aboutsummaryrefslogtreecommitdiffstats
path: root/korean
diff options
context:
space:
mode:
authorSebul <sebuls@gmail.com>2019-02-01 20:09:11 +0900
committerSebul <sebuls@gmail.com>2019-02-01 20:09:11 +0900
commitb58c884d322beb7c1852cda2939f91f65832b83b (patch)
tree152ad52c17de5caf3ff9c6743955d8dfbf6dca14 /korean
parent02daabbf463d0594505c7252d730cb8f65a7be89 (diff)
rssh
Diffstat (limited to 'korean')
-rw-r--r--korean/security/2019/dsa-4377.wml23
1 files changed, 23 insertions, 0 deletions
diff --git a/korean/security/2019/dsa-4377.wml b/korean/security/2019/dsa-4377.wml
new file mode 100644
index 00000000000..e66fe0418cf
--- /dev/null
+++ b/korean/security/2019/dsa-4377.wml
@@ -0,0 +1,23 @@
+#use wml::debian::translation-check translation="5ab30aafbfd62a548582887f297aa136a1d43e7b" maintainer="Sebul"
+<define-tag description>보안 업데이트</define-tag>
+<define-tag moreinfo>
+<p>The ESnet security team discovered a vulnerability in rssh, a restricted
+shell that allows users to perform only scp, sftp, cvs, svnserve
+(Subversion), rdist and/or rsync operations. Missing validation in the
+scp support could result in the bypass of this restriction, allowing the
+execution of arbitrary shell commands.</p>
+
+<p>업데이트가 적용되면 scp의 <q>-3</q> 옵션은 쓸 수 없습니다.
+</p>
+
+<p>안정 배포(stretch)에서, 이 문제를 버전 2.3.4-5+deb9u1에서 고쳤습니다.</p>
+
+<p>rssh 패키지를 업그레이드 하는 게 좋습니다.</p>
+
+<p>rssh의 자세한 보안 상태는 보안 추적 페이지 참조:
+<a href="https://security-tracker.debian.org/tracker/rssh">\
+https://security-tracker.debian.org/tracker/rssh</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2019/dsa-4377.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy