aboutsummaryrefslogtreecommitdiffstats
path: root/polish/security/cve-compatibility.wml
diff options
context:
space:
mode:
authorKonrad Bielak <vandut>2005-12-01 12:07:40 +0000
committerKonrad Bielak <vandut>2005-12-01 12:07:40 +0000
commitf740bf5fbb7a921d29031185533f9e62e69f328d (patch)
tree0b614576412389628c0c3ee965f6af60c18039f8 /polish/security/cve-compatibility.wml
parent1b72ded16f8480cd690a7578538d5fe2e7f3b0a1 (diff)
New update.current
CVS version numbers polish/.wmlrc: 1.4 -> 1.5 polish/contact.wml: 1.31 -> 1.32 polish/donations.wml: 1.35 -> 1.36 polish/social_contract.wml: 1.8 -> 1.9 polish/support.wml: 1.29 -> 1.30 polish/Bugs/Developer.wml: 1.23 -> 1.24 polish/Bugs/server-control.wml: 1.10 -> 1.11 polish/Bugs/server-refcard.wml: 1.9 -> 1.10 polish/Bugs/server-request.wml: 1.7 -> 1.8 polish/CD/index.wml: 1.19 -> 1.20 polish/CD/faq/index.wml: 1.30 -> 1.31 polish/CD/http-ftp/index.wml: 1.10 -> 1.11 polish/CD/mirroring/rsync-mirrors.wml: 1.2 -> 1.3 polish/CD/vendors/index.wml: 1.24 -> 1.25 polish/CD/vendors/legal.wml: 1.8 -> 1.9 polish/MailingLists/debian-announce.wml: 1.4 -> 1.5 polish/MailingLists/disclaimer.wml: 1.2 -> 1.3 polish/News/2002/20021216.wml: 1.4 -> 1.5 polish/News/2003/20030119.wml: 1.3 -> 1.4 polish/News/2003/20030127.wml: 1.3 -> 1.4 polish/News/2003/20030811.wml: 1.5 -> 1.6 polish/News/2003/20031005.wml: 1.4 -> 1.5 polish/News/2003/20031121a.wml: 1.5 -> 1.6 polish/News/2004/20040406.wml: 1.3 -> 1.4 polish/News/2004/20040515.wml: 1.1 -> 1.2 polish/News/2004/20040524.wml: 1.4 -> 1.5 polish/News/2004/20041026.wml: 1.2 -> 1.3 polish/News/weekly/contributing.wml: 1.10 -> 1.11 polish/News/weekly/index.wml: 1.8 -> 1.9 polish/News/weekly/2004/05/index.wml: 1.3 -> 1.4 polish/News/weekly/2004/10/index.wml: 1.6 -> 1.7 polish/News/weekly/2004/11/index.wml: 1.2 -> 1.3 polish/News/weekly/2004/20/index.wml: 1.2 -> 1.3 polish/News/weekly/2004/23/index.wml: 1.5 -> 1.6 polish/News/weekly/2004/27/index.wml: 1.2 -> 1.3 polish/News/weekly/2004/32/index.wml: 1.2 -> 1.3 polish/News/weekly/2004/33/index.wml: 1.3 -> 1.4 polish/News/weekly/2004/34/index.wml: 1.3 -> 1.4 polish/News/weekly/2004/35/index.wml: 1.4 -> 1.5 polish/News/weekly/2004/36/index.wml: 1.6 -> 1.7 polish/News/weekly/2004/37/index.wml: 1.2 -> 1.3 polish/banners/index.wml: 1.2 -> 1.3 polish/consultants/757_technologies.wml: 1.3 -> 1.4 polish/consultants/aerasec.wml: 1.3 -> 1.4 polish/consultants/alex_r.wml: 1.2 -> 1.3 polish/consultants/altoros.wml: 1.3 -> 1.4 polish/consultants/andreas_o.wml: 1.2 -> 1.3 polish/consultants/andreu_i.wml: 1.2 -> 1.3 polish/consultants/andrew_f.wml: 1.2 -> 1.3 polish/consultants/anthony_p.wml: 1.3 -> 1.4 polish/consultants/avalonix.wml: 1.2 -> 1.3 polish/consultants/baltazar_q.wml: 1.2 -> 1.3 polish/consultants/bao_h.wml: 1.2 -> 1.3 polish/consultants/beeznest.wml: 1.2 -> 1.3 polish/consultants/ben_b.wml: 1.2 -> 1.3 polish/consultants/benjamin_s.wml: 1.2 -> 1.3 polish/consultants/blue_orb.wml: 1.2 -> 1.3 polish/consultants/brickred_technologies.wml: 1.2 -> 1.3 polish/consultants/bruce_p.wml: 1.2 -> 1.3 polish/consultants/bryan_b.wml: 1.2 -> 1.3 polish/consultants/carlos_hg.wml: 1.3 -> 1.4 polish/consultants/catalyst.wml: 1.3 -> 1.4 polish/consultants/filippo_giunchedi.wml: 1.2 -> 1.3 polish/consultants/heureka.wml: 1.2 -> 1.3 polish/consultants/iceguard.wml: 1.2 -> 1.3 polish/consultants/john_b.wml: 1.2 -> 1.3 polish/consultants/lawrence_c.wml: 1.2 -> 1.3 polish/consultants/linunet.wml: 1.2 -> 1.3 polish/consultants/michael_b.wml: 1.2 -> 1.3 polish/consultants/mohawk_software.wml: 1.2 -> 1.3 polish/consultants/nils_r.wml: 1.3 -> 1.4 polish/consultants/rafez_n.wml: 1.2 -> 1.3 polish/consultants/sosa.wml: 1.2 -> 1.3 polish/consultants/stuart_t.wml: 1.2 -> 1.3 polish/consultants/turo_technology.wml: 1.2 -> 1.3 polish/consultants/ultreia.wml: 1.3 -> 1.4 polish/consultants/vivek_k.wml: 1.2 -> 1.3 polish/devel/index.wml: 1.26 -> 1.27 polish/devel/debian-desktop/index.wml: 1.7 -> 1.8 polish/devel/debian-installer/archive.wml: 1.3 -> 1.4 polish/devel/debian-installer/errata.wml: 1.9 -> 1.10 polish/devel/debian-installer/gtk-frontend.wml: 1.8 -> 1.9 polish/devel/debian-installer/ports-status.wml: 1.19 -> 1.20 polish/devel/debian-installer/svn.wml: 1.5 -> 1.6 polish/devel/debian-installer/News/2004/8.wml: 1.3 -> 1.4 polish/devel/debian-installer/News/2004/9.wml: 1.3 -> 1.4 polish/devel/debian-installer/News/2004/99.wml: 1.2 -> 1.3 polish/devel/debian-med/index.wml: 1.6 -> 1.7 polish/devel/debian-med/practice.wml: 1.3 -> 1.4 polish/devel/join/index.wml: 1.2 -> 1.3 polish/devel/join/newmaint.wml: 1.2 -> 1.3 polish/devel/join/nm-step1.wml: 1.3 -> 1.4 polish/devel/join/nm-step2.wml: INITIAL -> 1.1 polish/devel/website/index.wml: 1.2 -> 1.3 polish/devel/wnpp/index.wml: 1.12 -> 1.13 polish/devel/wnpp/wnpp.wml: 1.3 -> 1.4 polish/devel/wnpp/work_needing.wml: 1.2 -> 1.3 polish/distrib/cd.wml: 1.5 -> 1.6 polish/distrib/ftplist.wml: 1.20 -> 1.21 polish/doc/books.wml: 1.17 -> 1.18 polish/doc/cvs.wml: 1.7 -> 1.8 polish/doc/ddp.wml: 1.3 -> 1.4 polish/doc/devel-manuals.wml: 1.7 -> 1.8 polish/doc/docpolicy.wml: 1.6 -> 1.7 polish/doc/misc-manuals.wml: 1.5 -> 1.6 polish/doc/todo.wml: 1.3 -> 1.4 polish/doc/topics.wml: 1.4 -> 1.5 polish/doc/user-manuals.wml: 1.15 -> 1.16 polish/international/index.wml: 1.17 -> 1.18 polish/international/Polish/bezpieczny_debian.wml: 1.5 -> 1.6 polish/international/Polish/free.wml: 1.2 -> 1.3 polish/international/Polish/index.wml: 1.17 -> 1.18 polish/international/Polish/instalacja_potato.wml: 1.3 -> 1.4 polish/international/Polish/manifest.wml: 1.2 -> 1.3 polish/international/Polish/polaczenie_z_internetem.wml: 1.2 -> 1.3 polish/international/Polish/system_pakietow.wml: 1.4 -> 1.5 polish/international/Polish/wprowadzenie.wml: 1.2 -> 1.3 polish/international/Polish/wstep_do_debiana.wml: 1.3 -> 1.4 polish/intro/about.wml: 1.39 -> 1.40 polish/intro/cn.wml: 1.38 -> 1.39 polish/intro/search.wml: 1.3 -> 1.4 polish/intro/why_debian.wml: 1.13 -> 1.14 polish/legal/cryptoinmain.wml: INITIAL -> 1.1 polish/legal/index.wml: INITIAL -> 1.1 polish/legal/notificationforarchive.wml: INITIAL -> 1.1 polish/legal/notificationfornewpackages.wml: INITIAL -> 1.1 polish/mirror/official_sponsors.wml: 1.4 -> 1.5 polish/mirror/sponsors.wml: 1.2 -> 1.3 polish/mirror/submit.wml: 1.3 -> 1.4 polish/misc/awards.wml: 1.5 -> 1.6 polish/misc/memberships.wml: 1.4 -> 1.5 polish/partners/partners-form.wml: 1.4 -> 1.5 polish/po/bugs.pl.po: 1.12 -> 1.13 polish/po/countries.pl.po: 1.11 -> 1.12 polish/po/distrib.pl.po: 1.6 -> 1.7 polish/po/doc.pl.po: 1.6 -> 1.7 polish/po/langs.pl.po: 1.15 -> 1.16 polish/po/organization.pl.po: 1.13 -> 1.14 polish/po/others.pl.po: 1.20 -> 1.21 polish/po/ports.pl.po: 1.6 -> 1.7 polish/po/security.pl.po: 1.9 -> 1.10 polish/po/templates.pl.po: 1.19 -> 1.20 polish/ports/amd64/index.wml: 1.9 -> 1.10 polish/ports/freebsd/bsd-libc-based.wml: INITIAL -> 1.1 polish/ports/i386/index.wml: 1.3 -> 1.4 polish/ports/netbsd/news.wml: 1.3 -> 1.4 polish/releases/index.wml: 1.28 -> 1.29 polish/releases/potato/index.wml: 1.29 -> 1.30 polish/releases/sarge/index.wml: 1.14 -> 1.15 polish/releases/slink/index.wml: 1.19 -> 1.20 polish/releases/woody/errata.wml: 1.7 -> 1.8 polish/releases/woody/installmanual.wml: 1.8 -> 1.9 polish/releases/woody/releasenotes.wml: 1.3 -> 1.4 polish/security/crossreferences.wml: INITIAL -> 1.1 polish/security/cve-compatibility.wml: INITIAL -> 1.1 polish/security/index.wml: 1.30 -> 1.31 polish/security/2003/dsa-231.wml: 1.3 -> 1.4 polish/security/2003/dsa-233.wml: 1.3 -> 1.4 polish/security/2004/CAN-2004-0077.wml: INITIAL -> 1.1 polish/security/2004/CAN-2004-0109.wml: INITIAL -> 1.1 polish/security/2004/dsa-423.wml: 1.3 -> 1.4 polish/security/2004/dsa-432.wml: 1.2 -> 1.3 polish/security/2004/dsa-445.wml: 1.2 -> 1.3 polish/security/2004/dsa-446.wml: 1.3 -> 1.4 polish/security/2004/dsa-447.wml: 1.2 -> 1.3 polish/security/2004/dsa-462.wml: 1.3 -> 1.4 polish/security/2004/dsa-469.wml: INITIAL -> 1.1 polish/security/2004/dsa-470.wml: INITIAL -> 1.1 polish/security/2004/dsa-471.wml: INITIAL -> 1.1 polish/security/2004/dsa-472.wml: INITIAL -> 1.1 polish/security/2004/dsa-473.wml: INITIAL -> 1.1 polish/security/2004/dsa-474.wml: INITIAL -> 1.1 polish/security/2004/dsa-475.wml: INITIAL -> 1.1 polish/security/2004/dsa-476.wml: INITIAL -> 1.1 polish/security/2004/dsa-477.wml: INITIAL -> 1.1 polish/security/2004/dsa-478.wml: INITIAL -> 1.1 polish/security/2004/dsa-479.wml: INITIAL -> 1.1 polish/security/2004/dsa-480.wml: INITIAL -> 1.1 polish/security/2004/dsa-481.wml: INITIAL -> 1.1 polish/security/2004/dsa-482.wml: INITIAL -> 1.1 polish/security/2004/dsa-483.wml: INITIAL -> 1.1 polish/security/2004/dsa-484.wml: INITIAL -> 1.1 polish/security/2004/dsa-485.wml: INITIAL -> 1.1 polish/security/2004/dsa-486.wml: INITIAL -> 1.1 polish/security/2004/dsa-487.wml: INITIAL -> 1.1 polish/security/2004/dsa-488.wml: INITIAL -> 1.1 polish/security/2004/dsa-489.wml: INITIAL -> 1.1 polish/security/2004/dsa-490.wml: INITIAL -> 1.1 polish/security/2004/dsa-491.wml: INITIAL -> 1.1 polish/security/2004/dsa-492.wml: INITIAL -> 1.1 polish/security/2004/dsa-493.wml: INITIAL -> 1.1 polish/security/2004/dsa-494.wml: INITIAL -> 1.1 polish/security/2004/dsa-531.wml: INITIAL -> 1.1 polish/security/2004/dsa-532.wml: INITIAL -> 1.1 polish/security/2004/dsa-533.wml: INITIAL -> 1.1 polish/security/2004/dsa-534.wml: INITIAL -> 1.1 polish/security/2004/dsa-535.wml: INITIAL -> 1.1 polish/security/2004/dsa-536.wml: INITIAL -> 1.1 polish/security/2004/dsa-538.wml: INITIAL -> 1.1 polish/security/2004/dsa-540.wml: 1.2 -> 1.3 polish/users/index.wml: INITIAL -> 1.1 polish/y2k/index.wml: INITIAL -> 1.1
Diffstat (limited to 'polish/security/cve-compatibility.wml')
-rw-r--r--polish/security/cve-compatibility.wml95
1 files changed, 95 insertions, 0 deletions
diff --git a/polish/security/cve-compatibility.wml b/polish/security/cve-compatibility.wml
new file mode 100644
index 00000000000..9d660dea178
--- /dev/null
+++ b/polish/security/cve-compatibility.wml
@@ -0,0 +1,95 @@
+#pddp rafalm80
+#use wml::debian::template title="Debian CVE compatibility" NOHEADER="true"
+#include "$(ENGLISHDIR)/security/faq.inc"
+#use wml::debian::translation-check translation="1.3"
+
+<H1>Zgodność Debiana i CVE</H1>
+
+<P>Deweloperzy Debiana zrozumieli potrzebę dostarczania aktualnych i
+dokładnych informacji dotyczących bezpieczeństwa jego dystrybucji,
+pozwalając użytkownikom podołać ryzyku zwiazanym ze słabymi punktami
+bezpieczeństwa. <a href="http://cve.mitre.org">CVE</A> umożliwia
+dostarczenie typotych informacji, które pozwalają użytkownikom na
+rozwinąć proces zarządzania bezpieczeństwem z aktywnym CVE.</p>
+
+<P>Projekt CVE (The Common Vulnerabilities and Exposures), prowadzony
+przez korporacje MITRE, jest listą zestandaryzowanych nazw dla luk i
+słabych punktów bezpieczeństwa.
+Więcej informacji znajdziesz na <url "http://cve.mitre.org/">.</P>
+
+<P>Debian believes that providing users with additional information
+related to security issues that affect the Debian distribution is
+extremely important. The inclusion of CVE names in advisories help
+users associate generic vulnerabilities with specific Debian updates,
+which reduces the time spent handling vulnerabilities that affect our users.
+Also, it eases the management of security in an environment where
+CVE-enabled security tools such as network or host intrusion detection systems,
+or vulnerability assessment tools are already deployed regardless of
+whether or not they are based on the Debian distribution.
+
+<P>Debian has added CVE names to all the security advisories (DSA)
+released since september 1998 through a review process started on
+august 2002. All of the advisories can be retrieved on the Debian
+web site, and announcements related to new vulnerabilities include
+CVE names if available at the time of their release. Advisories
+associated with a given CVE name can be searched directly through
+the <a href="http://search.debian.org">search engine</A>.
+
+<P>Users who want to search for a particular CVE name can use the web
+search engine available in debian.org to retrieve advisories available
+(in English and translated to other languages) associated with CVE names.
+A search can be made for a specific name (like
+<a href="http://search.debian.org/?q=advisory+%22CAN-2002-0001%22&amp;ps=50&amp;o=1&amp;m=all">advisory CAN-2002-0001</A>)
+or for partial names
+(like all the 2002 candidates included in advisories <a href="http://search.debian.org/?q=advisory+%22CAN-2002%22&amp;ps=50&amp;o=1&amp;m=all">advisory CAN-2002</A>).
+Notice that you need to enter the word <em>advisory</em> together with the
+CVE name in order to retrieve <strong>only</strong> security advisories.
+
+<P>Moreover, Debian provides a fully <a href="crossreferences">crossreference
+table</A> including all the references available for all the advisories
+published since 1998. This table is provided to complement the
+<a href="http://cve.mitre.org/cve/refs/refmap/source-DEBIAN.html">reference
+map available at CVE</A>.
+
+<H1>Common questions on CVE status</H1>
+
+<maketoc>
+
+<toc-add-entry name=status>What is the current status of Debian in the CVE process?</toc-add-entry>
+<P>Debian is in the first phase of the two phases in the CVE process.</P>
+
+<toc-add-entry name=find>Why don't I find a given CVE name?</toc-add-entry>
+
+<P>You might not find a given CVE name in published advisories either
+because:
+<UL>
+<LI>Debian is not affected by that vulnerability.
+<LI>There is not yet an advisory covering that vulnerability.
+<LI>An advisory was published before a CVE name was assigned to a given
+vulnerability.
+</UL>
+
+<toc-add-entry name=candidates>What is the difference between a CVE entry and a candidate?</toc-add-entry>
+
+<P>(from the CVE site) CVE candidates are those vulnerabilities or
+exposures under consideration for acceptance into CVE.
+Candidates are assigned special names to distinguish them
+from official CVE entries.</P>
+
+<P>Candidates are assigned special numbers that distinguish them from CVE
+entries. However, these numbers become CVE entries if the candidate is
+accepted into CVE. For example, a candidate number might be
+CAN-1999-0067, while its eventual CVE number would be CVE-1999-0067.
+Also, the assignment of a candidate number is not a guarantee that it
+will become an official CVE entry.</P>
+
+<P>The database of published advisories is revised periodically to
+determine those candidates that have been accepted as CVE entries.
+
+<P>For more information please read
+<a href="http://cve.mitre.org/about/candidates.html">CVE Candidates explained</A>.
+
+<toc-add-entry name=moreinfo>Gdzie mogę uzyskać więcej informacji?</toc-add-entry>
+
+<P>Więcej informacji znajdziesz na <a
+href="http://cve.mitre.org/">stronie CVE</a>.

© 2014-2024 Faster IT GmbH | imprint | privacy policy