Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   31 Aug 2001  15:51:57
 To : All
 Subject : URL: http://www.lwn.net/2001/0830/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]On the Desktop
     [7]Development
     [8]Commerce
     [9]Linux in the news
     [10]Announcements
     [11]Linux History
     [12]Letters
    [13]All in one big page
    
    See also: [14]last week's Security page.
    
 Security
 
 News and Editorials
 
    New NSA SELinux release. A new release of the NSA's Security Enhanced
    Linux has been [15]announced. This version is based on the 2.4.9
    kernel; the most interesting new feature, though, is likely to be that
    this release is built on the new Linux security module architecture.
    It's the first release of this work as part of an integrated product,
    and thus it gives an indication of how future secure Linux releases
    will look.
    
    The security module project, remember, started after the [16]Kernel
    Summit last March. Linus Torvalds had stated that he wanted the
    various security projects to agree on a framework for hooking security
    extensions into the kernel, so that users could easily experiment with
    (and switch between) them. Work on the security module project has
    been proceeding quickly, to the point that the developers are
    beginning to consider proposing it for inclusion in the 2.5 kernel.
    Assuming there ever is a 2.5 kernel, of course.
    
    The SELinux release is a good step in that direction, since it
    provides a demonstration of a security-enhanced kernel using the new
    architecture. It will also allow for wider testing of the security
    module code and help to shake out the remaining problems.
    
    See the [17]NSA Security-Enhanced Linux pages for more information.
    The generic security module code can be found on the [18]Linux
    Security Module page.
    
    CERT's quarterly summary is [19]available; as usual, it points out the
    security vulnerabilities that (in CERT's opinion) people should be
    most worried about. It is dominated this time around by
    Windows-specific problems - Code Red, Sircam, etc. There is one issue
    in the list that is relevant for Linux users, though: the telnetd
    vulnerability. The current list of telnetd updates appears in the
    "Updates" section below; anybody who is still running telnet should be
    sure to apply the relevant update to their systems.
    
 Security Reports
 
    Buffer overflow in AOLserver. The AOLserver web server has been
    [20]reported to crash when fed a long authorization string as input.
    Such problems are usually exploitable, though no exploit has yet been
    reported in this case. Older versions of AOLserver (3.0, 3.2) are
    vulnerable; the current version (3.4) is not.
    
    String handling problems in xinetd. A new set of problems has been
    found in xinetd, having to do with how it handles strings. Versions
    prior to 2.3.1 are vulnerable, and should be upgraded. As of this
    writing, the only distributor update available is from [21]Conectiva.
    
    web scripts.
    The following web scripts were reported to contain vulnerabilities:
      * The PHProjekt groupware suite [22]contains a vulnerability
        allowing any user to view and modify other users' data. The fix is
        to upgrade to version 2.4a.
    
    Proprietary products.
    The following proprietary products were reported to contain
    vulnerabilities:
      * Cisco has [23]reported a vulnerability in its CBOS operating
        system that runs on its 600-series routers - such as its
        widely-used DSL routers. A denial of service is possible through
        excessive traffic to the router's web-based configuration port,
        which is enabled by default.
      * Netscape 6.01a [24]has a temp file vulnerability which could be
        used by a suitably talented and lucky local attacker to overwrite
        system files.
        
 Updates
 
    Linux Kernel 2.4 Netfilter/IPTables vulnerability.
    Check the [25]April 19 LWN Security Summary for the original report.
    The NetFilter team has provided [26]a patch for Linux 2.4.3.
    
    This week's updates:
      * [27]Mandrake (August 28, 2001)
        
    Previous updates:
      * [28]Progeny (May 17)
      * [29]Red Hat (June 21), 7.1, default configuration not vulnerable
        
    Denial of service vulnerability in OpenLDAP This problem was first
    identified in [30]a CERT advisory issued in July, 2001. It was covered
    in the [31]July 19, 2001 LWN security page.
    
    This week's updates:
      * [32]Conectiva (August 29, 2001)
        
    Previous updates:
      * [33]Debian (August 9, 2001)
        
      [34]Mandrake (August 13, 2001)
    
      [35]Progeny (August 14, 2001)
    
      [36]Red Hat (August 9, 2001)
    
      [37]Yellow Dog (August 10, 2001) Input validation problem with
    sendmail. An input validation error exists in versions of sendmail
    prior to 8.11.6 (or 8.12.0Beta19) which may be exploited by local
    users to obtain root access. See [38]the August 23 Security Page for
    the initial report.
    
    This week's updates:
      * [39]Caldera (August 24, 2001)
        
      [40]Conectiva (August 23, 2001)
    
      [41]Immunix (August 23, 2001)
    
      [42]Slackware (August 27, 2001)
    
      [43]SuSE (August 23, 2001)
    
    Multiple vendor telnetd vulnerability. This vulnerability, originally
    thought to be confined to BSD-derived systems, was first covered in
    the [44]July 26th Security Summary. It is now known that Linux telnet
    daemons are vulnerable as well.
    
    This week's updates:
      * [45]Conectiva (August 24, 2001)
        
    Previous updates:
      * [46]Caldera (August 10, 2001)
        
      [47]Debian (August 14, 2001) (SSL version)
    
      [48]Debian (August 14, 2001) (Update for Sparc version)
    
      [49]Mandrake (August 13, 2001)
    
      [50]Progeny (August 14, 2001)
    
      [51]Red Hat (August 9, 2001)
    
      [52]Red Hat (August 9, 2001) (kerberos version).
    
      [53]Slackware (August 9, 2001)
    
      [54]Yellow Dog (August 10, 2001)
    
      [55]Yellow Dog (August 10, 2001) (kerberos version). Buffer
    overflows in xloadimage This problem was first covered in the [56]July
    12 Security page.
    
    This week's updates:
      * [57]Conectiva (August 28, 2001)
        
    Previous updates:
      * [58]Debian (August 9, 2001)
        
      [59]Progeny (August 14, 2001)
    
      [60]Red Hat (July 12)
    
      [61]SuSE (July 26)
    
      [62]Yellow Dog (July 25, 2001)
    
 Resources
 
    LinuxSecurity.com's weekly newsletters ([63]Linux Security Week and
    [64]Linux Advisory Watch are available.
    
 Events
 
    RAID 2001, the Fourth International Symposium on Recent Advances in
    Intrusion Detection, will happen in Davis, California, on October 10
    to 12. A [65]call for participation has been posted.
    
    The 14th Annual Computer Security Incident Handling Conference will be
    held on June 24 to 28 at the Hilton Waikoloa Village in Hawaii. The
    [66]call for papers has been issued; the submission deadline is
    November 16.
    
    Upcoming Security Events.
    
    Date Event Location
    September 11 - 13, 2001 [67]New Security Paradigms Workshop 2001(NSPW)
    Cloudcroft, New Mexico, USA
    September 28 - 30, 2001 [68]Canadian Association for Security and
    Intelligence Studies(CASIS 2001) (Dalhousie University)Halifax, Nova
    Scotia, Canada.
    October 10 - 12, 2001 [69]Fourth International Symposium on Recent
    Advances in Intrusion Detection(RAID 2001) Davis, CA
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [70]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [71]lwn@lwn.net.
    
    Section Editor: [72]Jonathan Corbet
    August 30, 2001
    
                               [73]Click Here 
    LWN Resources
    [74]Security alerts archive
    Secured Distributions:
    [75]Blue Linux
    [76]Castle
    [77]Engarde Secure Linux
    [78]Immunix
    [79]Kaladix
    [80]NSA Security Enhanced
    [81]Openwall GNU/Linux
    [82]Trustix
    Security Projects
    [83]Bastille
    [84]Linux Security Audit Project
    [85]Linux Security Module
    [86]OpenSSH
    Security List Archives
    [87]Bugtraq Archive
    [88]Firewall Wizards Archive
    [89]ISN Archive
    Distribution-specific links
    [90]Caldera Advisories
    [91]Conectiva Updates
    [92]Debian Alerts
    [93]Kondara Advisories
    [94]Esware Alerts
    [95]LinuxPPC Security Updates
    [96]Mandrake Updates
    [97]Red Hat Errata
    [98]SuSE Announcements
    [99]Yellow Dog Errata
    BSD-specific links
    [100]BSDi
    [101]FreeBSD
    [102]NetBSD
    [103]OpenBSD
    Security mailing lists [104]Caldera
    [105]Cobalt
    [106]Conectiva
    [107]Debian
    [108]Esware
    [109]FreeBSD
    [110]Kondara
    [111]LASER5
    [112]Linux From Scratch
    [113]Linux-Mandrake
    [114]NetBSD
    [115]OpenBSD
    [116]Red Hat
    [117]Slackware
    [118]Stampede
    [119]SuSE
    [120]Trustix
    [121]turboLinux
    [122]Yellow Dog
    Security Software Archives
    [123]munitions
    [124]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [125]CERT
    [126]CIAC
    [127]Comp Sec News Daily
    [128]Crypto-GRAM
    [129]LinuxLock.org
    [130]LinuxSecurity.com
    [131]OpenSEC
    [132]Security Focus
    [133]SecurityPortal
    
    
                                                         [134]Next: Kernel
    
    [135]Eklektix, Inc. Linux powered! Copyright Л 2001 [136]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
    3. http://lwn.net/2001/0830/
    4. http://lwn.net/2001/0830/kernel.php3
    5. http://lwn.net/2001/0830/dists.php3
    6. http://lwn.net/2001/0830/desktop.php3
    7. http://lwn.net/2001/0830/devel.php3
    8. http://lwn.net/2001/0830/commerce.php3
    9. http://lwn.net/2001/0830/press.php3
   10. http://lwn.net/2001/0830/announce.php3
   11. http://lwn.net/2001/0830/history.php3
   12. http://lwn.net/2001/0830/letters.php3
   13. http://lwn.net/2001/0830/bigpage.php3
   14. http://lwn.net/2001/0823/security.php3
   15. http://lwn.net/2001/0830/a/selinux.php3
   16. http://lwn.net/2001/features/KernelSummit/
   17. http://www.nsa.gov/selinux/
   18. http://lsm.immunix.org/
   19. http://lwn.net/2001/0830/a/cert-quarterly.php3
   20. http://lwn.net/2001/0830/a/aolserver.php3
   21. http://lwn.net/alerts/Conectiva/CLA-2001:416.php3
   22. http://lwn.net/2001/0830/a/phprojekt.php3
   23. http://lwn.net/2001/0830/a/cbos.php3
   24. http://lwn.net/2001/0830/a/netscape.php3
   25. http://lwn.net/2001/0419/security.php3#iptables
   26. http://lwn.net/2001/0419/a/sec-iptables.php3
   27. http://lwn.net/alerts/Mandrake/MDKSA-2001:071.php3
   28. http://lwn.net/2001/0517/a/progeny-netfilter.php3
   29. http://lwn.net/2001/0628/a/rh-2.4.php3
   30. http://lwn.net/2001/0719/a/cert-ldap.php3
   31. http://lwn.net/2001/0719/security.php3#ldap
   32. http://lwn.net/alerts/Conectiva/CLA-2001:417.php3
   33. http://lwn.net/alerts/Debian/DSA-068-1.php3
   34. http://lwn.net/alerts/Mandrake/MDKSA-2001:069.php3
   35. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-30.php3
   36. http://lwn.net/alerts/RedHat/RHSA-2001:098-05.php3
   37. http://lwn.net/alerts/YellowDog/YDU-20010810-3.php3
   38. http://lwn.net/2001/0823/security.php3#sendmail
   39. http://lwn.net/alerts/Caldera/CSSA-2001-032.0.php3
   40. http://lwn.net/alerts/Conectiva/CLA-2001:412.php3
   41. http://lwn.net/alerts/Immunix/IMNX-2001-70-032-01.php3
   42. http://lwn.net/alerts/Slackware/sl-998919787.php3
   43. http://lwn.net/alerts/SuSE/SuSE-SA:2001:028.php3
   44. http://lwn.net/2001/0726/security.php3#mtelnetd
   45. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3
   46. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3
   47. http://lwn.net/alerts/Debian/DSA-075-1.php3
   48. http://lwn.net/alerts/Debian/DSA.php3
   49. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3
   50. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3
   51. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
   52. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3
   53. http://lwn.net/alerts/Slackware/sl-997726350.php3
   54. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3
   55. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3
   56. http://lwn.net/2001/0712/security.php3#xloadimage
   57. http://lwn.net/alerts/Conectiva/CLA-2001:415.php3
   58. http://lwn.net/alerts/Debian/DSA-069-1.php3
   59. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-31.php3
   60. http://lwn.net/2001/0712/a/rh-xloadimage.php3
   61. http://lwn.net/2001/0726/a/suse-xli.php3
   62. http://lwn.net/alerts/YellowDog/YDU-20010725-11.php3
   63. http://lwn.net/2001/0830/a/security-week.php3
   64. http://lwn.net/2001/0830/a/advisory-watch.php3
   65. http://lwn.net/2001/0830/a/raid.php3
   66. http://lwn.net/2001/0830/a/first.php3
   67. http://www.nspw.org/
   68. http://www.sfu.ca/igs/CASIS/
   69. http://www.raid-symposium.org/Raid2001
   70. http://securityfocus.com/calendar
   71. mailto:lwn@lwn.net
   72. mailto:lwn@lwn.net
   73. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
   74. http://lwn.net/alerts/
   75. http://bluelinux.sourceforge.net/
   76. http://castle.altlinux.ru/
   77. http://www.engardelinux.org/
   78. http://www.immunix.org/
   79. http://www.maganation.com/~kaladix/
   80. http://www.nsa.gov/selinux/
   81. http://www.openwall.com/Owl/
   82. http://www.trustix.com/
   83. http://www.bastille-linux.org/
   84. http://lsap.org/
   85. http://lsm.immunix.org/
   86. http://www.openssh.com/
   87. http://www.securityfocus.com/bugtraq/archive/
   88. http://www.nfr.net/firewall-wizards/
   89. http://www.jammed.com/Lists/ISN/
   90. http://www.calderasystems.com/support/security/
   91. http://www.conectiva.com.br/atualizacoes/
   92. http://www.debian.org/security/
   93. http://www.kondara.org/errata/k12-security.html
   94. http://www.esware.com/actualizaciones.html
   95. http://linuxppc.org/security/advisories/
   96. http://www.linux-mandrake.com/en/fupdates.php3
   97. http://www.redhat.com/support/errata/index.html
   98. http://www.suse.de/security/index.html
   99. http://www.yellowdoglinux.com/resources/errata.shtml
  100. http://www.BSDI.COM/services/support/patches/
  101. http://www.freebsd.org/security/security.html
  102. http://www.NetBSD.ORG/Security/
  103. http://www.openbsd.org/security.html
  104. http://www.calderasystems.com/support/forums/announce.html
  105. http://www.cobalt.com/support/resources/usergroups.html
  106. http://distro.conectiva.com.br/atualizacoes/
  107. http://www.debian.org/MailingLists/subscribe
  108. http://www.esware.com/lista_correo.html
  109. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  110. http://www.kondara.org/mailinglist.html.en
  111. http://l5web.laser5.co.jp/ml/ml.html
  112. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  113. http://www.linux-mandrake.com/en/flists.php3
  114. http://www.netbsd.org/MailingLists/
  115. http://www.openbsd.org/mail.html
  116. http://www.redhat.com/mailing-lists/
  117. http://www.slackware.com/lists/
  118. http://www.stampede.org/mailinglists.php3
  119. http://www.suse.com/en/support/mailinglists/index.html
  120. http://www.trustix.net/support/
  121. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  122. http://lists.yellowdoglinux.com/ydl_updates.shtml
  123. http://munitions.vipul.net/
  124. http://www.zedz.net/
  125. http://www.cert.org/nav/alerts.html
  126. http://ciac.llnl.gov/ciac/
  127. http://www.MountainWave.com/
  128. http://www.counterpane.com/crypto-gram.html
  129. http://linuxlock.org/
  130. http://linuxsecurity.com/
  131. http://www.opensec.net/
  132. http://www.securityfocus.com/
  133. http://www.securityportal.com/
  134. http://lwn.net/2001/0830/kernel.php3
  135. http://www.eklektix.com/
  136. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://www.lwn.net/2001/0830/security.php3   Sergey Lentsov   31 Aug 2001 15:51:57 
Архивное /ru.linux/19861bf57be9d.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional