diff options
author | Juraj Kubelka <cesta> | 2005-01-12 19:56:44 +0000 |
---|---|---|
committer | Juraj Kubelka <cesta> | 2005-01-12 19:56:44 +0000 |
commit | f4bfab483953006aad2f0446f6b243a838315435 (patch) | |
tree | b908802bb5b7e820c51c3125a0392bdf1d34939a /czech/security | |
parent | 560c4dbe1abdfd245782bff63dd47f31822e5236 (diff) |
Translated by Juraj Kubelka <Juraj.Kubelka at email.cz>.
CVS version numbers
czech/security/2005/dsa-635.wml: INITIAL -> 1.1
czech/security/2005/dsa-636.wml: INITIAL -> 1.1
Diffstat (limited to 'czech/security')
-rw-r--r-- | czech/security/2005/dsa-635.wml | 18 | ||||
-rw-r--r-- | czech/security/2005/dsa-636.wml | 21 |
2 files changed, 39 insertions, 0 deletions
diff --git a/czech/security/2005/dsa-635.wml b/czech/security/2005/dsa-635.wml new file mode 100644 index 00000000000..92ae4bb81b5 --- /dev/null +++ b/czech/security/2005/dsa-635.wml @@ -0,0 +1,18 @@ +#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka" +<define-tag description>přetečení bufferu</define-tag> +<define-tag moreinfo> +<p>Philip Hazel announced a buffer overflow in the host_aton function in +exim, the default mail-transport-agent in Debian, which can lead to the +execution of arbitrary code via an illegal IPv6 address.</p> + +<p>Pro stable distribuci (woody) byl tento problém opraven +ve verzi 3.35-1woody4.</p> + +<p>Pro unstable distribuci (sid) byl tento problém opraven +ve verzi 3.36-13 of exim and 4.34-10 of exim4.</p> + +<p>Doporučujeme vám aktualizovat vaše balíčky exim a exim4.</p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2005/dsa-635.data" diff --git a/czech/security/2005/dsa-636.wml b/czech/security/2005/dsa-636.wml new file mode 100644 index 00000000000..a4d21532bbd --- /dev/null +++ b/czech/security/2005/dsa-636.wml @@ -0,0 +1,21 @@ +#use wml::debian::translation-check translation="1.2" maintainer="Juraj Kubelka" +<define-tag description>nespolehlivé dočasné soubory</define-tag> +<define-tag moreinfo> +<p>Several insecure uses of temporary files have been discovered in +support scripts in the libc6 package which provides the c library for +a GNU/Linux system. Trustix developers found that the catchsegv +script uses temporary files insecurely. Openwall developers +discovered insecure temporary files in the glibcbug script. These +scripts are vulnerable to a symlink attack.</p> + +<p>Pro stable distribuci (woody) byly tyto problémy opraveny +ve verzi 2.2.5-11.8.</p> + +<p>Pro unstable distribuci (sid) byly tyto problémy opraveny +ve verzi 2.3.2.ds1-20.</p> + +<p>Doporučujeme vám aktualizovat váš balíček libc6.</p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2005/dsa-636.data" |