aboutsummaryrefslogtreecommitdiffstats
path: root/czech/security
diff options
context:
space:
mode:
authorJuraj Kubelka <cesta>2005-01-12 19:56:44 +0000
committerJuraj Kubelka <cesta>2005-01-12 19:56:44 +0000
commitf4bfab483953006aad2f0446f6b243a838315435 (patch)
treeb908802bb5b7e820c51c3125a0392bdf1d34939a /czech/security
parent560c4dbe1abdfd245782bff63dd47f31822e5236 (diff)
Translated by Juraj Kubelka <Juraj.Kubelka at email.cz>.
CVS version numbers czech/security/2005/dsa-635.wml: INITIAL -> 1.1 czech/security/2005/dsa-636.wml: INITIAL -> 1.1
Diffstat (limited to 'czech/security')
-rw-r--r--czech/security/2005/dsa-635.wml18
-rw-r--r--czech/security/2005/dsa-636.wml21
2 files changed, 39 insertions, 0 deletions
diff --git a/czech/security/2005/dsa-635.wml b/czech/security/2005/dsa-635.wml
new file mode 100644
index 00000000000..92ae4bb81b5
--- /dev/null
+++ b/czech/security/2005/dsa-635.wml
@@ -0,0 +1,18 @@
+#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
+<define-tag description>přetečení bufferu</define-tag>
+<define-tag moreinfo>
+<p>Philip Hazel announced a buffer overflow in the host_aton function in
+exim, the default mail-transport-agent in Debian, which can lead to the
+execution of arbitrary code via an illegal IPv6 address.</p>
+
+<p>Pro stable distribuci (woody) byl tento problém opraven
+ve verzi 3.35-1woody4.</p>
+
+<p>Pro unstable distribuci (sid) byl tento problém opraven
+ve verzi 3.36-13 of exim and 4.34-10 of exim4.</p>
+
+<p>Doporučujeme vám aktualizovat vaše balíčky exim a exim4.</p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2005/dsa-635.data"
diff --git a/czech/security/2005/dsa-636.wml b/czech/security/2005/dsa-636.wml
new file mode 100644
index 00000000000..a4d21532bbd
--- /dev/null
+++ b/czech/security/2005/dsa-636.wml
@@ -0,0 +1,21 @@
+#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka"
+<define-tag description>nespolehlivé dočasné soubory</define-tag>
+<define-tag moreinfo>
+<p>Several insecure uses of temporary files have been discovered in
+support scripts in the libc6 package which provides the c library for
+a GNU/Linux system. Trustix developers found that the catchsegv
+script uses temporary files insecurely. Openwall developers
+discovered insecure temporary files in the glibcbug script. These
+scripts are vulnerable to a symlink attack.</p>
+
+<p>Pro stable distribuci (woody) byly tyto problémy opraveny
+ve verzi 2.2.5-11.8.</p>
+
+<p>Pro unstable distribuci (sid) byly tyto problémy opraveny
+ve verzi 2.3.2.ds1-20.</p>
+
+<p>Doporučujeme vám aktualizovat váš balíček libc6.</p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2005/dsa-636.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy