Sigurnosni naputci iz 2000.

[25. 12. 2000.] DSA-008 dialog - insecure temporary files
[25. 12. 2000.] DSA-010 gnupg - cheating with detached signatures, circumvention of web of trust
[25. 12. 2000.] DSA-009 stunnel - insecure file handling, format string bug
[20. 12. 2000.] DSA-007 zope - insufficient protection
[19. 12. 2000.] DSA-006 zope - privilege escalation
[17. 12. 2000.] DSA-004 nano - symlink attack
[17. 12. 2000.] DSA-005 slocate - local exploit
[01. 12. 2000.] DSA-003 joe - symlink attack
[30. 11. 2000.] DSA-002 fsh - symlink attack
[29. 11. 2000.] DSA-001 ed - symlink attack
[25. 11. 2000.] mc - local DoS
[23. 11. 2000.] ghostscript - symlink attack
[21. 11. 2000.] joe - symlink attack
[22. 11. 2000.] modutils - local buffer overflow
[22. 11. 2000.] koules - local root exploit
[21. 11. 2000.] ethereal - remote exploit
[21. 11. 2000.] ncurses - local privilege escalation
[21. 11. 2000.] xmcd - untrustworthy privileged binaries
[20. 11. 2000.] modutils - local exploit
[20. 11. 2000.] tcpdump - remote denial of service
[19. 11. 2000.] cupsys - remote misuse of printer
[18. 11. 2000.] openssh - possible remote exploit
[18. 11. 2000.] cron - local privilege escalation
[12. 11. 2000.] bind - remote Denial of Service
[11. 11. 2000.] gnupg - incorrect signature verification
[11. 11. 2000.] tcsh - local exploit
[14. 10. 2000.] nis - local exploit
[14. 10. 2000.] php4 - possible remote exploit
[14. 10. 2000.] php3 - possible remote exploit
[13. 10. 2000.] traceroute - local root exploit
[13. 10. 2000.] curl and curl-ssl - remote exploit
[09. 10. 2000.] boa - exposes contents of local files
[08. 10. 2000.] esound - race condition
[19. 09. 2000.] sysklogd - root exploit
[11. 09. 2000.] libpam-smb - remote root exploit
[10. 09. 2000.] imp - remote compromise
[10. 09. 2000.] xpdf - local exploit
[02. 09. 2000.] glibc - local root exploit
[02. 09. 2000.] screen - local exploit
[01. 09. 2000.] netscape navigator/communicator - remote exploit
[30. 08. 2000.] ntop - Still remotely exploitable using buffer overflows
[30. 08. 2000.] xchat - Command Execution Via URLs Vulnerability
[21. 08. 2000.] zope - unauthorized escalation of privilege (update)
[16. 08. 2000.] xlockmore - possible shadow file compromise
[11. 08. 2000.] zope - unauthorized escalation of privilege
[08. 08. 2000.] mailx - local exploit
[28. 07. 2000.] dhcp client - remote root exploit in dhcp client
[27. 07. 2000.] userv - local exploit
[11. 07. 2000.] ftpd - buffer overflow in ftpd
[16. 07. 2000.] cvsweb - unauthorized remote code execution
[15. 07. 2000.] rpc.statd - remote root exploit
[01. 07. 2000.] canna server - buffer overflow
[28. 06. 2000.] dhcp client - remote root exploit in dhcp client
[22. 06. 2000.] wu-ftpd - remote root exploit in wu-ftpd
[19. 06. 2000.] xinetd - bug in access control mechanism
[12. 06. 2000.] kernel - bug in capabilities handling allows root exploits
[05. 06. 2000.] mailx - mail group exploit in mailx
[05. 06. 2000.] splitvt - root exploit in splitvt
[28. 03. 2000.] dump - reported exploit in dump
[09. 03. 2000.] mtr - possible local exploit in mtr
[28. 02. 2000.] nmh - remote exploit in nmh
[26. 02. 2000.] htdig - remote users can read files with webserver uid
[14. 02. 2000.] make - symlink attack in make
[01. 02. 2000.] apcd - symlink attack in apcd
[09. 01. 2000.] lpr - access control problem and root exploit
[08. 01. 2000.] nvi - incorrect file removal in boot script

Najnovija Debian sigurnosna upozorenja možete dobiti pretplatom na našu debian-security-announce mailing listu. Također možete pregledati arhive te liste.