[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{831,848,731}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-731.wml	2011-05-26 16:05:44.000000000 +0600
+++ russian/security/2005/dsa-731.wml	2016-07-09 14:20:57.642902432 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several problems have been discovered in telnet clients that could be
- -exploited by malicious daemons the client connects to.  The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? клиенÑ?аÑ? telnet бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем, коÑ?оÑ?Ñ?е могÑ?Ñ?
+иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?лÑ?жбами под Ñ?пÑ?авлением злоÑ?мÑ?Ñ?ленников, к коÑ?оÑ?Ñ?м (Ñ?лÑ?жбам) подклÑ?Ñ?аеÑ?Ñ?Ñ? клиенÑ?.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468";>CAN-2005-0468</a>
 
- -    <p>Gaël Delalleau discovered a buffer overflow in the env_opt_add()
- -    function that allow a remote attacker to execute arbitrary code.</p>
+    <p>Ð?аÑ?лÑ? Ð?елалÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии env_opt_add(),
+    коÑ?оÑ?ое позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469";>CAN-2005-0469</a>
 
- -    <p>Gaël Delalleau discovered a buffer overflow in the handling of the
- -    LINEMODE suboptions in telnet clients.  This can lead to the
- -    execution of arbitrary code when connected to a malicious server.</p>
+    <p>Ð?аÑ?лÑ? Ð?елалÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде обÑ?абоÑ?ки подопÑ?ий
+    LINEMODE в клиенÑ?аÑ? telnet.  ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода пÑ?и подклÑ?Ñ?ении к Ñ?еÑ?веÑ?Ñ? злоÑ?мÑ?Ñ?ленника.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 1.1-8-2.4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1-8-2.4.</p>
 
- -<p>For the testing distribution (sarge) these problems have been fixed in
- -version 1.2.2-11.2.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.2-11.2.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.2.2-11.2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.2-11.2.</p>
 
- -<p>We recommend that you upgrade your krb4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? krb4.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-831.wml	2005-10-18 04:01:55.000000000 +0600
+++ russian/security/2005/dsa-831.wml	2016-07-09 14:13:13.974146299 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>A stack-based buffer overflow in the init_syms function of MySQL, a
- -popular database, has been discovered that allows remote authenticated
- -users who can create user-defined functions to execute arbitrary code
- -via a long function_name field.  The ability to create user-defined
- -functions is not typically granted to untrusted users.</p>
+<p>Ð? Ñ?Ñ?нкÑ?ии init_syms в MySQL, попÑ?лÑ?Ñ?ной базе даннÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение
+бÑ?Ñ?еÑ?а, позволÑ?Ñ?Ñ?ее Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м,
+коÑ?оÑ?Ñ?е могÑ?Ñ? Ñ?оздаваÑ?Ñ? полÑ?зоваÑ?елÑ?Ñ?кие Ñ?Ñ?нкÑ?ии, вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код
+Ñ? помоÑ?Ñ?Ñ? длинного полÑ? function_name.  СпоÑ?обноÑ?Ñ?Ñ? Ñ?оздаваÑ?Ñ? полÑ?зоваÑ?елÑ?Ñ?кие
+Ñ?Ñ?нкÑ?ии обÑ?Ñ?но не даÑ?Ñ?Ñ?Ñ? недовеÑ?еннÑ?м полÑ?зоваÑ?елÑ?м.</p>
 
- -<p>The following vulnerability matrix shows which version of MySQL in
- -which distribution has this problem fixed:</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а показÑ?ваеÑ?, какаÑ? веÑ?Ñ?иÑ? MySQL и в
+каком вÑ?пÑ?Ñ?ке бÑ?ла иÑ?пÑ?авлена:</p>
 
 <div class="centerdiv">
 <table border=1 cellspacing=0 cellpadding=2>
@@ -20,31 +21,31 @@
   <tr>
     <td>mysql</td>
     <td>3.23.49-8.14</td>
- -    <td>n/a</td>
- -    <td>n/a</td>
+    <td>не доÑ?Ñ?Ñ?пно</td>
+    <td>не доÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg</td>
- -    <td>n/a</td>
+    <td>не доÑ?Ñ?Ñ?пно</td>
     <td>4.0.24-10sarge1</td>
     <td>4.0.24-10sarge1</td>
   </tr>
   <tr>
     <td>mysql-dfsg-4.1</td>
- -    <td>n/a</td>
+    <td>не доÑ?Ñ?Ñ?пно</td>
     <td>4.1.11a-4sarge2</td>
     <td>4.1.14-2</td>
   </tr>
   <tr>
     <td>mysql-dfsg-5.0</td>
- -    <td>n/a</td>
- -    <td>n/a</td>
+    <td>не доÑ?Ñ?Ñ?пно</td>
+    <td>не доÑ?Ñ?Ñ?пно</td>
     <td>5.0.11beta-3</td>
   </tr>
 </table>
 </div>
 
- -<p>We recommend that you upgrade your mysql-dfsg packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql-dfsg.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-848.wml	2005-10-08 14:09:23.000000000 +0600
+++ russian/security/2005/dsa-848.wml	2016-07-09 14:17:48.597631408 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Jens Steube discovered two vulnerabilities in masqmail, a mailer for
- -hosts without permanent internet connection.  The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð?енÑ? ШÑ?ойбе обнаÑ?Ñ?жил две Ñ?Ñ?звимоÑ?Ñ?и в masqmail, поÑ?Ñ?овой пÑ?огÑ?амме
+длÑ? Ñ?злов, не имеÑ?Ñ?иÑ? поÑ?Ñ?оÑ?нного подклÑ?Ñ?ениÑ? к Ñ?еÑ?и Ð?нÑ?еÑ?неÑ?.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2662";>CAN-2005-2662</a>
 
- -    <p>When sending failed mail messages, the address is not sanitised,
- -    which allows a local attacker to execute arbitrary commands as the
- -    mail user.</p></li>
+    <p>Ð?Ñ?и неÑ?даÑ?ной оÑ?пÑ?авке Ñ?ообÑ?ений оÑ?иÑ?Ñ?ка адÑ?еÑ?а не пÑ?оиÑ?Ñ?одиÑ?,
+    Ñ?Ñ?о позволÑ?еÑ? локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? оÑ?
+    лиÑ?а полÑ?зоваÑ?елÑ? mail.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2663";>CAN-2005-2663</a>
 
- -    <p>When opening the log file, masqmail does not relinquish
- -    privileges, which allows a local attacker to overwrite arbitrary
- -    files via a symlink attack.</p></li>
+    <p>Ð?Ñ?и оÑ?кÑ?Ñ?Ñ?ии Ñ?айла жÑ?Ñ?нала masqmail не Ñ?бÑ?аÑ?Ñ?ваеÑ?
+    пÑ?ивилегии, Ñ?Ñ?о позволÑ?еÑ? локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? пеÑ?езапиÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е
+    Ñ?айлÑ? Ñ? помоÑ?Ñ?Ñ? аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 0.1.16-2.2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.1.16-2.2.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.2.20-1sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.2.20-1sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.2.20-1sarge1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.2.20-1sarge1.</p>
 
- -<p>We recommend that you upgrade your masqmail package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? masqmail.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=f0EF
-----END PGP SIGNATURE-----


Reply to: