Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   01 Mar 2001  18:11:19
 To : All
 Subject : URL: http://lwn.net/2001/0301/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]On the Desktop
     [7]Development
     [8]Commerce
     [9]Linux in the news
     [10]Announcements
     [11]Linux History
     [12]Letters
    [13]All in one big page
    
    See also: [14]last week's Security page.
    
 Security
 
 News and Editorials
 
    Vulnerability Reporting: Bugs in the bug reporting process (CORE-SDI).
    [15]Volume 3, Issue 3 of Insight a newsletter from The Internet
    Security Conference, contains a column by Ivan Arce, Founder and
    Chairman of the Board of CORE-SDI, which discusses the problems in the
    current ad-hoc process for reporting security vulnerabilities. The
    column uses a detailed list of the steps possibly involved in a given
    security report, then outlines many of the ways in which that process
    can break down. Near the end, he recommends a simplified set of
    guidelines:
    
      The guidelines: A feeble attempt at improving the process 
      
      (1) Vulnerability reporting costs money: Keep it simple and
      everybody wins.
      
      All the involved parties (discoverer, proxy, vendor, trusted third
      party, user) must invest a certain amount of effort to fix bugs.
      All parties have finite resources and therefore it costs them
      money. Streamlining the process and addressing the problems in a
      responsible and timely fashion reduces the efforts for all parties.
      
      (2) Communication is key.
      
      The best way to streamline the process and ensure cooperation is to
      maintain every party informed of what is going on. When that fails,
      unilateral actions take place that could put all at risk.
      
      (3) Minimize harm.
      
      Conduct all activities bearing in mind that the end goal is to
      improve the overall security and minimize the harm to all parties.
      Although this sounds obvious, the ultimate goal can be obscured
      during the process, evaluate your actions accordingly.
      
      Extend the benefit of doubt, do not impute motives.
      
    From here, though, he goes on to end with a recommendation to
    "formalize and implement a vulnerability reporting process". That
    opens many cans of worms, in terms of who is involved in "formalizing"
    such a process and, once formalized, what are the penalties for
    non-conformance? The "who" is mentioned at the beginning of the
    article, which was inspired by discussions at SafeNet2000, an
    invitation-only gathering sponsored by Microsoft that was held last
    December. Apparently as a result of that gathering, work to formalize
    the process is already underway. Neither the sponsor nor the
    invitation-only nature of that gathering recommend it to us.
    
    The article does a good job of showing why the ideal process of
    reporting vulnerabilities will always be impacted by reality
    (insufficient resources, poor vendor response, multiple discoverers,
    active exploits, etc.), in short, why a formalized process will always
    tend to break down. Add to that the danger of allowing a closed
    (invitation-only) group to define, implement and potentially enforce a
    formal process and it seems like we might end up exchanging one set of
    problems for a less-appealing set.
    
    Starting and ending with the simple guidelines suggested seems like a
    better idea.
    
    WEP: No weapon against hackers (ZDNet). You might assume that [16]this
    latest ZDNet article on WEP was also talking about the cryptographic
    issues with WEP, which have been mentioned in the last couple of
    weeks. You'd be wrong. Instead, it looks at the issue of keeping
    trespassers off of your wireless LAN. "Controlling access to wireless
    networks is an increasingly difficult challenge for network
    administrators. Unlimited access means that anyone with a wireless
    network card could gain access to the network. On the other hand,
    highly restricted access negates the benefits of going wireless and
    annoys the users."
    
    More SSH articles. For those still with stamina to handle more
    editorial coverage of the SSH trademark issue, C|Net's Robert Lemos
    has written an article entitled, "[17]Ssh! Don't use that trademark".
    "'Regardless of its origins, the word has become the generic
    description for this type of software,' said Michael Bednarek, an
    intellectual property attorney at Washington, D.C.-based law firm Shaw
    Pittman. 'As far as I can tell, there is no other name for it.'"
    
 Security Reports
 
    Security hole in Java may expose servers (News.com).
    Sun has issued a warning that [18]a bug in Java Runtime Environments
    for multiple platforms, including Linux, may allow an attacker to run
    harmful programs on a server, though client systems running browsers
    should be unaffected.
    
    Linux-Mandrake security advisory for CUPS.
    Linux-Mandrake has issues a [19]security advisory for the CUPS
    printing packages. An internal audit found buffer overflow and
    temporary file creation problems. It is highly recommended that all
    Linux-Mandrake users upgrade to this new version of CUPS.
    
    sudo buffer overflow.
    A buffer overflow in Sudo, apparently discovered [20]by Chris Wilson,
    has been fixed in the [21]just-released sudo 1.6.3p6.
    
      * [22]Slackware
      * [23]Trustix
        
      * [24]Conectiva
      * [25]Linux-Mandrake
        
      * [26]Debian
      * [27]Immunix
                                       
    Zope security update.
    Digital Creations has released [28]a security update to Zope (all
    versions up to 2.3b1) fixing a security vulnerability in how ZClasses
    are handled. An upgrade is recommended.
    
      * [29]Red Hat
      * [30]Linux-Mandrake
        
    elm alternate folder buffer overflow.
    A [31]buffer overflow in elm 2.5 PL3 was demonstrated this week. It
    can be exploited by passing a long string in via the "-f" option. No
    patch or updated version has yet been reported. Check BugTraq ID
    [32]2403 for more details.
    
    PHP-Nuke magic quotes vulnerability.
    A [33]new vulnerability in PHP-Nuke was reported this week which can
    allow any user to execute commands with the privileges of the PHP-Nuke
    administrator. This occurs because magic_quotes_gpc is expected to be
    enabled; if it is disabled, then information continues to be read even
    after a NULL character is seen. An upgrade to PHP-Nuke 4.4.1 will fix
    the problem. Note, however, that any PHP script that expects Magic
    Quotes to be enabled could have this same problem. Here is a
    [34]recommended tip to prevent such problems.
    
    joe file handling vulnerability.
    The configuration file for the joe editor, .joerc, is read first from
    the current directory, if available, making it possible to [35]trick
    users into executing commands if they edit/open a file in a directory
    with a malicious .joerc file installed. No workaround/vendor solution
    has been posted yet, though theoretically a patch should be fairly
    easy to implement, by removing the check for the configuration file in
    the local directory and restricting the file to the user's home
    directory or the appropriate system directory.
    
    An [36]informal report indicates that FreeBSD and NetBSD are
    vulnerable to this, but that OpenBSD is not. No Linux-specific reports
    have been posted.
    
    Slackware IMAP exploit. A short note in the slackware-current
    changelog commented that [37]all previous versions of imapd (which is
    installed by default for Slackware distributions) had a remote exploit
    problem. This was slightly puzzling to us, since we hadn't heard of a
    new imapd vulnerability and Slackware [38]issued an update for imapd
    in November that fixed the most recent vulnerability that we knew of.
    
    Wednesday, though, an update to the Slackware Changelog cleared up the
    confusion:
    
      Tue Feb 27 15:31:05 PST 2001
      n1/imapd.tgz: No, the package wasn't changed. But, there's an
      update regarding the supposed imapd overflow. It was reported to us
      that an exploit existed for the version of imapd previously used by
      Slackware, but after obtaining a copy of the exploit from this
      site: http://packetstorm.securify.com/0102-exploits/imapd_exploit.c
      ...we found it to be completely ineffective. Still, it never hurts
      to keep daemons that provide network services as up-to-date as
      possible, so if you're running imapd you should consider upgrading.
      
    web scripts.
    The following cgi-bin scripts were reported to contain
    vulnerabilities:
      * [39]Mailnews.cgi is reported to contain a user-supplied input
        vulnerability, which can be exploited to remotely execute
        arbitrary shell commands. No patch or vendor response has been
        reported so far.
      * [40]Adlibrary.pm, a perl-based package from Adcycle.com, is
        reported to contain a vulnerability that can be exploited remotely
        to execute arbitrary commands. This is due to insufficient
        screening of user input. No patch or vendor response has been
        reported so far.
        
    Commercial products.
    The following commercial products were reported to contain
    vulnerabilities:
      * [41]Marconi ASX-1000, a commercial ATM switch, is reported to
        contain a vulnerability that can be used to disable remote
        administration of the device (until it is power-cycled). No patch
        or vendor response has been reported so far.
      * [42]Cisco IOS Software contains an SNMP Read-Write ILMI Community
        String vulnerability, which might make the device using the
        software vulnerable to a denial-of-service attack. Cisco is
        offering free updates to fix the problem.
      * A second [43]Cisco IOS Software vulnerability report details
        multiple vulnerabilities related to the unexpected creation and
        exposure of SNMP community strings. They can be exploited to
        permit unauthorized viewing or modification of devices. Specific
        workarounds are provided, along with a table of related updates.
      * [44]Chili!Soft responded to several recently discussed
        vulnerabilities in Chili!Soft ASP. In some cases, workarounds are
        offered; in others, it is promised that they will be addressed in
        the next release.
      * Shortly after the above Chili!Soft note was posted, Jim Sander
        responded with yet an additional vulnerability, in which the
        [45]Chili!Soft ASP license file, installed by default as a
        world-readable and writable file, can be removed by any user,
        causing the Chili!soft services to stop functioning.
      * [46]The APC web/snmp management card, available as an option for
        some APC products (power management), contains a potential
        denial-of-service attack via a telnet connection to the card. APC
        has responded by recommending that the APC product should be
        firewalled to protect it from connections from outside the local
        area network.
      * The [47]Netscape Collabra Server has been reported to be
        vulnerable to a denial-of-service attack via malicious packets
        sent to the 119, 5238, 5239 and 20749 ports. Filtering those ports
        is recommended; no vendor response has been seen so far.
        
 Updates
 
    Analog buffer overflow.
    An exploitable buffer overflow in analog was reported in the
    [48]February 22nd LWN Security Summary. Version 4.16 contains a fix
    for the problem, which affects all earlier versions.
    
    This week's updates:
      * [49]Red Hat
        
    Multiple vulnerabilities in bind 8.2.2 and bind 4.
    Check the [50]February 1st LWN Security Summary for the initial
    reports. Bind 8.2.3 contains fixes for the problems with 8.2.2. Bind 4
    fixes are also available, but an upgrade to bind 8 or even bind 9 is
    generally considered a preferable approach.
    
    This week's updates:
      * [51]Turbolinux
        
    Previous updates:
    
      * [52]Caldera Systems (February 1st)
      * [53]Conectiva (February 1st)
      * [54]Debian (February 1st)
      * [55]Linux-Mandrake (February 1st)
      * [56]Immunix (February 1st)
      * [57]Red Hat (February 1st)
      * [58]Slackware (February 1st)
      * [59]SuSE (February 1st)
        
      * [60]Trustix (February 1st)
      * [61]Yellow Dog Linux (February 1st)
      * [62]LinuxPPC (February 8th)
      * [63]FreeBSD (February 8th)
      * [64]Cobalt bind 8.2.3 (for the RaQ2 only) (February 8th)
      * [65]Cobalt bind 4 (for the Qube1, RaQ1 and Qube2) (February 8th)
      * [66]NetBSD (February 15th)
                                       
    Sendmail 8.11.2 security fixes.
    Check the [67]January 4th LWN Security Summary for the announcement of
    the release of sendmail 8.11.2. It includes fixes for a number of
    security issues found after 8.11.1 was released, including the
    "sendmail -bt negative index bug" reported by Michal Zalewski in
    October, 2000. Note that the exploitability of this bug was
    questioned, but in any case, it has been fixed as of sendmail 8.11.2.
    
    This week's updates:
      * [68]Turbolinux
        
    dump-0.4b15 local root access.
    Check the [69]November 2nd LWN Security Summary for the original
    report. This exploit only affects dump/restore if they are installed
    setuid root. As of dump-0.4b18, dump and restore no longer require
    setuid root. dump 0.4b20 was released in mid-November, 2000, with a
    fix for this problem.
    
    This week's updates:
      * [70]Immunix
        
    Previous updates:
      * [71]Red Hat 5.x and 6.x (Red Hat 7.0 not vulnerable) (November
        9th, 2000)
      * [72]Linux-Mandrake (not vulnerable) (November 9th, 2000)
      * [73]Trustix (November 9th, 2000)
      * [74]Conectiva (not vulnerable) (November 9th, 2000)
      * [75]Kondara (November 9th, 2000)
      * [76]SuSE, not vulnerable (November 16th, 2000)
        
    Format string vulnerabilities in PHP.
    Check the [77]October 19th LWN Security Summary for the original
    report. PHP 3.0.17 and 4.0.3 contain the fixes for these problems.
    
    This week's updates:
      * [78]Immunix
        
    Previous updates:
      * [79]Debian (October 19th, 2000)
      * [80]Caldera (October 19th, 2000)
      * [81]Linux-Mandrake (October 19th, 2000)
      * [82]Conectiva (October 19th, 2000)
      * [83]Red Hat (October 26th, 2000)
      * [84]Immunix (October 26th, 2000)
      * [85]FreeBSD (November 23rd, 2000)
      * [86]Red Hat, Alpha packages added for RH7 (November 30th, 2000)
        
    LPRng format string vulnerability.
    Check the [87]September 28, 2000 LWN Security section for the first
    report of format string vulnerabilities in LPRng and lpr.
    
    This week's updates:
      * [88]Immunix, lpr
        
    Previous updates:
      * [89]Turbolinux
      * [90]Caldera, LPRng (September 28th)
      * [91]Red Hat, LPRng (October 5th)
      * [92]Red Hat, lpr (October 5th)
      * [93]Immunix, lpr (October 5th)
      * [94]Linux-Mandrake, lpr (October 12th)
      * [95]Conectiva, lpr (October 12th)
      * [96]SuSE, LPRng (not vulnerable) (October 12th)
      * [97]Trustix, LPRng (October 12th)
        
 Resources
 
    OpenSSH 2.5.1p2. A new, minor update to the portable version of
    OpenSSH 2.5.1p2 [98]has been announced. The new version primarily
    contains bug-fixes, none of them specific to any security problem, but
    the upgrade is still recommended, possibly in particular to its
    bug-fixes for PAM failures seen on Linux (and Solaris) systems.
    
 Events
 
    Upcoming security events.
    
    Date Event Location
    March 3-6, 2001. [99]EICAR and Anti-Malware Conference Munich,
    Germany.
    March 26-29, 2001. [100]Distributed Object Computing Security Workshop
    Annapolis, Maryland, USA.
    March 27-28, 2001. [101]eSecurity Boston, MA, USA.
    March 28-30, 2001. [102]CanSecWest/core01 Network Security Training
    Conference Vancouver, British Columbia, Canada.
    March 29, 2001. [103]Security of e-Finance and e-Commerce Forum Series
    Manhattan, New York, USA.
    March 30-April 1, 2001. [104]@LANta.CON Doraville, GA, USA.
    April 6-8, 2001. [105]Rubi Con 2001 Detroit, MI, USA.
    April 8-12, 2001. [106]RSA Conference 2001 San Francisco, CA, USA.
    April 20-22, 2001. [107]First annual iC0N security conference
    Cleveland, Ohio, USA.
    April 22-25, 2001. [108]Techno-Security 2001 Myrtle Beach, SC, USA.
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [109]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [110]lwn@lwn.net.
    
    Section Editor: [111]Liz Coolbaugh
    March 1, 2001
    
                               [112]Click Here 
    Secure Linux Projects [113]Bastille Linux
    [114]Immunix
    [115]Nexus
    [116]SLinux [117]NSA Security-Enhanced
    [118]Trustix
    Security List Archives
    [119]Bugtraq Archive
    [120]Firewall Wizards Archive
    [121]ISN Archive
    Distribution-specific links
    [122]Caldera Advisories
    [123]Conectiva Updates
    [124]Debian Alerts
    [125]Kondara Advisories
    [126]Esware Alerts
    [127]LinuxPPC Security Updates
    [128]Mandrake Updates
    [129]Red Hat Errata
    [130]SuSE Announcements
    [131]Yellow Dog Errata
    BSD-specific links
    [132]BSDi
    [133]FreeBSD
    [134]NetBSD
    [135]OpenBSD
    Security mailing lists [136]Caldera
    [137]Cobalt
    [138]Conectiva
    [139]Debian
    [140]Esware
    [141]FreeBSD
    [142]Kondara
    [143]LASER5
    [144]Linux From Scratch
    [145]Linux-Mandrake
    [146]NetBSD
    [147]OpenBSD
    [148]Red Hat
    [149]Slackware
    [150]Stampede
    [151]SuSE
    [152]Trustix
    [153]turboLinux
    [154]Yellow Dog
    Security Software Archives
    [155]munitions
    [156]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [157]CERT
    [158]CIAC
    [159]Comp Sec News Daily
    [160]Crypto-GRAM
    [161]LinuxLock.org
    [162]Linux Security Audit Project
    [163]LinuxSecurity.com
    [164]OpenSSH
    [165]OpenSEC
    [166]Security Focus
    [167]SecurityPortal
    
    
                                                         [168]Next: Kernel
    
    [169]Eklektix, Inc. Linux powered! Copyright Л 2001 [170]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
    3. http://lwn.net/2001/0301/
    4. http://lwn.net/2001/0301/kernel.php3
    5. http://lwn.net/2001/0301/dists.php3
    6. http://lwn.net/2001/0301/desktop.php3
    7. http://lwn.net/2001/0301/devel.php3
    8. http://lwn.net/2001/0301/commerce.php3
    9. http://lwn.net/2001/0301/press.php3
   10. http://lwn.net/2001/0301/announce.php3
   11. http://lwn.net/2001/0301/history.php3
   12. http://lwn.net/2001/0301/letters.php3
   13. http://lwn.net/2001/0301/bigpage.php3
   14. http://lwn.net/2001/0222/security.php3
   15. http://tisc.corecom.com/newsletters/33.html
   16. http://www.zdnet.com/enterprise/stories/main/0,10228,2689916,00.html
   17. http://news.cnet.com/news/0-1003-201-4933417-0.html
   18. http://news.cnet.com/news/0-1003-201-4917560-0.html
   19. http://lwn.net/2001/0301/a/lm-MDKSA-2001-023.php3
   20. http://lwn.net/2001/0301/a/sec-sudo-credit.php3
   21. http://lwn.net/2001/0301/a/sec-sudo.php3
   22. http://lwn.net/2001/0301/a/sl-sudo.php3
   23. http://lwn.net/2001/0301/a/trustix-sudo.php3
   24. http://lwn.net/2001/0301/a/conectiva-sudo.php3
   25. http://lwn.net/2001/0301/a/lm-sudo.php3
   26. http://lwn.net/2001/0301/a/debian-sudo.php3
   27. http://lwn.net/2001/0301/a/immunix-sudo.php3
   28. http://lwn.net/2001/0301/a/zope-zclasses.php3
   29. http://lwn.net/2001/0301/a/rh-2001-021-06.php3
   30. http://lwn.net/2001/0301/a/lm-zope.php3
   31. http://lwn.net/2001/0301/a/elmoverflow.php3
   32. http://www.securityfocus.com/bid/2403
   33. http://lwn.net/2001/0301/a/phpnuke2.php3
   34. http://lwn.net/2001/0301/a/phptip.php3
   35. http://lwn.net/2001/0301/a/sec-joe.php3
   36. http://lwn.net/2001/0301/a/sec-joe-bsd.php3
   37. http://lwn.net/2001/0301/a/sl-imapd.php3
   38. http://lwn.net/2000/1123/security.php3#pine
   39. http://www.securityfocus.com/bid/2391
   40. http://www.securityfocus.com/bid/2393
   41. http://www.securityfocus.com/bid/2400
   42. http://lwn.net/2001/0301/a/cisco-ilmi.php3
   43. http://lwn.net/2001/0301/a/cisco-snmp.php3
   44. http://lwn.net/2001/0301/a/chilisoft.php3
   45. http://lwn.net/2001/0301/a/chilisoftlicense.php3
   46. http://lwn.net/2001/0301/a/apc.php3
   47. http://lwn.net/2001/0301/a/netsc-collabra.php3
   48. http://lwn.net/2001/0222/security.php3#web
   49. http://lwn.net/2001/0301/a/rh-analog.php3
   50. http://lwn.net/2001/0201/security.php3
   51. http://lwn.net/2001/0301/a/tl-bind.php3
   52. http://lwn.net/2001/0201/a/cald-bind.php3
   53. http://lwn.net/2001/0201/a/con-bind.php3
   54. http://lwn.net/2001/0201/a/deb-bind.php3
   55. http://lwn.net/2001/0201/a/lm-bind.php3
   56. http://lwn.net/2001/0201/a/immunix-bind.php3
   57. http://lwn.net/2001/0201/a/rh-bind.php3
   58. http://lwn.net/2001/0201/a/sl-bind.php3
   59. http://lwn.net/2001/0201/a/su-bind.php3
   60. http://lwn.net/2001/0201/a/trustix-bind.php3
   61. http://lwn.net/2001/0201/a/yd-bind.php3
   62. http://linuxppc.org/security/advisories/LPPCSA-2001-003-1.php3
   63. http://lwn.net/2001/0208/a/fb-bind-01-18.php3
   64. http://lwn.net/2001/0208/a/cbraq-bind.php3
   65. http://lwn.net/2001/0208/a/cbqube-bind.php3
   66. http://lwn.net/2001/0215/a/nb-bind.php3
   67. http://lwn.net/2001/0104/security.php3#sendmail
   68. http://lwn.net/2001/0301/a/tl-sendmail.php3
   69. http://lwn.net/2000/1102/security.php3#dump
   70. http://lwn.net/2001/0301/a/im-phpdumplpr.php3
   71. http://lwn.net/2000/1109/a/sec-rh-dump-upd.php3
   72. http://lwn.net/2000/1109/a/sec-lm-dump.php3
   73. http://lwn.net/2000/1109/a/sec-trustix-dump.php3
   74. http://lwn.net/2000/1109/a/sec-conectiva-dump.php3
   75. http://lwn.net/2000/1109/a/sec-kondara-dump.php3
   76. http://lwn.net/2000/1116/a/sec-suse-misc.php3
   77. http://lwn.net/2000/1019/security.php3#php
   78. http://lwn.net/2001/0301/a/im-phpdumplpr.php3
   79. http://lwn.net/2000/1019/a/deb-php3.php3
   80. http://lwn.net/2000/1019/a/cs-php3.php3
   81. http://lwn.net/2000/1019/a/lm-php3.php3
   82. http://lwn.net/2000/1019/a/con-php3.php3
   83. http://lwn.net/2000/1026/a/rh-apache.php3
   84. http://lwn.net/2000/1026/a/sec-im-apache.php3
   85. http://lwn.net/2000/1123/a/sec-freebsd-mod_php.php3
   86. http://lwn.net/2000/1130/a/sec-rh-apache.php3
   87. http://lwn.net/2000/0928/security.php3#lprng
   88. http://lwn.net/2001/0301/a/im-phpdumplpr.php3
   89. http://lwn.net/2001/0301/a/tl-lprng.php3
   90. http://lwn.net/2000/0928/a/sec-lprng.php3
   91. http://lwn.net/2000/1005/a/sec-lprng-rh.php3
   92. http://lwn.net/2000/1005/a/sec-lpr-rh.php3
   93. http://lwn.net/2000/1005/a/sec-lpr-immunix.php3
   94. http://lwn.net/2000/1012/a/sec-lpr-mandrake.php3
   95. http://lwn.net/2000/1012/a/sec-lpr-conectiva.php3
   96. http://lwn.net/2000/1012/a/su-lprng.php3
   97. http://lwn.net/2000/1012/a/tr-threefixes.php3
   98. http://lwn.net/2001/0301/a/openssh2.5.1p2.php3
   99. http://conference.eicar.org/
  100. http://www.omg.org/news/meetings/docsec2001/
  101. http://www.intmedgrp.com/security/sec01bs/overview.html
  102. http://www.dursec.com/conference.html
  103. http://www.ists.dartmouth.edu/iria/events/ebizforum.html
  104. http://www.atlantacon.org/
  105. http://www.rubi-con.org/
  106. http://www.rsasecurity.com/conference/rsa2001/index2.html
  107. http://lwn.net/2001/0208/a/iC0N.php3
  108. http://www.techsec.com/html/Conferences.html
  109. http://securityfocus.com/calendar
  110. mailto:lwn@lwn.net
  111. mailto:lwn@lwn.net
  112. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
  113. http://bastille-linux.sourceforge.net/
  114. http://www.immunix.org/
  115. http://Nexus-Project.net/
  116. http://www.slinux.org/
  117. http://www.nsa.gov/selinux/
  118. http://www.trustix.com/
  119. http://www.securityfocus.com/bugtraq/archive/
  120. http://www.nfr.net/firewall-wizards/
  121. http://www.jammed.com/Lists/ISN/
  122. http://www.calderasystems.com/support/security/
  123. http://www.conectiva.com.br/atualizacoes/
  124. http://www.debian.org/security/
  125. http://www.kondara.org/errata/k12-security.html
  126. http://www.esware.com/actualizaciones.html
  127. http://linuxppc.org/security/advisories/
  128. http://www.linux-mandrake.com/en/fupdates.php3
  129. http://www.redhat.com/support/errata/index.html
  130. http://www.suse.de/security/index.html
  131. http://www.yellowdoglinux.com/resources/errata.shtml
  132. http://www.BSDI.COM/services/support/patches/
  133. http://www.freebsd.org/security/security.html
  134. http://www.NetBSD.ORG/Security/
  135. http://www.openbsd.org/security.html
  136. http://www.calderasystems.com/support/forums/announce.html
  137. http://www.cobalt.com/support/resources/usergroups.html
  138. http://distro.conectiva.com.br/atualizacoes/
  139. http://www.debian.org/MailingLists/subscribe
  140. http://www.esware.com/lista_correo.html
  141. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  142. http://www.kondara.org/mailinglist.html.en
  143. http://l5web.laser5.co.jp/ml/ml.html
  144. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  145. http://www.linux-mandrake.com/en/flists.php3
  146. http://www.netbsd.org/MailingLists/
  147. http://www.openbsd.org/mail.html
  148. http://www.redhat.com/mailing-lists/
  149. http://www.slackware.com/lists/
  150. http://www.stampede.org/mailinglists.php3
  151. http://www.suse.com/en/support/mailinglists/index.html
  152. http://www.trustix.net/support/
  153. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  154. http://lists.yellowdoglinux.com/ydl_updates.shtml
  155. http://munitions.vipul.net/
  156. http://www.zedz.net/
  157. http://www.cert.org/nav/alerts.html
  158. http://ciac.llnl.gov/ciac/
  159. http://www.MountainWave.com/
  160. http://www.counterpane.com/crypto-gram.html
  161. http://linuxlock.org/
  162. http://lsap.org/
  163. http://linuxsecurity.com/
  164. http://www.openssh.com/
  165. http://www.opensec.net/
  166. http://www.securityfocus.com/
  167. http://www.securityportal.com/
  168. http://lwn.net/2001/0301/kernel.php3
  169. http://www.eklektix.com/
  170. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://lwn.net/2001/0301/security.php3   Sergey Lentsov   01 Mar 2001 18:11:19 
Архивное /ru.linux/2030837201523.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional