aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorCroatian Language Team <croatian>1999-11-09 17:36:35 +0000
committerCroatian Language Team <croatian>1999-11-09 17:36:35 +0000
commit2384e3d8bf7a3bf4dafee09dca6644b36eca5bde (patch)
tree4f78a3f48627feeef26935973ef12d18ceaf9971
parentcd96e71ae524c18c80e3a5dd34d5d2f24c18bc93 (diff)
Initial translation.
CVS version numbers croatian/security/1999/19990807.wml: INITIAL -> 1.1 croatian/security/1999/19990814.wml: INITIAL -> 1.1 croatian/security/1999/19990823.wml: INITIAL -> 1.1 croatian/security/1999/19990823a.wml: INITIAL -> 1.1 croatian/security/1999/19990823b.wml: INITIAL -> 1.1 croatian/security/1999/19990823c.wml: INITIAL -> 1.1 croatian/security/1999/19990830.wml: INITIAL -> 1.1 croatian/security/1999/19990907.wml: INITIAL -> 1.1 croatian/security/1999/19990924.wml: INITIAL -> 1.1
-rw-r--r--croatian/security/1999/19990807.wml27
-rw-r--r--croatian/security/1999/19990814.wml29
-rw-r--r--croatian/security/1999/19990823.wml27
-rw-r--r--croatian/security/1999/19990823a.wml19
-rw-r--r--croatian/security/1999/19990823b.wml16
-rw-r--r--croatian/security/1999/19990823c.wml17
-rw-r--r--croatian/security/1999/19990830.wml33
-rw-r--r--croatian/security/1999/19990907.wml43
-rw-r--r--croatian/security/1999/19990924.wml15
9 files changed, 226 insertions, 0 deletions
diff --git a/croatian/security/1999/19990807.wml b/croatian/security/1999/19990807.wml
new file mode 100644
index 00000000000..0eff0cb691a
--- /dev/null
+++ b/croatian/security/1999/19990807.wml
@@ -0,0 +1,27 @@
+<define-tag pagetitle>isdnutils</define-tag>
+<define-tag report_date>07. 08. 1999.</define-tag>
+<define-tag packages>isdnutils</define-tag>
+<define-tag description>Netočne dozvole za xmonisdn.</define-tag>
+<define-tag isvulnerable>no</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>xmonisdn je X aplikacija koja pokazuje stanje ISDN
+veza. Možete ju konfigurirati tako da pokreće dvije skripte na pritisak
+lijevog odnosno desnog gumba miša. xmonisdn je instaliran setuid root kako
+bi skripte mogle raditi stvari kao što je dodavanje i uklanjanje
+podrazumijevane rute. Međutim, iako je provjeravano je li root vlasnik
+skripti i jesu li one zaštićene od pisanja od strane grupe ili drugih
+korisnika, skripte su se pokretale funkcijom system(), koja pokreće ljusku.
+To znači da su skripte nezaštićene od napada mijenjanjem IFS-a i/ili PATH-a.
+<p>Međutim, setuid root više nije nužan jer ISDN sustav sada nudi druge
+načine spriječavanja spajanja osim mijenjanja mrežnih ruta. To može učiniti
+svatko tko može pristupiti /dev/isdnctrl0 i /dev/isdninfo. Na Debian
+sustavima ti uređaji su instalirani sa dozvolama za čitanje i pisanje za
+grupu dialout, pa ako xmonisdn pokrene netko iz grupe dialout, može izvršiti
+potrebne isdnctrl naredbe.</define-tag>
+
+#use wml::debian::security
+
+<dd>alpha: <a href=http://security.debian.org/dists/stable/updates/binary-alpha/isdnutils_3.0-12slink13_alpha.deb>http://security.debian.org/dists/stable/updates/binary-alpha/isdnutils_3.0-12slink13_alpha.deb</a></dd>
+<dd>i386: <a href=http://security.debian.org/dists/stable/updates/binary-i386/isdnutils_3.0-12slink13_i386.deb>http://security.debian.org/dists/stable/updates/binary-i386/isdnutils_3.0-12slink13_i386.deb</a></dd>
+<dd>m68k: <a href=http://security.debian.org/dists/stable/updates/binary-m68k/isdnutils_3.0-12slink13_m68k.deb>http://security.debian.org/dists/stable/updates/binary-m68k/isdnutils_3.0-12slink13_m68k.deb</a></dd>
+<dd>sparc: <a href=http://security.debian.org/dists/stable/updates/binary-sparc/isdnutils_3.0-12slink13_sparc.deb>http://security.debian.org/dists/stable/updates/binary-sparc/isdnutils_3.0-12slink13_sparc.deb</a></dd>
diff --git a/croatian/security/1999/19990814.wml b/croatian/security/1999/19990814.wml
new file mode 100644
index 00000000000..f2a7441d66e
--- /dev/null
+++ b/croatian/security/1999/19990814.wml
@@ -0,0 +1,29 @@
+<define-tag pagetitle>cfingerd</define-tag>
+<define-tag report_date>14. 08. 1999.</define-tag>
+<define-tag packages>cfingerd</define-tag>
+<define-tag description>Prisvajanje roota preko cfingerda.</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>Nađen je ozbiljan bug u cfingerdu prije verzije
+1.4.0. Prisutan je u svim verzijama cfingerda od 1.2.0 do 1.3.2. Uz
+odgovarajuću konfiguraciju, ovaj bug omogućava bilo kojem lokalnom korisniku
+izvršavanje bilo kojeg programa s root privilegijama.
+<p>Nema opasnosti ako ste isključili ALLOW_EXECUTION u svojoj cfingerd.conf
+datoteci, u dijelu "internal_config", tj. ako ta datoteka sadrži red
+"-ALLOW_EXECUTION".
+<p>To je predinstalirana konfiguracija ovog paketa. Ako koristite
+predinstaliranu cfingerd.conf datoteku kakva dolazi u distribuciji, nema
+opasnosti. Bez obzira na to, ipak nadogradite paket.
+<p>Sve verzije cfingerda prije 1.4.0 imaju ovu ranjivost. Rješenje iz 1.4.0
+je dodano u cfingerd 1.3.2-18.1 za slink, koji je dostupan na dolje
+navedenoj lokaciji.</define-tag>
+
+#use wml::debian::security
+
+<dd>Napomena: Ispravljeni paketi dolje su dostupni za Debian 2.1 (slink).
+cfingerd 1.4.0 je uključen u neobjavljeni Debian 2.2 (potato).</dd>
+<p>
+<dd>alpha: <a href=http://security.debian.org/dists/stable/updates/binary-alpha/cfingerd_1.3.2-18.1_alpha.deb>http://security.debian.org/dists/stable/updates/binary-alpha/cfingerd_1.3.2-18.1_alpha.deb</a></dd>
+<dd>i386: <a href=http://security.debian.org/dists/stable/updates/binary-i386/cfingerd_1.3.2-18.1_i386.deb>http://security.debian.org/dists/stable/updates/binary-i386/cfingerd_1.3.2-18.1_i386.deb</a></dd>
+<dd>m68k: <a href=http://security.debian.org/dists/stable/updates/binary-m68k/cfingerd_1.3.2-18.1_m68k.deb>http://security.debian.org/dists/stable/updates/binary-m68k/cfingerd_1.3.2-18.1_m68k.deb</a></dd>
+<dd>sparc: <a href=http://security.debian.org/dists/stable/updates/binary-sparc/cfingerd_1.3.2-18.1_sparc.deb>http://security.debian.org/dists/stable/updates/binary-sparc/cfingerd_1.3.2-18.1_sparc.deb</a></dd>
diff --git a/croatian/security/1999/19990823.wml b/croatian/security/1999/19990823.wml
new file mode 100644
index 00000000000..863d506d382
--- /dev/null
+++ b/croatian/security/1999/19990823.wml
@@ -0,0 +1,27 @@
+<define-tag pagetitle>rsync</define-tag>
+<define-tag report_date>18. 08. 1999.</define-tag>
+<define-tag packages>rsync</define-tag>
+<define-tag description>Rijedak problem s oštećenim dozvolama datoteka.</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>Autor rsynca, Andrew Tridgell, je objavio da su
+prethodne verzije rsynca sadržavale bug vezan sa sigurnošću. Ako ste
+prenosili prazan direktorij u nepostojeći direktorij na udaljenom računalu,
+postojala je mogućnost oštećenja dozvola na udaljenom računalu. Ovaj bug se
+pokazuje samo u vrlo rijetkim prilikama. Vrlo vjerojatno ga niste iskusili,
+ali bolje provjerite dozvole na svojim home direktorijima.</define-tag>
+
+#use wml::debian::security
+
+<dt>source:</dt>
+<dd><a href=http://security.debian.org/dists/slink/updates/source/rsync_2.3.1-0.slink.1.diff.gz>http://security.debian.org/dists/slink/updates/source/rsync_2.3.1-0.slink.1.diff.gz</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/source/rsync_2.3.1-0.slink.1.dsc>http://security.debian.org/dists/slink/updates/source/rsync_2.3.1-0.slink.1.dsc</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/source/rsync_2.3.1.orig.tar.gz>http://security.debian.org/dists/slink/updates/source/rsync_2.3.1.orig.tar.gz</a></dd>
+<dt>alpha:</dt>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-alpha/rsync_2.3.1-0.slink.1_alpha.deb>http://security.debian.org/dists/slink/updates/binary-alpha/rsync_2.3.1-0.slink.1_alpha.deb</a></dd>
+<dt>i386:</dt>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-i386/rsync_2.3.1-0.slink.1_i386.deb>http://security.debian.org/dists/slink/updates/binary-i386/rsync_2.3.1-0.slink.1_i386.deb</a></dd>
+<dt>m68k:</dt>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-m68k/rsync_2.3.1-0.slink.1_m68k.deb>http://security.debian.org/dists/slink/updates/binary-m68k/rsync_2.3.1-0.slink.1_m68k.deb</a></dd>
+<dt>sparc:</dt>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-sparc/rsync_2.3.1-0.slink.1_sparc.deb>http://security.debian.org/dists/slink/updates/binary-sparc/rsync_2.3.1-0.slink.1_sparc.deb</a></dd>
diff --git a/croatian/security/1999/19990823a.wml b/croatian/security/1999/19990823a.wml
new file mode 100644
index 00000000000..73ebf63e2f3
--- /dev/null
+++ b/croatian/security/1999/19990823a.wml
@@ -0,0 +1,19 @@
+<define-tag pagetitle>termcap-compat</define-tag>
+<define-tag report_date>18. 08. 1999.</define-tag>
+<define-tag packages>termcap-compat</define-tag>
+<define-tag description>Prekoračenje buffera.</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>Primili smo izvještaj da su starije verzije libtermcapa
+sadržavale iskoristivo prekoračenje buffera. Na Debianu samom nije se moguće
+okoristiti ovim bugom jer je termcap davno napušten i zamijenjen terminfom.
+Međutim, ako ste kompajlirali vlastite programe koji koriste termcap ili
+instalirali tuđe programe koji ovise o libtermcap i rade kao root,
+iskoristivi su.</define-tag>
+
+#use wml::debian::security
+
+<dd>alpha: <a href=http://security.debian.org/dists/slink/updates/binary-alpha/termcap-compat_1.1.1.1.0slink1_alpha.deb>http://security.debian.org/dists/slink/updates/binary-alpha/termcap-compat_1.1.1.1.0slink1_alpha.deb</a></dd>
+<dd>i386: <a href=http://security.debian.org/dists/slink/updates/binary-i386/termcap-compat_1.1.1.1.0slink1_i386.deb>http://security.debian.org/dists/slink/updates/binary-i386/termcap-compat_1.1.1.1.0slink1_i386.deb</a></dd>
+<dd>m68k: <a href=http://security.debian.org/dists/slink/updates/binary-m68k/termcap-compat_1.1.1.1.0slink1_m68k.deb>http://security.debian.org/dists/slink/updates/binary-m68k/termcap-compat_1.1.1.1.0slink1_m68k.deb</a></dd>
+<dd>sparc: <a href=http://security.debian.org/dists/slink/updates/binary-sparc/termcap-compat_1.1.1.1.0slink1_sparc.deb>http://security.debian.org/dists/slink/updates/binary-sparc/termcap-compat_1.1.1.1.0slink1_sparc.deb</a></dd>
diff --git a/croatian/security/1999/19990823b.wml b/croatian/security/1999/19990823b.wml
new file mode 100644
index 00000000000..4dad0cdf037
--- /dev/null
+++ b/croatian/security/1999/19990823b.wml
@@ -0,0 +1,16 @@
+<define-tag pagetitle>smtp-refuser</define-tag>
+<define-tag report_date>1999-08-19</define-tag>
+<define-tag packages>smtp-refuser</define-tag>
+<define-tag description>Problem u stvaranju /tmp datoteke.</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>Prethodne verzije paketa smtp-refuser su logirale
+naredbe u /tmp/log. To je omogućavalo brisanje željenih datoteka čiji je
+vlasnik root od strane bilo kojeg korisnika koji smije pisati u /tmp.</define-tag>
+
+#use wml::debian::security
+
+<dd>alpha: <a href=http://security.debian.org/dists/slink/updates/binary-alpha/smtp-refuser_1.0.1_alpha.deb>http://security.debian.org/dists/slink/updates/binary-alpha/smtp-refuser_1.0.1_alpha.deb</a></dd>
+<dd>i386: <a href=http://security.debian.org/dists/slink/updates/binary-i386/smtp-refuser_1.0.1_i386.deb>http://security.debian.org/dists/slink/updates/binary-i386/smtp-refuser_1.0.1_i386.deb</a></dd>
+<dd>m68k: <a href=http://security.debian.org/dists/slink/updates/binary-m68k/smtp-refuser_1.0.1_m68k.deb>http://security.debian.org/dists/slink/updates/binary-m68k/smtp-refuser_1.0.1_m68k.deb</a></dd>
+<dd>sparc: <a href=http://security.debian.org/dists/slink/updates/binary-sparc/smtp-refuser_1.0.1_sparc.deb>http://security.debian.org/dists/slink/updates/binary-sparc/smtp-refuser_1.0.1_sparc.deb</a></dd>
diff --git a/croatian/security/1999/19990823c.wml b/croatian/security/1999/19990823c.wml
new file mode 100644
index 00000000000..1e9e80e696e
--- /dev/null
+++ b/croatian/security/1999/19990823c.wml
@@ -0,0 +1,17 @@
+<define-tag pagetitle>trn</define-tag>
+<define-tag report_date>20. 08. 1999.</define-tag>
+<define-tag packages>trn</define-tag>
+<define-tag description>Problem u stvaranju /tmp datoteke.</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>Sve prethodne verzije trna koristile su isto ime
+datoteke u /tmp za privremeno pohranjivanje. Zlonamjerna simbolička veza bi
+mogla uzrokovati nenamjerno prepisivanje datoteke kojoj korisnik ima
+pristup.</define-tag>
+
+#use wml::debian::security
+
+<dd>alpha: <a href=http://security.debian.org/dists/slink/updates/binary-alpha/trn_3.6-9.3.1_alpha.deb>http://security.debian.org/dists/slink/updates/binary-alpha/trn_3.6-9.3.1_alpha.deb</a></dd>
+<dd>i386: <a href=http://security.debian.org/dists/slink/updates/binary-i386/trn_3.6-9.3.1_i386.deb>http://security.debian.org/dists/slink/updates/binary-i386/trn_3.6-9.3.1_i386.deb</a></dd>
+<dd>m68k: <a href=http://security.debian.org/dists/slink/updates/binary-m68k/trn_3.6-9.3.1_m68k.deb>http://security.debian.org/dists/slink/updates/binary-m68k/trn_3.6-9.3.1_m68k.deb</a></dd>
+<dd>sparc: <a href=http://security.debian.org/dists/slink/updates/binary-sparc/trn_3.6-9.3.1_sparc.deb>http://security.debian.org/dists/slink/updates/binary-sparc/trn_3.6-9.3.1_sparc.deb</a></dd>
diff --git a/croatian/security/1999/19990830.wml b/croatian/security/1999/19990830.wml
new file mode 100644
index 00000000000..e85726280fd
--- /dev/null
+++ b/croatian/security/1999/19990830.wml
@@ -0,0 +1,33 @@
+<define-tag pagetitle>cron</define-tag>
+<define-tag report_date>30. 08. 1999.</define-tag>
+<define-tag packages>cron</define-tag>
+<define-tag description>Prisvajanje roota preko crona.</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>cron šalje poštu kao root bez provjeravanja parametara
+danih sendmailu. To može voditi kompromitiranju roota. Preporučamo hitno
+nadograđivanje paketa cron.</define-tag>
+
+#use wml::debian::security
+
+<dl>source:
+<dd><a href=http://security.debian.org/dists/slink/updates/source/cron_3.0pl1-50.2.diff.gz>http://security.debian.org/dists/slink/updates/source/cron_3.0pl1-50.2.diff.gz</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/source/cron_3.0pl1-50.2.dsc>http://security.debian.org/dists/slink/updates/source/cron_3.0pl1-50.2.dsc</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/source/cron_3.0pl1.orig.tar.gz>http://security.debian.org/dists/slink/updates/source/cron_3.0pl1.orig.tar.gz</a></dd>
+</dl>
+
+<dl>alpha:
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-alpha/cron_3.0pl1-50.2_alpha.deb>http://security.debian.org/dists/slink/updates/binary-alpha/cron_3.0pl1-50.2_alpha.deb</a></dd>
+</dl>
+
+<dl>i386:
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-i386/cron_3.0pl1-50.2_i386.deb>http://security.debian.org/dists/slink/updates/binary-i386/cron_3.0pl1-50.2_i386.deb</a></dd>
+</dl>
+
+<dl>m68k:
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-m68k/cron_3.0pl1-50.2_m68k.deb>http://security.debian.org/dists/slink/updates/binary-m68k/cron_3.0pl1-50.2_m68k.deb</a></dd>
+</dl>
+
+<dl>sparc:
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-sparc/cron_3.0pl1-50.2_sparc.deb>http://security.debian.org/dists/slink/updates/binary-sparc/cron_3.0pl1-50.2_sparc.deb</a></dd>
+</dl>
diff --git a/croatian/security/1999/19990907.wml b/croatian/security/1999/19990907.wml
new file mode 100644
index 00000000000..38a76659b2a
--- /dev/null
+++ b/croatian/security/1999/19990907.wml
@@ -0,0 +1,43 @@
+<define-tag pagetitle>INN</define-tag>
+<define-tag report_date>07. 09. 1999.</define-tag>
+<define-tag packages>inewsinn, inn-dev, inn</define-tag>
+<define-tag description>Prekoračenje buffera u programu INN inews.</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>Dobili smo izvještaj o prekoračenju buffera u programu
+inews koji dolazi uz INN news poslužitelj. Taj program koriste lokalni
+klijenti za slanje članaka na poslužitelj. Kako bi se mogao spojiti na news
+poslužitelj preko Unix domain socketa, on mora biti setgid "news".
+Iskorištavajući ovaj bug lokalni korisnici mogu dobiti "news" privilegije.
+Nakon toga smiju mijenjati konfiguraciju INN poslužitelja, te uništavati
+njegove baze podataka i datoteke. Preporučamo hitno nadograđivanje paketa
+inews-inn.</define-tag>
+
+#use wml::debian::security
+
+<dl>source:
+<dd><a href=http://security.debian.org/dists/slink/updates/source/inn_1.7.2-4.1.diff.gz>http://security.debian.org/dists/slink/updates/source/inn_1.7.2-4.1.diff.gz</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/source/inn_1.7.2-4.1.dsc>http://security.debian.org/dists/slink/updates/source/inn_1.7.2-4.1.dsc</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/source/inn_1.7.2.orig.tar.gz>http://security.debian.org/dists/slink/updates/source/inn_1.7.2.orig.tar.gz</a></dd>
+</dl>
+
+<dl>alpha:
+<dd>INN nije bio dostupan na alpha arhitekturi u Debianu 2.1.</dl>
+
+<dl>i386:
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-i386/inewsinn_1.7.2-4.1_i386.deb>http://security.debian.org/dists/slink/updates/binary-i386/inewsinn_1.7.2-4.1_i386.deb</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-i386/inn-dev_1.7.2-4.1_i386.deb>http://security.debian.org/dists/slink/updates/binary-i386/inn-dev_1.7.2-4.1_i386.deb</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-i386/inn_1.7.2-4.1_i386.deb>http://security.debian.org/dists/slink/updates/binary-i386/inn_1.7.2-4.1_i386.deb</a></dd>
+</dl>
+
+<dl>m68k:
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-m68k/inewsinn_1.7.2-4.1_m68k.deb>http://security.debian.org/dists/slink/updates/binary-m68k/inewsinn_1.7.2-4.1_m68k.deb</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-m68k/inn-dev_1.7.2-4.1_m68k.deb>http://security.debian.org/dists/slink/updates/binary-m68k/inn-dev_1.7.2-4.1_m68k.deb</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-m68k/inn_1.7.2-4.1_m68k.deb>http://security.debian.org/dists/slink/updates/binary-m68k/inn_1.7.2-4.1_m68k.deb</a></dd>
+</dl>
+
+<dl>sparc:
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-sparc/inewsinn_1.7.2-4.1_sparc.deb>http://security.debian.org/dists/slink/updates/binary-sparc/inewsinn_1.7.2-4.1_sparc.deb</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-sparc/inn-dev_1.7.2-4.1_sparc.deb>http://security.debian.org/dists/slink/updates/binary-sparc/inn-dev_1.7.2-4.1_sparc.deb</a></dd>
+<dd><a href=http://security.debian.org/dists/slink/updates/binary-sparc/inn_1.7.2-4.1_sparc.deb>http://security.debian.org/dists/slink/updates/binary-sparc/inn_1.7.2-4.1_sparc.deb</a></dd>
+</dl>
diff --git a/croatian/security/1999/19990924.wml b/croatian/security/1999/19990924.wml
new file mode 100644
index 00000000000..4a5092a369b
--- /dev/null
+++ b/croatian/security/1999/19990924.wml
@@ -0,0 +1,15 @@
+<define-tag pagetitle>amd</define-tag>
+<define-tag report_date>24. 09. 1999.</define-tag>
+<define-tag packages>amd</define-tag>
+<define-tag description>Prekoračenje buffera u amdu.</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>Da</define-tag>
+<define-tag moreinfo>Verzija amda distribuirana uz Debian GNU/Linux 2.1 je
+ranjiva preko mreže. Zadavanjem velikog imena direktorija amdovom kodu za
+logiranje prepunio bi se buffer, što bi se potom moglo iskoristiti. To je
+riješeno u verziji 23.0slink1.</define-tag>
+
+#use wml::debian::security
+
+Napomena: Ovo upozorenje je <a href=19991018a>osvježeno</a>; molimo vas da
+pogledate najnovije upozorenje za detalje o ispravljanju ovog problema.

© 2014-2024 Faster IT GmbH | imprint | privacy policy