Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   08 Feb 2001  18:31:43
 To : All
 Subject : URL: http://lwn.net/2001/0208/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]Development
     [7]Commerce
     [8]Linux in the news
     [9]Announcements
     [10]Linux History
     [11]Letters
    [12]All in one big page
    
    See also: [13]last week's Security page.
    
    Security FAQs
    [14]SuSE
    [15]Linux Security HOWTO
    
 Security
 
 News and Editorials
 
    Privacy issues with HTML-based email. The Privacy Foundation has
    issued [16]an advisory regarding potential security problems with
    HTML-based email containing Javascript code. When read by mail clients
    such as Netscape 6, Outlook or Outlook Express, javascript code
    included in a message can be used to silently report back to the
    original sender information such as to whom the message is forwarded
    or what additions are made to a forwarded message, potentially
    revealing sensitive information.
    
    [17]This message from the politechbot.com mailing list provides a good
    summary of the issues involved, as well as links crediting the source
    of the security report. They sum it up pretty well, "Friends don't
    send friends HTML email".
    
    Note that not all HTML mail readers are affected. Some turn off
    Javascript by default while others automatically strip Javascript from
    messages before displaying them. Now is a good time to determine how
    your mail client handles such messages.
    
    ISC to close access to Bind security info?. Last week's reported
    security vulnerabilities in both bind 4 and bind 8 were followed this
    week by plans from ISC (the company who has been developing bind 9) to
    create a new "bind-members" forum for the discussion and dissemination
    of security information related to bind. Membership in this forum
    would be strictly limited, a nondisclosure agreement would be
    required, and a fee would be charged. Theo de Raadt forwarded (to
    Bugtraq) a copy of [18]an email message from Paul Vixie at ISC that
    discusses the proposal. As you might expect, a large amount of furor
    and discussion resulted.
    
    Kurt Seifreid at SecurityPortal.com followed up on this issue with ISC
    and others. [19]His article includes a brief email interview with Paul
    Vixie, who commented:
    
      An important point to make, if you're going to write about this, is
      that nothing ISC has historically done will stop. The code is still
      completely redistributable under the Berkeley-style license (which,
      unlike the GPL, allows vendors to distribute binaries based on
      modified sources without sharing those source modifications with
      ISC or anybody else). CERT will still be ISC's channel for
      announcing security bugs to the community. Patches will still be
      accepted from the community, and published to the community. The
      ONLY thing bind-members will do is ADD SOMETHING NEW.
      
    The commentary in the article from Linux-Mandrake, Immunix OS, and
    others, though, is still uniformly negative towards this move.
    
    From our perspective, though we sympathize with ISC's need to develop
    a revenue stream based on this Open Source product, their suggested
    model strongly resembles the X Consortium model (which Paul Vixie
    references). We consider that a failed model. In spite of the
    inclusion of non-profit members without a fee, the X Consortium
    eventually bogged down in corporate politics, failing to deliver
    quality development upgrades and leaving a vacuum that the XFree86
    group has happily stepped in to fill. In a similar manner, the
    bind-members group could result in timely information about potential
    security problems not getting out, or one vendor's fixes being delayed
    because fixes from other vendors were not yet available. Given the
    wide-spread use of bind across the Internet, this is a cause for much
    concern.
    
    If ISC is, indeed, planning on offering services to vendors that are
    in addition to what it already offers on public mailing lists, they
    should certainly be able to require a fee for that service. However,
    the need for a non-disclosure agreement along with that fee has not
    been demonstrated.
    
    For more coverage on this issue, check out our editorial on this
    week's [20]front page.
    
    NSA attempting to design crack-proof computer (ZDNet). ZDNet looks at
    how VMWare and the National Security Agency have [21]teamed up to make
    a more secure PC. "Called "NetTop," VMware's answer would turn each
    computer into a number of virtual PCs running on a Linux computer that
    would sit on each worker's desk. The security system would erect
    supposedly impenetrable, but virtual, walls between public data and
    more sensitive information on the same computer. "
    
    Note that VMWare on Linux was considered an avenue for this
    development while VMWare on Windows NT, etc., was not. Why? Because
    Linux provides the source code and Windows does not. NSA understands
    that they need the source code to be available to build a trusted
    system.
    
    NSA is therefore making a strong stand in support of Open Source, but
    not necessarily in support of Free Software. The article also
    discusses their plans to use commercial off-the-shelf software.
    Hopefully, closed source proprietary software will not be used while
    manipulating secure data ... otherwise, their exclusion of Microsoft's
    operating system will be meaningless. (Thanks to Richard Storey)
    
    Security of the WEP algorithm. Nikita Borisov, Ian Goldberg, and David
    Wagner have posted a [22]whitepaper describing vulnerabilities they
    see in the Wired Equivalent Privacy (WEP) algorithm, part of the
    802.11 standard. The potential for passive and active attacks to
    decrypt traffic are described, as well as one to inject new traffic.
    "Our analysis suggests that all of these attacks are practical to
    mount using only inexpensive off-the-shelf equipment. We recommend
    that anyone using an 802.11 wireless network not rely on WEP for
    security, and employ other security measures to protect their wireless
    network."
    
 Security Reports
 
    SSH1 brute force password vulnerability. A [23]potential vulnerability
    in SSH1 was reported this week involving the ability to brute force
    passwords due to the manner in which failed passwords are logged. A
    patch against ssh-1.2.30 is provided.
    
    SSH protocol 1.5 key session recovery vulnerability. A second SSH
    problem was reported this week, this time with the SSH protocol 1.5.
    [24]This advisory describes the vulnerability, which can allow the
    session key for an exchange to be captured and then used to decrypt
    session packets. ssh-1 "up to" ssh-1.2.31 is reportedly vulnerable,
    presumably meaning that ssh-1.2.31 is also affected. ssh-2.4.0 and
    later is not impacted because the server key is regenerated for every
    connection. SSH.com deprecates the use of SSH1.
    
    OpenSSH "up to" 2.3.0 is also vulnerable. A patch has been introduced
    into the OpenSSH source tree. Updated versions of OpenSSH and portable
    OpenSSH (for non-OpenBSD systems) have not yet been announced;
    presumably they'll be made available soon.
    
    Linux kernel 2.4.1 denial-of-service vulnerability. A
    [25]denial-of-service vulnerability has been reported in the Linux
    2.4.1 kernel code. A patch for the problem is available and will be
    merged into the next prepatch for Linux 2.4.2. Distribution updates
    for the problem are unlikely to be seen, since most distributions have
    not yet begun shipping the new stable kernel series.
    
    XEmacs/gnuserv execution of arbitrary code. gnuserv is a client/server
    package included with XEmacs, but also available as a standalone
    package. Via gnuserv's support for MIT-MAGIC-COOKIE authentication, it
    can be exploited remotely to execute arbitrary code. gnuserv 3.12.1
    resolves the problem and is included with XEmacs 21.1.14. Check
    BugTraq ID [26]2333 for more details.
      * [27]Linux-Mandrake
      * [28]Red Hat
      * [29]Red Hat Powertools
    
    CUPS denial-of-service vulnerability. This is the second time we've
    seen reports of security problems in CUPS which appear to originate
    from Linux-Mandrake (e.g., no previous reports were seen on BugTraq or
    elsewhere). This time, a denial-of-service problem was reported that
    can be triggered via an extra-long input line. In addition, however,
    the Linux-Mandrake update apparently also includes other
    security-auditing steps, such as the replacement of sprintf calls with
    snprintf, strcpy with strncpy, etc., to better protect against other
    potential buffer overflows.
    
      * [30]Linux-Mandrake
      * [31]Linux-Mandrake, problems with packages shipped with their
        first update.
        
    man -l format string vulnerability. A [32]format string vulnerability
    in the man command was reported in its processing of the "-l" command
    line option. Note that not all versions of man provide the "-l"
    option. Only Debian and SuSE are reported to be affected, with varying
    results, due to varying permissions on the man binary. SuSE has
    confirmed the problem and promised an update soon. A bug report has
    been filed with Debian.
    
    Multiple vulnerabilities in ProFTPD. Three vulnerabilities in ProFTPD
    have been reported to BugTraq in the past month, according to [33]this
    advisory from the ProFTPD development team. The vulnerabilities
    include a size memory leak, a USER memory link and format string
    vulnerabilities (links to the original reports are provided through
    the advisory). ProFTPD 1.2.0rc3 has now been released with fixes for
    all the above problems.
    
      * [34]Cobalt, unofficial package updates
        
    Sporadic reports of nmap crashing bind 9.1.0. Reports have been posted
    to BugTraq describing reproducible crashes of bind 9.1.0 caused by
    nmap. On the other hand, each of those reports has been followed by
    anecdotal evidence that 9.1.0 does not crash on all platforms and
    setups. So far, no one has pinpointed the cause of the crash in the
    9.1.0 source code, so while there is a potential denial-of-service
    problem, it has not yet been confirmed.
    
    Infobot perl-based IRC bot remote execution of arbitrary command. A
    security problem has been reported with the [35]Infobot perl-based IRC
    bot which could be exploited to run arbitrary files under the IRC bot
    user id. Disabling fortran math in the configuration file and
    restarting is a workaround for the vulnerability. No patch or update
    has been reported yet.
    
    cgi-bin scripts.
    The following cgi-bin scripts were reported to contain
    vulnerabilities:
      * [36]qDecoder, part of the CrazyWWWBoard web-based bulletin board
        system, is reported to contain a remotely-exploitable buffer
        overflow. A patch for the problem has been provided.
      * [37]iWeb Hyperseek 2000 is reported to contain a directory
        transversal vulnerability. No fixes have been posted as of yet.
      * A directory transversal problem was also reported in the
        [38]GGoAhead WebServer, primarily a Windows product, but also
        available for Linux.
        
    Commercial products.
    The following commercial products were reported to contain
    vulnerabilities:
      * [39]ChiliSoft ASP for Linux and other operating systems is
        reported to contain a problem with the inherited security mode, in
        which the group value for virtual domains is not properly
        inherited. ChiliSoft indicated that the problem should be fixed in
        Chili!Soft ASP 3.6, due out this quarter.
      * Two problems were reported in the Cisco Content Services (CSS)
        Switches, including a [40]Denial-of-Service vulnerability and a
        [41]directory transversal vulnerability. Upgrades to fix the
        denial-of-service are available, but no solution to the directory
        transversal problem has yet been seen.
        
 Updates
 
    Multiple vulnerabilities in bind 8.2.2 and bind 4. Check the
    [42]February 1st LWN Security Summary for the initial reports. Bind
    8.2.3 contains fixes for the problems with 8.2.2. Bind 4 fixes are
    also available, but an upgrade to bind 8 or even bind 9 is generally
    considered a preferable approach.
    
    This week's updates:
      * [43]LinuxPPC
      * [44]FreeBSD
      * [45]Cobalt bind 8.2.3 (for the RaQ2 only)
      * [46]Cobalt bind 4 (for the Qube1, RaQ1 and Qube2)
        
    Previous updates:
    
      * [47]Caldera Systems (February 1st)
      * [48]Conectiva (February 1st)
      * [49]Debian (February 1st)
      * [50]Linux-Mandrake (February 1st)
      * [51]Immunix (February 1st)
        
      * [52]Red Hat (February 1st)
      * [53]Slackware (February 1st)
      * [54]SuSE (February 1st)
      * [55]Trustix (February 1st)
      * [56]Yellow Dog Linux (February 1st)
                                       
    MySQL buffer overflow.
    Check the [57]January 25th LWN Security Summary or BugTraq ID [58]2262
    for the original reports. This can be exploited remotely to gain
    access to the system under the uid of the mysql server. MySQL 3.23.31
    and earlier are affected. MySQL 3.23.32 fixes the problem.
    
    This week's updates:
      * [59]Linux-Mandrake, updated advisory
        
    Previous reports:
      * [60]Debian (January 25th)
      * [61]Linux-Mandrake, including new PHP packages (January 25th)
      * [62]Red Hat (January 25th)
      * [63]Red Hat, new PHP packages (January 25th)
      * [64]Conectiva (February 2nd)
      * [65]FreeBSD (February 2nd)
        
    kdesu password sniffing vulnerability. The KDE "kdesu" utility has a
    vulnerability that can allow a local user to steal passwords; see the
    [66]January 25 LWN Security Section for the initial report.
    
    This week's updates:
      * [67]Linux-Mandrake (February 2nd)
        
    Previous updates:
      * [68]Conectiva (February 2nd)
      * [69]SuSE (February 2nd)
      * [70]Caldera Systems (January 25th).
        
    Multiple glibc vulnerabilities. Multiple glibc vulnerabilities have
    been reported in recent weeks in glibc. Since glibc updates generally
    address all the problems, rather than one specific problem, we are
    combining the update report for them. For the original reports, check
    the January 18th, 2001, LWN Security Report under the topics
    "[71]glibc RESOLV_HOST_CONF preload vulnerability" and "[72]glibc
    local write/ld.so.cache preload vulnerability".
    
    This week's updates:
      * [73]Conectiva
      * [74]Immunix, updated packages (the originally released updates did
        not fix the problem)
        
    Previous updates:
      * [75]Red Hat (January 18th)
      * [76]Slackware (January 18th)
      * [77]Debian, 2.2 not vulnerable, testing and devel trees are
        (January 18th)
      * [78]Red Hat (January 18th)
      * [79]Immunix (January 25th)
      * [80]Linux-Mandrake (January 25th)
      * [81]Trustix (January 25th)
      * [82]Caldera (February 2nd)
      * [83]SuSE (February 2nd)
        
    exmh symlink vulnerability.
    Check the [84]January 18th LWN Security Summary for the initial
    report.
    
    This week's updates:
      * [85]Linux-Mandrake (January 25th, but missed in previous reports)
        
    Previous updates:
      * [86]Debian (February 2nd)
      * [87]FreeBSD (February 2nd)
        
 Resources
 
    William Stearns [88]announced the latest version of his [89]ramenfind
    script, for detecting and removing the Ramen worm.
    
    Osvaldo J. Filho posted a [90]small patch to syslog which will log
    version requests for bind, helpful for noticing probes for the latest
    bind vulnerabilities.
    
 Events
 
    Upcoming security events.
    
    Date Event Location
    February 13-15, 2001. [91]PKC 2001 Cheju Island, Korea.
    February 19-22, 2001. [92]Financial Cryptography 2001 Grand Cayman,
    BWI.
    February 19-22, 2001. [93]VPN Con San Jose, CA, USA.
    February 24-March 1, 2001. [94]InfoSec World 2001 Orlando, FL, USA.
    March 3-6, 2001. [95]EICAR and Anti-Malware Conference Munich,
    Germany.
    March 27-28, 2001. [96]eSecurity Boston, MA, USA.
    March 30-April 1, 2001. [97]@LANta.CON Doraville, GA, USA.
    April 6-8, 2001. [98]Rubi Con 2001 Detroit, MI, USA.
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [99]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [100]lwn@lwn.net.
    
    Section Editor: [101]Liz Coolbaugh
    February 8, 2001
    
                               [102]Click Here 
    Secure Linux Projects [103]Bastille Linux
    [104]Immunix
    [105]Nexus
    [106]SLinux [107]NSA Security-Enhanced
    [108]Trustix
    Security List Archives
    [109]Bugtraq Archive
    [110]Firewall Wizards Archive
    [111]ISN Archive
    Distribution-specific links
    [112]Caldera Advisories
    [113]Conectiva Updates
    [114]Debian Alerts
    [115]Kondara Advisories
    [116]Esware Alerts
    [117]LinuxPPC Security Updates
    [118]Mandrake Updates
    [119]Red Hat Errata
    [120]SuSE Announcements
    [121]Yellow Dog Errata
    BSD-specific links
    [122]BSDi
    [123]FreeBSD
    [124]NetBSD
    [125]OpenBSD
    Security mailing lists [126]Caldera
    [127]Cobalt
    [128]Conectiva
    [129]Debian
    [130]Esware
    [131]FreeBSD
    [132]Kondara
    [133]LASER5
    [134]Linux From Scratch
    [135]Linux-Mandrake
    [136]NetBSD
    [137]OpenBSD
    [138]Red Hat
    [139]Slackware
    [140]Stampede
    [141]SuSE
    [142]Trustix
    [143]turboLinux
    [144]Yellow Dog
    Security Software Archives
    [145]munitions
    [146]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [147]CERT
    [148]CIAC
    [149]Comp Sec News Daily
    [150]Crypto-GRAM
    [151]LinuxLock.org
    [152]Linux Security Audit Project
    [153]LinuxSecurity.com
    [154]OpenSSH
    [155]OpenSEC
    [156]Security Focus
    [157]SecurityPortal
    
    
                                                         [158]Next: Kernel
    
    [159]Eklektix, Inc. Linux powered! Copyright Л 2001 [160]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
    3. http://lwn.net/2001/0208/
    4. http://lwn.net/2001/0208/kernel.php3
    5. http://lwn.net/2001/0208/dists.php3
    6. http://lwn.net/2001/0208/devel.php3
    7. http://lwn.net/2001/0208/commerce.php3
    8. http://lwn.net/2001/0208/press.php3
    9. http://lwn.net/2001/0208/announce.php3
   10. http://lwn.net/2001/0208/history.php3
   11. http://lwn.net/2001/0208/letters.php3
   12. http://lwn.net/2001/0208/bigpage.php3
   13. http://lwn.net/2001/0201/security.php3
   14. http://www.susesecurity.com/faq/
   15. http://www.linuxdoc.org/HOWTO/Security-HOWTO.html
   16. http://www.privacyfoundation.org/advisories/advemailwiretap.html
   17. http://lwn.net/2001/0208/a/htmlprivacy.php3
   18. http://lwn.net/2001/0208/a/bind-closure.php3
   19. http://www.securityportal.com/articles/chargingforsecurity20010201.html
   20. http://lwn.net/2001/0208//index.php3
   21. http://www.zdnet.com/zdnn/stories/news/0,4586,2681205,00.html
   22. http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
   23. http://lwn.net/2001/0208/a/ssh1logging.php3
   24. http://lwn.net/2001/0208/a/sshprotocol1.5.php3
   25. http://lwn.net/2001/0208/kernel.php3#DatagramBug
   26. http://www.securityfocus.com/bid/2333
   27. http://lwn.net/2001/0208/a/lm-xemacs.php3
   28. http://lwn.net/2001/0208/a/rh-xemacs.php3
   29. http://lwn.net/2001/0208/a/rhp-xemacs.php3
   30. http://lwn.net/2001/0208/a/lm-cups.php3
   31. http://lwn.net/2001/0208/a/lm-cups-update.php3
   32. http://www.securityfocus.com/bid/2327
   33. http://lwn.net/2001/0208/a/sec-proftpd.php3
   34. http://lwn.net/2001/0208/a/cb-proftpd.php3
   35. http://lwn.net/2001/0208/a/sec-infobot.php3
   36. http://www.securityfocus.com/bid/2329
   37. http://www.securityfocus.com/bid/2314
   38. http://www.securityfocus.com/bid/2334
   39. http://lwn.net/2001/0208/a/sec-chilisoft.php3
   40. http://www.securityfocus.com/bid/2330
   41. http://www.securityfocus.com/bid/2331
   42. http://lwn.net/2001/0201/security.php3
   43. http://linuxppc.org/security/advisories/LPPCSA-2001-003-1.php3
   44. http://lwn.net/2001/0208/a/fb-bind-01-18.php3
   45. http://lwn.net/2001/0208/a/cbraq-bind.php3
   46. http://lwn.net/2001/0208/a/cbqube-bind.php3
   47. http://lwn.net/2001/0201/a/cald-bind.php3
   48. http://lwn.net/2001/0201/a/con-bind.php3
   49. http://lwn.net/2001/0201/a/deb-bind.php3
   50. http://lwn.net/2001/0201/a/lm-bind.php3
   51. http://lwn.net/2001/0201/a/immunix-bind.php3
   52. http://lwn.net/2001/0201/a/rh-bind.php3
   53. http://lwn.net/2001/0201/a/sl-bind.php3
   54. http://lwn.net/2001/0201/a/su-bind.php3
   55. http://lwn.net/2001/0201/a/trustix-bind.php3
   56. http://lwn.net/2001/0201/a/yd-bind.php3
   57. http://lwn.net/2001/0125/security.php3#mysql
   58. http://www.securityfocus.com/bid/2262
   59. http://lwn.net/2001/0208/a/lm-2001-014-1.php3
   60. http://lwn.net/2001/0125/a/deb-mysql.php3
   61. http://lwn.net/2001/0125/a/lm-mysql.php3
   62. http://lwn.net/2001/0125/a/rh-RHSA-2001-003-07.php3
   63. http://lwn.net/2001/0125/a/HSA-2000-136-10.php3
   64. http://lwn.net/2001/0201/a/con-CLA-2001-375.php3
   65. http://lwn.net/2001/0201/a/fb-mysql.php3
   66. http://lwn.net/2001/0125/security.php3#kdesu
   67. http://lwn.net/2001/0208/a/lm-2001-018.php3
   68. http://lwn.net/2001/0201/a/con-kdesu.php3
   69. http://lwn.net/2001/0201/a/su-kdesu.php3
   70. http://lwn.net/2001/0125/a/cal-CSSA-2001-005.0.php3
   71. http://lwn.net/2001/0118/security.php3#glibc5
   72. http://lwn.net/2001/0118/security.php3#glibc6
   73. http://lwn.net/2001/0208/a/con-glibc.php3
   74. http://lwn.net/2001/0208/a/im-glibc-2001-62-001-01.php3
   75. http://lwn.net/2001/0118/a/rh-glibc-2001001-5.php3
   76. http://lwn.net/2001/0118/a/slware-glibc-2001001-5.php3
   77. http://www.debian.org/News/weekly/2001/3/mail#1
   78. http://lwn.net/2001/0118/a/rh.2001-02-03.php3
   79. http://lwn.net/2001/0125/a/im-2000-70-029-01.php3
   80. http://lwn.net/2001/0125/a/lm-2001-012.php3
   81. http://lwn.net/2001/0125/a/trustix-0122.php3
   82. http://lwn.net/2001/0201/a/cal-CSSA-2001-007.0.php3
   83. http://lwn.net/2001/0201/a/suse-SuSE-SA-2001-01.php3
   84. http://lwn.net/2001/0118/security.php3#exmh
   85. http://lwn.net/2001/0208/a/lm-2001-015.php3
   86. http://lwn.net/2001/0201/a/deb-DSA-022-1.php3
   87. http://lwn.net/2001/0201/a/fb-exmh.php3
   88. http://lwn.net/2001/0208/a/ramenfindannounce.php3
   89. http://lwn.net/2001/0208/a/ramenfind.v0.3
   90. http://lwn.net/2001/0208/a/bindsyslog.php3
   91. http://caislab.icu.ac.kr/pkc01/
   92. http://fc01.ai/
   93. http://www.vpncon.com/2001events/spring/spring2001index.htm
   94. http://www.misti.com/conference_show.asp?id=OS01
   95. http://conference.eicar.org/
   96. http://www.intmedgrp.com/security/sec01bs/overview.html
   97. http://www.atlantacon.org/
   98. http://www.rubi-con.org/
   99. http://securityfocus.com/calendar
  100. mailto:lwn@lwn.net
  101. mailto:lwn@lwn.net
  102. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
  103. http://bastille-linux.sourceforge.net/
  104. http://www.immunix.org/
  105. http://Nexus-Project.net/
  106. http://www.slinux.org/
  107. http://www.nsa.gov/selinux/
  108. http://www.trustix.com/
  109. http://www.securityfocus.com/bugtraq/archive/
  110. http://www.nfr.net/firewall-wizards/
  111. http://www.jammed.com/Lists/ISN/
  112. http://www.calderasystems.com/support/security/
  113. http://www.conectiva.com.br/atualizacoes/
  114. http://www.debian.org/security/
  115. http://www.kondara.org/errata/k12-security.html
  116. http://www.esware.com/actualizaciones.html
  117. http://linuxppc.org/security/advisories/
  118. http://www.linux-mandrake.com/en/fupdates.php3
  119. http://www.redhat.com/support/errata/index.html
  120. http://www.suse.de/security/index.html
  121. http://www.yellowdoglinux.com/resources/errata.shtml
  122. http://www.BSDI.COM/services/support/patches/
  123. http://www.freebsd.org/security/security.html
  124. http://www.NetBSD.ORG/Security/
  125. http://www.openbsd.org/security.html
  126. http://www.calderasystems.com/support/forums/announce.html
  127. http://www.cobalt.com/support/resources/usergroups.html
  128. http://distro.conectiva.com.br/atualizacoes/
  129. http://www.debian.org/MailingLists/subscribe
  130. http://www.esware.com/lista_correo.html
  131. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  132. http://www.kondara.org/mailinglist.html.en
  133. http://l5web.laser5.co.jp/ml/ml.html
  134. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  135. http://www.linux-mandrake.com/en/flists.php3
  136. http://www.netbsd.org/MailingLists/
  137. http://www.openbsd.org/mail.html
  138. http://www.redhat.com/mailing-lists/
  139. http://www.slackware.com/lists/
  140. http://www.stampede.org/mailinglists.php3
  141. http://www.suse.com/en/support/mailinglists/index.html
  142. http://www.trustix.net/support/
  143. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  144. http://lists.yellowdoglinux.com/ydl_updates.shtml
  145. http://munitions.vipul.net/
  146. http://www.zedz.net/
  147. http://www.cert.org/nav/alerts.html
  148. http://ciac.llnl.gov/ciac/
  149. http://www.MountainWave.com/
  150. http://www.counterpane.com/crypto-gram.html
  151. http://linuxlock.org/
  152. http://lsap.org/
  153. http://linuxsecurity.com/
  154. http://www.openssh.com/
  155. http://www.opensec.net/
  156. http://www.securityfocus.com/
  157. http://www.securityportal.com/
  158. http://lwn.net/2001/0208/kernel.php3
  159. http://www.eklektix.com/
  160. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://lwn.net/2001/0208/security.php3   Sergey Lentsov   08 Feb 2001 18:31:43 
Архивное /ru.linux/203081f322561.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional