[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{844,694,705}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-694.wml	2005-03-21 17:09:54.000000000 +0500
+++ russian/security/2005/dsa-694.wml	2016-07-09 12:46:08.411759169 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>missing input sanitising, integer overflow</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?, пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in xloadimage, an image
- -viewer for X11.  The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? xloadimage, пÑ?огÑ?амме пÑ?оÑ?моÑ?Ñ?а изобÑ?ажений длÑ? X11, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0638";>CAN-2005-0638</a>
 
- -    <p>Tavis Ormandy of the Gentoo Linux Security Audit Team has reported
- -    a flaw in the handling of compressed images, where shell
- -    meta-characters are not adequately escaped.</p>
+    <p>ТÑ?виÑ? Ð?Ñ?манди из Gentoo Linux Security Audit Team Ñ?ообÑ?ил
+    об Ñ?Ñ?звимоÑ?Ñ?и в коде обÑ?абоÑ?ки Ñ?жаÑ?Ñ?Ñ? изобÑ?ажений, пÑ?и коÑ?оÑ?ой Ñ?кÑ?аниÑ?ование
+    меÑ?аÑ?имволов командой оболоÑ?ки вÑ?полнÑ?еÑ?Ñ?Ñ? непÑ?авилÑ?но.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0639";>CAN-2005-0639</a>
 
- -    <p>Insufficient validation of image properties have been
- -    discovered which could potentially result in buffer management
- -    errors.</p>
+    <p>Ð?Ñ?ла обнаÑ?Ñ?жена недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка Ñ?войÑ?Ñ?в
+    изобÑ?ажениÑ?, коÑ?оÑ?аÑ? поÑ?енÑ?иалÑ?но можеÑ? пÑ?иводиÑ?Ñ? к оÑ?ибкам
+    Ñ?пÑ?авлениÑ? бÑ?Ñ?еÑ?ом.</p>
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 4.1-10woody1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.1-10woody1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.1-14.2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.1-14.2.</p>
 
- -<p>We recommend that you upgrade your xloadimage package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? xloadimage.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-705.wml	2005-04-12 02:34:57.000000000 +0600
+++ russian/security/2005/dsa-705.wml	2016-07-09 12:50:24.970892803 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>missing input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Several denial of service conditions have been discovered in wu-ftpd,
- -the popular FTP daemon.  The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? wu-ftpd, попÑ?лÑ?Ñ?ной Ñ?лÑ?жбе FTP, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко оÑ?казов
+в обÑ?лÑ?живании.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0256";>CAN-2005-0256</a>
 
- -    <p>Adam Zabrocki discovered a denial of service condition in wu-ftpd
- -    that could be exploited by a remote user and cause the server to
- -    slow down by resource exhaustion.</p>
+    <p>Ð?дам Ð?абÑ?оÑ?кий обнаÑ?Ñ?жил оÑ?каз в обÑ?лÑ?живании в wu-ftpd,
+    коÑ?оÑ?Ñ?й можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?далÑ?ннÑ?м полÑ?зоваÑ?елем, и можеÑ? вÑ?зÑ?ваÑ?Ñ? замедление
+    Ñ?еÑ?веÑ?а из-за Ñ?Ñ?езмеÑ?ного поÑ?Ñ?еблениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0854";>CAN-2003-0854</a>
 
- -    <p>Georgi Guninski discovered that /bin/ls may be called from within
- -    wu-ftpd in a way that will result in large memory consumption and
- -    hence slow down the server.</p>
+    <p>Ð?еоÑ?гий Ð?Ñ?нинÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о можно вÑ?зваÑ?Ñ? /bin/ls из
+    wu-ftpd Ñ?ак, Ñ?Ñ?о Ñ?Ñ?о пÑ?иведÑ?Ñ? к поÑ?Ñ?еблениÑ? болÑ?Ñ?ого обÑ?Ñ?ма памÑ?Ñ?и и
+    замедлениÑ? Ñ?еÑ?веÑ?а.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 2.6.2-3woody5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.2-3woody5.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.6.2-19.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.2-19.</p>
 
- -<p>We recommend that you upgrade your wu-ftpd package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? wu-ftpd.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-844.wml	2005-10-05 15:24:29.000000000 +0600
+++ russian/security/2005/dsa-844.wml	2016-07-09 12:42:13.217679604 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>programming error</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ?</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability in mod_auth_shadow, an Apache module that lets users
- -perform HTTP authentication against /etc/shadow, has been discovered.
- -The module runs for all locations that use the 'require group'
- -directive which would bypass access restrictions controlled by another
- -authorisation mechanism, such as AuthGroupFile file, if the username
- -is listed in the password file and in the gshadow file in the proper
- -group and the supplied password matches against the one in the shadow
- -file.</p>
- -
- -<p>This update requires an explicit "AuthShadow on" statement if website
- -authentication should be checked against /etc/shadow.</p>
- -
- -<p>For the old stable distribution (woody) this problem has been fixed in
- -version 1.3-3.1woody.2.</p>
+<p>Ð?Ñ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ? в mod_auth_shadow, модÑ?ле Apache, позволÑ?Ñ?Ñ?ем
+полÑ?зоваÑ?елÑ?м вÑ?полнÑ?Ñ?Ñ? HTTP-аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ? в Ñ?ооÑ?веÑ?Ñ?Ñ?вии Ñ? /etc/shadow.
+Ð?одÑ?лÑ? запÑ?Ñ?каеÑ?Ñ?Ñ? длÑ? вÑ?еÑ? меÑ?Ñ?, иÑ?полÑ?зÑ?Ñ?Ñ?иÑ? диÑ?екÑ?ивÑ? 'require group',
+Ñ?Ñ?о позволÑ?еÑ? обÑ?одиÑ?Ñ? огÑ?аниÑ?ениÑ? доÑ?Ñ?Ñ?па, Ñ?Ñ?Ñ?ановленнÑ?е дÑ?Ñ?гим
+меÑ?анизмом авÑ?оÑ?изаÑ?ии (Ñ?аким как Ñ?айл AuthGroupFile) в Ñ?лÑ?Ñ?ае, еÑ?ли имÑ?
+полÑ?зоваÑ?елÑ? имееÑ?Ñ?Ñ? в Ñ?айле password и в Ñ?айле gshadow в Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей
+гÑ?Ñ?ппе, а введÑ?ннÑ?й паÑ?олÑ? Ñ?овпадаеÑ? Ñ? одним из паÑ?олей в Ñ?айле
+shadow.</p>
+
+<p>Ð?анное обновление Ñ?Ñ?ебÑ?еÑ? Ñ?вного налиÑ?иÑ? Ñ?Ñ?веÑ?ждениÑ? "AuthShadow on" в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли
+пÑ?овеÑ?ка аÑ?Ñ?енÑ?иÑ?икаÑ?ии должна оÑ?Ñ?Ñ?еÑ?Ñ?влÑ?Ñ?Ñ?Ñ?Ñ? Ñ?еÑ?ез /etc/shadow.</p>
+
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.3-3.1woody.2.</p>
 
- -<p>For the stable distribution (sarge) this problem has been fixed in
- -version 1.4-1sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4-1sarge1.</p>
 
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 1.4-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4-2.</p>
 
- -<p>We recommend that you upgrade your libapache-mod-auth-shadow package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? libapache-mod-auth-shadow.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=PE28
-----END PGP SIGNATURE-----


Reply to: