Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   15 Mar 2001  18:11:20
 To : All
 Subject : URL: http://lwn.net/2001/0315/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]On the Desktop
     [7]Development
     [8]Commerce
     [9]Linux in the news
     [10]Announcements
     [11]Linux History
     [12]Letters
    [13]All in one big page
    
    See also: [14]last week's Security page.
    
 Security
 
 News and Editorials
 
    TCP/IP initial sequence number weakness. Now, before you read this
    article, note that we tend to have a slight bias against vulnerability
    reports that show up first in the media, rather than in
    technical/security forums (where we think they belong). That said,
    this week Computerworld published a story on a "[15]security weakness
    in TCP/IP".
    
    In the article, Guardent, a Waltham, Massachusetts-based security
    firm, claimed to know of a security flaw in TCP/IP whereby TCP initial
    sequence numbers that were supposed to be randomized were actually
    guessable, and could be used to hijack sessions or spoof connections.
    The company also declined to give additional details, which made
    evalution of their claims a bit difficult.
    
    However, it appears that Guardent did go on to share their
    "copyrighted research" with CERT, who in turn has validated the
    existence of the weakness in [16]this vulnerability note. This note
    still does not confirm what operating systems are vulnerable, though
    it has been hinted that Linux might be one of several.
    
    Underlying the weakness is the question of whether a given operating
    system has implemented [17]RFC 1948 ("Defending Against Sequence
    Number Attacks") properly. Potential security issues if this was not
    done have been [18]known since the mid '80s.
    
    Perhaps we should be grateful for Guardent's work to sensationalize
    this issue, if it results in every operating system auditing its
    TCP/IP implementation and making needed corrections to it.
    Nonetheless, the mixture of copyrighted research, secrecy and press
    exploitation are a bit nauseating. Meanwhile, there do not seem to be
    any published exploits for this problem as of yet. That makes waiting
    for vendor advisories and updates a bit more palatable.
    
    Carnivore by any other name ... (ComputerWorld). Carnivore, the FBI's
    program for "monitoring" email communications of suspected criminals,
    was reviewed by outside consultants at the instigation of the Justice
    Department. One of the recommendation of those reviewers was that the
    name of the program be changed. So we're sure you'll all be much
    happier about the existence of [19]DCS1000, the program formerly known
    as Carnivore. Given their choice of a cryptic, non-informational name,
    we'll take a hefty bet that the moniker "Carnivore" will stick,
    whether they want it to or not.
    
    Meanwhile, there's no new information on any substantive changes to
    Carnivore or previous efforts to get them to Open Source the code.
    
    Bad News for Snoops (ZDNet). There's a bit of news about the UK's
    passage of part three of the United Kingdom's RIP law, or Regulation
    of Investigatory Powers Act, in [20]this ZDNet article, but the
    primary focus is on [21]m-o-o-t, which is designed to protect UK
    citizens from possible abuse of the new laws by the British
    government. "The self-contained software will be shipped on a bootable
    CD. User data and mail will be encrypted and stored in offshore data
    havens, bypassing local storage. Untraceable e-mail and telephony are
    also in the works".
    
 Security Reports
 
    icecast buffer overflows.
    This week, several [22]buffer overflows in icecast were reported. As a
    result, icecast 1.3.9 and 1.3.10 have been released in the past week.
    Icecast 1.3.9 is chock full of security fixes; icecast 1.3.10 contains
    additional fixes, but the [23]website does not make a note of whether
    or not those fixes are security-related. In addition, icecast format
    string vulnerability reported in the [24]January 25th LWN Security
    Summary has finally been officially repaired. As a result, this
    upgrade is strongly recommended.
    
      * [25]FreeBSD
    
    XFree86 nextaw/xaw3d/xaw95 temporary file issues.
    Bug fixes for temporary file problems with the AsciiSrc and MultiSrc
    widget in the Athena widget library are now available to resolve
    situations where temporary files are handled incorrectly.
      * [26]Debian
        
    sgml-tools temporary file issues. Versions of sgml-tools prior to
    1.0.9-15 are reported to handle temporary file creation insecurely. An
    upgrade to 1.0.9-15 or later is recommended.
      * [27]Debian
        
    slrn buffer overflow. A buffer overflow in the slrn newsreader was
    found and reported by Bill Nottingham. Check the [28]Debian advisory
    for more details.
    
      * [29]Debian
      * [30]Linux-Mandrake
        
    Zope 'aq_inContextOf' method access validation vulnerability.
    An access validation error in the 'aq_inContextOf' method can be
    exploited to gain access to Zope objects that should be denied, though
    they comment that a Zope expert would be required in order to succeed.
    Zope 2.3.0 alpha, beta and final versions and Zope 2.3.1 beta 1 are
    all affected. [31]A hotfix has been issued to fix the problem until
    Zope 2.3.1 beta 2 is released. Applying the hotfix is recommended.
    
    Caldera-specific IMAP/POP vulnerability. Caldera issued [32]an
    advisory concerning several buffer overflows in imap, ipop2d and
    ipop3d, which are normally not exploitable, because they could only be
    used to get access to processes already owned by the uid of the
    attacker. However, a configuration problem makes it possible instead
    to gain access to the 'nobody' account and execute arbitrary programs.
    Updated packages are provided.
    
    mailx buffer overflow.
    A buffer overflow has been found in /bin/mailx which, if the program
    is installed setgid, can be exploited locally to gain access to the
    gid of the binary. No fix for this problem has been reported. The best
    workaround currently available is to remove the setgid bit, which will
    still allow it to be used to send mail, but will severely limit other
    functionality on systems that require group mail for writing to the
    mail spool directory.
    
      * [33]Debian, setgid bit removed
        
    Mesa temporary file link vulnerability.
    A temporary file link problem has been reported in the [34]Mesa 3-D
    graphics library by Ben Collins. [35]Linux-Mandrake has issued updated
    Mesa 3.3 packages with a fix for the problem. Note that [36]Mesa 3.4.1
    was released on February 15th, but no mention of a fix for a temporary
    file link problem is mentioned, so presumably it is impacted as well.
    
      * [37]Linux-Mandrake
        
    timed denial-of-service vulnerability.
    FreeBSD has issued [38]an advisory regarding a denial-of-service
    vulnerability in timed. The timed server crashes when sent malformed
    packets. Both a patch and updated packages are provided for FreeBSD.
    This problem is not specific to FreeBSD, but has not been confirmed on
    other BSD or Linux systems.
    
    rwhod denial-of-service vulnerability.
    FreeBSD also issued [39]a similar advisory for the rwhod demon.
    
    FTP File System buffer overflow.
    [40]FTP File System is a Linux kernel module that allows FTP
    repositories to be mounted locally as VFS file systems. A [41]buffer
    overflow in FTPFS was reported this week by Frank Denis. The author
    has been notified. [42]FTP File System 0.2.1 was released yesterday,
    March 14th. Although it does not reference the security report, the
    description for the update does say, "Sanity checks on mount
    parameters were added to prevent overflows", so it might be presumed
    that the new version resolves this problem.
    
 Updates
 
    ePerl buffer overflows.
    Check the [43]March 8th LWN Security Summary for the initial report.
    
    This week's updates:
      * [44]Linux-Mandrake
        
    Previous updates:
      * [45]Debian (March 8th)
        
    mc binary execution vulnerability.
    Check the [46]March 8th LWN Security Summary or [47]Bugtraq ID 2016
    for more details.
    
    This week's updates:
      * [48]Slackware (changelog, 2001/3/10)
        
    Previous updates:
      * [49]Debian (March 8th)
        
    Zope security update.
    Digital Creations released [50]a security update to Zope (all versions
    up to 2.3b1) fixing a security vulnerability in how ZClasses are
    handled the week of [51]March 1st. An upgrade is recommended.
    
    This week's updates:
      * [52]Debian
        
    Previous updates:
      * [53]Red Hat (March 1st)
      * [54]Linux-Mandrake (March 1st)
      * [55]Conectiva (March 8th)
        
    joe file handling vulnerability.
    Check the [56]March 1st LWN Security Summary for the initial report.
    
    This week's updates:
      * [57]Debian
        
    Previous updates:
      * [58]Red Hat (March 8th)
      * [59]Immunix (March 8th)
      * [60]Linux-Mandrake (March 8th)
        
    sudo buffer overflow.
    Check the [61]March 1st LWN Security Summary for the original report.
    
    This week's updates:
      * [62]Linux-Mandrake, new 7.1 packages due to build problem.
        
    Previous updates:
    
      * [63]Slackware (March 1st)
      * [64]Trustix (March 1st)
      * [65]Conectiva (March 1st)
      * [66]Linux-Mandrake (March 1st)
        
      * [67]Debian (March 1st)
      * [68]Immunix (March 1st)
      * [69]Debian (March 8th), PowerPC packages
                                       
    XEmacs/gnuserv execution of arbitrary code.
    Check the [70]February 8th LWN Security Summary or BugTraq ID [71]2333
    for details. gnuserv 3.12.1 resolves the problem and is included with
    XEmacs 21.1.14.
    
    This week's updates:
      * [72]Debian
        
    Previous updates:
      * [73]Linux-Mandrake (February 8th)
      * [74]Red Hat (February 8th)
      * [75]Red Hat Powertools (February 8th)
        
    Multiple glibc vulnerabilities. Multiple glibc vulnerabilities have
    been reported in recent weeks in glibc. Since glibc updates generally
    address all the problems, rather than one specific problem, the update
    report for them has been combined. For the original reports, check the
    January 18th, 2001, LWN Security Report under the topics "[76]glibc
    RESOLV_HOST_CONF preload vulnerability" and "[77]glibc local
    write/ld.so.cache preload vulnerability".
    
    This week's updates:
      * [78]Debian, both issues
        
    Previous updates:
      * [79]Red Hat, local write (January 18th)
      * [80]Slackware (January 18th)
      * [81]Debian, preload only, 2.2 not vulnerable, testing and devel
        trees are (January 18th)
      * [82]Red Hat, preload (January 18th)
      * [83]Immunix (January 25th)
      * [84]Linux-Mandrake (January 25th)
      * [85]Trustix (January 25th)
      * [86]Caldera (February 2nd)
      * [87]SuSE (February 2nd)
      * [88]Conectiva (February 8th)
      * [89]Immunix, updated packages (the originally released updates did
        not fix the problem) (February 8th)
      * [90]Turbolinux (February 22nd)
        
    Borland InterBase backdoor.
    Check the [91]January 18th LWN Security Summary for the initial
    report. This is the first related advisory we've seen, but note that
    InterBase is not shipped by default with most distributions.
    
      * [92]FreeBSD
        
    GNU CFEngine format string vulnerability.
    Root access can be obtained on a local system by exploiting CFEngine's
    use of syslog and its related format string vulnerability. Check the
    [93]October 5th LWN Security Summary for more details.
    
    This week's updates:
      * [94]FreeBSD
        
    Previous updates:
      * [95]SuSE (October 12th, 2000)
      * [96]Linux-Mandrake (October 19th, 2000)
      * [97]NetBSD (November 2nd, 2000)
        
    esound tmpfile link vulnerability.
    Check the [98]September 7th LWN Security Summary for the original
    report of this problem from FreeBSD.
    
    This week's updates:
      * [99]Slackware, (changelog, 2001/3/10)
        
    Previous updates:
      * [100]FreeBSD (September 7th, 2000)
      * [101]Linux-Mandrake (September 28th, 2000)
      * [102]Red Hat (October 12th, 2000)
      * [103]SuSE (October 12th, 2000)
      * [104]Immunix (October 12th, 2000)
      * [105]Debian (not vulnerable) (October 12th, 2000)
      * [106]Kondara (November 9th, 2000)
        
 Resources
 
    Minor Bastille testing update. [107]Bastille Linux 1.2.0.pre11 was
    released this week, the latest in the testing series for this
    distribution.
    
    KNARK rootkit analysis. Toby Miller has made available his
    [108]analysis of the KNARK rootkit. "In the past if a box had a
    rootkit installed, an administrator could comb through the binaries
    and find traces of the rootkit. Not so in this case. The KNARK rootkit
    actually hides within the kernel making this rootkit almost impossible
    to find and analyze. How is this being done? Well, attackers are able
    to do this by using Loadable Kernel Modules (LKM)."
    
 Events
 
    Registration for the 2001 FIRST Conference now open. Registration for
    this year's FIRST conference is [109]now open. The conference will
    take place June 17-22, 2001, in Toulouse, France.
    
    Upcoming security events.
    
    Date Event Location
    March 26-29, 2001. [110]Distributed Object Computing Security Workshop
    Annapolis, Maryland, USA.
    March 27-28, 2001. [111]eSecurity Boston, MA, USA.
    March 28-30, 2001. [112]CanSecWest/core01 Network Security Training
    Conference Vancouver, British Columbia, Canada.
    March 29, 2001. [113]Security of e-Finance and e-Commerce Forum Series
    Manhattan, New York, USA.
    March 30-April 1, 2001. [114]@LANta.CON Doraville, GA, USA.
    April 6-8, 2001. [115]Rubi Con 2001 Detroit, MI, USA.
    April 8-12, 2001. [116]RSA Conference 2001 San Francisco, CA, USA.
    April 20-22, 2001. [117]First annual iC0N security conference
    Cleveland, Ohio, USA.
    April 22-25, 2001. [118]Techno-Security 2001 Myrtle Beach, SC, USA.
    April 24-26, 2001. [119]Infosecurity Europe 2001 London, Britain, UK.
    May 13-16, 2001. [120]2001 IEEE Symposium on Security Oakland, CA,
    USA.
    May 13-16, 2001. [121]CHES 2001 Paris, France.
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [122]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [123]lwn@lwn.net.
    
    Section Editor: [124]Liz Coolbaugh
    March 15, 2001
    
                               [125]Click Here 
    Secure Linux Projects [126]Bastille Linux
    [127]Immunix
    [128]Nexus
    [129]SLinux [130]NSA Security-Enhanced
    [131]Trustix
    Security List Archives
    [132]Bugtraq Archive
    [133]Firewall Wizards Archive
    [134]ISN Archive
    Distribution-specific links
    [135]Caldera Advisories
    [136]Conectiva Updates
    [137]Debian Alerts
    [138]Kondara Advisories
    [139]Esware Alerts
    [140]LinuxPPC Security Updates
    [141]Mandrake Updates
    [142]Red Hat Errata
    [143]SuSE Announcements
    [144]Yellow Dog Errata
    BSD-specific links
    [145]BSDi
    [146]FreeBSD
    [147]NetBSD
    [148]OpenBSD
    Security mailing lists [149]Caldera
    [150]Cobalt
    [151]Conectiva
    [152]Debian
    [153]Esware
    [154]FreeBSD
    [155]Kondara
    [156]LASER5
    [157]Linux From Scratch
    [158]Linux-Mandrake
    [159]NetBSD
    [160]OpenBSD
    [161]Red Hat
    [162]Slackware
    [163]Stampede
    [164]SuSE
    [165]Trustix
    [166]turboLinux
    [167]Yellow Dog
    Security Software Archives
    [168]munitions
    [169]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [170]CERT
    [171]CIAC
    [172]Comp Sec News Daily
    [173]Crypto-GRAM
    [174]LinuxLock.org
    [175]Linux Security Audit Project
    [176]LinuxSecurity.com
    [177]OpenSSH
    [178]OpenSEC
    [179]Security Focus
    [180]SecurityPortal
    
    
                                                         [181]Next: Kernel
    
    [182]Eklektix, Inc. Linux powered! Copyright Л 2001 [183]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
    3. http://lwn.net/2001/0315/
    4. http://lwn.net/2001/0315/kernel.php3
    5. http://lwn.net/2001/0315/dists.php3
    6. http://lwn.net/2001/0315/desktop.php3
    7. http://lwn.net/2001/0315/devel.php3
    8. http://lwn.net/2001/0315/commerce.php3
    9. http://lwn.net/2001/0315/press.php3
   10. http://lwn.net/2001/0315/announce.php3
   11. http://lwn.net/2001/0315/history.php3
   12. http://lwn.net/2001/0315/letters.php3
   13. http://lwn.net/2001/0315/bigpage.php3
   14. http://lwn.net/2001/0308/security.php3
   15.
 http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO58542,00.html?
 &_ref=1103801518
   16. http://www.kb.cert.org/vuls/id/498440
   17. http://www.faqs.org/rfcs/rfc1948.html
   18. http://www.securityfocus.com/templates/headline.html?id=10694
   19.
 http://www.computerworld.com/cwi/story/0,1199,NAV47-74-213-1720_STO58474,00.htm
   20. http://www.zdnet.com/smartbusinessmag/stories/all/0,6605,2688765,00.html
   21. http://www.m-o-o-t.org/
   22. http://lwn.net/2001/0315/a/sec-icecast.php3
   23. http://www.icecast.org/
   24. http://lwn.net/2001/0125/security.php3#icecast
   25. http://lwn.net/2001/0315/a/fb-icecast.php3
   26. http://lwn.net/2001/0315/a/deb-xaw.php3
   27. http://lwn.net/2001/0315/a/deb-sgml-tools.php3
   28. http://lwn.net/2001/0315/a/deb-slrn-20010309.php3
   29. http://lwn.net/2001/0315/a/deb-slrn-20010309.php3
   30. http://lwn.net/2001/0315/a/lm-slrn.php3
   31. http://lwn.net/2001/0315/a/zope-hotfix.php3
   32. http://lwn.net/2001/0315/a/cald-imap.php3
   33. http://lwn.net/2001/0315/a/deb-mailx.php3
   34. http://freshmeat.net/projects/mesa/
   35. http://lwn.net/2001/0315/a/lm-mesa.php3
   36. http://mesa3d.sourceforge.net/news.html
   37. http://lwn.net/2001/0315/a/lm-mesa.php3
   38. http://lwn.net/2001/0315/a/fb-timed.php3
   39. http://lwn.net/2001/0315/a/fb-rwhod.php3
   40. http://sourceforge.net/projects/ftpfs
   41. http://lwn.net/2001/0315/a/sec-ftpfs.php3
   42. http://freshmeat.net/releases/43224/
   43. http://lwn.net/2001/0308/security.php3#eperl
   44. http://lwn.net/2001/0315/a/lm-eperl.php3
   45. http://lwn.net/2001/0308/a/deb-eperl.php3
   46. http://lwn.net/2001/0308/security.php3#mc
   47. http://www.securityfocus.com/bid/2016
   48. http://www.slackware.com/changelog/current.php?cpu=i386
   49. http://lwn.net/2001/0308/a/deb-mc.php3
   50. http://lwn.net/2001/0315/a/zope-zclasses.php3
   51. http://lwn.net/2001/0301/security.php3#zope
   52. http://lwn.net/2001/0315/a/deb-zope-20010309.php3
   53. http://lwn.net/2001/0301/a/rh-2001-021-06.php3
   54. http://lwn.net/2001/0301/a/lm-zope.php3
   55. http://lwn.net/2001/0308/a/con-zope.php3
   56. http://lwn.net/2001/0301/security.php3#joe2
   57. http://lwn.net/2001/0315/a/deb-joe-20010309.php3
   58. http://lwn.net/2001/0308/a/rh-joe.php3
   59. http://lwn.net/2001/0308/a/imm-joe.php3
   60. http://lwn.net/2001/0308/a/lm-joe.php3
   61. http://lwn.net/2001/0301/security.php3#sudo
   62. http://lwn.net/2001/0315/a/lm-sudo2.php3
   63. http://lwn.net/2001/0301/a/sl-sudo.php3
   64. http://lwn.net/2001/0301/a/trustix-sudo.php3
   65. http://lwn.net/2001/0301/a/conectiva-sudo.php3
   66. http://lwn.net/2001/0301/a/lm-sudo.php3
   67. http://lwn.net/2001/0301/a/debian-sudo.php3
   68. http://lwn.net/2001/0301/a/immunix-sudo.php3
   69. http://lwn.net/2001/0308/a/deb-sudo.php3
   70. http://lwn.net/2001/0208/security.php3#xemacs/gnuserv
   71. http://www.securityfocus.com/bid/2333
   72. http://lwn.net/2001/0315/a/deb-xemacs-20010309.php3
   73. http://lwn.net/2001/0208/a/lm-xemacs.php3
   74. http://lwn.net/2001/0208/a/rh-xemacs.php3
   75. http://lwn.net/2001/0208/a/rhp-xemacs.php3
   76. http://lwn.net/2001/0118/security.php3#glibc5
   77. http://lwn.net/2001/0118/security.php3#glibc6
   78. http://lwn.net/2001/0315/a/deb-glibc-20010309.php3
   79. http://lwn.net/2001/0118/a/rh-glibc-2001001-5.php3
   80. http://lwn.net/2001/0118/a/slware-glibc-2001001-5.php3
   81. http://www.debian.org/News/weekly/2001/3/mail#1
   82. http://lwn.net/2001/0118/a/rh.2001-02-03.php3
   83. http://lwn.net/2001/0125/a/im-2000-70-029-01.php3
   84. http://lwn.net/2001/0125/a/lm-2001-012.php3
   85. http://lwn.net/2001/0125/a/trustix-0122.php3
   86. http://lwn.net/2001/0201/a/cal-CSSA-2001-007.0.php3
   87. http://lwn.net/2001/0201/a/suse-SuSE-SA-2001-01.php3
   88. http://lwn.net/2001/0208/a/con-glibc.php3
   89. http://lwn.net/2001/0208/a/im-glibc-2001-62-001-01.php3
   90. http://lwn.net/2001/0222/a/tl-glibc.php3
   91. http://lwn.net/2001/0118/security.php3#interbase
   92. http://lwn.net/2001/0315/a/fb-interbase.php3
   93. http://lwn.net/2000/1005/security.php3#cfd
   94. http://lwn.net/2001/0315/a/fb-cfengine.php3
   95. http://lwn.net/2000/1012/a/su-cfengine.php3
   96. http://lwn.net/2000/1019/a/lm-cfengine.php3
   97. http://lwn.net/2000/1102/a/sec-netbsd-cfengine.php3
   98. http://lwn.net/2000/0907/security.php3#esound
   99. http://www.slackware.com/changelog/current.php?cpu=i386
  100. http://lwn.net/2000/0907/a/fb-esound.php3
  101. http://lwn.net/2000/0928/a/lm-esound.php3
  102. http://lwn.net/2000/1012/a/rh-esound.php3
  103. http://lwn.net/2000/1012/a/su-esound.php3
  104. http://lwn.net/2000/1012/a/im-esound.php3
  105. http://lwn.net/2000/1012/a/db-esound.php3
  106. http://lwn.net/2000/1109/a/sec-kondara-esound.php3
  107. http://freshmeat.net/releases/42935/
  108.
 http://www.securityfocus.com/templates/forum_message.html?forum=2&head=4871&id=4
 871
  109. http://lwn.net/2001/0315/a/sec-first.php3
  110. http://www.omg.org/news/meetings/docsec2001/
  111. http://www.intmedgrp.com/security/sec01bs/overview.html
  112. http://www.dursec.com/conference.html
  113. http://www.ists.dartmouth.edu/iria/events/ebizforum.html
  114. http://www.atlantacon.org/
  115. http://www.rubi-con.org/
  116. http://www.rsasecurity.com/conference/rsa2001/index2.html
  117. http://lwn.net/2001/0208/a/iC0N.php3
  118. http://www.techsec.com/html/Conferences.html
  119. http://www.infosec.co.uk/page.cfm
  120. http://www.ieee-security.org/TC/sp2001.html
  121. http://www.ece.wpi.edu/Research/crypt/ches/start.html
  122. http://securityfocus.com/calendar
  123. mailto:lwn@lwn.net
  124. mailto:lwn@lwn.net
  125. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
  126. http://bastille-linux.sourceforge.net/
  127. http://www.immunix.org/
  128. http://Nexus-Project.net/
  129. http://www.slinux.org/
  130. http://www.nsa.gov/selinux/
  131. http://www.trustix.com/
  132. http://www.securityfocus.com/bugtraq/archive/
  133. http://www.nfr.net/firewall-wizards/
  134. http://www.jammed.com/Lists/ISN/
  135. http://www.calderasystems.com/support/security/
  136. http://www.conectiva.com.br/atualizacoes/
  137. http://www.debian.org/security/
  138. http://www.kondara.org/errata/k12-security.html
  139. http://www.esware.com/actualizaciones.html
  140. http://linuxppc.org/security/advisories/
  141. http://www.linux-mandrake.com/en/fupdates.php3
  142. http://www.redhat.com/support/errata/index.html
  143. http://www.suse.de/security/index.html
  144. http://www.yellowdoglinux.com/resources/errata.shtml
  145. http://www.BSDI.COM/services/support/patches/
  146. http://www.freebsd.org/security/security.html
  147. http://www.NetBSD.ORG/Security/
  148. http://www.openbsd.org/security.html
  149. http://www.calderasystems.com/support/forums/announce.html
  150. http://www.cobalt.com/support/resources/usergroups.html
  151. http://distro.conectiva.com.br/atualizacoes/
  152. http://www.debian.org/MailingLists/subscribe
  153. http://www.esware.com/lista_correo.html
  154. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  155. http://www.kondara.org/mailinglist.html.en
  156. http://l5web.laser5.co.jp/ml/ml.html
  157. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  158. http://www.linux-mandrake.com/en/flists.php3
  159. http://www.netbsd.org/MailingLists/
  160. http://www.openbsd.org/mail.html
  161. http://www.redhat.com/mailing-lists/
  162. http://www.slackware.com/lists/
  163. http://www.stampede.org/mailinglists.php3
  164. http://www.suse.com/en/support/mailinglists/index.html
  165. http://www.trustix.net/support/
  166. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  167. http://lists.yellowdoglinux.com/ydl_updates.shtml
  168. http://munitions.vipul.net/
  169. http://www.zedz.net/
  170. http://www.cert.org/nav/alerts.html
  171. http://ciac.llnl.gov/ciac/
  172. http://www.MountainWave.com/
  173. http://www.counterpane.com/crypto-gram.html
  174. http://linuxlock.org/
  175. http://lsap.org/
  176. http://linuxsecurity.com/
  177. http://www.openssh.com/
  178. http://www.opensec.net/
  179. http://www.securityfocus.com/
  180. http://www.securityportal.com/
  181. http://lwn.net/2001/0315/kernel.php3
  182. http://www.eklektix.com/
  183. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://lwn.net/2001/0315/security.php3   Sergey Lentsov   15 Mar 2001 18:11:20 
Архивное /ru.linux/203082477f3c5.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional