aboutsummaryrefslogtreecommitdiffstats
path: root/czech/security
diff options
context:
space:
mode:
authorJuraj Kubelka <cesta>2005-01-15 13:17:41 +0000
committerJuraj Kubelka <cesta>2005-01-15 13:17:41 +0000
commitdcb3010eb9e975a2a812fb5cbcd5dc2bc2acefb5 (patch)
treef1858dcfa584c2e5083192b4ecfdf976f9cabcaa /czech/security
parent13d7e2c4e3b418d817641ec04c157dcbd6e006f2 (diff)
Translated by Juraj Kubelka <Juraj.Kubelka at email.cz>.
CVS version numbers czech/security/2005/dsa-639.wml: INITIAL -> 1.1
Diffstat (limited to 'czech/security')
-rw-r--r--czech/security/2005/dsa-639.wml65
1 files changed, 65 insertions, 0 deletions
diff --git a/czech/security/2005/dsa-639.wml b/czech/security/2005/dsa-639.wml
new file mode 100644
index 00000000000..503eed24798
--- /dev/null
+++ b/czech/security/2005/dsa-639.wml
@@ -0,0 +1,65 @@
+#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
+<define-tag description>několik zranitelností</define-tag>
+<define-tag moreinfo>
+<p>Andrew V. Samoilov has noticed that several bugfixes which were
+applied to the source by upstream developers of mc, the midnight
+commander, a file browser and manager, were not backported to the
+current version of mc that Debian ships in their stable release. The
+Common Vulnerabilities and Exposures Project identifies the following
+vulnerabilities:</p>
+
+<ul>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1004">CAN-2004-1004</a>
+
+ <p>Multiple format string vulnerabilities</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1005">CAN-2004-1005</a>
+
+ <p>Multiple buffer overflows</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1009">CAN-2004-1009</a>
+
+ <p>One infinite loop vulnerability</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1090">CAN-2004-1090</a>
+
+ <p>Denial of service via corrupted section header</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1091">CAN-2004-1091</a>
+
+ <p>Denial of service via null dereference</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1092">CAN-2004-1092</a>
+
+ <p>Freeing unallocated memory</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1093">CAN-2004-1093</a>
+
+ <p>Denial of service via use of already freed memory</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1174">CAN-2004-1174</a>
+
+ <p>Denial of service via manipulating non-existing file handles</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1175">CAN-2004-1175</a>
+
+ <p>Unintended program execution via insecure filename quoting</p>
+
+<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1176">CAN-2004-1176</a>
+
+ <p>Denial of service via a buffer underflow</p>
+
+</ul>
+
+<p>Pro stable distribuci (woody) byly tyto problémy opraveny
+ve verzi 4.5.55-1.2woody5.</p>
+
+<p>V&nbsp;unstable distribuci (sid) by již měly být tyto problémy
+opraveny, protože byly vzaty z&nbsp;aktuálních verzí.</p>
+
+<p>Doporučujeme vám aktualizovat váš balíček mc.</p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2005/dsa-639.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy