diff options
author | Juraj Kubelka <cesta> | 2005-01-15 13:17:41 +0000 |
---|---|---|
committer | Juraj Kubelka <cesta> | 2005-01-15 13:17:41 +0000 |
commit | dcb3010eb9e975a2a812fb5cbcd5dc2bc2acefb5 (patch) | |
tree | f1858dcfa584c2e5083192b4ecfdf976f9cabcaa /czech/security | |
parent | 13d7e2c4e3b418d817641ec04c157dcbd6e006f2 (diff) |
Translated by Juraj Kubelka <Juraj.Kubelka at email.cz>.
CVS version numbers
czech/security/2005/dsa-639.wml: INITIAL -> 1.1
Diffstat (limited to 'czech/security')
-rw-r--r-- | czech/security/2005/dsa-639.wml | 65 |
1 files changed, 65 insertions, 0 deletions
diff --git a/czech/security/2005/dsa-639.wml b/czech/security/2005/dsa-639.wml new file mode 100644 index 00000000000..503eed24798 --- /dev/null +++ b/czech/security/2005/dsa-639.wml @@ -0,0 +1,65 @@ +#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka" +<define-tag description>několik zranitelností</define-tag> +<define-tag moreinfo> +<p>Andrew V. Samoilov has noticed that several bugfixes which were +applied to the source by upstream developers of mc, the midnight +commander, a file browser and manager, were not backported to the +current version of mc that Debian ships in their stable release. The +Common Vulnerabilities and Exposures Project identifies the following +vulnerabilities:</p> + +<ul> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1004">CAN-2004-1004</a> + + <p>Multiple format string vulnerabilities</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1005">CAN-2004-1005</a> + + <p>Multiple buffer overflows</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1009">CAN-2004-1009</a> + + <p>One infinite loop vulnerability</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1090">CAN-2004-1090</a> + + <p>Denial of service via corrupted section header</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1091">CAN-2004-1091</a> + + <p>Denial of service via null dereference</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1092">CAN-2004-1092</a> + + <p>Freeing unallocated memory</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1093">CAN-2004-1093</a> + + <p>Denial of service via use of already freed memory</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1174">CAN-2004-1174</a> + + <p>Denial of service via manipulating non-existing file handles</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1175">CAN-2004-1175</a> + + <p>Unintended program execution via insecure filename quoting</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1176">CAN-2004-1176</a> + + <p>Denial of service via a buffer underflow</p> + +</ul> + +<p>Pro stable distribuci (woody) byly tyto problémy opraveny +ve verzi 4.5.55-1.2woody5.</p> + +<p>V unstable distribuci (sid) by již měly být tyto problémy +opraveny, protože byly vzaty z aktuálních verzí.</p> + +<p>Doporučujeme vám aktualizovat váš balíček mc.</p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2005/dsa-639.data" |