aboutsummaryrefslogtreecommitdiffstats
path: root/korean/security/2020/dsa-4611.wml
blob: 1c8126a9e75c951d5094fd55ada16ae34cac59a1 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
#use wml::debian::translation-check translation="3ca692b931073b2f0a3154ffd1fc96ac6743ed54" mindelta="-1"
# 주의: 불완전한 번역. 번역을 마친 다음 위의 'mindelta="-1"'을 지우십시오.
<define-tag description>보안 업데이트</define-tag>
<define-tag moreinfo>
<p>Qualys는 OpenSMTPD SMTP 서버가 e-메일 주소유효성 검사를 불충분하게 수행함을 발견하였으며
이는 임의 명령을 루트로 실행할 수 있습니다.
또한 이 업데이트는 opportunistic TLS 다운그레이드를 트리거하여
서비스 거부를 수정합니다.
Qualys discovered that the OpenSMTPD SMTP server performed insufficient
validation of email addresses which could result in the execution of
arbitrary commands as root. In addition this update fixes a denial of
service by triggering an opportunistic TLS downgrade.</p>

<p>For the oldstable distribution (stretch), these problems have been fixed
in version 6.0.2p1-2+deb9u2.</p>

<p>For the stable distribution (buster), these problems have been fixed in
version 6.0.3p1-5+deb10u3. This update also includes non-security
bugfixes which were already lined up for the Buster 10.3 point release.</p>

<p>opensmtpd 패키지를 업그레이드 하는 게 좋습니다.</p>

<p>For the detailed security status of opensmtpd please refer to
its security tracker page at:
<a href="https://security-tracker.debian.org/tracker/opensmtpd">\
https://security-tracker.debian.org/tracker/opensmtpd</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2020/dsa-4611.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy