[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{659,787,886}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-659.wml	2005-03-25 11:48:19.000000000 +0500
+++ russian/security/2005/dsa-659.wml	2016-07-09 14:26:25.105725992 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>information leak, integer underflow</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>Ñ?Ñ?еÑ?ка инÑ?оÑ?маÑ?ии, оÑ?Ñ?иÑ?аÑ?елÑ?ное пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел</define-tag>
 <define-tag moreinfo>
- -<p>Two problems have been discovered in the libpam-radius-auth package,
- -the PAM RADIUS authentication module.  The Common Vulnerabilities and
- -Exposures Project identifies the following problems:</p>
+<p>Ð? пакеÑ?е libpam-radius-auth, модÑ?ле аÑ?Ñ?енÑ?иÑ?икаÑ?ии
+PAM RADIUS, бÑ?ло обнаÑ?Ñ?жено две пÑ?облемÑ?.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1340";>CAN-2004-1340</a>
 
- -    <p>The Debian package accidentally installed its configuration file
- -    /etc/pam_radius_auth.conf world-readable.  Since it may possibly
- -    contain secrets all local users are able to read them if the
- -    administrator hasn't adjusted file permissions.  This problem is
- -    Debian specific.</p>
+    <p>Ð?акеÑ? Debian Ñ?лÑ?Ñ?айно оÑ?Ñ?авлÑ?еÑ? Ñ?вой Ñ?айл наÑ?Ñ?Ñ?ойки
+    /etc/pam_radius_auth.conf оÑ?кÑ?Ñ?Ñ?Ñ?м длÑ? Ñ?Ñ?ениÑ? вÑ?ем полÑ?зоваÑ?елÑ?м.  Ð?оÑ?колÑ?кÑ? он можеÑ?
+    Ñ?одеÑ?жаÑ?Ñ? Ñ?екÑ?еÑ?Ñ?, вÑ?е локалÑ?нÑ?е полÑ?зоваÑ?ели могÑ?Ñ? пÑ?оÑ?иÑ?аÑ?Ñ? Ñ?Ñ?оÑ? Ñ?айл в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли
+    админиÑ?Ñ?Ñ?аÑ?оÑ? не изменил пÑ?ава доÑ?Ñ?Ñ?па к Ñ?Ñ?омÑ? Ñ?айлÑ?.  Ð?аннаÑ? пÑ?облема
+    каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0108";>CAN-2005-0108</a>
 
- -    <p>Leon Juranic discovered an integer underflow in the mod_auth_radius
- -    module for Apache which is also present in libpam-radius-auth.</p>
+    <p>Ð?еон ЮÑ?аник обнаÑ?Ñ?жил оÑ?Ñ?иÑ?аÑ?елÑ?ное пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в модÑ?ле mod_auth_radius
+    длÑ? Apache, коÑ?оÑ?ое имееÑ?Ñ?Ñ? Ñ?акже и в libpam-radius-auth.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 1.3.14-1.3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.14-1.3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.3.16-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.16-3.</p>
 
- -<p>We recommend that you upgrade your libpam-radius-auth package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? libpam-radius-auth.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-787.wml	2005-08-26 15:02:03.000000000 +0600
+++ russian/security/2005/dsa-787.wml	2016-07-09 14:35:42.116300947 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>insecure permissions and tempfile</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>небезопаÑ?нÑ?е пÑ?ава доÑ?Ñ?Ñ?па и вÑ?еменнÑ?й Ñ?айл</define-tag>
 <define-tag moreinfo>
- -<p>Two bugs have been found in backup-manager, a command-line driven
- -backup utility.  The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? backup-manager, Ñ?Ñ?илиÑ?е длÑ? Ñ?езеÑ?вного копиÑ?ованиÑ? из командной Ñ?Ñ?Ñ?оки,
+бÑ?ло обнаÑ?Ñ?жено две оÑ?ибки.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1855";>CAN-2005-1855</a>
 
- -    <p>Jeroen Vermeulen discovered that backup files are created with
- -    default permissions making them world readable, even though they
- -    may contain sensitive information.</p>
+    <p>Ð?еÑ?Ñ?н Ð?еÑ?мÑ?лен обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?езеÑ?внÑ?е Ñ?айлÑ? Ñ?оздаÑ?Ñ?Ñ?Ñ? Ñ?
+    пÑ?авами доÑ?Ñ?Ñ?па по Ñ?молÑ?аниÑ?, Ñ?Ñ?о делаеÑ? иÑ? оÑ?кÑ?Ñ?Ñ?Ñ?ми длÑ? Ñ?Ñ?ениÑ? вÑ?ем полÑ?зоваÑ?елÑ?м даже в Ñ?ом Ñ?лÑ?Ñ?ае,
+    еÑ?ли Ñ?Ñ?и Ñ?айлÑ? Ñ?одеÑ?жаÑ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1856";>CAN-2005-1856</a>
 
- -    <p>Sven Joachim discovered that the optional CD-burning feature of
- -    backup-manager uses a hardcoded filename in a world-writable
- -    directory for logging.  This can be subject to a symlink attack.</p>
+    <p>Свен Ð?оаÑ?им обнаÑ?Ñ?жил, Ñ?Ñ?о опÑ?ионалÑ?наÑ? возможноÑ?Ñ?Ñ? запиÑ?и компакÑ?-диÑ?ков
+    в пÑ?огÑ?амме backup-manager иÑ?полÑ?зÑ?еÑ? длÑ? ведениÑ? жÑ?Ñ?нала жÑ?Ñ?Ñ?ко запÑ?огÑ?аммиÑ?ованное
+    имÑ? Ñ?айла в каÑ?алоге, оÑ?кÑ?Ñ?Ñ?ом длÑ? запиÑ?и вÑ?ем полÑ?зоваÑ?елÑ?м.  ЭÑ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки.</p>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not provide the
- -backup-manager package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?
+backup-manager оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.5.7-1sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.5.7-1sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.5.8-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.5.8-2.</p>
 
- -<p>We recommend that you upgrade your backup-manager package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? backup-manager.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-886.wml	2005-11-08 11:03:05.000000000 +0500
+++ russian/security/2005/dsa-886.wml	2016-07-09 14:38:26.822912212 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in chmlib, a library for
- -dealing with CHM format files.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? chmlib, библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? Ñ?айлами в Ñ?оÑ?маÑ?е CHM, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2659";>CVE-2005-2659</a>
 
- -    <p>Palasik Sandor discovered a buffer overflow in the LZX
- -    decompression method.</p></li>
+    <p>Ð?алаÑ?ик СандоÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в меÑ?оде
+    Ñ?аÑ?паковки LZX.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2930";>CVE-2005-2930</a>
 
- -    <p>A buffer overflow has been discovered that could lead to the
- -    execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено пеÑ?еполнение бÑ?Ñ?еÑ?а, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3318";>CVE-2005-3318</a>
 
- -    <p>Sven Tantau discovered a buffer overflow that could lead to the
- -    execution of arbitrary code.</p></li>
+    <p>Свен ТанÑ?аÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain chmlib packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? chmlib оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.35-6sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.35-6sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.37-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.37-2.</p>
 
- -<p>We recommend that you upgrade your chmlib packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chmlib.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=CD7D
-----END PGP SIGNATURE-----


Reply to: