[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{877,843,651}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-651.wml	2005-01-20 22:06:38.000000000 +0500
+++ russian/security/2005/dsa-651.wml	2016-07-09 13:54:21.045690357 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>buffer overflow, integer overflow</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а, пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Squid, the internet
- -object cache, the popular WWW proxy cache.  The Common Vulnerabilities
- -and Exposures Project identifies the following vulnerabilities:</p>
+<p>Ð? Squid, кеÑ?е Ð?нÑ?еÑ?неÑ?-обÑ?екÑ?ов, попÑ?лÑ?Ñ?ном кеÑ?иÑ?Ñ?Ñ?Ñ?ем WWW-пÑ?окÑ?и, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко  Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094";>CAN-2005-0094</a>
 
- -    <p>"infamous41md" discovered a buffer overflow in the parser for
- -    Gopher responses which will lead to memory corruption and usually
- -    crash Squid.</p>
+    <p>"infamous41md" обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а
+    оÑ?веÑ?ов по пÑ?оÑ?околÑ? Gopher, коÑ?оÑ?ое пÑ?иводиÑ? к повÑ?еждениÑ? Ñ?одеÑ?жимого памÑ?Ñ?и и
+    аваÑ?ийной оÑ?Ñ?ановке Squid.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095";>CAN-2005-0095</a>
 
- -    <p>"infamous41md" discovered an integer overflow in the receiver of
- -    WCCP (Web Cache Communication Protocol) messages.  An attacker
- -    could send a specially crafted UDP datagram that will cause Squid
- -    to crash.</p>
+    <p>"infamous41md" обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде полÑ?Ñ?аÑ?елÑ?
+    Ñ?ообÑ?ений WCCP (Web Cache Communication Protocol).  Ð?лоÑ?мÑ?Ñ?ленник
+    можеÑ? оÑ?пÑ?авиÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? дейÑ?агÑ?аммÑ? UDP, коÑ?оÑ?аÑ? пÑ?иведÑ?Ñ? к
+    аваÑ?ийной оÑ?Ñ?ановке Squid.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 2.4.6-2woody5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.6-2woody5.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.5.7-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5.7-4.</p>
 
- -<p>We recommend that you upgrade your squid package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? squid.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-843.wml	2005-10-05 12:06:44.000000000 +0600
+++ russian/security/2005/dsa-843.wml	2016-07-09 13:46:36.718749850 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>insecure temporary file</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>небезопаÑ?нÑ?й вÑ?еменнÑ?й Ñ?айл</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in the ARC archive program
- -under Unix.  The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? ARC, аÑ?Ñ?ивной пÑ?огÑ?амме длÑ? Unix, бÑ?ло обнаÑ?Ñ?жено две
+Ñ?Ñ?звимоÑ?Ñ?и.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2945";>CAN-2005-2945</a>
 
- -    <p>Eric Romang discovered that the ARC archive program under Unix
- -    creates a temporary file with insecure permissions which may lead
- -    to an attacker stealing sensitive information.</p></li>
+    <p>ЭÑ?ик Роман обнаÑ?Ñ?жил, Ñ?Ñ?о аÑ?Ñ?ивнаÑ? пÑ?огÑ?амма ARC под Unix
+    Ñ?оздаÑ?Ñ? вÑ?еменнÑ?й Ñ?айл Ñ? небезопаÑ?нÑ?ми пÑ?авами доÑ?Ñ?Ñ?па, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ?
+    к Ñ?омÑ?, Ñ?Ñ?о злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?кÑ?аÑ?Ñ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2992";>CAN-2005-2992</a>
 
- -    <p>Joey Schulze discovered that the temporary file was created in an
- -    insecure fashion as well, leaving it open to a classic symlink
- -    attack.</p></li>
+    <p>Ð?жоелÑ? ШÑ?лÑ?Ñ?е обнаÑ?Ñ?жил, Ñ?Ñ?о вÑ?еменнÑ?й Ñ?айл Ñ?оздаÑ?Ñ?Ñ?Ñ?
+    небезопаÑ?нÑ?м обÑ?азом, Ñ?Ñ?о позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? аÑ?акÑ? Ñ?еÑ?ез
+    Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain arc packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? arc оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 5.21l-1sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.21l-1sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 5.21m-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.21m-1.</p>
 
- -<p>We recommend that you upgrade your arc package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? arc.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-877.wml	2006-12-09 09:02:13.000000000 +0500
+++ russian/security/2005/dsa-877.wml	2016-07-09 13:41:42.583513552 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>cross-site scripting, directory traversal</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг, обÑ?од каÑ?алога</define-tag>
 <define-tag moreinfo>
- -<p>Steve Kemp discovered two vulnerabilities in gnump3d, a streaming
- -server for MP3 and OGG files.  The Common Vulnerabilities and
- -Exposures Project identifies the following problems:</p>
+<p>СÑ?ив Ð?Ñ?мп обнаÑ?Ñ?жил две Ñ?Ñ?звимоÑ?Ñ?и в gnump3d, Ñ?еÑ?веÑ?е поÑ?окового веÑ?аниÑ?
+Ñ?айлов MP3 и OGG.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3122";>CVE-2005-3122</a>
 
- -    <p>The 404 error page does not strip malicious javascript content
- -    from the resulting page, which would be executed in the victims
- -    browser.</p>
+    <p>СÑ?Ñ?аниÑ?а Ñ? оÑ?ибкой 404 не Ñ?далÑ?еÑ? некоÑ?Ñ?екÑ?ное Ñ?одеÑ?жимое кода javascript
+    Ñ? оконÑ?аÑ?елÑ?ной Ñ?Ñ?Ñ?аниÑ?Ñ?, коÑ?оÑ?ое вÑ?полнÑ?еÑ?Ñ?Ñ? в бÑ?аÑ?зеÑ?е
+    жеÑ?Ñ?вÑ?.</p>
 </li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3123";>CVE-2005-3123</a>
 
- -    <p>By using specially crafting URLs it is possible to read arbitrary
- -    files to which the user of the streaming server has access to.</p>
+    <p>Ð?Ñ?полÑ?зование Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? URL позволÑ?еÑ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е
+    Ñ?айлÑ?, к коÑ?оÑ?Ñ?м полÑ?зоваÑ?елÑ? Ñ?еÑ?веÑ?а поÑ?окового веÑ?аниÑ? имееÑ? доÑ?Ñ?Ñ?п.</p>
 </li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain a gnump3d package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ? gnump3d оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.9.3-1sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.9.3-1sarge2.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.9.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.9.6-1.</p>
 
- -<p>We recommend that you upgrade your gnump3d package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? gnump3d.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=LeaD
-----END PGP SIGNATURE-----


Reply to: