aboutsummaryrefslogtreecommitdiffstats
path: root/czech/security
diff options
context:
space:
mode:
authorJuraj Kubelka <cesta>2005-04-20 17:31:35 +0000
committerJuraj Kubelka <cesta>2005-04-20 17:31:35 +0000
commita4a330a5d043ba86a7a4f6ba66e163f4200eef1e (patch)
tree3ebf6db14315abeeb39705acfca8088217fd35f3 /czech/security
parent1f71e19489449e354f98f9fa905f133f1a98d16b (diff)
Delete file, because it is not fully translated.
CVS version numbers czech/security/2005/dsa-630.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-631.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-632.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-633.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-634.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-635.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-636.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-637.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-638.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-639.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-640.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-641.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-642.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-643.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-644.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-645.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-646.wml: 1.2 -> 1.3(DEAD) czech/security/2005/dsa-647.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-648.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-649.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-650.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-651.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-652.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-653.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-654.wml: 1.2 -> 1.3(DEAD) czech/security/2005/dsa-655.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-656.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-657.wml: 1.1 -> 1.2(DEAD) czech/security/2005/dsa-658.wml: 1.1 -> 1.2(DEAD)
Diffstat (limited to 'czech/security')
-rw-r--r--czech/security/2005/dsa-630.wml19
-rw-r--r--czech/security/2005/dsa-631.wml19
-rw-r--r--czech/security/2005/dsa-632.wml18
-rw-r--r--czech/security/2005/dsa-633.wml19
-rw-r--r--czech/security/2005/dsa-634.wml48
-rw-r--r--czech/security/2005/dsa-635.wml18
-rw-r--r--czech/security/2005/dsa-636.wml21
-rw-r--r--czech/security/2005/dsa-637.wml18
-rw-r--r--czech/security/2005/dsa-638.wml32
-rw-r--r--czech/security/2005/dsa-639.wml65
-rw-r--r--czech/security/2005/dsa-640.wml19
-rw-r--r--czech/security/2005/dsa-641.wml18
-rw-r--r--czech/security/2005/dsa-642.wml33
-rw-r--r--czech/security/2005/dsa-643.wml17
-rw-r--r--czech/security/2005/dsa-644.wml19
-rw-r--r--czech/security/2005/dsa-645.wml19
-rw-r--r--czech/security/2005/dsa-646.wml19
-rw-r--r--czech/security/2005/dsa-647.wml21
-rw-r--r--czech/security/2005/dsa-648.wml18
-rw-r--r--czech/security/2005/dsa-649.wml18
-rw-r--r--czech/security/2005/dsa-650.wml18
-rw-r--r--czech/security/2005/dsa-651.wml35
-rw-r--r--czech/security/2005/dsa-652.wml37
-rw-r--r--czech/security/2005/dsa-653.wml20
-rw-r--r--czech/security/2005/dsa-654.wml42
-rw-r--r--czech/security/2005/dsa-655.wml19
-rw-r--r--czech/security/2005/dsa-656.wml18
-rw-r--r--czech/security/2005/dsa-657.wml19
-rw-r--r--czech/security/2005/dsa-658.wml20
29 files changed, 0 insertions, 706 deletions
diff --git a/czech/security/2005/dsa-630.wml b/czech/security/2005/dsa-630.wml
deleted file mode 100644
index dd947ea5564..00000000000
--- a/czech/security/2005/dsa-630.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>nespolehlivý dočasný adresář</define-tag>
-<define-tag moreinfo>
-<p>Jeroen van Wolffelaar discovered a problem in lintian, the Debian
-package checker. The program removes the working directory even if it
-wasn't created at program start, removing an unrelated file or
-directory a malicious user inserted via a symlink attack.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven ve verzi
-1.20.17.1.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven ve verzi
-1.23.6.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček lintian.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-630.data"
diff --git a/czech/security/2005/dsa-631.wml b/czech/security/2005/dsa-631.wml
deleted file mode 100644
index 808a10f83b7..00000000000
--- a/czech/security/2005/dsa-631.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>neošetřený vstup</define-tag>
-<define-tag moreinfo>
-<p>Thiago Macieira discovered a vulnerability in the kioslave library,
-which is part of kdelibs, which allows a remote attacker to execute
-arbitrary FTP commands via an ftp:// URL that contains an URL-encoded
-newline before the FTP command.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven ve verzi
-2.2.2-13.woody.13.</p>
-
-<p>Pro unstable distribuci (sid) bude tento problém brzy
-odstraněn.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček kdelibs3.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-631.data"
diff --git a/czech/security/2005/dsa-632.wml b/czech/security/2005/dsa-632.wml
deleted file mode 100644
index 46d4cfa2f98..00000000000
--- a/czech/security/2005/dsa-632.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>Stephen Dranger discovered a buffer overflow in linpopup, an X11 port
-of winpopup, running over Samba, that could lead to the execution of
-arbitrary code when displaying a maliciously crafted message.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 1.2.0-2woody1.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 1.2.0-7.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček linpopup.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-632.data"
diff --git a/czech/security/2005/dsa-633.wml b/czech/security/2005/dsa-633.wml
deleted file mode 100644
index af2dd4da0d9..00000000000
--- a/czech/security/2005/dsa-633.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>nespolehlivý dočasný soubor</define-tag>
-<define-tag moreinfo>
-<p>Peter Samuelson, upstream maintainer of bmv, a PostScript viewer for
-SVGAlib, discovered that temporary files are created in an insecure
-fashion. A malicious local user could cause arbitrary files to be
-overwritten by a symlink attack.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 1.2-14.2.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 1.2-17.</p>
-
-<p>Doporučujeme vám aktualizovat vaše bmv balíčky.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-633.data"
diff --git a/czech/security/2005/dsa-634.wml b/czech/security/2005/dsa-634.wml
deleted file mode 100644
index 1f7901a9452..00000000000
--- a/czech/security/2005/dsa-634.wml
+++ /dev/null
@@ -1,48 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>slabá kontrola jména počítače a jména uživatele</define-tag>
-<define-tag moreinfo>
-<p>Patrice Fournier discovered a vulnerability in the authorisation
-subsystem of hylafax, a flexible client/server fax system. A local or
-remote user guessing the contents of the hosts.hfaxd database could
-gain unauthorised access to the fax system.</p>
-
-<p>Some installations of hylafax may actually utilise the weak hostname
-and username validation for authorized uses. For example, hosts.hfaxd
-entries that may be common are</p>
-
-<pre>
- 192.168.0
- username:uid:pass:adminpass
- user@host
-</pre>
-
-<p>After updating, these entries will need to be modified in order to
-continue to function. Respectively, the correct entries should be</p>
-
-<pre>
- 192.168.0.[0-9]+
- username@:uid:pass:adminpass
- user@host
-</pre>
-
-<p>Unless such matching of "username" with "otherusername" and "host" with
-"hostname" is desired, the proper form of these entries should include
-the delimiter and markers like this</p>
-
-<pre>
- @192.168.0.[0-9]+$
- ^username@:uid:pass:adminpass
- ^user@host$
-</pre>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 4.1.1-3.1.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 4.2.1-1.</p>
-
-<p>Doporučujeme vám aktualizovat vaše hylafax balíčky.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-634.data"
diff --git a/czech/security/2005/dsa-635.wml b/czech/security/2005/dsa-635.wml
deleted file mode 100644
index 92ae4bb81b5..00000000000
--- a/czech/security/2005/dsa-635.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>Philip Hazel announced a buffer overflow in the host_aton function in
-exim, the default mail-transport-agent in Debian, which can lead to the
-execution of arbitrary code via an illegal IPv6 address.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 3.35-1woody4.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 3.36-13 of exim and 4.34-10 of exim4.</p>
-
-<p>Doporučujeme vám aktualizovat vaše balíčky exim a exim4.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-635.data"
diff --git a/czech/security/2005/dsa-636.wml b/czech/security/2005/dsa-636.wml
deleted file mode 100644
index a4d21532bbd..00000000000
--- a/czech/security/2005/dsa-636.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>nespolehlivé dočasné soubory</define-tag>
-<define-tag moreinfo>
-<p>Several insecure uses of temporary files have been discovered in
-support scripts in the libc6 package which provides the c library for
-a GNU/Linux system. Trustix developers found that the catchsegv
-script uses temporary files insecurely. Openwall developers
-discovered insecure temporary files in the glibcbug script. These
-scripts are vulnerable to a symlink attack.</p>
-
-<p>Pro stable distribuci (woody) byly tyto problémy opraveny
-ve verzi 2.2.5-11.8.</p>
-
-<p>Pro unstable distribuci (sid) byly tyto problémy opraveny
-ve verzi 2.3.2.ds1-20.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček libc6.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-636.data"
diff --git a/czech/security/2005/dsa-637.wml b/czech/security/2005/dsa-637.wml
deleted file mode 100644
index baf6817cfac..00000000000
--- a/czech/security/2005/dsa-637.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>Philip Hazel announced a buffer overflow in the host_aton function in
-exim-tls, the SSL-enabled version of the default mail-transport-agent
-in Debian, which can lead to the execution of arbitrary code via an
-illegal IPv6 address.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 3.35-3woody3.</p>
-
-<p>V&nbsp;unstable distribuci (sid) již tento balíček neexistuje.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček exim-tls.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-637.data"
diff --git a/czech/security/2005/dsa-638.wml b/czech/security/2005/dsa-638.wml
deleted file mode 100644
index fc00c692f8b..00000000000
--- a/czech/security/2005/dsa-638.wml
+++ /dev/null
@@ -1,32 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>několik zranitelností</define-tag>
-<define-tag moreinfo>
-<p>"jaguar" has discovered two security relevant problems in gopherd, the
-Gopher server in Debian which is part of the gopher package. The
-Common Vulnerabilities and Exposures project identifies the following
-vulnerabilities:</p>
-
-<ul>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0560">CAN-2004-0560</a>
-
- <p>An integer overflow can happen when posting content of a specially
- calculated size.</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0561">CAN-2004-0561</a>
-
- <p>A format string vulnerability has been found in the log routine.</p>
-
-</ul>
-
-<p>Pro stable distribuci (woody) byly tyto problémy opraveny
-ve verzi 3.0.3woody2.</p>
-
-<p>Unstable distribuce (sid) neobsahuje balíček gopherd. Byl nahrazen
-balíčkem Pygopherd.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček gopherd.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-638.data"
diff --git a/czech/security/2005/dsa-639.wml b/czech/security/2005/dsa-639.wml
deleted file mode 100644
index 503eed24798..00000000000
--- a/czech/security/2005/dsa-639.wml
+++ /dev/null
@@ -1,65 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>několik zranitelností</define-tag>
-<define-tag moreinfo>
-<p>Andrew V. Samoilov has noticed that several bugfixes which were
-applied to the source by upstream developers of mc, the midnight
-commander, a file browser and manager, were not backported to the
-current version of mc that Debian ships in their stable release. The
-Common Vulnerabilities and Exposures Project identifies the following
-vulnerabilities:</p>
-
-<ul>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1004">CAN-2004-1004</a>
-
- <p>Multiple format string vulnerabilities</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1005">CAN-2004-1005</a>
-
- <p>Multiple buffer overflows</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1009">CAN-2004-1009</a>
-
- <p>One infinite loop vulnerability</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1090">CAN-2004-1090</a>
-
- <p>Denial of service via corrupted section header</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1091">CAN-2004-1091</a>
-
- <p>Denial of service via null dereference</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1092">CAN-2004-1092</a>
-
- <p>Freeing unallocated memory</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1093">CAN-2004-1093</a>
-
- <p>Denial of service via use of already freed memory</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1174">CAN-2004-1174</a>
-
- <p>Denial of service via manipulating non-existing file handles</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1175">CAN-2004-1175</a>
-
- <p>Unintended program execution via insecure filename quoting</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1176">CAN-2004-1176</a>
-
- <p>Denial of service via a buffer underflow</p>
-
-</ul>
-
-<p>Pro stable distribuci (woody) byly tyto problémy opraveny
-ve verzi 4.5.55-1.2woody5.</p>
-
-<p>V&nbsp;unstable distribuci (sid) by již měly být tyto problémy
-opraveny, protože byly vzaty z&nbsp;aktuálních verzí.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček mc.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-639.data"
diff --git a/czech/security/2005/dsa-640.wml b/czech/security/2005/dsa-640.wml
deleted file mode 100644
index 87b575c3868..00000000000
--- a/czech/security/2005/dsa-640.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>Erik Sjölund discovered a buffer overflow in xatitv, one of the
-programs in the gatos package, that is used to display video with
-certain ATI video cards. xatitv is installed setuid root in order to
-gain direct access to the video hardware.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 0.0.5-6woody3.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 0.0.5-15.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček gatos.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-640.data"
diff --git a/czech/security/2005/dsa-641.wml b/czech/security/2005/dsa-641.wml
deleted file mode 100644
index 513e2767d47..00000000000
--- a/czech/security/2005/dsa-641.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>Erik Sjölund discovered that playmidi, a MIDI player, contains a
-setuid root program with a buffer overflow that can be exploited by a
-local attacker.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 2.4-4woody1.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 2.4debian-3.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček playmidi.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-641.data"
diff --git a/czech/security/2005/dsa-642.wml b/czech/security/2005/dsa-642.wml
deleted file mode 100644
index ecb07f41e5f..00000000000
--- a/czech/security/2005/dsa-642.wml
+++ /dev/null
@@ -1,33 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>několik zranitelností</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in gallery, a web-based
-photo album written in PHP4. The Common Vulnerabilities and Exposures
-project identifies the following vulnerabilities:</p>
-
-<ul>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1106">CAN-2004-1106</a>
-
- <p>Jim Paris discovered a cross site scripting vulnerability which
- allows code to be inserted by using specially formed URLs.</p>
-
-<li>CVE-NOMATCH
-
- <p>The upstream developers of gallery have fixed several cases of
- possible variable injection that could trick gallery to unintended
- actions, e.g. leaking database passwords.</p>
-
-</ul>
-
-<p>Pro stable distribuci (woody) byly tyto problémy opraveny
-ve verzi 1.2.5-8woody3.</p>
-
-<p>Pro unstable distribuci (sid) byly tyto problémy opraveny
-ve verzi 1.4.4-pl4-1.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček gallery.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-642.data"
diff --git a/czech/security/2005/dsa-643.wml b/czech/security/2005/dsa-643.wml
deleted file mode 100644
index 7130de7f2dd..00000000000
--- a/czech/security/2005/dsa-643.wml
+++ /dev/null
@@ -1,17 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>"jaguar" of the Debian Security Audit Project has discovered several
-buffer overflows in queue, a transparent load balancing system.</p>
-
-<p>Pro stable distribuci (woody) byly tyto problémy opraveny
-ve verzi 1.30.1-4woody2.</p>
-
-<p>Pro unstable distribuci (sid) byly tyto problémy opraveny
-ve verzi 1.30.1-5.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček queue.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-643.data"
diff --git a/czech/security/2005/dsa-644.wml b/czech/security/2005/dsa-644.wml
deleted file mode 100644
index f4330ebb484..00000000000
--- a/czech/security/2005/dsa-644.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>Danny Lungstrom discovered a vulnerability in chbg, a tool to change
-background pictures. A maliciously crafted configuration/scenario
-file could overflow a buffer and lead to the execution of arbitrary
-code on the victim's machine.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 1.5-1woody1.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 1.5-4.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček chbg.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-644.data"
diff --git a/czech/security/2005/dsa-645.wml b/czech/security/2005/dsa-645.wml
deleted file mode 100644
index af3c94400e4..00000000000
--- a/czech/security/2005/dsa-645.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>iDEFENSE has reported a buffer overflow in xpdf, the portable document
-format (PDF) suite. Similar code is present in the PDF processing
-part of CUPS. A maliciously crafted PDF file could exploit this
-problem, resulting in the execution of arbitrary code.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 1.1.14-5woody12.</p>
-
-<p>V&nbsp;unstable distribuci (sid) CUPSYS již nepoužívá svoji vlastní
-xpdf variantu, ale používá xpdf-utils.</p>
-
-<p>Doporučujeme vám aktualizovat vaše cups balíčky.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-645.data"
diff --git a/czech/security/2005/dsa-646.wml b/czech/security/2005/dsa-646.wml
deleted file mode 100644
index e5d103edb12..00000000000
--- a/czech/security/2005/dsa-646.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>Andrei Nigmatulin discovered a buffer overflow in the PSD
-image-decoding module of ImageMagick, a commonly used image
-manipulation library. Remote exploition with a carefully crafted
-image could lead to the execution of arbitrary code.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 5.4.4.5-1woody5.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 6.0.6.2-2.</p>
-
-<p>Doporučujeme vám aktualizovat vaše imagemagick balíčky.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-646.data"
diff --git a/czech/security/2005/dsa-647.wml b/czech/security/2005/dsa-647.wml
deleted file mode 100644
index 2061ba924f3..00000000000
--- a/czech/security/2005/dsa-647.wml
+++ /dev/null
@@ -1,21 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>nespolehlivé dočasné soubory</define-tag>
-<define-tag moreinfo>
-<p>Javier Fernandez-Sanguino Pena from the Debian Security Audit Project
-discovered a temporary file vulnerability in the mysqlaccess script of
-MySQL that could allow an unprivileged user to let root overwrite
-arbitrary files via a symlink attack and could also could unveil the
-contents of a temporary file which might contain sensitive
-information.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 3.23.49-8.9.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven ve verzi
-4.0.23-3 mysql-dfsg a&nbsp;ve verzi 4.1.8a-6 mysql-dfsg-4.1.</p>
-
-<p>Doporučujeme vám aktualizovat vaše mysql balíčky.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-647.data"
diff --git a/czech/security/2005/dsa-648.wml b/czech/security/2005/dsa-648.wml
deleted file mode 100644
index d4fe0b6d385..00000000000
--- a/czech/security/2005/dsa-648.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>iDEFENSE has reported a buffer overflow in xpdf, the portable document
-format (PDF) suite. A maliciously crafted PDF file could exploit this
-problem, resulting in the execution of arbitrary code.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 1.00-3.4.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 3.00-12.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček xpdf.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-648.data"
diff --git a/czech/security/2005/dsa-649.wml b/czech/security/2005/dsa-649.wml
deleted file mode 100644
index 40b91dcbcb4..00000000000
--- a/czech/security/2005/dsa-649.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow has been discovered in xtrlock, a minimal X display
-lock program which can be exploited by a malicious local attacker to
-crash the lock program and take over the desktop session.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 2.0-6woody2.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 2.0-9.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček xtrlock.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-649.data"
diff --git a/czech/security/2005/dsa-650.wml b/czech/security/2005/dsa-650.wml
deleted file mode 100644
index ab9508bac10..00000000000
--- a/czech/security/2005/dsa-650.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>chybí ošetření vstupu</define-tag>
-<define-tag moreinfo>
-<p>Ulf Härnhammar discovered that due to missing input sanitising in
-diatheke, a CGI script for making and browsing a bible website, it is
-possible to execute arbitrary commands via a specially crafted URL.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 1.5.3-3woody2.</p>
-
-<p>Pro unstable distribuci (sid) bude tento problém brzy
-odstraněn.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček diatheke.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-650.data"
diff --git a/czech/security/2005/dsa-651.wml b/czech/security/2005/dsa-651.wml
deleted file mode 100644
index 3821177b6cf..00000000000
--- a/czech/security/2005/dsa-651.wml
+++ /dev/null
@@ -1,35 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu, celočíselné přetečení</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in Squid, the internet
-object cache, the popular WWW proxy cache. The Common Vulnerabilities
-and Exposures Project identifies the following vulnerabilities:</p>
-
-<ul>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094">CAN-2005-0094</a>
-
- <p>"infamous41md" discovered a buffer overflow in the parser for
- Gopher responses which will lead to memory corruption and usually
- crash Squid.</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095">CAN-2005-0095</a>
-
- <p>"infamous41md" discovered an integer overflow in the receiver of
- WCCP (Web Cache Communication Protocol) messages. An attacker
- could send a specially crafted UDP datagram that will cause Squid
- to crash.</p>
-
-</ul>
-
-<p>Pro stable distribuci (woody) byly tyto problémy opraveny
-ve verzi 2.4.6-2woody5.</p>
-
-<p>Pro unstable distribuci (sid) byly tyto problémy opraveny
-ve verzi 2.5.7-4.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček squid.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-651.data"
diff --git a/czech/security/2005/dsa-652.wml b/czech/security/2005/dsa-652.wml
deleted file mode 100644
index f095d14958f..00000000000
--- a/czech/security/2005/dsa-652.wml
+++ /dev/null
@@ -1,37 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>několik zranitelností</define-tag>
-<define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in unarj, a non-free ARJ
-unarchive utility. The Common Vulnerabilities and Exposures Project
-identifies the following vulnerabilities:</p>
-
-<ul>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947">CAN-2004-0947</a>
-
- <p>A buffer overflow has been discovered when handling long file
- names contained in an archive. An attacker could create a
- specially crafted archive which could cause unarj to crash or
- possibly execute arbitrary code when being extracted by a victim.</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027">CAN-2004-1027</a>
-
- <p>A directory traversal vulnerability has been found so that an
- attacker could create a specially crafted archive which would
- create files in the parent directory when being extracted by a
- victim. When used recursively, this vulnerability could be used
- to overwrite critical system files and programs.</p>
-
-</ul>
-
-<p>Pro stable distribuci (woody) byly tyto problémy opraveny
-ve verzi 2.43-3woody1.</p>
-
-<p>For the unstable distribution (sid) these problems don't apply since
-unstable/non-free does not contain the unarj package.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček unarj.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-652.data"
diff --git a/czech/security/2005/dsa-653.wml b/czech/security/2005/dsa-653.wml
deleted file mode 100644
index 2582b060b4a..00000000000
--- a/czech/security/2005/dsa-653.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>A buffer overflow has been detected in the X11 dissector of ethereal,
-a commonly used network traffic analyser. A remote attacker may be
-able to overflow a buffer using a specially crafted IP packet. More
-problems have been discovered which don't apply to the version in
-woody but are fixed in sid as well.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 0.9.4-1woody11.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 0.10.9-1.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček ethereal.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-653.data"
diff --git a/czech/security/2005/dsa-654.wml b/czech/security/2005/dsa-654.wml
deleted file mode 100644
index 94a38b6c820..00000000000
--- a/czech/security/2005/dsa-654.wml
+++ /dev/null
@@ -1,42 +0,0 @@
-#use wml::debian::translation-check translation="1.4" maintainer="Juraj Kubelka"
-<define-tag description>několik zranitelností</define-tag>
-<define-tag moreinfo>
-<p>Erik Sjölund has discovered several security relevant problems in
-enscript, a program to convert ASCII text into Postscript and other
-formats. The Common Vulnerabilities and Exposures project identifies
-the following vulnerabilities:</p>
-
-<ul>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1184">CAN-2004-1184</a>
-
- <p>Unsanitised input can cause the execution of arbitrary commands
- via EPSF pipe support. This has been disabled, also upstream.</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1185">CAN-2004-1185</a>
-
- <p>Due to missing sanitising of filenames it is possible that a
- specially crafted filename can cause arbitrary commands to be
- executed.</p>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1186">CAN-2004-1186</a>
-
- <p>Multiple buffer overflows can cause the program to crash.</p>
-
-</ul>
-
-<p>Usually, enscript is only run locally, but since it is executed inside
-of viewcvs some of the problems mentioned above can easily be turned
-into a remote vulnerability.</p>
-
-<p>Pro stable distribuci (woody) byly tyto problémy opraveny
-ve verzi 1.6.3-1.3.</p>
-
-<p>Pro unstable distribuci (sid) byly tyto problémy opraveny
-ve verzi 1.6.4-6.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček enscript.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-654.data"
diff --git a/czech/security/2005/dsa-655.wml b/czech/security/2005/dsa-655.wml
deleted file mode 100644
index be880c6830a..00000000000
--- a/czech/security/2005/dsa-655.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>chybějící kontrola práv</define-tag>
-<define-tag moreinfo>
-<p>Erik Sjölund discovered that zhcon, a fast console CJK system using
-the Linux framebuffer, accesses a user-controlled configuration file
-with elevated privileges. Thus, it is possible to read arbitrary
-files.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 0.2-4woody3.</p>
-
-<p>Pro unstable distribuci (sid) bude tento problém brzy
-odstraněn.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček zhcon.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-655.data"
diff --git a/czech/security/2005/dsa-656.wml b/czech/security/2005/dsa-656.wml
deleted file mode 100644
index ff73c28af7b..00000000000
--- a/czech/security/2005/dsa-656.wml
+++ /dev/null
@@ -1,18 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>nespolehlivý přístup k&nbsp;souboru</define-tag>
-<define-tag moreinfo>
-<p>Javier Fernández-Sanguino Pe&ntilde;a from the Debian Security Audit Team has
-discovered that the vdr daemon which is used for video disk recorders
-for DVB cards can overwrite arbitrary files.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 1.0.0-1woody2.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 1.2.6-6.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček vdr.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-656.data"
diff --git a/czech/security/2005/dsa-657.wml b/czech/security/2005/dsa-657.wml
deleted file mode 100644
index 14874b5156d..00000000000
--- a/czech/security/2005/dsa-657.wml
+++ /dev/null
@@ -1,19 +0,0 @@
-#use wml::debian::translation-check translation="1.1" maintainer="Juraj Kubelka"
-<define-tag description>přetečení bufferu</define-tag>
-<define-tag moreinfo>
-<p>A heap overflow has been discovered in the DVD subpicture decoder of
-xine-lib. An attacker could cause arbitrary code to be executed on
-the victims host by supplying a malicious MPEG. By tricking users to
-view a malicious network stream, this is remotely exploitable.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 0.9.8-2woody2.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 1-rc6a-1.</p>
-
-<p>Doporučujeme vám aktualizovat vaše libxine balíčky.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-657.data"
diff --git a/czech/security/2005/dsa-658.wml b/czech/security/2005/dsa-658.wml
deleted file mode 100644
index 32243bf94a9..00000000000
--- a/czech/security/2005/dsa-658.wml
+++ /dev/null
@@ -1,20 +0,0 @@
-#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
-<define-tag description>nespolehlivý dočasný soubor</define-tag>
-<define-tag moreinfo>
-<p>Javier Fernández-Sanguino Pe&ntilde;a from the Debian Security Audit Project
-discovered that the DBI library, the Perl5 database interface, creates
-a temporary PID file in an insecure manner. This can be exploited by a
-malicious user to overwrite arbitrary files owned by the person
-executing the parts of the library.</p>
-
-<p>Pro stable distribuci (woody) byl tento problém opraven
-ve verzi 1.21-2woody2.</p>
-
-<p>Pro unstable distribuci (sid) byl tento problém opraven
-ve verzi 1.46-6.</p>
-
-<p>Doporučujeme vám aktualizovat váš balíček libdbi-perl.</p>
-</define-tag>
-
-# do not modify the following line
-#include "$(ENGLISHDIR)/security/2005/dsa-658.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy