[DONE] wml://security/2008/dsa-1{662,467,685}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2008/dsa-1467.wml 2014-04-30 13:16:14.000000000 +0600
+++ russian/security/2008/dsa-1467.wml 2016-07-08 16:38:48.101459527 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Mantis, a web based
- -bug tracking system. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Mantis, веб-Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? оÑ?ибок, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6574">CVE-2006-6574</a>
- - <p>Custom fields were not appropriately protected by per-item access
- - control, allowing for sensitive data to be published.</p></li>
+ <p>Ð?аÑ?Ñ?Ñ?аиваемÑ?е полÑ? недоÑ?Ñ?аÑ?оÑ?но заÑ?иÑ?енÑ? меÑ?анизмами Ñ?пÑ?авлениÑ?
+ доÑ?Ñ?пом, Ñ?Ñ?о позволÑ?еÑ? пÑ?бликоваÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?е даннÑ?е.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6611">CVE-2007-6611</a>
- - <p>Multiple cross site scripting issues allowed a remote attacker to
- - insert malicious HTML or web script into Mantis web pages.</p></li>
+ <p>Ð?ногоÑ?иÑ?леннÑ?е пÑ?облемÑ?, Ñ?вÑ?заннÑ?е Ñ? межÑ?айÑ?овÑ?м Ñ?кÑ?ипÑ?ингом, позволÑ?Ñ?Ñ? Ñ?далÑ?нномÑ?
+ злоÑ?мÑ?Ñ?ленникÑ? вÑ?Ñ?авлÑ?Ñ?Ñ? код HTML или веб-Ñ?Ñ?енаÑ?ий в веб-Ñ?Ñ?Ñ?аниÑ?Ñ? Mantis.</p></li>
</ul>
- -<p>For the old stable distribution (sarge), these problems have been fixed in
- -version 0.19.2-5sarge5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.2-5sarge5.</p>
- -<p>The stable distribution (etch) is not affected by these problems.</p>
+<p>СÑ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (etch) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.0.8-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.8-4.</p>
- -<p>We recommend that you upgrade your mantis package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mantis.</p>
</define-tag>
# do not modify the following line
- --- english/security/2008/dsa-1662.wml 2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1662.wml 2016-07-08 16:34:51.768236097 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>authorization bypass</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обÑ?од авÑ?оÑ?изаÑ?ии</define-tag>
<define-tag moreinfo>
- -<p>A symlink traversal vulnerability was discovered in MySQL, a
- -relational database server. The weakness could permit an attacker
- -having both CREATE TABLE access to a database and the ability to
- -execute shell commands on the database server to bypass MySQL access
- -controls, enabling them to write to tables in databases to which they
- -would not ordinarily have access.</p>
+<p>Ð? MySQL, Ñ?еÑ?веÑ?е Ñ?елÑ?Ñ?ионнÑ?Ñ? баз даннÑ?Ñ?, бÑ?л обнаÑ?Ñ?жен обÑ?од
+Ñ?имволÑ?нÑ?Ñ? Ñ?Ñ?Ñ?лок. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?,
+имеÑ?Ñ?емÑ? одновÑ?еменно доÑ?Ñ?Ñ?п к команде CREATE TABLE длÑ? базÑ? даннÑ?Ñ? и возможноÑ?Ñ?Ñ?
+вÑ?полнÑ?Ñ?Ñ? командÑ? командной оболоÑ?ки на Ñ?еÑ?веÑ?е баз даннÑ?Ñ?, обÑ?одиÑ?Ñ? конÑ?Ñ?олÑ? доÑ?Ñ?Ñ?па
+MySQL, Ñ?Ñ?о позволÑ?еÑ? емÑ? делаÑ?Ñ? запиÑ?и в Ñ?аблиÑ?Ñ?, к коÑ?оÑ?Ñ?м он
+в обÑ?Ñ?ном Ñ?лÑ?Ñ?ае не должен имеÑ?Ñ? доÑ?Ñ?Ñ?па.</p>
- -<p>The Common Vulnerabilities and Exposures project identifies this
- -vulnerability as <a href="https://security-tracker.debian.org/tracker/CVE-2008-4098">CVE-2008-4098</a>. Note that a closely aligned issue,
- -identified as <a href="https://security-tracker.debian.org/tracker/CVE-2008-4097">CVE-2008-4097</a>, was prevented by the update announced in
- -DSA-1608-1. This new update supersedes that fix and mitigates both
- -potential attack vectors.</p>
+<p>Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?Ñ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?Ñ? как <a href="https://security-tracker.debian.org/tracker/CVE-2008-4098">CVE-2008-4098</a>. Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о близкаÑ? пÑ?облема,
+опÑ?еделÑ?ннаÑ? как <a href="https://security-tracker.debian.org/tracker/CVE-2008-4097">CVE-2008-4097</a>, бÑ?ла иÑ?пÑ?авлена в Ñ?екомендаÑ?ии
+DSA-1608-1. Ð?аÑ?Ñ?оÑ?Ñ?ее новое обновление заменÑ?еÑ? Ñ?казанное иÑ?пÑ?авление и Ñ?менÑ?Ñ?аеÑ?
+поÑ?енÑ?иалÑ?нÑ?е векÑ?оÑ?Ñ? аÑ?аки.</p>
- -<p>For the stable distribution (etch), this problem has been fixed in
- -version 5.0.32-7etch8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.0.32-7etch8.</p>
- -<p>We recommend that you upgrade your mysql packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql.</p>
</define-tag>
# do not modify the following line
- --- english/security/2008/dsa-1685.wml 2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1685.wml 2016-07-08 16:42:24.910350248 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>buffer overflows, null pointer dereference</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а, Ñ?азÑ?менование null-Ñ?казаÑ?елÑ?</define-tag>
<define-tag moreinfo>
- -<p>Two vulnerabilities have been found in uw-imap, an IMAP
- -implementation. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
- -
- -<p>It was discovered that several buffer overflows can be triggered via a
- -long folder extension argument to the tmail or dmail program. This
- -could lead to arbitrary code execution (<a href="https://security-tracker.debian.org/tracker/CVE-2008-5005">CVE-2008-5005</a>).</p>
+<p>Ð? uw-imap, Ñ?еализаÑ?ии IMAP, бÑ?ли обнаÑ?Ñ?женÑ? две
+Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
+
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о можно вÑ?зваÑ?Ñ? неÑ?колÑ?ко пеÑ?еполнений бÑ?Ñ?еÑ?а в пÑ?огÑ?аммаÑ?
+tmail и dmail Ñ?еÑ?ез длиннÑ?й аÑ?гÑ?менÑ? Ñ?аÑ?Ñ?иÑ?ениÑ? папки. ÐÑ?о
+можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода (<a href="https://security-tracker.debian.org/tracker/CVE-2008-5005">CVE-2008-5005</a>).</p>
- -<p>It was discovered that a NULL pointer dereference could be triggered by
- -a malicious response to the QUIT command leading to a denial of service
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о можно вÑ?зваÑ?Ñ? Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?
+Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного запÑ?оÑ?а команде QUIT, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании
(<a href="https://security-tracker.debian.org/tracker/CVE-2008-5006">CVE-2008-5006</a>).</p>
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2002edebian1-13.1+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2002edebian1-13.1+etch1.</p>
- -<p>For the unstable distribution (sid) and the testing distribution
- -(lenny), these problems have been fixed in version 2007d~dfsg-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном (sid) и Ñ?еÑ?Ñ?иÑ?Ñ?емом (lenny) вÑ?пÑ?Ñ?ке
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2007d~dfsg-1.</p>
- -<p>We recommend that you upgrade your uw-imap packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? uw-imap.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=eY7s
-----END PGP SIGNATURE-----
Reply to: