Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   21 Jun 2001  17:11:55
 To : All
 Subject : URL: http://lwn.net/2001/0621/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]On the Desktop
     [7]Development
     [8]Commerce
     [9]Linux in the news
     [10]Announcements
     [11]Linux History
     [12]Letters
    [13]All in one big page
    
    See also: [14]last week's Security page.
    
 Security
 
 News and Editorials
 
    The Danger of Allowing Users to Post Images. A major [15]discussion
    thread on BugTraq this week started when John Percival posted a note
    entitled [16]The Danger of Allowing Users to Post Images. With it, he
    included an exploit developed by Chris 'stallion' Lambert which could
    be used with almost any web script that uses cookie session/login data
    to validate CGI forms.
    
    Many such web scripts, including threaded discussion forums like
    Infopop's Ultimate Bulletin Board or ezboard allow users to post
    images to the forum. This means that they accept user input in the
    form of HTML-embedded references or URLs. They do not, however,
    necessarily check the input they receive to make sure it does not
    contain additional HTML commands, such as possible hostile
    query-strings. As a result, another user clicking on such as image may
    be unwittingly executing HTML commands. If such a user has additional
    privileges, such as a forum administrator, more damage can result.
    
    BugTraq ID [17]2871 addresses this issue and currently lists four
    affected applications: ezboard, Infopop's Ultimate Bulletin Board,
    VBulletin and WWWThreads. Fixes for Ultimate Bulletin Board and
    VBulletin have been made available. However, the basic issue is not
    specific to the applications, but just a demonstration that input
    verification vulnerabilities are extremely wide-spread in current
    web-based scripts. Time to take a look at your web scripts and look at
    how you are currently verifying the user input you receive,
    particularly if that input is in the form of HTML or other executable
    code.
    
    CRYPTO-GRAM Newsletter. Bruce Schneier's [18]CRYPTO-GRAM Newsletter
    for June is out. It covers a wide range of topics, including the
    grc.com attacks and the Honeynet project. "The results are
    fascinating. A random computer on the Internet is scanned dozens of
    times a day. The life expectancy of a default installation of Red Hat
    6.2 server, or the time before someone successfully hacks it, is less
    than 72 hours. A common home user setup, with Windows 98 and file
    sharing enabled, was hacked five times in four days. Systems are
    subjected to NetBIOS scans an average of 17 times a day. And the
    fastest time for a server being hacked: 15 minutes after plugging it
    into the network."
    
    One of the links inside this month's CRYPTO-GRAM is to [19]The Strange
    Tale of Denial of Service, an account by Steve Gibson of his research
    into the world of distributed denial-of-service attacks. In this case,
    the machines used to deploy the attacks were running Microsoft Windows
    operating systems, but the victims could be any machine. From his
    experiences, he learned that major ISPs were simply unwilling to take
    action in response to this type of problem, that the US Federal
    government has too many problems to handle and will not look at
    "small" problems, such as the disablement of a single site, and that
    age does indeed shield youthful offenders within the US from
    prosecution.
    
    To quote Steve, "We can not have a stable Internet economy while
    13-year-old children are free to deny arbitrary Internet services with
    impunity".
    
    Using a Cryptographic Hardware Token with Linux: the OpenSSL Project's
    New Engine (Linux Journal). Linux Journal's Paul Friburg takes a look
    at [20]using OpenSSL's new engine to provide support for
    digitally-signed emails using a hardware token. "Hardware tokens are
    nearly tamper proof and assure that the data are originating from a
    given Linux PC provided that the token is plugged into it. ... Sadly,
    the token we were requested to integrate, the Chrysalis-ITS Luna2 PC
    card, was not on the list of the three tokens implemented in the
    engine. This forced us to go under the hood of the OpenSSL engine
    code. ".
    
 Security Reports
 
    sysklogd denial-of-service vulnerability.
    Immunix reports that the Linux kernel logging daemon klogd distributed
    with the sysklogd is vulnerable to a denial-of-service attack because
    it will shut down if it receives a null byte in a log message from the
    Linux kernel. A patch to fix the problem is available.
      * [21]Immunix
    
    fetchmail buffer overflow.
    Wolfram Kleff reported a [22]buffer overflow in all versions of
    fetchmail. This is remotely exploitable and could lead to root access
    if fetchmail is run by root. An upgrade to fetchmail 5.8.6 will
    resolve the problem.
    
      * [23]Immunix
      * [24]Debian
      * [25]Conectiva
      * [26]Slackware, June 18th Changelog
        
    rxvt buffer overflow.
    Samuel "Zorgon" Dralet reported a [27]buffer overflow in rxvt which
    can be exploited to gain group utmp privileges on some systems, which
    could allow the utmp file to be modified. A patch is available to fix
    the problem.
      * [28]Debian
      * [29]Slackware, June 18th Changelog
      * [30]Linux-Mandrake
        
    man page source buffer overflow.
    zen-parse reported a [31]buffer overflow in man that, when manual
    pages begin with a '.so' statement, may be exploited to execute
    arbitrary code under the 'man' group id. No patch or update for man
    has been posted so far. For more details, check BugTraq ID [32]2872.
    
    MDBMS query display buffer overflow.
    teleh0r reported a [33]buffer overflow in [34]MDBMS, an SQL database
    server for Unix which provides source code and is free for
    non-commercial use. The buffer overflow can be exploited to execute
    arbitrary code. An [35]updated version is available, containing a fix
    for the problem.
    
    BSD ptrace race condition vulnerability.
    The version of ptrace shipped with NetBSD and OpenBSD has been
    reported to [36]contain a race condition which can be exploited to
    allow an unprivileged user to attach to a privileged process,
    elevating the attacker's privileges. OpenBSD has released patches to
    their kernel to resolve the problem; NetBSD has fixed the problem in
    their CVS tree.
    
    ghttp buffer overflow. The Gaztek HTTP daemon, [37]ghttpd, is a GPL'd
    HTTP server with a small memory footprint that is capable of handling
    "thousands of simultaneous connections". A [38]buffer overflow has
    been reported in version 1.4 that can be exploited by a remote
    attacker to run arbitrary code under the privileges of the ghttpd
    server. No fix for the problem has been reported so far.
    
    Proprietary products.
    The following proprietary products were reported to contain
    vulnerabilities:
      * [39]WatchGuard Firebox 2500 and 4500 boxes are reported to contain
        a vulnerability which makes it possible for an intruder to bypass
        SMTP checking using attachments encoded in base64. No vendor
        response has been reported so far.
      * [40]ScreamingMedia SiteWare versions 2.501 and earlier and 3.1 and
        earlier contain a file disclosure vulnerability. An upgrade to
        2.5.1 or 3.1.1 will apparent resolve the problem. BugTraq ID
        [41]2868.
      * cgiCentral's WebStore shopping cart software has been reported to
        contain two vulnerabilities which can be used together to allow an
        attacker to execute arbitrary commands on a system running
        Webstore. The two vulnerabilities are an [42]administrator
        authentication bypass vulnerability and an [43]arbitrary command
        execution vulnerability. A workaround for the command execution
        vulnerability has been posted, but no vendor response has been
        seen so far.
      * [44]The Cisco Node Route Processor 2 card has been reported to
        allow unauthorized telnet access in its default configuration. An
        upgrade to Cisco 6400 NRP2 12.1DC will resolve the problem.
      * [45]NetSQL, a light-weight SQL database server for Linux and
        Solaris, has been reported to [46]contain a remotely exploitable
        buffer overflow which can give an remote attacker root access on
        the server. No vendor response has been seen so far.
      * [47]Microburst uDirectory, a Perl CGI script, has been reported to
        contain an input validation error which can be exploited remotely
        to execute arbitrary commands on the host. No vendor response has
        been seen so far.
        
 Updates
 
    exim format string vulnerability.
    Check the [48]June 14th LWN Security Summary for the original report.
    
    This week's updates:
      * [49]Red Hat [Note, one user reported [50]problems with the Red Hat
        7.0 packages in this update].
        
    Previous updates:
      * [51]Debian (June 14th)
      * [52]Conectiva (June 14th)
        
    xinetd buffer overflow.
    Check the [53]June 14th LWN Security Summary for the initial report.
    The buffer overflow is in the ident logging portion of xinetd, so one
    workaround to the problem is to disable ident logging.
    
    This week's updates:
      * [54]Debian
      * [55]Conectiva
        
    xinetd default umask vulnerability.
    Check the [56]June 7th LWN Security Summary for the original report.
    Fixing the problem simply requires that the default umask for xinetd
    be set to 022 instead of 000. This is also covered in BugTraq ID
    [57]2826.
    
    This week's updates:
      * [58]Debian
      * [59]Conectiva
        
    Previous updates:
      * [60]Red Hat (June 7th)
      * [61]Linux-Mandrake (June 14th)
      * [62]Immunix (June 14th)
        
    OpenSSH tmplink vulnerability.
    Check the [63]June 7th LWN Security Summary for the initial report.
    This is also covered in BugTraq ID [64]2825.
    
    This week, [65]OpenSSH 2.9.p2 was released with a fix for the problem.
    
    ispell symbolic link vulnerabilities.
    Check the [66]June 7th LWN Security Summary for the original report.
    
    This week's updates:
      * [67]Linux-Mandrake
        
    Previous updates:
      * [68]Red Hat (June 7th)
      * [69]Debian, fixed in ispell-3.1.20-8, updated January 26, 2000.
        (June 14th)
        
    Webmin environment variable inheritance vulnerability. Check the
    [70]May 31st LWN Security Summary for the original report.
    
    This week's updates:
      * [71]Linux-Mandrake
        
    Previous updates:
      * [72]Caldera, disabling Webmin recommended, no updated packages
        available yet. (May 31st)
      * [73]Caldera, updated packages now available (June 7th)
        
    gnupg format string vulnerability.
    Check the [74]May 31st LWN Security Summary for the initial report.
    gnupg 1.0.5 and earlier are vulnerable; gnupg 1.0.6 contains a fix for
    this problem and an upgrade is recommended. Werner Koch also sent out
    [75]a note warning of minor build problems with gnupg 1.0.6 when
    compiled without gcc.
    
    This week's updates:
      * [76]Debian, official
        
    Previous updates:
      * [77]Engarde (May 31st)
      * [78]Progeny (May 31st)
      * [79]Linux-Mandrake (June 7th)
      * [80]Immunix (June 7th)
      * [81]Trustix (June 7th)
      * [82]SuSE (June 7th)
      * [83]Conectiva (June 14th)
      * [84]Red Hat (June 14th)
      * [85]Turbolinux (June 14th)
      * [86]Caldera (June 14th)
      * [87]Debian, unstable upgrade to 1.0.6 on May 29th. (June 14th)
        
    gnupg.
    [88]gnupg 1.0.5 was released on April 29th. Check the [89]May 3rd LWN
    Security Summary for details. An upgrade to 1.0.5 is recommended.
    
    This week's updates:
      * [90]Debian
        
    Previous updates:
      * [91]Linux-Mandrake (May 10th)
      * [92]Immunix (May 3rd)
      * [93]Red Hat (May 24th)
      * [94]Caldera (May 24th)
        
    Denial-of-service vulnerability in FTP server implementations.
    Check the [95]March 22nd LWN Security Summary for the original report.
    Affected FTP daemons include ProFTPd, NetBSD FTP, PureFTPd (to some
    variants of this attack), BeroFTPD, and FreeBSD FTP.
    
    This week's updates:
      * [96]Linux-Mandrake
        
    Previous updates:
      * [97]ProFTPd (workaround only) (March 22nd)
      * [98]ProFTPD 1.2.2rc1
        
    Apache directory listing error.
    Check the [99]March 8th LWN Security Summary for the initial report.
    Apache 1.3.18 and earlier are vulnerable; Apache 1.3.19 contains a fix
    for the problem. Note that this week is the first week where we've
    seen distribution updates for this problem, even though it was
    initially reported three months ago.
    
      * [100]Trustix
        
 Resources
 
    Bastille Linux 1.2. The Bastille Linux development team [101]announced
    the release of Bastille Linux 1.2, a hardening script for multiple
    Linux distributions.
    
    CryptoMail 0.90. The first public release of CryptoMail, [102]version
    0.90, was announced this week. CryptoMail is an end-to-end secure
    email system. MySQL, Apache and Sendmail are required in order to run
    the server. More information is available at
    [103]http://www.cryptomail.org.
    
 Events
 
    Upcoming Security Events.
    
    Date Event Location
    June 21 - 22, 2001 [104]13th Annual Computer Security Incident
    Handling Conference (FIRST 2001) Toulouse, France
    June 21, 2001 [105]PKI Forum Members Meeting (Kempinski Hotel Airport
    Munchen)Munich, Germany
    July 11 - 12, 2001 [106]Black Hat Briefings USA '01 Las Vegas, Nevada,
    USA.
    July 17, 2001 [107]The Open Group Security Forum briefing Austin,
    Texas
    August 6 - 10, 2001 [108]CERT Conference 2001 Omaha, NE, USA.
    August 7, 2001 [109]CIBC World Markets First Annual Security & Privacy
    Conference New York, NY, USA.
    August 13 - 17, 2001 [110]10th USENIX Security Symposium 2001
    Conference Washington, D.C.
    August 13 - 17, 2001 [111]HAL2001 Enschede, The Netherlands
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [112]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [113]lwn@lwn.net.
    
    Section Editor: [114]Liz Coolbaugh
    June 21, 2001
    
                               [115]Click Here 
    Secured Distributions:
    [116]Engarde Secure Linux
    [117]Immunix
    [118]Kaladix
    [119]Nexus
    [120]NSA Security Enhanced
    [121]Openwall GNU/Linux
    [122]SLinux
    [123]Trustix
    Security Projects
    [124]Bastille
    [125]Linux Security Audit Project
    [126]Linux Security Module
    [127]OpenSSH
    Security List Archives
    [128]Bugtraq Archive
    [129]Firewall Wizards Archive
    [130]ISN Archive
    Distribution-specific links
    [131]Caldera Advisories
    [132]Conectiva Updates
    [133]Debian Alerts
    [134]Kondara Advisories
    [135]Esware Alerts
    [136]LinuxPPC Security Updates
    [137]Mandrake Updates
    [138]Red Hat Errata
    [139]SuSE Announcements
    [140]Yellow Dog Errata
    BSD-specific links
    [141]BSDi
    [142]FreeBSD
    [143]NetBSD
    [144]OpenBSD
    Security mailing lists [145]Caldera
    [146]Cobalt
    [147]Conectiva
    [148]Debian
    [149]Esware
    [150]FreeBSD
    [151]Kondara
    [152]LASER5
    [153]Linux From Scratch
    [154]Linux-Mandrake
    [155]NetBSD
    [156]OpenBSD
    [157]Red Hat
    [158]Slackware
    [159]Stampede
    [160]SuSE
    [161]Trustix
    [162]turboLinux
    [163]Yellow Dog
    Security Software Archives
    [164]munitions
    [165]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [166]CERT
    [167]CIAC
    [168]Comp Sec News Daily
    [169]Crypto-GRAM
    [170]LinuxLock.org
    [171]LinuxSecurity.com
    [172]OpenSEC
    [173]Security Focus
    [174]SecurityPortal
    
    
                                                         [175]Next: Kernel
    
    [176]Eklektix, Inc. Linux powered! Copyright Л 2001 [177]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
    3. http://lwn.net/2001/0621/
    4. http://lwn.net/2001/0621/kernel.php3
    5. http://lwn.net/2001/0621/dists.php3
    6. http://lwn.net/2001/0621/desktop.php3
    7. http://lwn.net/2001/0621/devel.php3
    8. http://lwn.net/2001/0621/commerce.php3
    9. http://lwn.net/2001/0621/press.php3
   10. http://lwn.net/2001/0621/announce.php3
   11. http://lwn.net/2001/0621/history.php3
   12. http://lwn.net/2001/0621/letters.php3
   13. http://lwn.net/2001/0621/bigpage.php3
   14. http://lwn.net/2001/0614/security.php3
   15.
 http://securityfocus.com/frames/?content=/templates/archive.pike%3Ftid%3D192006%
 26start%3D2001-06-17%26fromthread%3D0%26threads%3D1%26list%3D1%26end%3D2001-06-2
 3%26
   16. http://www.securityfocus.com/archive/1/191114
   17. http://www.securityfocus.com/bid/2871
   18. http://lwn.net/2001/0621/a/crypto-gram.php3
   19. http://grc.com/dos/grcdos.htm
   20. http://noframes.linuxjournal.com/articles/style/0006.html
   21. http://lwn.net/2001/0621/a/im-sysklogd.php3
   22. http://www.securityfocus.com/bid/2877
   23. http://lwn.net/2001/0621/a/im-fetchmail.php3
   24. http://lwn.net/2001/0621/a/deb-fetchmail.php3
   25. http://lwn.net/2001/0621/a/con-fetchmail.php3
   26. http://www.slackware.com/changelog/current.php?cpu=i386
   27. http://www.securityfocus.com/bid/2878
   28. http://lwn.net/2001/0621/a/deb-rxvt.php3
   29. http://www.slackware.com/changelog/current.php?cpu=i386
   30. http://lwn.net/2001/0621/a/lm-rxvt.php3
   31. http://www.securityfocus.com/archive/1/190136
   32. http://www.securityfocus.com/bid/2872
   33. http://www.securityfocus.com/archive/1/190933
   34. http://www.hinttech.com/mdbms/
   35. http://www.hinttech.com/mdbms/download.html
   36. http://www.securityfocus.com/bid/2873
   37. http://www.gaztek.org/ghttpd/index.html
   38. http://www.securityfocus.com/bid/2879
   39. http://www.securityfocus.com/bid/2855
   40. http://www.securityfocus.com/bid/2869
   41. http://www.securityfocus.com/bid/
   42. http://www.securityfocus.com/bid/2860
   43. http://www.securityfocus.com/bid/2861
   44. http://www.securityfocus.com/bid/2874
   45. http://www.munica.com/webpak/
   46. http://www.securityfocus.com/bid/2885
   47. http://www.securityfocus.com/bid/2884
   48. http://lwn.net/2001/0614/security.php3#exim
   49. http://lwn.net/2001/0621/a/rh-exim.php3
   50. http://lwn.net/2001/0621/a/rh-exim-problems.php3
   51. http://lwn.net/2001/0614/a/deb-exim.php3
   52. http://lwn.net/2001/0614/a/con-exim.php3
   53. http://lwn.net/2001/0614/security.php3#xinetdbo
   54. http://lwn.net/2001/0621/a/deb-xinetd.php3
   55. http://lwn.net/2001/0621/a/con-xinetd.php3
   56. http://lwn.net/2001/0607/security.php3#xinetd
   57. http://www.securityfocus.com/bid/2826
   58. http://lwn.net/2001/0621/a/deb-xinetd.php3
   59. http://lwn.net/2001/0621/a/con-xinetd.php3
   60. http://lwn.net/2001/0607/a/rh-xinetd.php3
   61. http://lwn.net/2001/0614/a/lm-xinetd.php3
   62. http://lwn.net/2001/0614/a/im-xinetd.php3
   63. http://lwn.net/2001/0607/security.php3#opensshtmplink
   64. http://www.securityfocus.com/bid/
   65. http://freshmeat.net/releases/50683/
   66. http://lwn.net/2001/0607/security.php3#ispell
   67. http://lwn.net/2001/0621/a/lm-ispell.php3
   68. http://lwn.net/2001/0607/a/rh-ispell.php3
   69. http://lwn.net/2001/0614/a/db-ispell.php3
   70. http://lwn.net/2001/0531/security.php3#webmin
   71. http://lwn.net/2001/0621/a/lm-webmin.php3
   72. http://lwn.net/2001/0531/a/caldera-webmin.php3
   73. http://lwn.net/2001/0607/a/caldera-webmin.php3
   74. http://lwn.net/2001/0531/security.php3#gnupgformatstring
   75. http://lwn.net/2001/0607/a/gnupggcc.php3
   76. http://lwn.net/2001/0621/a/deb-gnupg.php3
   77. http://lwn.net/2001/0531/a/esl-gnupg.php3
   78. http://lwn.net/2001/0531/a/pr-gnupg.php3
   79. http://lwn.net/2001/0607/a/lm-gnupg.php3
   80. http://lwn.net/2001/0607/a/im-gnupg.php3
   81. http://lwn.net/2001/0607/a/trustix-gnupg.php3
   82. http://lwn.net/2001/0607/a/suse-gnupg.php3
   83. http://lwn.net/2001/0614/a/conectiva-gnupg.php3
   84. http://lwn.net/2001/0614/a/rh-gnupg.php3
   85. http://lwn.net/2001/0614/a/tl-gnupg.php3
   86. http://lwn.net/2001/0614/a/cald-gnupg.php3
   87. http://lwn.net/2001/0614/a/db-gnupg.php3
   88. http://www.gnupg.org/whatsnew.html#rn20010429
   89. http://lwn.net/2001/0503/security.php3#gnupg1.0.5
   90. http://lwn.net/2001/0621/a/deb-gnupg.php3
   91. http://lwn.net/2001/0510/a/lm-gnupg.php3
   92. http://lwn.net/2001/0503/a/im-gnupg.php3
   93. http://lwn.net/2001/0524/a/rh-gnupg.php3
   94. http://lwn.net/2001/0524/a/caldera-gnupg.php3
   95. http://lwn.net/2001/0322/security.php3#ftpds
   96. http://lwn.net/2001/0621/a/lm-proftpd.php3
   97. http://lwn.net/2001/0322/a/proftpd-dos.php3
   98. http://freshmeat.net/releases/44640/
   99. http://lwn.net/2001/0308/security.php3#apache
  100. http://lwn.net/2001/0621/a/trustix-apache.php3
  101. http://lwn.net/2001/0621/a/bastille-1.2.php3
  102. http://freshmeat.net/releases/50589/
  103. http://www.cryptomail.org/
  104. http://www.first.org/conference/2001/
  105. http://www.pkiforum.org/meetings/20010619/index.html
  106. http://www.blackhat.com/
  107. http://www.opengroup.org/austin2001/security_outline.htm
  108. http://www.certconf.org/
  109. http://www.cibcwm.com/eq/conference/security/
  110. http://www.usenix.org/events/sec2001
  111. http://www.hal2001.org/hal/01Home/index.html
  112. http://securityfocus.com/calendar
  113. mailto:lwn@lwn.net
  114. mailto:lwn@lwn.net
  115. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
  116. http://www.engardelinux.org/
  117. http://www.immunix.org/
  118. http://www.maganation.com/~kaladix/
  119. http://Nexus-Project.net/
  120. http://www.nsa.gov/selinux/
  121. http://www.openwall.com/Owl/
  122. http://www.slinux.org/
  123. http://www.trustix.com/
  124. http://www.bastille-linux.org/
  125. http://lsap.org/
  126. http://lsm.immunix.org/
  127. http://www.openssh.com/
  128. http://www.securityfocus.com/bugtraq/archive/
  129. http://www.nfr.net/firewall-wizards/
  130. http://www.jammed.com/Lists/ISN/
  131. http://www.calderasystems.com/support/security/
  132. http://www.conectiva.com.br/atualizacoes/
  133. http://www.debian.org/security/
  134. http://www.kondara.org/errata/k12-security.html
  135. http://www.esware.com/actualizaciones.html
  136. http://linuxppc.org/security/advisories/
  137. http://www.linux-mandrake.com/en/fupdates.php3
  138. http://www.redhat.com/support/errata/index.html
  139. http://www.suse.de/security/index.html
  140. http://www.yellowdoglinux.com/resources/errata.shtml
  141. http://www.BSDI.COM/services/support/patches/
  142. http://www.freebsd.org/security/security.html
  143. http://www.NetBSD.ORG/Security/
  144. http://www.openbsd.org/security.html
  145. http://www.calderasystems.com/support/forums/announce.html
  146. http://www.cobalt.com/support/resources/usergroups.html
  147. http://distro.conectiva.com.br/atualizacoes/
  148. http://www.debian.org/MailingLists/subscribe
  149. http://www.esware.com/lista_correo.html
  150. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  151. http://www.kondara.org/mailinglist.html.en
  152. http://l5web.laser5.co.jp/ml/ml.html
  153. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  154. http://www.linux-mandrake.com/en/flists.php3
  155. http://www.netbsd.org/MailingLists/
  156. http://www.openbsd.org/mail.html
  157. http://www.redhat.com/mailing-lists/
  158. http://www.slackware.com/lists/
  159. http://www.stampede.org/mailinglists.php3
  160. http://www.suse.com/en/support/mailinglists/index.html
  161. http://www.trustix.net/support/
  162. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  163. http://lists.yellowdoglinux.com/ydl_updates.shtml
  164. http://munitions.vipul.net/
  165. http://www.zedz.net/
  166. http://www.cert.org/nav/alerts.html
  167. http://ciac.llnl.gov/ciac/
  168. http://www.MountainWave.com/
  169. http://www.counterpane.com/crypto-gram.html
  170. http://linuxlock.org/
  171. http://linuxsecurity.com/
  172. http://www.opensec.net/
  173. http://www.securityfocus.com/
  174. http://www.securityportal.com/
  175. http://lwn.net/2001/0621/kernel.php3
  176. http://www.eklektix.com/
  177. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://lwn.net/2001/0621/security.php3   Sergey Lentsov   21 Jun 2001 17:11:55 
Архивное /ru.linux/203089ff5da92.html, оценка 3 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional