Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   11 Apr 2002  19:37:28
 To : All
 Subject : URL: http://www.lwn.net/2002/0411/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    [LWN.net]
 
    Sections:
     [2]Main page
     Security
     [3]Kernel
     [4]Distributions
     [5]Development
     [6]Commerce
     [7]Linux in the news
     [8]Announcements
     [9]Letters
    [10]All in one big page
 
    See also: [11]last week's Security page.
 
 Security
 
 News and Editorials
 
    Red Hat Unveils CVE Security Compatibility. Red Hat [12]announced that
    their security alerts and advisories, including updates issued through
    the Red Hat Network, will use Common Vulnerabilities and Exposures
    (CVE) standard names. The [13]CVE project has been working since 1999
    to create a standard way of talking about security problems. So far,
    [14]fifty one organizations have declared that [15]seventy six network
    security products or services are, or will be CVE-compatible.
 
    Other Linux distributors who have adopted CVE at some level include
    Caldera, Debian, EnGarde Secure Linux and Mandrake Linux. LWN
    published a brief introduction to CVE in our [16]February 28th
    security section.
 
    New Evans Data Survey Reports Security Breaches Rare in Linux
    Environment. An Evans Data Corp. survey [17]looks at Linux security
    statistics. "According to CERT, a center for Internet security
    expertise operated by Carnegie Mellon University, the total number of
    computer attacks has almost doubled every year since 1988. However,
    the rarity of security breaches in the Linux environment is
    illustrated by the fact that 78% of respondents to the survey have
    never experienced an unwanted intrusion and 94% have operated
    virus-free."
 
    Open sourcers wear the white hats (ZDNet). Here's an [18]article by
    Bruce Perens about the difference in the security of open-source and
    proprietary software. "In contrast, open source has a lot of "white
    hats" looking at the source. They often do find security bugs while
    working on other aspects of the code, and the bugs are reported and
    closed. However, open source can still profit from a formal security
    review, just as proprietary code can, and there is an accelerating
    trend to do formal security reviews in open-source projects."
 
 Security Reports
 
    IMP 2.2.8 released. Version 2.2.8 of IMP [19]has been released, it
    fixes some vulnerabilities. "The Horde team announces the availability
    of IMP 2.2.6, which fixes three potential security issues. We strongly
    recommend that all sites running IMP 2.2.x upgrade to this version. "
 
    Red Hat Security Advisory - tcpdump. Updated [20]tcpdump, libpcap, and
    arpwatch packages are available for Red Hat Linux 6.2 and 7.x. These
    updates close vulnerabilities present in versions of tcpdump up to
    3.5.1 and various other bugs.
 
    Red Hat Security Advisory - logwatch. Updated Red Hat Linux 7.2
    [21]logwatch packages are available that fix tmp file race conditions
    which can cause a local user to gain root privileges. Here's the same
    alert for the Red Hat Powertools [22]logwatch.
 
    web scripts.
    The following web scripts were reported to contain vulnerabilities:
      * Steve Gustin has [23]reported a remote code execution
        vulnerability in csGuestBook, csLiveSupport, csNewsPro and
        csChatRBox. Updates that fix the vulnerability are available from
        [24]CGIScript.net
 
    Proprietary products.
    The following proprietary products were reported to contain
    vulnerabilities:
      * [25]Emumail has a reported [26]vulnerability in emumail.cgi which
        allows viewing of arbitrary files on the server.
 
 Updates
 
    Apache spoofed information logging vulnerabilty. Versions of apache
    prior to 1.3.24 sometimes put invalid client hostnames in the log
    file. A remote attacker may exploit this behavior to insert spoofed
    information into the webserver logs. The fix is to upgrade to the
    recent Apache 1.3.24 release. (First LWN report: [27]March 28th).
 
    This week's updates:
      * [28]Eridani (April 5, 2002) .
 
    rsync supplementary groups vulnerability. Ethan Benson [29]reported
    that rsyncd fails to remove supplementary groups (such as root) from
    the server process after changing to the specified unprivileged uid
    and gid. "This seems only serious if rsync is called using "rsync
    --daemon" from the command line where it will inherit the group of the
    user starting the server (usually root)." (First LWN report:
    [30] March 14th).
 
    This week's updates:
      * [31]Caldera (April 3, 2002)
 
    Previous updates:
      * [32]Mandrake (March 13, 2002)
      * [33]Red Hat (March 21, 2002)
      * [34]Slackware (March 12, 2002)
 
    Multiple vulnerabilities in SNMP implementations. Most SNMP
    implementations out there have a variety of buffer overflow
    vulnerabilities and should be upgraded at first opportunity. See
    [35]this CERT advisory for more. (First LWN report: [36]February 14).
 
    This week's updates:
      * [37]SuSE (April 8, 2002) (ucdsnmp)
 
    Previous updates:
      * [38]Caldera (January 22, 2002)
      * [39]Conectiva (February 14, 2002)
      * [40]Debian (February 28, 2002) (first update caused some problems)
      * [41]Debian (February 14, 2002)
      * [42]Eridani Linux (February 22, 2002)
      * [43]Mandrake (February 15, 2002)
      * [44]Red Hat (February 12, 2002)
      * [45]Yellow Dog (February 11, 2002)
 
    zlib corrupts malloc data structures via double free. This
    vulnerability impacts all major Linux vendors. It may impact every
    Linux installation on Earth. Updates are required to zlib and any
    packages that were statically built with the zlib code. (First LWN
    report: [46]March 14).
 
    LinuxSecurity [47]describes the vulnerability and coordinated
    distributor efforts in detail. "Packages including X11, rsync, the
    Linux kernel, QT, mozilla, gcc, vnc, and many other programs that have
    the ability to use network compression are potentially vulnerable."
 
    Updating is recommended. As always, please proceed with caution when
    applying updates to the kernel.
 
    This week's updates:
      * [48]Caldera (April 4, 2002) (libz and derived packages)
      * [49]Caldera (April 3, 2002) (rsync)
 
    Previous updates:
      * [50]Conectiva (March 14, 2002) (zlib and derived packages)
      * [51]Debian (March 11, 2002) (nine packages)
      * [52]EnGarde (March 11, 2002) (zlib kernel popt rsync)
      * [53]Eridani (March 22, 2002) (kernel update to [54]March 13 alert)
      * [55]Eridani (March 13, 2002) (libz)
      * [56]Eridani (March 13, 2002) (vnc dump cvs rsync kernel)
      * [57]Mandrake (March 13, 2002) (packages containing zlib)
      * [58]Mandrake (March 12, 2002) (zlib)
      * [59]Mandrake (March 12, 2002) (twelve packages including kernel)
      * [60]OpenPKG (March 12, 2002) (zlib cvs gnupg rrdtool rsync)
      * [61]Red Hat (March 21, 2002) (Powertools 6.2 VNC update to
        [62]March 11 fix; sparc64 kernel for Red Hat 6.2)
      * [63]Red Hat (March 15, 2002) (kernel for Red Hat 6.2 & 7.0)
      * [64]Red Hat (March 11, 2002) (Red Hat Linux; also apply the March
        15 kernel update)
      * [65]Red Hat (March 11, 2002) (Red Hat Powertools)
      * [66]SuSE (March 11, 2002) (libz/zlib)
      * [67]SuSE (March 11, 2002) (eight packages including kernel)
      * [68]Slackware (March 12, 2002) (zlib)
      * [69]Slackware (March 12, 2002) (rsync)
      * [70]Slackware (March 12, 2002) (cvs)
      * [71]Trustix (March 18, 2002) (zlib and derived packages)
 
    See also: articles in [72]ZDNet and [73]The Register about the zlib
    vulnerability. And, these reports from [74]ZDNet and [75]Vnunet on
    this vulnerability in some of Microsoft's major applications.
 
 Resources
 
    Linux security week. The [76]Linux Security Week and [77]Linux
    Advisory Watch publications from LinuxSecurity.com are available.
 
    Network security tips for managers (ZDNet). While not Linux (or Unix)
    specific, [78]this article does contain some good security tips. "To
    see what may be listening on the computers in your network, you should
    use a simple hacker's tool known as a port scanner. Software is used
    across a network listens to network information on a port. There are a
    number of ports available on most servers. By using a tool known as a
    port scanner, a hacker checks for every possible piece of network
    software. If it answers, the hacker tries to find more information
    about the computer. The hacker then tries to exploit that port.
    However, you can use it just as a list of what's listening on a
    computer and check to make sure you don't have unnecessary software
    running."
 
 Events
 
    Black Hat Briefings 2002 call for papers. Black Hat has issued this
    [79]reminder that the Black Hat 2002 Call for Papers closes May 1st.
    The conference is held from July 31-August 1, 2002 at the Caesars
    Palace Hotel and Resort in Las Vegas, NV, USA.
 
    Upcoming Security Events.
 
    Date Event Location
    April 14 - 15, 2002 [80]Workshop on Privacy Enhancing Technologies
    2002 (Cathedral Hill Hotel)San Francisco, California, USA
    April 15 - 19, 2002 [81]InfoSec 2002 UniNet IRC network
    (irc.uninet.edu) - channel #infosec
    April 16 - 19, 2002 [82]The Twelfth Conference on Computers, Freedom &
    Privacy (Cathedral Hill Hotel)San Francisco, California, USA
    April 23 - 25, 2002 [83]Infosecurity Europe 2002 Olympia, London, UK
    May 1 - 3, 2002 [84]cansecwest/core02 Vancouver, Canada
    May 4 - 5, 2002 [85]DallasCon Dallas, TX., USA
    May 12 - 15, 2002 [86]2002 IEEE Symposium on Security and Privacy (The
    Claremont Resort)Oakland, California, USA
    May 13 - 14, 2002 [87]3rd International Common Criteria
    Conference(ICCC) Ottawa, Ont., Canada
    May 13 - 17, 2002 14th Annual Canadian Information Technology Security
    Symposium(CITSS) (Ottawa Congress Centre)Ottawa, Ontario, Canada
    May 27 - 31, 2002 [88]3rd International SANE Conference(SANE 2002)
    Maastricht, The Netherlands
    May 29 - 30, 2002 [89]RSA Conference 2002 Japan (Akasaka Prince
    Hotel)Tokyo, Japan
 
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [90]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [91]lwn@lwn.net.
 
    Section Editor: [92]Dennis Tenney
    April 11, 2002
 
                                Sponsored Link
 
    [93]Your Text Ad Here
 
    Purchase your own text ad with our self-serve advertising system.
 
    LWN Resources
    [94]Security alerts archive
    Secured Distributions:
    [95]Astaro Security
    [96]Blue Linux
    [97]Castle
    [98]Engarde Secure Linux
    [99]Immunix
    [100]Kaladix Linux
    [101]NSA Security Enhanced
    [102]Openwall GNU/Linux
    [103]Trustix
    Security Projects
    [104]Bastille
    [105]Linux Security Audit Project
    [106]Linux Security Module
    [107]OpenSSH
    Security List Archives
    [108]Bugtraq Archive
    [109]Firewall Wizards Archive
    [110]ISN Archive
    Distribution-specific links
    [111]Caldera Advisories
    [112]Conectiva Updates
    [113]Debian Alerts
    [114]Kondara Advisories
    [115]Esware Alerts
    [116]LinuxPPC Security Updates
    [117]Mandrake Updates
    [118]Red Hat Errata
    [119]SuSE Announcements
    [120]Turbolinux
    [121]Yellow Dog Errata
    BSD-specific links
    [122]BSDi
    [123]FreeBSD
    [124]NetBSD
    [125]OpenBSD
    Security mailing lists
    [126]Caldera
    [127]Cobalt
    [128]Conectiva
    [129]Debian
    [130]Esware
    [131]FreeBSD
    [132]Kondara
    [133]LASER5
    [134]Linux From Scratch
    [135]Linux-Mandrake
    [136]NetBSD
    [137]OpenBSD
    [138]Red Hat
    [139]Slackware
    [140]Stampede
    [141]SuSE
    [142]Trustix
    [143]turboLinux
    [144]Yellow Dog
    Security Software Archives
    [145]munitions
    [146]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [147]CERT
    [148]CIAC
    [149]Comp Sec News Daily
    [150]Crypto-GRAM
    [151]LinuxLock.org
    [152]LinuxSecurity.com
    [153]Security Focus
    [154]SecurityPortal
                                                         [155]Next: Kernel
 
    [156]Eklektix, Inc. Linux powered! Copyright Л 2002 [157]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://lwn.net/2002/0411/
    3. http://lwn.net/2002/0411/kernel.php3
    4. http://lwn.net/2002/0411/dists.php3
    5. http://lwn.net/2002/0411/devel.php3
    6. http://lwn.net/2002/0411/commerce.php3
    7. http://lwn.net/2002/0411/press.php3
    8. http://lwn.net/2002/0411/announce.php3
    9. http://lwn.net/2002/0411/letters.php3
   10. http://lwn.net/2002/0411/bigpage.php3
   11. http://lwn.net/2002/0404/security.php3
   12.
 http://www.businesswire.com/cgi-bin/f_headline.cgi?bw.041002/221002075&ticker=RH
 AT
   13. http://cve.mitre.org/
   14. http://cve.mitre.org/compatible/
   15. http://cve.mitre.org/compatible
   16. http://lwn.net/2002/0228/security.php3
   17. http://www.businesswire.com/cgi-bin/f_headline.cgi?bw.040802/220982285
   18. http://www.zdnet.com/techupdate/stories/main/0,14179,2859555,00.html
   19. http://lwn.net/2002/0411/a/imp228.php3
   20. http://lwn.net/alerts/RedHat/RHSA-2001:089-08.php3
   21. http://lwn.net/alerts/RedHat/RHSA-2002:053-12.php3
   22. http://lwn.net/alerts/RedHat/RHSA-2002:054-09.php3
   23. http://lwn.net/2002/0411/a/cgiscript.php3
   24. http://www.cgiscript.net/
   25. http://www.emumail.com/
   26. http://lwn.net/2002/0411/a/emumail.php3
   27. http://lwn.net/2002/0328/security.php3#apache
   28. http://lwn.net/alerts/Eridani/ERISA-2002:012.php3
   29. http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=132272
   30. http://lwn.net/2002/0314/security.php3#rsync
   31. http://lwn.net/alerts/Caldera/CSSA-2002-014.0.php3
   32. http://lwn.net/alerts/Mandrake/MDKSA-2002:024.php3
   33. http://lwn.net/alerts/RedHat/RHSA-2002:026-43.php3
   34. http://lwn.net/alerts/Slackware/sl-1015950024.php3
   35. http://lwn.net/2002/0214/a/cert-snmp.php3
   36. http://lwn.net/2002/0214/security.php3
   37. http://lwn.net/alerts/SuSE/SuSE-SA:2002:012.php3
   38. http://lwn.net/alerts/Caldera/CSSA-2002-004.0.php3
   39. http://lwn.net/alerts/Conectiva/CLA-2002:462.php3
   40. http://lwn.net/alerts/Debian/DSA-111-2.php3
   41. http://lwn.net/alerts/Debian/DSA-111-1.php3
   42. http://lwn.net/2002/0228/a/el-sec.php3
   43. http://lwn.net/alerts/Mandrake/MDKSA-2002:014.php3
   44. http://lwn.net/alerts/RedHat/RHSA-2001:163-20.php3
   45. http://lwn.net/alerts/YellowDog/YDU-20020211-1.php3
   46. http://lwn.net/2002/0314/security.php3#zlib
   47. http://www.linuxsecurity.com/articles/security_sources_article-4582.html
   48. http://lwn.net/alerts/Caldera/CSSA-2002-015.0.php3
   49. http://lwn.net/alerts/Caldera/CSSA-2002-014.0.php3
   50. http://lwn.net/alerts/Conectiva/CLA-2002:469.php3
   51. http://lwn.net/alerts/Debian/DSA-122-1.php3
   52. http://lwn.net/alerts/EnGarde/ESA-20020311-008.php3
   53. http://vena.lwn.net/alerts/Eridani/ERISA-2002:000.php3
   54. http://lwn.net/alerts/Eridani/ERISA-2002:008.php3
   55. http://lwn.net/alerts/Eridani/ERISA-2002:008.php3
   56. http://lwn.net/alerts/Eridani/ERISA-2002:009.php3
   57. http://lwn.net/alerts/Mandrake/MDKSA-2002:023-1.php3
   58. http://lwn.net/alerts/Mandrake/MDKSA-2002:022.php3
   59. http://lwn.net/alerts/Mandrake/MDKSA-2002:023.php3
   60. http://lwn.net/alerts/OpenPKG/OpenPKG-SA-2002.003.php3
   61. http://lwn.net/alerts/RedHat/RHSA-2002:026-43.php3
   62. http://lwn.net/alerts/RedHat/RHSA-2002:027-22.php3
   63. http://lwn.net/alerts/RedHat/RHSA-2002:026-39.php3
   64. http://lwn.net/alerts/RedHat/RHSA-2002:026-35.php3
   65. http://lwn.net/alerts/RedHat/RHSA-2002:027-22.php3
   66. http://lwn.net/alerts/SuSE/SuSE-SA:2002:010.php3
   67. http://lwn.net/alerts/SuSE/SuSE-SA:2002:011.php3
   68. http://lwn.net/alerts/Slackware/sl-1015949806.php3
   69. http://lwn.net/alerts/Slackware/sl-1015950024.php3
   70. http://lwn.net/alerts/Slackware/sl-1015950525.php3
   71. http://lwn.net/alerts/Trustix/2002-0040.php3
   72. http://zdnet.com.com/2100-1104-857031.html
   73. http://www.theregister.co.uk/content/5/24387.html
   74. http://zdnet.com.com/2100-1104-860428.html
   75. http://www.vnunet.com/News/1130151
   76. http://lwn.net/2002/0411/a/security-week.php3
   77. http://lwn.net/2002/0411/a/advisory-watch.php3
   78. http://zdnet.com.com/2100-1107-854265.html
   79. http://lwn.net/2002/0411/a/blackhat.php3
   80. http://www.pet2002.org/
   81. http://infosec.uninet.edu/
   82. http://www.cfp2002.org/
   83. http://www.infosec.co.uk/
   84. http://cansecwest.com/
   85. http://www.dallascon.com/
   86. http://www.ieee-security.org/TC/SP02/sp02index.html
   87. http://www.cse-cst.gc.ca/en/iccc/iccc.html
   88. http://www.nluug.nl/sane/
   89. http://www.rsaconference.net/
   90. http://securityfocus.com/calendar
   91. mailto:lwn@lwn.net
   92. mailto:lwn@lwn.net
   93.
 http://oasis.lwn.net/oasisc.php?s=4&c=5&cb=476026769&url=http%3A%2F%2Flwn.net%2F
 corp%2Fadvertise%2Ftext%2F
   94. http://lwn.net/alerts/
   95. http://www.astaro.com/products/index.html
   96. http://bluelinux.sourceforge.net/
   97. http://castle.altlinux.ru/
   98. http://www.engardelinux.org/
   99. http://www.immunix.org/
  100. http://www.kaladix.org/
  101. http://www.nsa.gov/selinux/
  102. http://www.openwall.com/Owl/
  103. http://www.trustix.com/
  104. http://www.bastille-linux.org/
  105. http://lsap.org/
  106. http://lsm.immunix.org/
  107. http://www.openssh.com/
  108. http://www.securityfocus.com/archive/1
  109. http://www.nfr.net/firewall-wizards/
  110. http://www.jammed.com/Lists/ISN/
  111. http://www.calderasystems.com/support/security/
  112. http://www.conectiva.com.br/atualizacoes/
  113. http://www.debian.org/security/
  114. http://www.kondara.org/errata/k12-security.html
  115. http://www.esware.com/actualizaciones.html
  116. http://linuxppc.org/security/advisories/
  117. http://www.linux-mandrake.com/en/fupdates.php3
  118. http://www.redhat.com/support/errata/index.html
  119. http://www.suse.de/security/index.html
  120. http://www.turbolinux.com/security/
  121. http://www.yellowdoglinux.com/resources/
  122. http://www.BSDI.COM/services/support/patches/
  123. http://www.freebsd.org/security/security.html
  124. http://www.NetBSD.ORG/Security/
  125. http://www.openbsd.org/security.html
  126. http://www.calderasystems.com/support/forums/announce.html
  127. http://www.cobalt.com/support/resources/usergroups.html
  128. http://distro.conectiva.com.br/atualizacoes/
  129. http://www.debian.org/MailingLists/subscribe
  130. http://www.esware.com/lista_correo.html
  131. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  132. http://www.kondara.org/mailinglist.html.en
  133. http://l5web.laser5.co.jp/ml/ml.html
  134. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  135. http://www.linux-mandrake.com/en/flists.php3
  136. http://www.netbsd.org/MailingLists/
  137. http://www.openbsd.org/mail.html
  138. http://www.redhat.com/mailing-lists/
  139. http://www.slackware.com/lists/
  140. http://www.stampede.org/mailinglists.php3
  141. http://www.suse.com/en/support/mailinglists/index.html
  142. http://www.trustix.net/support/
  143. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  144. http://lists.yellowdoglinux.com/ydl_updates.shtml
  145. http://munitions.vipul.net/
  146. http://www.zedz.net/
  147. http://www.cert.org/nav/alerts.html
  148. http://ciac.llnl.gov/ciac/
  149. http://www.MountainWave.com/
  150. http://www.counterpane.com/crypto-gram.html
  151. http://linuxlock.org/
  152. http://linuxsecurity.com/
  153. http://www.securityfocus.com/
  154. http://www.securityportal.com/
  155. http://lwn.net/2002/0411/kernel.php3
  156. http://www.eklektix.com/
  157. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://www.lwn.net/2002/0411/security.php3   Sergey Lentsov   11 Apr 2002 19:37:28 
Архивное /ru.linux/19861d1aca8b5.html, оценка 2 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional