[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-{1985,2086,1983,1968,2109,2026,2120,2118,2091,2022,2046}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-1968.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1968.wml	2016-02-16 12:24:35.322949041 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that pdns-recursor, the PowerDNS recursive name
- -server, contains several vulnerabilities:</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено Ñ?Ñ?о pdns-recursor, Ñ?еÑ?веÑ? Ñ?екÑ?Ñ?Ñ?ивнÑ?Ñ? имÑ?н
+PowerDNS, Ñ?одеÑ?жиÑ? неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4009";>CVE-2009-4009</a>
 
- -<p>A buffer overflow can be exploited to crash the daemon, or potentially
- -execute arbitrary code.</p></li>
+<p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки Ñ?лÑ?жбÑ? или поÑ?енÑ?иалÑ?ного
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4010";>CVE-2009-4010</a>
 
- -<p>A cache poisoning vulnerability may allow attackers to trick the
- -server into serving incorrect DNS data.</p></li>
+<p>Ð?Ñ?Ñ?авление кеÑ?а можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникам заÑ?Ñ?авиÑ?Ñ?
+Ñ?еÑ?веÑ? пеÑ?едаÑ?Ñ? некоÑ?Ñ?екÑ?нÑ?е даннÑ?е DNS.</p></li>
 </ul>
 
- -<p>For the oldstable distribution (etch), fixed packages will be
- -provided soon.</p>
+<p>Ð?лÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (etch) иÑ?пÑ?авленнÑ?е пакеÑ?Ñ? бÑ?дÑ?Ñ?
+пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 3.1.7-1+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.1.7-1+lenny1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 3.1.7.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.1.7.2-1.</p>
 
- -<p>We recommend that you upgrade your pdns-recursor package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? pdns-recursor.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-1983.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1983.wml	2016-02-16 12:21:29.429114923 +0500
@@ -1,29 +1,30 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Wireshark
- -network traffic analyzer, which may lead to the execution of arbitrary
- -code or denial of service. The Common Vulnerabilities and Exposures
- -project identifies the following problems: </p>
+<p>Ð? Wireshark, анализаÑ?оÑ?е Ñ?еÑ?евого Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+кода или оÑ?казÑ? в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?: </p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4377";>CVE-2009-4377</a>
 
- -    <p>A NULL pointer dereference was found in the SMB/SMB2 dissectors.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ? в диÑ?Ñ?екÑ?оÑ?аÑ? SMB/SMB2.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0304";>CVE-2010-0304</a>
 
- -    <p>Several buffer overflows were found in the LWRES dissector.</p></li>
+    <p>Ð?еÑ?колÑ?ко пеÑ?еполнений бÑ?Ñ?еÑ?а бÑ?ло обнаÑ?Ñ?жено в диÑ?Ñ?екÑ?оÑ?е LWRES.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in 
- -version 1.0.2-3+lenny8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.2-3+lenny8.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.2.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.6-1.</p>
 
- -<p>We recommend that you upgrade your Wireshark packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Wireshark.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-1985.wml	2010-12-21 07:01:52.000000000 +0500
+++ russian/security/2010/dsa-1985.wml	2016-02-16 12:16:11.434139803 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>insufficient input validation</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that sendmail, a Mail Transport Agent, does not properly handle
- -a '\0' character in a Common Name (CN) field of an X.509 certificate.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о sendmail, агенÑ? пеÑ?еÑ?Ñ?лки поÑ?Ñ?Ñ?, непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ?
+Ñ?имвол '\0' в поле Common Name (CN) Ñ?еÑ?Ñ?иÑ?икаÑ?а X.509.</p>
 
- -<p>This allows an attacker to spoof arbitrary SSL-based SMTP servers via a crafted server
- -certificate issued by a legitimate Certification Authority, and to bypass intended
- -access restrictions via a crafted client certificate issued by a legitimate
- -Certification Authority.</p>
+<p>ЭÑ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? подделÑ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е SMTP-Ñ?еÑ?веÑ?Ñ? Ñ? SSL пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованного Ñ?еÑ?веÑ?ного Ñ?еÑ?Ñ?иÑ?икаÑ?а, вÑ?данного дейÑ?Ñ?вÑ?Ñ?Ñ?им авÑ?оÑ?иÑ?еÑ?ом и обÑ?одиÑ?Ñ?
+огÑ?аниÑ?ениÑ? доÑ?Ñ?Ñ?па пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного клиенÑ?Ñ?кого Ñ?еÑ?Ñ?иÑ?икаÑ?а, вÑ?данного
+дейÑ?Ñ?вÑ?Ñ?Ñ?им авÑ?оÑ?иÑ?еÑ?ом.</p>
 
- -<p>For the oldstable distribution (etch), this problem has been fixed in
- -version 8.13.8-3+etch1</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.13.8-3+etch1</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 8.14.3-5+lenny1</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.14.3-5+lenny1</p>
 
- -<p>For the  unstable distribution (sid), this problem has been fixed in
- -version 8.14.3-9.1, and will migrate to the testing distribution (squeeze)
- -shortly.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.14.3-9.1, Ñ?Ñ?а веÑ?Ñ?иÑ? в ближайÑ?ее вÑ?емÑ? пеÑ?ейдÑ?Ñ? в
+Ñ?еÑ?Ñ?иÑ?Ñ?емÑ?й вÑ?пÑ?Ñ?к (squeeze).</p>
 
- -<p>We recommend that you upgrade your sendmail package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? sendmail.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2022.wml	2010-03-25 02:27:19.000000000 +0500
+++ russian/security/2010/dsa-2022.wml	2016-02-16 13:03:04.765087104 +0500
@@ -1,29 +1,30 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in mediawiki, a web-based wiki
- -engine.  The following issues have been identified:</p>
+<p>Ð? mediawiki, веб-движке длÑ? вики, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?ли опÑ?еделенÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
- -<li><p>Insufficient input sanitization in the CSS validation code allows editors
- -to display external images in wiki pages.  This can be a privacy concern
- -on public wikis as it allows attackers to gather IP addresses and other
- -information by linking these images to a web server under their control.</p></li>
- -
- -<li><p>Insufficient permission checks have been found in thump.php which can lead
- -to disclosure of image files that are restricted to certain users
- -(e.g. with img_auth.php).</p></li>
+<li><p>Ð?едоÑ?Ñ?аÑ?оÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ? в коде пÑ?овеÑ?ки CSS позволÑ?еÑ? Ñ?едакÑ?оÑ?ам
+оÑ?обÑ?ажаÑ?Ñ? внеÑ?ние изобÑ?ажениÑ? на вики-Ñ?Ñ?Ñ?аниÑ?аÑ?.  ЭÑ?о можеÑ? вÑ?зÑ?ваÑ?Ñ? пÑ?облемÑ? конÑ?иденÑ?иалÑ?ноÑ?Ñ?и
+на пÑ?блиÑ?нÑ?Ñ? вики, Ñ?ак как Ñ?Ñ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам Ñ?обиÑ?аÑ?Ñ? IP адÑ?еÑ?а и дÑ?Ñ?гÑ?Ñ?
+инÑ?оÑ?маÑ?иÑ?, оÑ?Ñ?авлÑ?Ñ? Ñ?Ñ?Ñ?лки на изобÑ?ажениÑ? на Ñ?воÑ?м веб-Ñ?еÑ?веÑ?е.</p></li>
+
+<li><p>Ð?едоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки пÑ?ав доÑ?Ñ?Ñ?па бÑ?ли обнаÑ?Ñ?женÑ? в thump.php, коÑ?оÑ?Ñ?е могÑ?Ñ?
+пÑ?иводиÑ?Ñ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? Ñ?айлов изобÑ?ажений, длÑ? коÑ?оÑ?Ñ?Ñ? Ñ?Ñ?Ñ?ановленÑ? огÑ?аниÑ?ениÑ? длÑ? опÑ?еделÑ?ннÑ?Ñ?
+полÑ?зоваÑ?елей (напÑ?имеÑ?, пÑ?и помоÑ?и img_auth.php).</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.12.0-2lenny4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.12.0-2lenny4.</p>
 
- -<p>For the testing distribution (squeeze), these problems have been fixed in
- -version 1:1.15.2-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:1.15.2-1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1:1.15.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:1.15.2-1.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2026.wml	2010-04-03 03:29:55.000000000 +0600
+++ russian/security/2010/dsa-2026.wml	2016-02-16 12:34:17.743268221 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>stack-based buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
 
- -<p>Marc Schoenefeld discovered a stack-based buffer overflow in the XPM reader
- -implementation in netpbm-free, a suite of image manipulation utilities.
- -An attacker could cause a denial of service (application crash) or possibly
- -execute arbitrary code via an XPM image file that contains a crafted header
- -field associated with a large color index value.</p>
+<p>Ð?аÑ?к ШÑ?нÑ?Ñ?елÑ?д обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?еализаÑ?ии коде длÑ? Ñ?Ñ?иÑ?Ñ?ваниÑ?
+XPM в netpbm-free, набоÑ?е Ñ?Ñ?илиÑ? длÑ? обÑ?абоÑ?ки изобÑ?ажений.
+Ð?лоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) или вÑ?полниÑ?Ñ?
+пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?айла Ñ? изобÑ?ажением XPM, Ñ?одеÑ?жаÑ?им Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное
+поле заголовка, аÑ?Ñ?оÑ?ииÑ?ованное Ñ? болÑ?Ñ?им знаÑ?ением Ñ?казаÑ?елÑ? Ñ?веÑ?а.</p>
 
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 2:10.0-12+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2:10.0-12+lenny1.</p>
 
- -<p>For the testing distribution (squeeze), this problem has been fixed in
- -version 2:10.0-12.1+squeeze1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2:10.0-12.1+squeeze1.</p>
 
- -<p>For the unstable distribution (sid), this problem will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
 
- -<p>Due to a problem with the archive system it is not possible to release
- -all architectures. The missing architectures will be installed into the
- -archive once they become available.</p>
+<p>Ð?з-за пÑ?облемÑ? в Ñ?иÑ?Ñ?еме аÑ?Ñ?ива, пакеÑ? нелÑ?зÑ? вÑ?пÑ?Ñ?Ñ?иÑ?Ñ? длÑ?
+вÑ?еÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?. Ð?бновлениÑ? длÑ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? бÑ?дÑ?Ñ? Ñ?Ñ?Ñ?ановленÑ? в
+аÑ?Ñ?ив по меÑ?е иÑ? доÑ?Ñ?Ñ?пноÑ?Ñ?и.</p>
 
- -<p>We recommend that you upgrade your netpbm-free package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? netpbm-free.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2046.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2046.wml	2016-02-16 13:06:14.335819071 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in phpgroupware, a
- -Web based groupware system written in PHP. The Common Vulnerabilities 
- -and Exposures project identifies the following problems:</p>
+<p>Ð? phpgroupware, веб-Ñ?иÑ?Ñ?еме длÑ? коллекÑ?ивной Ñ?абоÑ?Ñ?, напиÑ?анной на PHP,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0403";>CVE-2010-0403</a>
 
- -<p>A local file inclusion vulnerability allows remote attackers to execute
- -arbitrary PHP code and include arbitrary local files.</p></li>
+<p>Ð?клÑ?Ñ?ение локалÑ?ного Ñ?айла позволÑ?еÑ? Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ?
+пÑ?оизволÑ?нÑ?е код PHP и добавлÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е локалÑ?нÑ?е Ñ?айлÑ?.</p></li>
 
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0404";>CVE-2010-0404</a> 
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0404";>CVE-2010-0404</a>
 
- -<p>Multiple SQL injection vulnerabilities allows remote attackers to execute
- -arbitrary SQL commands.</p></li>
+<p>Ð?ногоÑ?иÑ?леннÑ?е инÑ?екÑ?ии SQL позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ?
+пÑ?оизволÑ?нÑ?е командÑ? SQL.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1:0.9.16.012+dfsg-8+lenny2</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:0.9.16.012+dfsg-8+lenny2</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your phpgroupware package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpgroupware.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2086.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2086.wml	2016-02-16 12:18:56.537934748 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Avahi mDNS/DNS-SD
- -daemon. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? Ñ?лÑ?жбе Avahi mDNS/DNS-SD бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0758";>CVE-2009-0758</a>
 
- -    <p>Rob Leslie discovered a denial of service vulnerability in the
- -    code used to reflect unicast mDNS traffic.</p></li>
+    <p>Роб Ð?Ñ?Ñ?ли обнаÑ?Ñ?жил оÑ?каз в обÑ?лÑ?живании в
+    коде, иÑ?полÑ?зÑ?емом длÑ? оÑ?Ñ?ажениÑ? Ñ?Ñ?аÑ?ика одноадÑ?еÑ?ной пеÑ?едаÑ?и mDNS.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-2244";>CVE-2010-2244</a>
 
- -    <p>Ludwig Nussel discovered a denial of service vulnerability in
- -    the processing of malformed DNS packets.</p></li>
+    <p>Ð?Ñ?двиг Ð?Ñ?Ñ?Ñ?елÑ? обнаÑ?Ñ?жил оÑ?каз в обÑ?лÑ?живании в
+    коде обÑ?абоÑ?ки некоÑ?Ñ?екÑ?нÑ?Ñ? пакеÑ?ов DNS.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in 
- -version 0.6.23-3lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.6.23-3lenny2.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 0.6.26-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.6.26-1.</p>
 
- -<p>We recommend that you upgrade your Avahi packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Avahi.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2091.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2091.wml	2016-02-16 12:58:27.303529055 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>No user-specific token implemented</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>не Ñ?еализован ни один полÑ?зоваÑ?елÑ?Ñ?кий Ñ?окен</define-tag>
 <define-tag moreinfo>
- -<p>SquirrelMail, a webmail application, does not employ a user-specific token 
- -for webforms. This allows a remote attacker to perform a Cross Site Request 
- -Forgery (CSRF) attack. The attacker may hijack the authentication of 
- -unspecified victims and send messages or change user preferences among other 
- -actions, by tricking the victim into following a link controlled by the 
- -offender.</p>
+<p>SquirrelMail, пÑ?иложениÑ? длÑ? веб-доÑ?Ñ?Ñ?па к поÑ?Ñ?е, не иÑ?полÑ?зÑ?еÑ? в веб-Ñ?оÑ?маÑ?
+полÑ?зоваÑ?елÑ?Ñ?кие Ñ?окенÑ?. ЭÑ?о позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? подделкÑ?
+межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов (CSRF). Ð?лоÑ?мÑ?Ñ?ленник можеÑ? пеÑ?еÑ?ваÑ?иÑ?Ñ? аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ?
+жеÑ?Ñ?вÑ? и оÑ?пÑ?авиÑ?Ñ? Ñ?ообÑ?ениÑ?, либо измениÑ?Ñ? полÑ?зоваÑ?елÑ?Ñ?кие наÑ?Ñ?Ñ?ойки, а Ñ?акже вÑ?полниÑ?Ñ?
+Ñ?Ñ?д дÑ?Ñ?гиÑ? дейÑ?Ñ?вий в Ñ?лÑ?Ñ?ае, еÑ?ли жеÑ?Ñ?ва оÑ?кÑ?оеÑ? Ñ?Ñ?Ñ?лкÑ?, конÑ?Ñ?олиÑ?Ñ?емÑ?Ñ?
+злоÑ?мÑ?Ñ?ленником.</p>
 
- -<p>In addition, a denial-of-service was fixed, which could be triggered when a 
- -password containing 8-bit characters was used to log in (<a href="https://security-tracker.debian.org/tracker/CVE-2010-2813";>CVE-2010-2813</a>).</p>
+<p>Ð?Ñ?оме Ñ?ого, бÑ?л иÑ?пÑ?авлен оÑ?каз в обÑ?лÑ?живании, коÑ?оÑ?Ñ?й возникаеÑ? в Ñ?лÑ?Ñ?аÑ?Ñ?
+иÑ?полÑ?зованиÑ? паÑ?олÑ?, Ñ?одеÑ?жаÑ?его 8-биÑ?нÑ?е Ñ?имволÑ? (<a href="https://security-tracker.debian.org/tracker/CVE-2010-2813";>CVE-2010-2813</a>).</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.4.15-4+lenny3.1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.15-4+lenny3.1.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution (sid),
- -these problems have been fixed in version 1.4.21-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.4.21-1.</p>
 
- -<p>We recommend that you upgrade your squirrelmail packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? squirrelmail.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2109.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2109.wml	2016-02-16 12:29:07.759546396 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
 
- -<p>A vulnerability has been discovered in samba, a SMB/CIFS file, print,
- -and login server for Unix.</p>
+<p>Ð? samba, SMB/CIFS Ñ?айловом Ñ?еÑ?веÑ?е, Ñ?еÑ?веÑ?е пеÑ?аÑ?и и Ñ?еÑ?веÑ?е аÑ?Ñ?енÑ?иÑ?икаÑ?ии длÑ?
+Unix, бÑ?ла обнаÑ?Ñ?жен Ñ?Ñ?звимоÑ?Ñ?Ñ?.</p>
 
- -<p>The sid_parse() function does not correctly check its input lengths
- -when reading a binary representation of a Windows SID (Security ID).
- -This allows a malicious client to send a sid that can overflow the
- -stack variable that is being used to store the SID in the Samba smbd
- -server. (<a href="https://security-tracker.debian.org/tracker/CVE-2010-3069";>CVE-2010-3069</a>)</p>
- -
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 3.2.5-4lenny13.</p>
- -
- -<p>For the testing distribution (squeeze) and the unstable distribution (sid),
- -this problem will be fixed in version 3.5.5~dfsg-1.</p>
- -
- -<p>We recommend that you upgrade your samba packages. The packages for the
- -mips architecture are not included in this upgrade. They will be released
- -as soon as they become available.</p>
+<p>ФÑ?нкÑ?иÑ? sid_parse() непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? длинÑ? вÑ?однÑ?Ñ? даннÑ?Ñ?
+пÑ?и Ñ?Ñ?ении двоиÑ?ного пÑ?едÑ?Ñ?авлениÑ? Windows SID (Security ID).
+ЭÑ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? иденÑ?иÑ?икаÑ?оÑ? безопаÑ?ноÑ?Ñ?и, коÑ?оÑ?Ñ?й можеÑ? вÑ?зваÑ?Ñ? пеÑ?еполнение
+Ñ?Ñ?Ñ?ковой пеÑ?еменной, иÑ?полÑ?зÑ?Ñ?Ñ?ейÑ?Ñ? длÑ? Ñ?Ñ?анениÑ? SID в Samba-Ñ?еÑ?веÑ?е
+smbd. (<a href="https://security-tracker.debian.org/tracker/CVE-2010-3069";>CVE-2010-3069</a>)</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.2.5-4lenny13.</p>
+
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена в веÑ?Ñ?ии 3.5.5~dfsg-1.</p>
+
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? samba. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ?
+mips оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? в данном обновлении. Ð?ни бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ?
+по меÑ?е иÑ? доÑ?Ñ?Ñ?пноÑ?Ñ?и.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2118.wml	2011-02-22 00:30:21.000000000 +0500
+++ russian/security/2010/dsa-2118.wml	2016-02-16 12:54:07.819374938 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>logic flaw</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>логиÑ?еÑ?каÑ? оÑ?ибка</define-tag>
 <define-tag moreinfo>
- -<p>Kamesh Jayachandran and C. Michael Pilat discovered that the mod_dav_svn
- -module of Subversion, a version control system, is not properly enforcing
- -access rules which are scope-limited to named repositories.  If the
- -SVNPathAuthz option is set to <q>short_circuit</q> set this may enable an
- -unprivileged attacker to bypass intended access restrictions and disclose
- -or modify repository content.</p>
+<p>Ð?амеÑ? Ð?жаÑ?Ñ?андÑ?ан и Ð?айкл Ð?илаÑ? обнаÑ?Ñ?жили, Ñ?Ñ?о модÑ?лÑ? mod_dav_svn
+длÑ? Subversion, Ñ?иÑ?Ñ?емÑ? Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми, непÑ?авилÑ?но иÑ?полÑ?зÑ?еÑ?
+пÑ?авила доÑ?Ñ?Ñ?па, коÑ?оÑ?Ñ?е огÑ?аниÑ?енÑ? поименованнÑ?ми Ñ?епозиÑ?оÑ?иÑ?ми.  Ð?Ñ?ли
+опÑ?иÑ? SVNPathAuthz Ñ?Ñ?Ñ?ановлена в знаÑ?ение <q>short_circuit</q>, Ñ?о Ñ?Ñ?о можеÑ? позволиÑ?Ñ?
+непÑ?ивилегиÑ?ованномÑ? злоÑ?мÑ?Ñ?ленникÑ? обойÑ?и огÑ?аниÑ?ениÑ? доÑ?Ñ?Ñ?па и Ñ?аÑ?кÑ?Ñ?Ñ?Ñ?
+или измениÑ?Ñ? Ñ?одеÑ?жимое Ñ?епозиÑ?оÑ?иÑ?.</p>
 
- -<p>As a workaround it is also possible to set SVNPathAuthz to <q>on</q> but be
- -advised that this can result in a performance decrease for large
- -repositories.</p>
+<p>Ð? каÑ?еÑ?Ñ?ве вÑ?еменного Ñ?еÑ?ениÑ? можно вÑ?Ñ?Ñ?авиÑ?Ñ? опÑ?иÑ? SVNPathAuthz в знаÑ?ение <q>on</q>, но
+Ñ?Ñ?Ñ?иÑ?е, Ñ?Ñ?о Ñ?Ñ?о можеÑ? пÑ?ивеÑ?Ñ?и к Ñ?нижениÑ? пÑ?оизводиÑ?елÑ?ноÑ?Ñ?и длÑ?
+болÑ?Ñ?иÑ? Ñ?епозиÑ?оÑ?иев.</p>
 
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 1.5.1dfsg1-5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.5.1dfsg1-5.</p>
 
- -<p>For the testing distribution (squeeze), this problem has been fixed in
- -version 1.6.12dfsg-2.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.6.12dfsg-2.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.6.12dfsg-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.6.12dfsg-2.</p>
 
 
- -<p>We recommend that you upgrade your subversion packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? subversion.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2120.wml	2010-10-13 03:53:31.000000000 +0600
+++ russian/security/2010/dsa-2120.wml	2016-02-16 12:49:33.998119936 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>privilege escalation</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>повÑ?Ñ?ение пÑ?ивилегий</define-tag>
 <define-tag moreinfo>
- -<p>Tim Bunce discovered that PostgreSQL, a database server software, does
- -not properly separate interpreters for server-side stored procedures
- -which run in different security contexts. As a result, non-privileged
- -authenticated database users might gain additional privileges.</p>
- -
- -<p>Note that this security update may impact intended communication through
- -global variables between stored procedures.  It might be necessary to
- -convert these functions to run under the plperlu or pltclu languages,
- -with database superuser privileges.</p>
- -
- -<p>This security update also includes unrelated bug fixes from PostgreSQL
- -8.3.12.</p>
+<p>Тим Ð?анÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о PostgreSQL, Ñ?еÑ?веÑ? баз даннÑ?Ñ?, непÑ?авилÑ?но
+Ñ?азделÑ?еÑ? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?Ñ? длÑ? Ñ?Ñ?анимÑ?Ñ? на Ñ?еÑ?веÑ?е пÑ?оÑ?едÑ?Ñ?,
+коÑ?оÑ?Ñ?е запÑ?Ñ?каÑ?Ñ?Ñ?Ñ? в Ñ?азнÑ?Ñ? конÑ?екÑ?Ñ?аÑ? безопаÑ?ноÑ?Ñ?и. Ð? Ñ?езÑ?лÑ?Ñ?аÑ?е непÑ?ивилегиÑ?ованнÑ?е
+аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е полÑ?зоваÑ?ели базÑ? даннÑ?Ñ? могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? дополниÑ?елÑ?нÑ?е пÑ?ава доÑ?Ñ?Ñ?па.</p>
+
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о данное обновление безопаÑ?ноÑ?Ñ?и можеÑ? измениÑ?Ñ? оказаÑ?Ñ? влиÑ?ние на
+взаимодейÑ?Ñ?вие междÑ? Ñ?оÑ?Ñ?анÑ?ннÑ?ми пÑ?оÑ?едÑ?Ñ?ами Ñ?еÑ?ез глобалÑ?нÑ?е пеÑ?еменнÑ?е.  Ð?ожеÑ? поÑ?Ñ?ебоваÑ?Ñ?Ñ?Ñ?
+пÑ?еобÑ?азоваÑ?Ñ? Ñ?Ñ?и Ñ?Ñ?нкÑ?ии Ñ?ак, Ñ?Ñ?обÑ? они запÑ?Ñ?калиÑ?Ñ? Ñ?зÑ?ками plperlu или pltclu
+Ñ? пÑ?авами Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ? базÑ? даннÑ?Ñ?.</p>
+
+<p>Ð?Ñ?оме Ñ?ого, данное обновление безопаÑ?ноÑ?Ñ?и вклÑ?Ñ?аеÑ? в Ñ?ебÑ? иÑ?пÑ?авлениÑ? неÑ?вÑ?заннÑ?Ñ? Ñ?
+Ñ?казанной Ñ?Ñ?звимоÑ?Ñ?Ñ?Ñ? оÑ?ибок из PostgreSQL 8.3.12.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 8.3_8.3.12-0lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.3_8.3.12-0lenny1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 8.4.5-1 of the postgresql-8.4 package.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.4.5-1 пакеÑ?а postgresql-8.4.</p>
 
- -<p>We recommend that you upgrade your PostgreSQL packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? PostgreSQL.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=UTVx
-----END PGP SIGNATURE-----


Reply to: