[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-22{06,47,85}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2206.wml	2011-03-30 04:06:44.000000000 +0600
+++ russian/security/2011/dsa-2206.wml	2016-07-09 18:40:57.069941961 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two security vulnerabilities have been discovered in Mahara, a fully
- -featured electronic portfolio, weblog, resume builder and social
- -networking system:</p>
+<p>Ð? Mahara, полноÑ?Ñ?нкÑ?ионалÑ?ном Ñ?лекÑ?Ñ?онном поÑ?Ñ?Ñ?олио, блоге, пÑ?огÑ?амме поÑ?Ñ?Ñ?оениÑ? Ñ?езÑ?ме
+и Ñ?иÑ?Ñ?еме Ñ?абоÑ?Ñ? Ñ? Ñ?оÑ?иалÑ?нÑ?ми Ñ?еÑ?Ñ?ми, бÑ?ло обнаÑ?Ñ?жено две
+Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0439";>CVE-2011-0439</a>
 
- -    <p>A security review commissioned by a Mahara user discovered that
- -    Mahara processes unsanitized input which can lead to cross-site
- -    scripting (XSS).</p></li>
+    <p>Ð?Ñ?овеÑ?ка безопаÑ?ноÑ?Ñ?и, вÑ?полненнаÑ? полÑ?зоваÑ?елем Mahara, обнаÑ?Ñ?жила, Ñ?Ñ?о
+    Mahara обÑ?абаÑ?Ñ?ваеÑ? неоÑ?иÑ?еннÑ?е вÑ?однÑ?е даннÑ?е, коÑ?оÑ?Ñ?е пÑ?и иÑ? обÑ?абоÑ?ке могÑ?Ñ? пÑ?иводиÑ?Ñ?
+    к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ? (XSS).</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0440";>CVE-2011-0440</a>
 
- -    <p>Mahara Developers discovered that Mahara doesn't check the session
- -    key under certain circumstances which can be exploited as
- -    cross-site request forgery (CSRF) and can lead to the deletion of
- -    blogs.</p></li>
+    <p>РазÑ?абоÑ?Ñ?ики Mahara обнаÑ?Ñ?жили, Ñ?Ñ?о Mahara не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? клÑ?Ñ?а Ñ?еÑ?Ñ?ии
+    пÑ?и опÑ?еделÑ?ннÑ?Ñ? обÑ?Ñ?оÑ?Ñ?елÑ?Ñ?Ñ?ваÑ?, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? в каÑ?еÑ?Ñ?ве
+    подделки межÑ?айÑ?ового запÑ?оÑ?а (CSRF) и можеÑ? пÑ?иводиÑ?Ñ? к Ñ?далениÑ?
+    блогов.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (lenny) these problems have been fixed in
- -version 1.0.4-4+lenny8.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.4-4+lenny8.</p>
 
- -<p>For the stable distribution (squeeze) these problems have been fixed in
- -version 1.2.6-2+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.6-2+squeeze1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.2.7.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.7.</p>
 
- -<p>We recommend that you upgrade your mahara package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mahara.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2247.wml	2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2247.wml	2016-07-09 18:48:25.928520298 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Rails, the Ruby web
- -application framework. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Rails, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е длÑ? веб-пÑ?иложений на Ñ?зÑ?ке Ruby, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0446";>CVE-2011-0446</a>
 
- -    <p>Multiple cross-site scripting (XSS) vulnerabilities when JavaScript
- -    encoding is used, allow remote attackers to inject arbitrary web
- -    script or HTML.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е пÑ?облемÑ? Ñ? межÑ?айÑ?овÑ?м Ñ?кÑ?ипÑ?ингом (XSS) пÑ?и иÑ?полÑ?зовании
+    закодиÑ?ованного JavaScript позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й
+    веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0447";>CVE-2011-0447</a>
 
- -    <p>Rails does not properly validate HTTP requests that contain an
- -    X-Requested-With header, which makes it easier for remote attackers
- -    to conduct cross-site request forgery (CSRF) attacks.</p></li>
+    <p>Rails непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? HTTP-запÑ?оÑ?ов, Ñ?одеÑ?жаÑ?иÑ?
+    заголовок X-Requested-With, Ñ?Ñ?о облегÑ?аеÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?полнÑ?Ñ?Ñ? аÑ?аки по подделке межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов (CSRF).</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 2.1.0-7+lenny0.1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.1.0-7+lenny0.1.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.3.5-1.2+squeeze0.1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.3.5-1.2+squeeze0.1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.3.11-0.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.3.11-0.1.</p>
 
- -<p>We recommend that you upgrade your rails packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? rails.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2285.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2285.wml	2016-07-09 18:52:26.028872378 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in mapserver, a CGI-based
- -web framework to publish spatial data and interactive mapping applications.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? mapserver, веб-инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е на оÑ?нове CGI длÑ? пÑ?бликаÑ?ии пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?веннÑ?Ñ?
+даннÑ?Ñ? и инÑ?еÑ?акÑ?ивнÑ?Ñ? каÑ?Ñ?огÑ?аÑ?иÑ?еÑ?киÑ? пÑ?иложений, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2703";>CVE-2011-2703</a>
 
- -  <p>Several instances of insufficient escaping of user input, leading to
- -  SQL injection attacks via OGC filter encoding (in WMS, WFS, and SOS
- -  filters).</p></li>
+  <p>Ð?еÑ?колÑ?ко Ñ?лÑ?Ñ?аев недоÑ?Ñ?аÑ?оÑ?ного Ñ?кÑ?аниÑ?ованиÑ? полÑ?зоваÑ?елÑ?Ñ?киÑ? вÑ?однÑ?Ñ? даннÑ?Ñ? пÑ?иводÑ?Ñ?
+  к SQL-инÑ?екÑ?иÑ?м Ñ? помоÑ?Ñ?Ñ? кодиÑ?ованиÑ? OGC-Ñ?илÑ?Ñ?Ñ?а (в Ñ?илÑ?Ñ?Ñ?аÑ? WMS, WFS
+  и SOS).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2704";>CVE-2011-2704</a>
 
- -  <p>Missing length checks in the processing of OGC filter encoding that can
- -  lead to stack-based buffer overflows and the execution of arbitrary code.</p></li>
+  <p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ок длинÑ? в коде обÑ?абоÑ?ки кодиÑ?ованиÑ? OGC-Ñ?илÑ?Ñ?Ñ?а могÑ?Ñ?
+  пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ?м бÑ?Ñ?еÑ?а и вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), these problems have been fixed in
- -version 5.0.3-3+lenny7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.0.3-3+lenny7.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 5.6.5-2+squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.6.5-2+squeeze2.</p>
 
- -<p>For the testing (squeeze) and unstable (sid) distributions, these problems
- -will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и пÑ?облемÑ?
+бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your mapserver packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mapserver.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=3eVN
-----END PGP SIGNATURE-----


Reply to: