98]SuSE Announcements
[99]Yellow Dog Errata
BSD-specific links
[100]BSDi
[101]FreeBSD
[102]NetBSD
[103]OpenBSD
Security mailing lists [104]Caldera
[105]Cobalt
[106]Conectiva
[107]Debian
[108]Esware
[109]FreeBSD
[110]Kondara
[111]LASER5
[112]Linux From Scratch
[113]Linux-Mandrake
[114]NetBSD
[115]OpenBSD
[116]Red Hat
[117]Slackware
[118]Stampede
[119]SuSE
[120]Trustix
[121]turboLinux
[122]Yellow Dog
Security Software Archives
[123]munitions
[124]ZedZ.net (formerly replay.com)
Miscellaneous Resources
[125]CERT
[126]CIAC
[127]Comp Sec News Daily
[128]Crypto-GRAM
[129]LinuxLock.org
[130]LinuxSecurity.com
[131]OpenSEC
[132]Security Focus
[133]SecurityPortal
[134]Next: Kernel
[135]Eklektix, Inc. Linux powered! Copyright Л 2001 [136]Eklektix,
Inc., all rights reserved
Linux (R) is a registered trademark of Linus Torvalds
References
1. http://lwn.net/
2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
3. http://lwn.net/2001/0830/
4. http://lwn.net/2001/0830/kernel.php3
5. http://lwn.net/2001/0830/dists.php3
6. http://lwn.net/2001/0830/desktop.php3
7. http://lwn.net/2001/0830/devel.php3
8. http://lwn.net/2001/0830/commerce.php3
9. http://lwn.net/2001/0830/press.php3
10. http://lwn.net/2001/0830/announce.php3
11. http://lwn.net/2001/0830/history.php3
12. http://lwn.net/2001/0830/letters.php3
13. http://lwn.net/2001/0830/bigpage.php3
14. http://lwn.net/2001/0823/security.php3
15. http://lwn.net/2001/0830/a/selinux.php3
16. http://lwn.net/2001/features/KernelSummit/
17. http://www.nsa.gov/selinux/
18. http://lsm.immunix.org/
19. http://lwn.net/2001/0830/a/cert-quarterly.php3
20. http://lwn.net/2001/0830/a/aolserver.php3
21. http://lwn.net/alerts/Conectiva/CLA-2001:416.php3
22. http://lwn.net/2001/0830/a/phprojekt.php3
23. http://lwn.net/2001/0830/a/cbos.php3
24. http://lwn.net/2001/0830/a/netscape.php3
25. http://lwn.net/2001/0419/security.php3#iptables
26. http://lwn.net/2001/0419/a/sec-iptables.php3
27. http://lwn.net/alerts/Mandrake/MDKSA-2001:071.php3
28. http://lwn.net/2001/0517/a/progeny-netfilter.php3
29. http://lwn.net/2001/0628/a/rh-2.4.php3
30. http://lwn.net/2001/0719/a/cert-ldap.php3
31. http://lwn.net/2001/0719/security.php3#ldap
32. http://lwn.net/alerts/Conectiva/CLA-2001:417.php3
33. http://lwn.net/alerts/Debian/DSA-068-1.php3
34. http://lwn.net/alerts/Mandrake/MDKSA-2001:069.php3
35. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-30.php3
36. http://lwn.net/alerts/RedHat/RHSA-2001:098-05.php3
37. http://lwn.net/alerts/YellowDog/YDU-20010810-3.php3
38. http://lwn.net/2001/0823/security.php3#sendmail
39. http://lwn.net/alerts/Caldera/CSSA-2001-032.0.php3
40. http://lwn.net/alerts/Conectiva/CLA-2001:412.php3
41. http://lwn.net/alerts/Immunix/IMNX-2001-70-032-01.php3
42. http://lwn.net/alerts/Slackware/sl-998919787.php3
43. http://lwn.net/alerts/SuSE/SuSE-SA:2001:028.php3
44. http://lwn.net/2001/0726/security.php3#mtelnetd
45. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3
46. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3
47. http://lwn.net/alerts/Debian/DSA-075-1.php3
48. http://lwn.net/alerts/Debian/DSA.php3
49. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3
50. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3
51. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
52. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3
53. http://lwn.net/alerts/Slackware/sl-997726350.php3
54. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3
55. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3
56. http://lwn.net/2001/0712/security.php3#xloadimage
57. http://lwn.net/alerts/Conectiva/CLA-2001:415.php3
58. http://lwn.net/alerts/Debian/DSA-069-1.php3
59. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-31.php3
60. http://lwn.net/2001/0712/a/rh-xloadimage.php3
61. http://lwn.net/2001/0726/a/suse-xli.php3
62. http://lwn.net/alerts/YellowDog/YDU-20010725-11.php3
63. http://lwn.net/2001/0830/a/security-week.php3
64. http://lwn.net/2001/0830/a/advisory-watch.php3
65. http://lwn.net/2001/0830/a/raid.php3
66. http://lwn.net/2001/0830/a/first.php3
67. http://www.nspw.org/
68. http://www.sfu.ca/igs/CASIS/
69. http://www.raid-symposium.org/Raid2001
70. http://securityfocus.com/calendar
71. mailto:lwn@lwn.net
72. mailto:lwn@lwn.net
73. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
74. http://lwn.net/alerts/
75. http://bluelinux.sourceforge.net/
76. http://castle.altlinux.ru/
77. http://www.engardelinux.org/
78. http://www.immunix.org/
79. http://www.maganation.com/~kaladix/
80. http://www.nsa.gov/selinux/
81. http://www.openwall.com/Owl/
82. http://www.trustix.com/
83. http://www.bastille-linux.org/
84. http://lsap.org/
85. http://lsm.immunix.org/
86. http://www.openssh.com/
87. http://www.securityfocus.com/bugtraq/archive/
88. http://www.nfr.net/firewall-wizards/
89. http://www.jammed.com/Lists/ISN/
90. http://www.calderasystems.com/support/security/
91. http://www.conectiva.com.br/atualizacoes/
92. http://www.debian.org/security/
93. http://www.kondara.org/errata/k12-security.html
94. http://www.esware.com/actualizaciones.html
95. http://linuxppc.org/security/advisories/
96. http://www.linux-mandrake.com/en/fupdates.php3
97. http://www.redhat.com/support/errata/index.html
98. http://www.suse.de/security/index.html
99. http://www.yellowdoglinux.com/resources/errata.shtml
100. http://www.BSDI.COM/services/support/patches/
101. http://www.freebsd.org/security/security.html
102. http://www.NetBSD.ORG/Security/
103. http://www.openbsd.org/security.html
104. http://www.calderasystems.com/support/forums/announce.html
105. http://www.cobalt.com/support/resources/usergroups.html
106. http://distro.conectiva.com.br/atualizacoes/
107. http://www.debian.org/MailingLists/subscribe
108. http://www.esware.com/lista_correo.html
109. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
110. http://www.kondara.org/mailinglist.html.en
111. http://l5web.laser5.co.jp/ml/ml.html
112. http://www.linuxfromscratch.org/services/mailinglistinfo.php
113. http://www.linux-mandrake.com/en/flists.php3
114. http://www.netbsd.org/MailingLists/
115. http://www.openbsd.org/mail.html
116. http://www.redhat.com/mailing-lists/
117. http://www.slackware.com/lists/
118. http://www.stampede.org/mailinglists.php3
119. http://www.suse.com/en/support/mailinglists/index.html
120. http://www.trustix.net/support/
121. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
122. http://lists.yellowdoglinux.com/ydl_updates.shtml
123. http://munitions.vipul.net/
124. http://www.zedz.net/
125. http://www.cert.org/nav/alerts.html
126. http://ciac.llnl.gov/ciac/
127. http://www.MountainWave.com/
128. http://www.counterpane.com/crypto-gram.html
129. http://linuxlock.org/
130. http://linuxsecurity.com/
131. http://www.opensec.net/
132. http://www.securityfocus.com/
133. http://www.securityportal.com/
134. http://lwn.net/2001/0830/kernel.php3
135. http://www.eklektix.com/
136. http://www.eklektix.com/
--- ifmail v.2.14.os7-aks1
* Origin: Unknown (2:4615/71.10@fidonet)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/19861bf57be9d.html, оценка из 5, голосов 10
|