|
|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 13 Sep 2001 16:25:24 To : All Subject : URL: http://www.lwn.net/2001/0913/security.php3 --------------------------------------------------------------------------------
[1][LWN Logo]
[2]Click Here
[LWN.net]
Sections:
[3]Main page
Security
[4]Kernel
[5]Distributions
[6]On the Desktop
[7]Development
[8]Commerce
[9]Linux in the news
[10]Announcements
[11]Linux History
[12]Letters
[13]All in one big page
See also: [14]last week's Security page.
Security
News and Editorials
With the recent terrorist attacks in New York City and Washington
D.C., security advisors are recommending that now is a good time to be
on the lookout for cyber attacks, which have reportedly increased by
an order of magnitude. The usual monitoring of log files is
recommended, and the latest patches should be applied to all
vulnerable software.
Security workers: Copyright law stifles. C|Net is running [15]an
article on the effects of the DMCA law on writers of security code.
Security software developers are wary of lawsuits and are removing
projects from distribution.
First open virus scanner released. The [16]OpenAntivirus Project has
been announced, and has produced an open source anti virus scanner.
Currently the scanner can detect 5 different viruses with 11 variants.
(Thanks to Lenz Grimmer)
Introducing ssh-agent and keychain (IBM developerWorks). IBM's
developerWorks introduces readers to the [17]ssh-agent and keychain
utilities. "ssh-agent, included with the OpenSSH distribution, is a
special program designed to make dealing with RSA and DSA keys both
pleasant and secure...[and] for the sole purpose of caching your
decrypted private keys."
New Unix worm could be next Code Red (ZDNet). A new worm known as X.C
apparently [18]exploits a hole in the telnet daemon according to this
ZDNet article. Telnet is, of course, already vulnerable to clear text
password sniffing and sites concerned with security usually replace it
with ssh.
Linux Trojan spotted in the wild (Register). The Register reports on
another [19]Linux-based Trojan known as Remote Shell, which should not
be confused with the ancient rsh utility. "Qualys suggests Remote
Shell can be disseminated by inconspicuous emails and replicates
itself on the infected Linux-based system. The Trojan installs a
backdoor that listens for incoming connections on UDP port 5503 or
higher, enabling remote attackers to connect and take control of the
system."
Security Reports
Red Hat advisory for bugzilla. Red Hat has posted their advisory for
bugzilla. See: [20]Red Hat (September 10, 2001)
. This advisory addresses several security problems with bugzilla in
which valid users can obtain confidential data without authorization,
also addresses a problem where parameters were not being checked
properly.
Conectiva security update to mailman. Conectiva has issued a security
update to mailman which fixes a number of vulnerabilities, some fairly
old. See: [21]Conectiva (September 5, 2001)
Uucp local user exploits. There is a vulnerability in the command-line
argument handling of uucp which can be exploited by a local user to
obtain uid/gid uucp. The following updates address the problem:
* [22]Conectiva (September 11, 2001)
[23]Caldera (September 7, 2001)
Red Hat advisory for xinetd. After doing a security audit of xinetd,
Red hat has released an update to the package that fixes some
discovered problems. [24]Red Hat (September 7, 2001)
.
Updates
Apache-contrib command injection vulnerability. The Apache module
mod_auth_mysql 1.4 was found vulnerable to possible bypass
authentication by MySQL command injection. See [25]last week's LWN
security page for a discussion of the SQL injection problems with a
number of Apache modules.
This week's updates:
* [26]Conectiva (September 6, 2001)
[27]SuSE (September 10, 2001)
Buffer overrun vulnerabilities in fetchmail. (Found by Salvatore
Sanfilippo). Two buffer overrun vulnerabilities exist in the much-used
fetchmail program. Given a hostile server, arbitrary code can be run
on the system running fetchmail. The solution is to upgrade to
fetchmail 5.8.17. See [28]the August 16 Security page for the initial
report.
This week's updates:
[29]Red Hat (September 6, 2001)
Previous updates:
* [30]Conectiva (September 5, 2001)
[31]Debian (August 10, 2001)
[32]EnGarde (August 16, 2001)
[33]Mandrake (August 31, 2001)
[34]Progeny (August 14, 2001)
[35]SuSE (August 16, 2001)
Format string vulnerability in groff. A format string problem exists
in groff; apparently it could be remotely exploited when it is
configured to be used with the lpd printing system.
Previous updates:
* [36]Debian (August 10, 2001)
[37]Progeny (August 16, 2001) Vulnerabilities in Horde IMP Horde IMP
has several vulnerabilities which are fixed in version 2.2.6; see
Bugtraq ID's [38]3066, [39]3079, [40]3082, and [41]3083 for more
details.
Previous updates:
* [42]Caldera (August 2)
* [43]Conectiva (August 2)
* [44]Debian (August 11, 2001)
[45]Progeny (August 14, 2001)
Linux Kernel 2.4 Netfilter/IPTables vulnerability.
Check the [46]April 19 LWN Security Summary for the original report.
The NetFilter team has provided [47]a patch for Linux 2.4.3.
Previous updates:
* [48]Mandrake (August 28, 2001)
[49]Progeny (May 17)
[50]Red Hat (June 21), 7.1, default configuration not vulnerable
Denial of service vulnerability in OpenLDAP This problem was first
identified in [51]a CERT advisory issued in July, 2001. It was covered
in the [52]July 19, 2001 LWN security page.
Previous updates:
* [53]Conectiva (August 29, 2001)
[54]Debian (August 9, 2001)
[55]Mandrake (August 13, 2001)
[56]Progeny (August 14, 2001)
[57]Red Hat (August 9, 2001)
[58]Yellow Dog (August 10, 2001) OpenSSL Pseudo-random number
generator weakness A weakness has been discovered in the OpenSSL
Pseudo random number generator that can allow an attacker to discover
the PNRG's state and predict future values. (First reported
[59]July 12).
Previous updates:
* [60]Conectiva (August 30, 2001)
[61]EnGarde (July 12)
[62]Progeny (August 14, 2001)
[63]Trustix (July 12) Procmail race conditions. See [64]the July 26
Security page for the initial report.
Previous updates:
* [65]Red Hat (July 26)
* [66]Yellow Dog (July 25, 2001)
Input validation problem with sendmail. An input validation error
exists in versions of sendmail prior to 8.11.6 (or 8.12.0Beta19) which
may be exploited by local users to obtain root access. See [67]the
August 23 Security Page for the initial report.
This week's updates:
* [68]Mandrake (August 31, 2001)
[69]Red Hat (September 6, 2001) Previous updates:
* [70]Caldera (August 24, 2001)
[71]Conectiva (August 23, 2001)
[72]Debian (not vulnerable).
[73]Immunix (August 23, 2001)
[74]Slackware (August 27, 2001)
[75]SuSE (August 23, 2001) SQL injection vulnerabilities in Apache
authentication modules. Several Apache authentication modules have
vulnerabilities that could allow an attacker to feed arbitrary SQL
code to the underlying database, resulting in a compromise of database
integrity and unauthorized access to the server. See [76]the
September 6 security page for more information.
This week's updates:
* [77]Conectiva (September 6, 2001)
Squid httpd acceleration ACL vulnerability. This vulnerability could
result in unauthorized access to the squid server. See the [78]July 26
Security page for details.
This week's updates:
* [79]Yellow Dog (July 25, 2001)
Previous updates:
* [80]Caldera (August 9)
* [81]Linux-Mandrake (August 2)
* [82]Immunix (July 26)
* [83]Trustix (July 26)
* [84]Red Hat (July 26)
Multiple vendor telnetd vulnerability. This vulnerability, originally
thought to be confined to BSD-derived systems, was first covered in
the [85]July 26th Security Summary. It is now known that Linux telnet
daemons are vulnerable as well.
Previous updates:
* [86]Caldera (August 10, 2001)
[87]Conectiva (August 24, 2001)
[88]Debian (August 14, 2001) (SSL version)
[89]Debian (August 14, 2001) (Update for Sparc version)
[90]Mandrake (August 13, 2001)
[91]Progeny (August 14, 2001)
[92]Red Hat (August 9, 2001)
[93]Red Hat (August 9, 2001) (kerberos version).
[94]Slackware (August 9, 2001)
[95]SuSE (September 3, 2001)
[96]Yellow Dog (August 10, 2001)
[97]Yellow Dog (August 10, 2001) (kerberos version).
Buffer overruns in Window Maker A buffer overrun exists in Window
Maker which could, conceivably, be exploited remotely if the user runs
a hostile application. This problem initially appeared in the
[98]August 16, 2001 LWN security page.
Previous updates:
* [99]Conectiva (August 13, 2001)
[100]Debian (August 12, 2001)
[101]Mandrake (August 31, 2001)
[102]Progeny (August 14, 2001) Buffer overflows in xloadimage This
problem was first covered in the [103]July 12 Security page.
This week's updates:
* [104]Mandrake (September 12, 2001)
Previous updates:
* [105]Conectiva (August 28, 2001)
[106]Debian (August 9, 2001)
[107]Mandrake (August 31, 2001)
[108]Progeny (August 14, 2001)
[109]Red Hat (July 12)
[110]SuSE (July 26)
[111]Yellow Dog (July 25, 2001)
Resources
Events
Upcoming Security Events.
Date Event Location
September 13, 2001 [112]New Security Paradigms Workshop 2001(NSPW)
Cloudcroft, New Mexico, USA
September 28 - 30, 2001 [113]Canadian Association for Security and
Intelligence Studies(CASIS 2001) (Dalhousie University)Halifax, Nova
Scotia, Canada.
October 10 - 12, 2001 [114]Fourth International Symposium on Recent
Advances in Intrusion Detection(RAID 2001) Davis, CA
November 5 - 8, 2001 [115]8th ACM Conference on Computer and
Communication Security(CCS-8) Philadelphia, PA, USA
November 13 - 15, 2001 [116]International Conference on Information
and Communications Security(ICICS 2001) Xian, China
For additional security-related events, included training courses
(which we don't list above) and events further in the future, check
out Security Focus' [117]calendar, one of the primary resources we use
for building the above list. To submit an event directly to us, please
send a plain-text message to [118]lwn@lwn.net.
Section Editor: [119]Forrest Cook
September 13, 2001
[120]Click Here
LWN Resources
[121]Security alerts archive
Secured Distributions:
[122]Blue Linux
[123]Castle
[124]Engarde Secure Linux
[125]Immunix
[126]Kaladix
[127]NSA Security Enhanced
[128]Openwall GNU/Linux
[129]Trustix
Security Projects
[130]Bastille
[131]Linux Security Audit Project
[132]Linux Security Module
[133]OpenSSH
Security List Archives
[134]Bugtraq Archive
[135]Firewall Wizards Archive
[136]ISN Archive
Distribution-specific links
[137]Caldera Advisories
[138]Conectiva Updates
[139]Debian Alerts
[140]Kondara Advisories
[141]Esware Alerts
[142]LinuxPPC Security Updates
[143]Mandrake Updates
[144]Red Hat Errata
[145]SuSE Announcements
[146]Yellow Dog Errata
BSD-specific links
[147]BSDi
[148]FreeBSD
[149]NetBSD
[150]OpenBSD
Security mailing lists [151]Caldera
[152]Cobalt
[153]Conectiva
[154]Debian
[155]Esware
[156]FreeBSD
[157]Kondara
[158]LASER5
[159]Linux From Scratch
[160]Linux-Mandrake
[161]NetBSD
[162]OpenBSD
[163]Red Hat
[164]Slackware
[165]Stampede
[166]SuSE
[167]Trustix
[168]turboLinux
[169]Yellow Dog
Security Software Archives
[170]munitions
[171]ZedZ.net (formerly replay.com)
Miscellaneous Resources
[172]CERT
[173]CIAC
[174]Comp Sec News Daily
[175]Crypto-GRAM
[176]LinuxLock.org
[177]LinuxSecurity.com
[178]OpenSEC
[179]Security Focus
[180]SecurityPortal
[181]Next: Kernel
[182]Eklektix, Inc. Linux powered! Copyright Л 2001 [183]Eklektix,
Inc., all rights reserved
Linux (R) is a registered trademark of Linus Torvalds
References
1. http://lwn.net/
2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
3. http://lwn.net/2001/0913/
4. http://lwn.net/2001/0913/kernel.php3
5. http://lwn.net/2001/0913/dists.php3
6. http://lwn.net/2001/0913/desktop.php3
7. http://lwn.net/2001/0913/devel.php3
8. http://lwn.net/2001/0913/commerce.php3
9. http://lwn.net/2001/0913/press.php3
10. http://lwn.net/2001/0913/announce.php3
11. http://lwn.net/2001/0913/history.php3
12. http://lwn.net/2001/0913/letters.php3
13. http://lwn.net/2001/0913/bigpage.php3
14. http://lwn.net/2001/0906/security.php3
15. http://news.cnet.com/news/0-1003-200-7079519.html
16. http://lwn.net/2001/0913/a/openantivirus.php3
17.
http://www-106.ibm.com/developerworks/linux/library/l-keyc2/?open&l=252,t=grl,p=
ossh2
18. http://www.zdnet.com/zdnn/stories/news/0,4586,2811517,00.html
19. http://www.theregister.co.uk/content/56/21538.html
20. http://lwn.net/alerts/RedHat/RHSA-2001:107-07.php3
21. http://lwn.net/alerts/Conectiva/CLA-2001:420.php3
22. http://lwn.net/alerts/Conectiva/CLA-2001:425.php3
23. http://lwn.net/alerts/Caldera/CSSA-2001-033.0.php3
24. http://lwn.net/alerts/RedHat/RHSA-2001:109-05.php3
25. http://lwn.net/2001/0906/security.php3
26. http://lwn.net/alerts/Conectiva/CLA-2001:421.php3
27. http://lwn.net/alerts/SuSE/SuSE-SA:2001:31.php3
28. http://lwn.net/2001/0816/security.php3#fetchmail
29. http://lwn.net/alerts/RedHat/RHSA-2001:103-04.php3
30. http://lwn.net/alerts/Conectiva/CLA-2001:419.php3
31. http://lwn.net/alerts/Debian/DSA-071-1.php3
32. http://lwn.net/alerts/EnGarde/ESA-20010816-01.php3
33. http://lwn.net/alerts/Mandrake/MDKSA-2001:072.php3
34. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-29.php3
35. http://lwn.net/alerts/SuSE/SuSE-SA:2001:026.php3
36. http://lwn.net/alerts/Debian/DSA-072-1.php3
37. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-33.php3
38. http://www.securityfocus.com/bid/3066
39. http://www.securityfocus.com/bid/3079
40. http://www.securityfocus.com/bid/3082
41. http://www.securityfocus.com/bid/3083
42. http://lwn.net/2001/0802/a/caldera-imp.php3
43. http://lwn.net/2001/0802/a/con-imp.php3
44. http://lwn.net/alerts/Debian/DSA-073-1.php3
45. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-28.php3
46. http://lwn.net/2001/0419/security.php3#iptables
47. http://lwn.net/2001/0419/a/sec-iptables.php3
48. http://lwn.net/alerts/Mandrake/MDKSA-2001:071.php3
49. http://lwn.net/2001/0517/a/progeny-netfilter.php3
50. http://lwn.net/2001/0628/a/rh-2.4.php3
51. http://lwn.net/2001/0719/a/cert-ldap.php3
52. http://lwn.net/2001/0719/security.php3#ldap
53. http://lwn.net/alerts/Conectiva/CLA-2001:417.php3
54. http://lwn.net/alerts/Debian/DSA-068-1.php3
55. http://lwn.net/alerts/Mandrake/MDKSA-2001:069.php3
56. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-30.php3
57. http://lwn.net/alerts/RedHat/RHSA-2001:098-05.php3
58. http://lwn.net/alerts/YellowDog/YDU-20010810-3.php3
59. http://lwn.net/2001/0712/security.php3#openssl
60. http://lwn.net/alerts/Conectiva/CLA-2001:418.php3
61. http://lwn.net/2001/0712/a/eng-openssl.php3
62. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-23.php3
63. http://lwn.net/2001/0712/a/trustix-openssl.php3
64. http://lwn.net/2001/0726/security.php3#procmail
65. http://lwn.net/2001/0726/a/rh-procmail.php3
66. http://lwn.net/alerts/YellowDog/YDU-20010725-12.php3
67. http://lwn.net/2001/0823/security.php3#sendmail
68. http://lwn.net/alerts/Mandrake/MDKSA-2001:075.php3
69. http://lwn.net/alerts/RedHat/RHSA-2001:106-06.php3
70. http://lwn.net/alerts/Caldera/CSSA-2001-032.0.php3
71. http://lwn.net/alerts/Conectiva/CLA-2001:412.php3
72.
http://lists.debian.org/debian-security/2001/debian-security-200109/msg00089.htm
l
73. http://lwn.net/alerts/Immunix/IMNX-2001-70-032-01.php3
74. http://lwn.net/alerts/Slackware/sl-998919787.php3
75. http://lwn.net/alerts/SuSE/SuSE-SA:2001:028.php3
76. http://lwn.net/2001/0906/security.php3
77. http://lwn.net/alerts/Conectiva/CLA-2001:421.php3
78. http://lwn.net/2001/0726/security.php3#squid
79. http://lwn.net/alerts/YellowDog/YDU-20010725-14.php3
80. http://lwn.net/2001/0809/a/caldera-squid.php3
81. http://lwn.net/2001/0802/a/lm-squid.php3
82. http://lwn.net/2001/0726/a/imm-squid.php3
83. http://lwn.net/2001/0726/a/trustix-squid.php3
84. http://lwn.net/2001/0726/a/rh-squid.php3
85. http://lwn.net/2001/0726/security.php3#mtelnetd
86. http://lwn.net/alerts/Caldera/CSSA-2001-030.0.php3
87. http://lwn.net/alerts/Conectiva/CLA-2001:413.php3
88. http://lwn.net/alerts/Debian/DSA-075-1.php3
89. http://lwn.net/alerts/Debian/DSA.php3
90. http://lwn.net/alerts/Mandrake/MDKSA-2001:068.php3
91. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-27.php3
92. http://lwn.net/alerts/RedHat/RHSA-2001:099-06.php3
93. http://lwn.net/alerts/RedHat/RHSA-2001:100-02.php3
94. http://lwn.net/alerts/Slackware/sl-997726350.php3
95. http://lwn.net/alerts/SuSE/SuSE-SA:2001:029.php3
96. http://lwn.net/alerts/YellowDog/YDU-20010810-1.php3
97. http://lwn.net/alerts/YellowDog/YDU-20010810-2.php3
98. http://lwn.net/2001/0816/security.php3
99. http://lwn.net/alerts/Conectiva/CLA-2001:411.php3
100. http://lwn.net/alerts/Debian/DSA-074-1.php3
101. http://lwn.net/alerts/Mandrake/MDKSA-2001:074.php3
102. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-32.php3
103. http://lwn.net/2001/0712/security.php3#xloadimage
104. http://lwn.net/alerts/Mandrake/MDKSA-2001:073-1.php3
105. http://lwn.net/alerts/Conectiva/CLA-2001:415.php3
106. http://lwn.net/alerts/Debian/DSA-069-1.php3
107. http://lwn.net/alerts/Mandrake/MDKSA-2001:073.php3
108. http://lwn.net/alerts/Progeny/PROGENY-SA-2001-31.php3
109. http://lwn.net/2001/0712/a/rh-xloadimage.php3
110. http://lwn.net/2001/0726/a/suse-xli.php3
111. http://lwn.net/alerts/YellowDog/YDU-20010725-11.php3
112. http://www.nspw.org/
113. http://www.sfu.ca/igs/CASIS/
114. http://www.raid-symposium.org/Raid2001
115. http://www.bell-labs.com/user/reiter/ccs8/
116. http://homex.coolconnect.com/member2/icisa/icics2001.html
117. http://securityfocus.com/calendar
118. mailto:lwn@lwn.net
119. mailto:lwn@lwn.net
120. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
121. http://lwn.net/alerts/
122. http://bluelinux.sourceforge.net/
123. http://castle.altlinux.ru/
124. http://www.engardelinux.org/
125. http://www.immunix.org/
126. http://www.maganation.com/~kaladix/
127. http://www.nsa.gov/selinux/
128. http://www.openwall.com/Owl/
129. http://www.trustix.com/
130. http://www.bastille-linux.org/
131. http://lsap.org/
132. http://lsm.immunix.org/
133. http://www.openssh.com/
134. http://www.securityfocus.com/bugtraq/archive/
135. http://www.nfr.net/firewall-wizards/
136. http://www.jammed.com/Lists/ISN/
137. http://www.calderasystems.com/support/security/
138. http://www.conectiva.com.br/atualizacoes/
139. http://www.debian.org/security/
140. http://www.kondara.org/errata/k12-security.html
141. http://www.esware.com/actualizaciones.html
142. http://linuxppc.org/security/advisories/
143. http://www.linux-mandrake.com/en/fupdates.php3
144. http://www.redhat.com/support/errata/index.html
145. http://www.suse.de/security/index.html
146. http://www.yellowdoglinux.com/resources/errata.shtml
147. http://www.BSDI.COM/services/support/patches/
148. http://www.freebsd.org/security/security.html
149. http://www.NetBSD.ORG/Security/
150. http://www.openbsd.org/security.html
151. http://www.calderasystems.com/support/forums/announce.html
152. http://www.cobalt.com/support/resources/usergroups.html
153. http://distro.conectiva.com.br/atualizacoes/
154. http://www.debian.org/MailingLists/subscribe
155. http://www.esware.com/lista_correo.html
156. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
157. http://www.kondara.org/mailinglist.html.en
158. http://l5web.laser5.co.jp/ml/ml.html
159. http://www.linuxfromscratch.org/services/mailinglistinfo.php
160. http://www.linux-mandrake.com/en/flists.php3
161. http://www.netbsd.org/MailingLists/
162. http://www.openbsd.org/mail.html
163. http://www.redhat.com/mailing-lists/
164. http://www.slackware.com/lists/
165. http://www.stampede.org/mailinglists.php3
166. http://www.suse.com/en/support/mailinglists/index.html
167. http://www.trustix.net/support/
168. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
169. http://lists.yellowdoglinux.com/ydl_updates.shtml
170. http://munitions.vipul.net/
171. http://www.zedz.net/
172. http://www.cert.org/nav/alerts.html
173. http://ciac.llnl.gov/ciac/
174. http://www.MountainWave.com/
175. http://www.counterpane.com/crypto-gram.html
176. http://linuxlock.org/
177. http://linuxsecurity.com/
178. http://www.opensec.net/
179. http://www.securityfocus.com/
180. http://www.securityportal.com/
181. http://lwn.net/2001/0913/kernel.php3
182. http://www.eklektix.com/
183. http://www.eklektix.com/
--- ifmail v.2.14.os7-aks1
* Origin: Unknown (2:4615/71.10@fidonet)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/19861cf97626d.html, оценка из 5, голосов 10
|