[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{539,625,583}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1539.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1539.wml	2016-07-08 19:18:41.347786663 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Chris Schmidt and Daniel Morissette discovered two vulnerabilities
- -in mapserver, a development environment for spatial and mapping
- -applications.  The Common Vulnerabilities and Exposures project
- -identifies the following two problems:</p>
+<p>Ð?Ñ?иÑ? ШмидÑ? и Ð?Ñ?ниелÑ? Ð?оÑ?иÑ?еÑ? обнаÑ?Ñ?жили две Ñ?Ñ?звимоÑ?Ñ?и
+в mapserver, окÑ?Ñ?жении Ñ?азÑ?абоÑ?ки пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?веннÑ?Ñ? пÑ?иложений и Ñ?озданиÑ?
+каÑ?Ñ?.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4542";>CVE-2007-4542</a>
 
- -    <p>Lack of input sanitizing and output escaping in the CGI
- -    mapserver's template handling and error reporting routines leads
- -    to cross-site scripting vulnerabilities.</p></li>
+    <p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? и Ñ?кÑ?аниÑ?ованиÑ? вÑ?вода в обÑ?абоÑ?ке CGI-Ñ?аблонов
+    mapserver и Ñ?Ñ?нкÑ?иÑ?Ñ? Ñ?ообÑ?ениÑ? об оÑ?ибкаÑ? пÑ?иводÑ?Ñ?
+    к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4629";>CVE-2007-4629</a>
- -    
- -    <p>Missing bounds checking in mapserver's template handling leads to
- -    a stack-based buffer overrun vulnerability, allowing a remote
- -    attacker to execute arbitrary code with the privileges of the CGI
- -    or httpd user.</p></li>
+
+    <p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ки гÑ?аниÑ? маÑ?Ñ?ива в коде Ñ?абоÑ?Ñ? Ñ? Ñ?аблонами mapserver пÑ?иводиÑ?
+    к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а и позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? пÑ?авами CGI
+    или полÑ?зоваÑ?елÑ? httpd.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 4.10.0-5.1+etch2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.10.0-5.1+etch2.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 4.10.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.10.3-1.</p>
 
- -<p>We recommend that you upgrade your mapserver (4.10.0-5.1+etch2) package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mapserver (4.10.0-5.1+etch2).</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1583.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1583.wml	2016-07-08 19:27:20.461481564 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in GNOME PeerCast,
- -the GNOME interface to PeerCast, a P2P audio and video streaming
- -server. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? GNOME PeerCast, GNOME-инÑ?еÑ?Ñ?ейÑ?е длÑ? PeerCast, Ñ?еÑ?веÑ?а
+поÑ?окового P2P-веÑ?аниÑ? аÑ?дио и видео, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6454";>CVE-2007-6454</a>
 
- -    <p>Luigi Auriemma discovered that PeerCast is vulnerable to a heap
- -    overflow in the HTTP server code, which allows remote attackers to
- -    cause a denial of service and possibly execute arbitrary code via a
- -    long SOURCE request.</p></li>
+    <p>Ð?Ñ?иджи Ð?Ñ?Ñ?иемма обнаÑ?Ñ?жил, Ñ?Ñ?о PeerCast Ñ?Ñ?звим к пеÑ?еполнениÑ?
+    динамиÑ?еÑ?кой памÑ?Ñ?и в коде HTTP-Ñ?еÑ?веÑ?а, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ?
+    длинного запÑ?оÑ?а SOURCE.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-2040";>CVE-2008-2040</a>
 
- -    <p>Nico Golde discovered that PeerCast, a P2P audio and video streaming
- -    server, is vulnerable to a buffer overflow in the HTTP Basic
- -    Authentication code, allowing a remote attacker to crash PeerCast or
- -    execute arbitrary code.</p></li>
+    <p>Ð?ико Ð?олде обнаÑ?Ñ?жил, Ñ?Ñ?о PeerCast, Ñ?еÑ?веÑ? поÑ?окового P2P-веÑ?аниÑ? аÑ?дио
+    и видео, Ñ?Ñ?звим к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в коде HTTP Basic
+    Authentication, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? аваÑ?ийно оÑ?Ñ?анавливаÑ?Ñ? PeerCast
+    или вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 0.5.4-1.1etch0.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.5.4-1.1etch0.</p>
 
- -<p>gnome-peercast has been removed from the unstable distribution (sid).</p>
+<p>Ð?акеÑ? gnome-peercast бÑ?л Ñ?далÑ?н из неÑ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (sid).</p>
 
- -<p>We recommend that you upgrade your gnome-peercast package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? gnome-peercast.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1625.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1625.wml	2016-07-08 19:22:09.261247608 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Common Unix
- -Printing System (CUPS). The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? обÑ?ей Ñ?иÑ?Ñ?еме пеÑ?аÑ?и Unix (CUPS) бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0053";>CVE-2008-0053</a>
 
- -    <p>Buffer overflows in the HP-GL input filter allowed to possibly run
- -    arbitrary code through crafted HP-GL files.</p></li>
+    <p>Ð?еÑ?еполнениÑ? бÑ?Ñ?еÑ?а в Ñ?илÑ?Ñ?Ñ?е вÑ?однÑ?Ñ? даннÑ?Ñ? HP-GL позволÑ?еÑ? запÑ?Ñ?каÑ?Ñ?
+    пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов HP-GL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1373";>CVE-2008-1373</a>
 
- -    <p>Buffer overflow in the GIF filter allowed to possibly run arbitrary
- -    code through crafted GIF files.</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?илÑ?Ñ?Ñ?е GIF позволÑ?еÑ? запÑ?Ñ?каÑ?Ñ? пÑ?оизволÑ?нÑ?й
+    код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов GIF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1722";>CVE-2008-1722</a>
 
- -    <p>Integer overflows in the PNG filter allowed to possibly run arbitrary
- -    code through crafted PNG files.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?илÑ?Ñ?Ñ?е PNG позволÑ?еÑ? запÑ?Ñ?каÑ?Ñ? пÑ?оизволÑ?нÑ?й
+    код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов PNG.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.2.7-4etch4 of package cupsys.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.7-4etch4 пакеÑ?а cupsys.</p>
 
- -<p>For the testing (lenny) and unstable distribution (sid), these problems
- -have been fixed in version 1.3.7-2 of package cups.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (lenny) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и пÑ?облемÑ?
+бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.3.7-2 пакеÑ?а cups.</p>
 
- -<p>We recommend that you upgrade your cupsys package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? cupsys.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=A63A
-----END PGP SIGNATURE-----


Reply to: