[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{495,623,601}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1495.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1495.wml	2016-07-08 16:08:25.232413011 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?ов</define-tag>
 <define-tag moreinfo>
- -<p>Several local/remote vulnerabilities have been discovered in two of
- -the plugins for the Nagios network monitoring and management system.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? двÑ?Ñ? дополнениÑ?Ñ? длÑ? Nagios, Ñ?иÑ?Ñ?емÑ? мониÑ?оÑ?инга и Ñ?пÑ?авлениÑ? Ñ?еÑ?Ñ?Ñ?, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко локалÑ?нÑ?Ñ?/Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?Ñ?Ñ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5198";>CVE-2007-5198</a>
 
- -    <p>A buffer overflow has been discovered in the parser for HTTP
- -    Location headers (present in the check_http module).</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено пеÑ?еполнение бÑ?Ñ?еÑ?а в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а заголовков
+    HTTP Location (в модÑ?ле check_http).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5623";>CVE-2007-5623</a>
 
- -    <p>A buffer overflow has been discovered in the check_snmp module.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено пеÑ?еполнение бÑ?Ñ?еÑ?а в модÑ?ле check_snmp.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (sarge), these problems have been
- -fixed in version 1.4-6sarge1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.4-6sarge1.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.4.5-1etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.5-1etch1.</p>
 
- -<p>We recommend that you upgrade your nagios-plugins package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? nagios-plugins.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1601.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1601.wml	2016-07-08 16:16:29.609350178 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Wordpress,
- -the weblog manager. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Wordpress, пÑ?огÑ?амме длÑ? ведениÑ? блога, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1599";>CVE-2007-1599</a>
 
- -    <p>WordPress allows remote attackers to redirect authenticated users
- -    to other websites and potentially obtain sensitive information.</p></li>
+    <p>WordPress позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам пеÑ?енапÑ?авлÑ?Ñ?Ñ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?Ñ? полÑ?зоваÑ?елей
+    на дÑ?Ñ?гие веб-Ñ?айÑ?Ñ? и поÑ?енÑ?иалÑ?но полÑ?Ñ?аÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0664";>CVE-2008-0664</a>
 
- -    <p>The XML-RPC implementation, when registration is enabled, allows
- -    remote attackers to edit posts of other blog users.</p></li>
+    <p>РеализаÑ?иÑ? XML-RPC пÑ?и вклÑ?Ñ?ении Ñ?егиÑ?Ñ?Ñ?аÑ?ии позволÑ?еÑ?
+    Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам Ñ?едакÑ?иÑ?оваÑ?Ñ? Ñ?ообÑ?ениÑ? дÑ?Ñ?гиÑ? полÑ?зоваÑ?елей блога.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.0.10-1etch3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.10-1etch3.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.3.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.3.3-1.</p>
 
- -<p>We recommend that you upgrade your wordpress package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? wordpress.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1623.wml	2008-08-01 01:16:59.000000000 +0600
+++ russian/security/2008/dsa-1623.wml	2016-07-08 16:13:43.684383053 +0500
@@ -1,26 +1,27 @@
- -<define-tag description>DNS cache poisoning</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?авление кеÑ?а DNS</define-tag>
 <define-tag moreinfo>
- -<p>Dan Kaminsky discovered that properties inherent to the DNS protocol
- -lead to practical DNS cache poisoning attacks. Among other things,
- -successful attacks can lead to misdirected web traffic and email
- -rerouting.</p>
- -
- -<p>This update changes Debian's dnsmasq packages to implement the
- -recommended countermeasure: UDP query source port randomization. This
- -change increases the size of the space from which an attacker has to
- -guess values in a backwards-compatible fashion and makes successful
- -attacks significantly more difficult.</p>
- -
- -<p>This update also switches the random number generator to Dan
- -Bernstein's SURF.</p>
+<p>Ð?Ñ?н Ð?аминÑ?ки обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?обÑ?Ñ?веннÑ?е Ñ?войÑ?Ñ?ва пÑ?оÑ?окола DNS
+пÑ?иводÑ?Ñ? к пÑ?акÑ?иÑ?еÑ?ким аÑ?акам по оÑ?Ñ?авлениÑ? кеÑ?а DNS. Ð?омимо пÑ?оÑ?его
+Ñ?Ñ?пеÑ?нÑ?е аÑ?аки могÑ?Ñ? пÑ?иводиÑ?Ñ? к непÑ?авилÑ?номÑ? напÑ?авлениÑ? веб-Ñ?Ñ?аÑ?ика и
+Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ?.</p>
+
+<p>Ð?анное обновление изменÑ?еÑ? пакеÑ?Ñ? dnsmasq Ñ?ак, Ñ?Ñ?о в ниÑ? Ñ?еализÑ?Ñ?Ñ?Ñ?Ñ?
+Ñ?екомендÑ?емÑ?е конÑ?Ñ?меÑ?Ñ?: Ñ?лÑ?Ñ?айнÑ?й бÑ?ло поÑ?Ñ?а иÑ?Ñ?оÑ?ника UDP-запÑ?оÑ?а. ЭÑ?о
+изменение Ñ?велиÑ?иваеÑ? Ñ?азмеÑ? облаÑ?Ñ?и, из коÑ?оÑ?ой злоÑ?мÑ?Ñ?ленник должен
+Ñ?гадаÑ?Ñ? знаÑ?ениÑ? и делаеÑ? Ñ?Ñ?пеÑ?нÑ?е аÑ?аки
+знаÑ?иÑ?елÑ?но более Ñ?Ñ?Ñ?днÑ?ми.</p>
+
+<p>Ð?Ñ?оме Ñ?ого, в данном  обновлении иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? SURF, генеÑ?аÑ?оÑ? Ñ?лÑ?Ñ?айнÑ?Ñ? Ñ?иÑ?ел Ð?Ñ?на
+Ð?еÑ?нÑ?Ñ?айна.</p>
 
- -<p>For the stable distribution (etch), this problem has been fixed in
- -version 2.35-1+etch4. Packages for alpha will be provided later.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.35-1+etch4. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? alpha бÑ?дÑ?Ñ? подгоÑ?овленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.43-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.43-1.</p>
 
- -<p>We recommend that you upgrade your dnsmasq package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? dnsmasq.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=KV8p
-----END PGP SIGNATURE-----


Reply to: