|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 12 Apr 2001 17:11:22 To : All Subject : URL: http://lwn.net/2001/0412/security.php3 -------------------------------------------------------------------------------- [1][LWN Logo] [2]Click Here [LWN.net] Sections: [3]Main page Security [4]Kernel [5]Distributions [6]On the Desktop [7]Development [8]Commerce [9]Linux in the news [10]Announcements [11]Linux History [12]Letters [13]All in one big page See also: [14]last week's Security page. Security News and Editorials Adore those kernel modules. It seems highly likely the name of the Adore worm was chosen partially because it provides opportunity for so many humorous headlines and off-hand comments. However, there are a couple of points about the Adore worm that did not come to light before we published last week. The most important point is that the Adore worm, unlike the Ramen and Lion worms of which it was considered to be a variant, is the first worm to [15]use a loadable Linux kernel module to hide its tracks. We've been discussing the security impact of loadable kernel modules for some time. For example, in June of 2000, when a loadable kernel module (capcheck) was released in order to close a security vulnerability in the kernel (the 2.2 capability bug). This fix demonstrated the scope of loadable kernel modules, making it pretty much inevitable that rootkits such as [16]Knark and now the Adore worm would make use of them on behalf of attackers. Further back than that, though, we also discussed how the ability to load kernel modules could be disabled on a running system, by removing CAP_SYS_MODULE from the capability bounding set (see the [17]December 2nd, 1999 Kernel Page) for instructions and caveats). Although root has the ability to remove capabilities, only init has the ability to add them. This means that loadable kernel modules can be used initially, when your system is booted, but then they can be disabled, preventing root kits like Knark and worms like Adore from using loadable kernel modules to cover their tracks. This was considered something that only the most security-conscious sites would be interested in back in 1999. Nowadays, it is a configuration option that may want to be seriously considered by Linux distributors, particularly those that are marketing themselves as secure by default. Cybercrime Treaty. A commentary on the [18]International Treaty on Cybercrime from a lawyer's perspective marvels at the lack of attention paid to this bill, which could have enormous implications in terms of requiring law enforcement agencies, phone companies, ISPs and more to comply with evidence orders from nations all around the world. "One moment, an Internet provider might be turning over all Bulgarian folk songs on its system to an investigator. The next moment, it might be searching for e-mail traffic between customers in Latvia and the Ukraine". Federal Computer Incident Response Center contracts out. The Federal Computer Incident Response Center is currently supported by a contract with [19]CERT. According to [20]this report, that will soon change. Day-to-day operations will, instead, be performed by Science Applications International Corp. ([21]SAIC) and its partner Global Integrity Information Security. "The two companies proved their effectiveness during the 'ILOVEYOU' e-mail virus from the Philippines in May 2000. They were able to inform their customer, the Financial Services Information Sharing and Analysis Center, about the virus and how to counteract it hours before even the Defense Department could spread the word to the United States". PGP Security's NAI Labs Partner With NSA. NAI Labs, a division of PGP Security, announced [22]they are joining with the National Security Agency (NSA) and its other partners to further develop the NSA's Security-Enhanced Linux (SELinux) prototype. The $1.2 million deal will be paid over the life of the two-year contract, and the work will focus on research and development to improve the security of open-source operating system platforms Security Reports ntp remotely exploitable static buffer overflow. An exploit for a static buffer overflow in the Network Time Protocol (ntp) was published on April 4th. This exploit can allow a remote attacker to crash the ntp daemon and possibly execute arbitrary commands on the host. Patches and new packages to fix this problem came out quickly. It is recommended that you upgrade your ntp package immediately. If you cannot, disabling the service until you can is a good idea. For more details and links to related posts, check BugTraq ID [23]2540. This week's updates: * [24]Caldera * [25]Conectiva * [26]Debian * [27]Debian, original patch to ntp introduced a potential denial-of-service problem, fixed in new updates to ntp. * [28]Engarde * [29]Immunix * [30]Linux-Mandrake * [31]NetBSD * [32]Progeny * [33]Red Hat * [34]Slackware * [35]SuSE * [36]Trustix Netscape 4.76 GIF comment vulnerability. Florian Wesch discovered that Netscape 4.76 would display the comment attached to a GIF file, but does not filter the displayed comment in any manner, allowing embedded javascript in a comment to be directly executed. This is apparently fixed as of Netscape 4.77, which is available for download from ftp.netscape.com. * [37]Red Hat IP Filter fragment caching vulnerability. IP Filter is a TCP/IP packet filter used in FreeBSD, NetBSD and OpenBSD. Darren Reed reported a [38]serious vulnerability in IPFilter in which fragment caching can be used to pass through any packet, essentially destroying the function of the firewall. When matching fragments, only the source IP address, destination IP address and IP identification number are checked before the fragment cache is used. This is done before any rules are checked. [39]IP Filter 3.4.17 has been released with a fix for the problem. Check BugTraq ID [40]2545 for additional details. Multiple FTP daemon globbing vulnerability. The FTP daemons used on BSD (and other Unix) systems have been reported vulnerable to [41]multiple buffer overflows in glob() function. Check the related [42]CERT advisory for more details. * [43]NetBSD web scripts. The following web scripts were reported to contain vulnerabilities: * [44]talkback.cgi, a cgi script from [45]Way to the Web, is reported to contain a file disclosure vulnerability that can be used to view any file on the host. An [46]updated version of the script has been released. * The perl script [47]nph-maillist.pl, part of a web-based email list generator, does not filter input sufficiently and can be used to execute arbitrary commands. An exploit has been published; no vendor response so far. * [48]Ultimate Bulletin Board (UBB) Version 5.47e, an older and currently supported version of UBB, has been reported to be vulnerable to a password bypass vulnerability in its forum. This can allow an attacker to gain access to any message on the forum, regardless of membership privilege or password requirements. An upgrade to Ultimate Bulletin Board 6.01 should to fix the problem. Commercial products. The following commercial products were reported to contain vulnerabilities: * Multiple vulnerabilities have been reported in [49]Alcatel ADSL-Ethernet bridge devices, the most serious of which include both a cryptographic challenge back-door and the ability to remotely load new firmware, potentially including firmware containing sniffers or other attack software. No workaround or fix has been reported so far, nor any vendor response. Check the related [50]CERT advisory for more details. Here is another [51]related posting. * The [52]Caucho Technology Resin webserver is reported to contain a JavaBean disclosure vulnerability. Resin is a commercial product released under a Developer Source license, meaning that, although development use is free, a license is required to deploy a product that includes or is developed with Resin. This vulnerability allows read access to any known JavaBean file residing on a host running Resin. No fix for this has yet been reported. * Cisco has reported that their [53]Content Services (CSS) switch, also known as Arrowpoint, in older releases contains a security vulnerability that can allow a non-privileged user to escalate their privilege level. Free software upgrades are offered to resolve the problem. * The [54]Watchguard Firebox II has been reported vulnerable to a denial-of-service attack when subject to bursts of specific malformed packets. The vendor has released an update. * The [55]BinTec X4000 Router is reported to be vulnerable to a denial-of-service vulnerability because a SYN portscan will cause a lockup. Workarounds for the problem have been posted and include feedback from Bintec. * A denial-of-service vulnerability has been reported in the [56]PIX Firewall 5.1. Cisco is working on the problem, but having difficulties recreating it. Updates ptrace/execve/procfs race condition in the Linux kernel 2.2.18. Exploits were released the week of [57]March 29th for a [58]ptrace/execve/procfs race condition in the Linux kernel 2.2.18. As a result, an upgrade to Linux 2.2.19 is recommended. Last week, Alan Cox put up the [59]Linux 2.2.19 release notes, finally giving the specifics on all the security-related fixes in 2.2.19 (all thirteen of them!) and giving credit to the [60]Openwall project and Chris Evans, for the majority of the third-party testing and auditing work that turned up these bugs. Fixes for the same bugs have also been ported forward into the 2.4.X kernel series. This week's updates: * [61]Trustix * [62]Progeny * [63]Progeny, advisory updated due to error in update instructions. Previous updates: * [64]Immunix (March 29th) * [65]Linux 2.2.19 release notes * [66]Caldera, 2.2.19 security fixes (April 5th) backported to 2.2.10 and 2.2.14, the kernels used in various Caldera products VIM statusline Text-Embedded Command Execution Vulnerability. A security problem was reported in VIM [67]last week where VIM codes could be maliciously embedded in files and then executed in vim-enhanced or vim-X11. Check BugTraq ID [68]2510 for more details. This week's updates: * [69]SuSE * [70]Caldera Previous updates: * [71]Red Hat (March 29th) * [72]Linux-Mandrake (March 29th) * [73]Immunix (April 5th) mailx buffer overflow. Check the [74]March 15th LWN Security Summary for the original report. The buffer overflow is only exploitable if the program is shipped setgid mail. This week's updates: * [75]Progeny, setgid bit removed Previous updates: * [76]Debian, setgid bit removed mc binary execution vulnerability. Check the [77]March 8th LWN Security Summary or [78]BugTraq ID 2016 for more details. This week's updates: * [79]SuSE Previous updates: * [80]Debian (March 8th) * [81]Slackware (changelog, 2001/3/10) joe file handling vulnerability. Check the [82]March 1st LWN Security Summary for the initial report. This week's updates: * [83]Slackware (from the Changelog, updated April 10th) Previous updates: * [84]Red Hat (March 8th) * [85]Immunix (March 8th) * [86]Linux-Mandrake (March 8th) * [87]Debian (March 15th) * [88]SuSE (March 29th) Multiple vulnerabilities in splitvt. Multiple vulnerabilities were reported in splitvt in the [89]January 18th LWN Security Summary, including several buffer overflows and a format string vulnerability. An upgrade to splitvt 1.6.5 should resolve the problems. This week's updates: * [90]Slackware (from the Changelog, updated April 10th) Previous updates: * [91]Debian (January 25th) * [92]Debian, updated advisory due to package mixup (January 25th) pico symbolic link vulnerability. Check the [93]December 14th, 2000 LWN Security Summary for the initial report of this problem. Note that this has also been reported as a [94]pine vulnerability, but the vulnerable component is still pico, not pine. Check BugTraq ID [95]2097 for more details. This is the first distribution update we've seen for this four-month-old vulnerability. This week's update: * [96]Red Hat Resources Trustix Secure Linux 1.4.80. Trustix has [97]announced the release of Trustix Secure Linux 1.4.80, a beta release toward the 1.5 stable version. It is nicknamed "Ooops," and is incompatible with 1.2 in a number of ways; read the announcement closely. Lion Internet Worm Analysis. Max Vision has posted [98]his analysis of the Lion worm and the three variants of it that have been identified so far. (Thanks to Jose Nazario). Security Focus announces Malware Repository. Security Focus announced this week that they will be maintaining [99]a repository of malware samples in order to make such software readily available for analysis. "Initially, the page will contain samples for Ramen, Lion, and Adore, plus anything else that comes out between now and then. We will be maintaining copies of new items from now on, and will not be making an attempt to go back in time to get a complete collection, unless someone wants to volunteer a personal collection". Bastille Linux 1.2.0rc1. Bastille Linux has [100]version 1.2.0rc1, the first release candidate for their upcoming 1.2.0 release. This version is considered stable enough for use on production systems. Detecting Loadable Kernel Modules (LKM). Toby Miller has posted a paper on [101]detecting loadable kernel modules. It goes over the basics of loadable kernel modules, /lib/modules, conf.modules and kstat. Linux Security Module mailing list. Crispin Cowan has announced a new mailing list called [102]linux-security-module. "The charter is to design, implement, and maintain suitable enhancements to the LKM to support a reasonable set of security enhancement packages. The prototypical module to be produced would be to port the POSIX Privs code out of the kernel and make it a module. An essential part of this project will be that the resulting work is acceptable for the mainline Linux kernel" Events Upcoming Security Events. Date Event Location April 12, 2001 [103]RSA Conference 2001 San Francisco, CA, USA April 17 - 18, 2001 [104]E-Security Conference New York City, NY, USA April 20 - 22, 2001 [105]First annual iC0N security conference Cleveland, Ohio, USA April 22 - 25, 2001 [106]Techno-Security 2001 Myrtle Beach, SC, USA April 24 - 26, 2001 [107]Infosecurity Europe 2001 London, Britain, UK May 13 - 16, 2001 [108]2001 IEEE Symposium on Security Oakland, CA, USA May 13 - 16, 2001 [109]CHES 2001 Paris, France May 29, 2001 [110]Security of Mobile Multiagent Systems(SEMAS-2001) Montreal, Canada May 31 - June 1, 2001 [111]The first European Electronic Signatures Summit London, England, UK June 1 - 3, 2001 [112]Summercon 2001 Amsterdam, Netherlands June 4 - 8, 2001 [113]TISC 2001 Los Angeles, CA, USA June 5 - 6, 2001 [114]2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop United States Military Academy, Westpoint, New York, USA June 11 - 12, 2001 [115]7th Annual Information Security Conference: Securing the Infocosm: Security, Privacy and Risk Orlando, FL, USA. For additional security-related events, included training courses (which we don't list above) and events further in the future, check out Security Focus' [116]calendar, one of the primary resources we use for building the above list. To submit an event directly to us, please send a plain-text message to [117]lwn@lwn.net. Section Editor: [118]Liz Coolbaugh April 12, 2001 [119]Click Here Secured Distributions: [120]Engarde Secure Linux [121]Immunix [122]Nexus [123]SLinux [124]NSA Security Enhanced [125]Trustix Security List Archives [126]Bugtraq Archive [127]Firewall Wizards Archive [128]ISN Archive Distribution-specific links [129]Caldera Advisories [130]Conectiva Updates [131]Debian Alerts [132]Kondara Advisories [133]Esware Alerts [134]LinuxPPC Security Updates [135]Mandrake Updates [136]Red Hat Errata [137]SuSE Announcements [138]Yellow Dog Errata BSD-specific links [139]BSDi [140]FreeBSD [141]NetBSD [142]OpenBSD Security mailing lists [143]Caldera [144]Cobalt [145]Conectiva [146]Debian [147]Esware [148]FreeBSD [149]Kondara [150]LASER5 [151]Linux From Scratch [152]Linux-Mandrake [153]NetBSD [154]OpenBSD [155]Red Hat [156]Slackware [157]Stampede [158]SuSE [159]Trustix [160]turboLinux [161]Yellow Dog Security Software Archives [162]munitions [163]ZedZ.net (formerly replay.com) Miscellaneous Resources [164]CERT [165]CIAC [166]Comp Sec News Daily [167]Crypto-GRAM [168]LinuxLock.org [169]Linux Security Audit Project [170]LinuxSecurity.com [171]OpenSSH [172]OpenSEC [173]Security Focus [174]SecurityPortal [175]Next: Kernel [176]Eklektix, Inc. Linux powered! Copyright Л 2001 [177]Eklektix, Inc., all rights reserved Linux (R) is a registered trademark of Linus Torvalds References Visible links 1. http://lwn.net/ 2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012 3. http://lwn.net/2001/0412/ 4. http://lwn.net/2001/0412/kernel.php3 5. http://lwn.net/2001/0412/dists.php3 6. http://lwn.net/2001/0412/desktop.php3 7. http://lwn.net/2001/0412/devel.php3 8. http://lwn.net/2001/0412/commerce.php3 9. http://lwn.net/2001/0412/press.php3 10. http://lwn.net/2001/0412/announce.php3 11. http://lwn.net/2001/0412/history.php3 12. http://lwn.net/2001/0412/letters.php3 13. http://lwn.net/2001/0412/bigpage.php3 14. http://lwn.net/2001/0405/security.php3 15. http://lwn.net/2001/0412/a/adoremodule.php3 16. http://www.securityfocus.com/templates/forum_message.html?forum=2&head=4871&id=4 871 17. http://lwn.net/1999/1202/kernel.php3 18. http://www.law.com/cgi-bin/nwlink.cgi?ACG=ZZZD3WRL5LC 19. http://www.cert.org/ 20. http://www.fcw.com/fcw/articles/2001/0402/web-saic-04-05-01.asp 21. http://www.saic.com/ 22. http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=104&STORY=/www/story/04-09-200 1/0001464825&EDATE= 23. http://www.securityfocus.com/bid/2540 24. http://lwn.net/2001/0412/a/cald-ntpd.php3 25. http://lwn.net/2001/0412/a/con-xntp.php3 26. http://lwn.net/2001/0412/a/deb-ntp.php3 27. http://lwn.net/2001/0412/a/db-ntp-2.php3 28. http://lwn.net/2001/0412/a/engarde-xntp.php3 29. http://lwn.net/2001/0412/a/im-ntp-xntp3.php3 30. http://lwn.net/2001/0412/a/lm-ntp-xntp3.php3 31. http://lwn.net/2001/0412/a/nb-ntp.php3 32. http://lwn.net/2001/0412/a/progeny-ntpd.php3 33. http://lwn.net/2001/0412/a/rh-xntp.php3 34. http://lwn.net/2001/0412/a/sl-xntp.php3 35. http://lwn.net/2001/0412/a/suse-xntp.php3 36. http://lwn.net/2001/0412/a/trustix-xntp.php3 37. http://lwn.net/2001/0412/a/rh-netscape.php3 38. http://lwn.net/2001/0412/a/ipfilter.php3 39. http://freshmeat.net/releases/45473/ 40. http://www.securityfocus.com/bid/2545 41. http://lwn.net/2001/0412/a/ftpglob.php3 42. http://lwn.net/2001/0412/a/cert-ftpglob.php3 43. http://lwn.net/2001/0412/a/nb-ftp.php3 44. http://lwn.net/2001/0412/a/talkback.php3 45. http://www.waytotheweb.com/webscripts/talkback.htm 46. http://www.waytotheweb.com/webscripts/talkback.htm 47. http://lwn.net/2001/0412/a/nphmaillist.php3 48. http://www.securityfocus.com/bid/2546 49. http://lwn.net/2001/0412/a/alcatel.php3 50. http://lwn.net/2001/0412/a/cert-alcatel.php3 51. http://lwn.net/2001/0412/a/alcatel2.php3 52. http://www.securityfocus.com/bid/2533 53. http://lwn.net/2001/0412/a/cisco-arrowpoint.php3 54. http://lwn.net/2001/0412/a/watchguarddos.php3 55. http://lwn.net/2001/0412/a/bintec2.php3 56. http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1% 26tid%3D175489%26fromthread%3D0%26threads%3D1%26start%3D2001-04-08%26end%3D2001- 04-14%26 57. http://lwn.net/2001/0329/security.php3#kernelptrace 58. http://securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26ti d%3D172196%26fromthread%3D0%26threads%3D1%26start%3D2001-03-25%26end%3D2001-03-3 1%26 59. http://www.linux.org.uk/VERSION/relnotes.2219.html 60. http://www.openwall.com/ 61. http://lwn.net/2001/0412/a/trustix-kernel.php3 62. http://lwn.net/2001/0412/a/progeny-ptrace.php3 63. http://lwn.net/2001/0412/a/progeny-ptrace2.php3 64. http://lwn.net/2001/0329/a/im-kernel.php3 65. http://www.linux.org.uk/VERSION/relnotes.2219.html 66. http://lwn.net/2001/0405/a/caldera-backport.php3 67. http://lwn.net/2001/0329/security.php3#vim 68. http://www.securityfocus.com/bid/2510 69. http://lwn.net/2001/0412/a/suse-vim.php3 70. http://lwn.net/2001/0412/a/cald-vim.php3 71. http://lwn.net/2001/0329/a/rh-vim.php3 72. http://lwn.net/2001/0329/a/lm-vim.php3 73. http://lwn.net/2001/0405/a/im-vim.php3 74. http://lwn.net/2001/0315/security.php3#mailx 75. http://lwn.net/2001/0412/a/progeny-mailx.php3 76. http://lwn.net/2001/0412/a/deb-mailx.php3 77. http://lwn.net/2001/0308/security.php3#mc 78. http://www.securityfocus.com/bid/2016 79. http://lwn.net/2001/0412/a/suse-mc.php3 80. http://lwn.net/2001/0308/a/deb-mc.php3 81. http://www.slackware.com/changelog/current.php?cpu=i386 82. http://lwn.net/2001/0301/security.php3#joe2 83. ftp://ftp.slackware.com/pub/slackware/slackware-current/ChangeLog.txt 84. http://lwn.net/2001/0308/a/rh-joe.php3 85. http://lwn.net/2001/0308/a/imm-joe.php3 86. http://lwn.net/2001/0308/a/lm-joe.php3 87. http://lwn.net/2001/0315/a/deb-joe-20010309.php3 88. http://lwn.net/2001/0329/a/suse-joe.php3 89. http://lwn.net/2001/0118/security.php3#splitvt 90. ftp://ftp.slackware.com/pub/slackware/slackware-current/ChangeLog.txt 91. http://lwn.net/2001/0125/a/deb-splitvt.php3 92. http://lwn.net/2001/0125/a/deb-DSA-014-2.php3 93. http://lwn.net/2000/1214/security.php3#pico 94. http://www.securityfocus.com/archive/1/150150 95. http://www.securityfocus.com/bid/2097 96. http://lwn.net/2001/0412/a/rh-pine.php3 97. http://lwn.net/2001/0412/a/trustix-oops.php3 98. http://whitehats.com/library/worms/lion/ 99. http://lwn.net/2001/0412/a/malware.php3 100. http://freshmeat.net/releases/45074/ 101. http://members.prestige.net/tmiller12/papers/lkm.htm 102. http://lwn.net/2001/0412/a/linux-security-module.php3 103. http://www.rsasecurity.com/conference/rsa2001/index2.html 104. http://www.esecurityexpo.com/mainmenu.asp 105. http://lwn.net/2001/0208/a/iC0N.php3 106. http://www.techsec.com/html/Conferences.html 107. http://www.infosec.co.uk/page.cfm 108. http://www.ieee-security.org/TC/sp2001.html 109. http://www.ece.wpi.edu/Research/crypt/ches/start.html 110. http://www.dfki.de/~kuf/semas/ 111. http://www.iqpc.com/cgi-bin/templates/98485262029583740234300003/genevent.html?e vent=1525&topic= 112. http://www.summercon.org/announcements/ 113. http://www.tisc2001.com/ 114. http://www.itoc.usma.edu/Workshop/2001/Workshop2001.htm 115. http://www.gartner.com/IndexHomePage.jsp?landPage=/2_events/conferences_briefing s/conferences/sec7.jsp 116. http://securityfocus.com/calendar 117. mailto:lwn@lwn.net 118. mailto:lwn@lwn.net 119. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity 120. http://www.engardelinux.org/ 121. http://www.immunix.org/ 122. http://Nexus-Project.net/ 123. http://www.slinux.org/ 124. http://www.nsa.gov/selinux/ 125. http://www.trustix.com/ 126. http://www.securityfocus.com/bugtraq/archive/ 127. http://www.nfr.net/firewall-wizards/ 128. http://www.jammed.com/Lists/ISN/ 129. http://www.calderasystems.com/support/security/ 130. http://www.conectiva.com.br/atualizacoes/ 131. http://www.debian.org/security/ 132. http://www.kondara.org/errata/k12-security.html 133. http://www.esware.com/actualizaciones.html 134. http://linuxppc.org/security/advisories/ 135. http://www.linux-mandrake.com/en/fupdates.php3 136. http://www.redhat.com/support/errata/index.html 137. http://www.suse.de/security/index.html 138. http://www.yellowdoglinux.com/resources/errata.shtml 139. http://www.BSDI.COM/services/support/patches/ 140. http://www.freebsd.org/security/security.html 141. http://www.NetBSD.ORG/Security/ 142. http://www.openbsd.org/security.html 143. http://www.calderasystems.com/support/forums/announce.html 144. http://www.cobalt.com/support/resources/usergroups.html 145. http://distro.conectiva.com.br/atualizacoes/ 146. http://www.debian.org/MailingLists/subscribe 147. http://www.esware.com/lista_correo.html 148. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL 149. http://www.kondara.org/mailinglist.html.en 150. http://l5web.laser5.co.jp/ml/ml.html 151. http://www.linuxfromscratch.org/services/mailinglistinfo.php 152. http://www.linux-mandrake.com/en/flists.php3 153. http://www.netbsd.org/MailingLists/ 154. http://www.openbsd.org/mail.html 155. http://www.redhat.com/mailing-lists/ 156. http://www.slackware.com/lists/ 157. http://www.stampede.org/mailinglists.php3 158. http://www.suse.com/en/support/mailinglists/index.html 159. http://www.trustix.net/support/ 160. http://www.turbolinux.com/mailman/listinfo/tl-security-announce 161. http://lists.yellowdoglinux.com/ydl_updates.shtml 162. http://munitions.vipul.net/ 163. http://www.zedz.net/ 164. http://www.cert.org/nav/alerts.html 165. http://ciac.llnl.gov/ciac/ 166. http://www.MountainWave.com/ 167. http://www.counterpane.com/crypto-gram.html 168. http://linuxlock.org/ 169. http://lsap.org/ 170. http://linuxsecurity.com/ 171. http://www.openssh.com/ 172. http://www.opensec.net/ 173. http://www.securityfocus.com/ 174. http://www.securityportal.com/ 175. http://lwn.net/2001/0412/kernel.php3 176. http://www.eklektix.com/ 177. http://www.eklektix.com/ Hidden links: 178. http://lwn.net/2000/0622/ --- ifmail v.2.14.os7-aks1 * Origin: Unknown (2:4615/71.10@fidonet) Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/203083d9b6543.html, оценка из 5, голосов 10
|