[DONE] wml://security/2005/dsa-{669,661,829}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2005/dsa-661.wml 2011-05-26 16:05:43.000000000 +0600
+++ russian/security/2005/dsa-661.wml 2016-07-09 14:06:42.645629154 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>insecure temporary files</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>небезопаÑ?нÑ?е вÑ?еменнÑ?е Ñ?айлÑ?</define-tag>
<define-tag moreinfo>
- -<p>Dan McMahill noticed that our advisory DSA 661-1 did not correct
- -the multiple insecure files problem, hence, this update. For
- -completeness below is the original advisory text:</p>
+<p>Ð?Ñ?н Ð?акмаÑ?ил замеÑ?ил, Ñ?Ñ?о в Ñ?екомендаÑ?ии DSA 661-1 не иÑ?пÑ?авлена
+пÑ?облема Ñ? многоÑ?иÑ?леннÑ?ми небезопаÑ?нÑ?ми Ñ?айлами, поÑ?Ñ?омÑ? вÑ?пÑ?Ñ?кам Ñ?Ñ?о обновление.
+Ð?лÑ? полноÑ?Ñ? ниже пÑ?иводиÑ?Ñ?Ñ? изнаÑ?алÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии:</p>
<blockquote>
- -<p>Javier Fernández-Sanguino Peña from the Debian Security Audit project
- -discovered that f2c and fc, which are both part of the f2c package, a
- -fortran 77 to C/C++ translator, open temporary files insecurely and
- -are hence vulnerable to a symlink attack. The Common
- -Vulnerabilities and Exposures project identifies the following
- -vulnerabilities:</p>
+<p>ХавÑ?еÑ? ФеÑ?нандез-СангÑ?ино Ð?ена из пÑ?оекÑ?а Debian Security Audit
+обнаÑ?Ñ?жил, Ñ?Ñ?о f2c и fc, коÑ?оÑ?Ñ?е Ñ?влÑ?Ñ?Ñ?Ñ?Ñ? Ñ?аÑ?Ñ?Ñ?ми пакеÑ?а f2c,
+Ñ?Ñ?анÑ?лÑ?Ñ?оÑ?е fortran 77 на C/C++, оÑ?кÑ?Ñ?ваÑ?Ñ? вÑ?еменнÑ?е Ñ?айлÑ? небезопаÑ?нÑ?м обÑ?азом и
+Ñ?влÑ?Ñ?Ñ?Ñ?Ñ? Ñ?Ñ?звимÑ?ми к аÑ?аке Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+Ñ?Ñ?звимоÑ?Ñ?и:</p>
<ul>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0017">CAN-2005-0017</a>
- - <p>Multiple insecure temporary files in the f2c translator.</p>
+ <p>Ð?ногоÑ?иÑ?леннÑ?е небезопаÑ?нÑ?е вÑ?еменнÑ?е Ñ?айлÑ? в Ñ?Ñ?анÑ?лÑ?Ñ?оÑ?е f2c.</p>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0018">CAN-2005-0018</a>
- - <p>Two insecure temporary files in the f2 shell script.</p>
+ <p>Ð?ва небезопаÑ?нÑ?Ñ? вÑ?еменнÑ?Ñ? Ñ?айла в Ñ?Ñ?енаÑ?ии командной оболоÑ?ки f2.</p>
</ul>
</blockquote>
- -<p>For the stable distribution (woody) and all others including testing
- -this problem has been fixed in version 20010821-3.2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) и дÑ?Ñ?гиÑ? вÑ?пÑ?Ñ?каÑ?, вклÑ?Ñ?аÑ? Ñ?еÑ?Ñ?иÑ?Ñ?емÑ?й,
+Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 20010821-3.2.</p>
- -<p>We recommend that you upgrade your f2c package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? f2c.</p>
</define-tag>
# do not modify the following line
- --- english/security/2005/dsa-669.wml 2005-02-07 17:13:31.000000000 +0500
+++ russian/security/2005/dsa-669.wml 2016-07-09 14:01:40.371267032 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in php4 which also apply to
- -the version of php3 in the stable Debian distribution. The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? php4 бÑ?ло обнаÑ?Ñ?жено две Ñ?Ñ?звимоÑ?Ñ?и, коÑ?оÑ?Ñ?е Ñ?акже каÑ?аÑ?Ñ?Ñ?Ñ?
+веÑ?Ñ?ии php3 из Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка Debian. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
<ul>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594">CAN-2004-0594</a>
- - <p>The memory_limit functionality allows remote attackers to execute
- - arbitrary code under certain circumstances.</p>
+ <p>ФÑ?нкÑ?иÑ? memory_limit позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам пÑ?и опÑ?еделÑ?ннÑ?Ñ?
+ обÑ?Ñ?оÑ?Ñ?елÑ?Ñ?Ñ?ваÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595">CAN-2004-0595</a>
- - <p>The strip_tags function does not filter null (\0) characters
- - within tag names when restricting input to allowed tags, which
- - allows dangerous tags to be processed by some web browsers which
- - could lead to cross-site scripting (XSS) vulnerabilities.</p>
+ <p>ФÑ?нкÑ?иÑ? strip_tags не Ñ?илÑ?Ñ?Ñ?Ñ?еÑ? null-Ñ?имволÑ? (\0)
+ в именаÑ? Ñ?егов пÑ?и огÑ?аниÑ?ении вÑ?однÑ?Ñ? даннÑ?Ñ? до Ñ?азÑ?еÑ?Ñ?ннÑ?Ñ? Ñ?егов, Ñ?Ñ?о
+ позволÑ?еÑ? обÑ?абаÑ?Ñ?ваÑ?Ñ? опаÑ?нÑ?е Ñ?еги некоÑ?оÑ?Ñ?ми веб-бÑ?аÑ?зеÑ?ами, Ñ?Ñ?о
+ можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ? (XSS).</p>
</ul>
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 3.0.18-23.1woody2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.18-23.1woody2.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 3.0.18-27.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.18-27.</p>
- -<p>We recommend that you upgrade your php3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php3.</p>
</define-tag>
# do not modify the following line
- --- english/security/2005/dsa-829.wml 2005-10-18 03:59:29.000000000 +0600
+++ russian/security/2005/dsa-829.wml 2016-07-09 14:10:29.434295762 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
<define-tag moreinfo>
- -<p>A stack-based buffer overflow in the init_syms function of MySQL, a
- -popular database, has been discovered that allows remote authenticated
- -users who can create user-defined functions to execute arbitrary code
- -via a long function_name field. The ability to create user-defined
- -functions is not typically granted to untrusted users.</p>
+<p>Ð? Ñ?Ñ?нкÑ?ии init_syms в MySQL, попÑ?лÑ?Ñ?ной базе даннÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение
+бÑ?Ñ?еÑ?а, позволÑ?Ñ?Ñ?ее Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м,
+коÑ?оÑ?Ñ?е могÑ?Ñ? Ñ?оздаваÑ?Ñ? полÑ?зоваÑ?елÑ?Ñ?кие Ñ?Ñ?нкÑ?ии, вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код
+Ñ? помоÑ?Ñ?Ñ? длинного полÑ? function_name. СпоÑ?обноÑ?Ñ?Ñ? Ñ?оздаваÑ?Ñ? полÑ?зоваÑ?елÑ?Ñ?кие
+Ñ?Ñ?нкÑ?ии обÑ?Ñ?но не даÑ?Ñ?Ñ?Ñ? недовеÑ?еннÑ?м полÑ?зоваÑ?елÑ?м.</p>
- -<p>The following vulnerability matrix shows which version of MySQL in
- -which distribution has this problem fixed:</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а показÑ?ваеÑ?, какаÑ? веÑ?Ñ?иÑ? MySQL и в
+каком вÑ?пÑ?Ñ?ке бÑ?ла иÑ?пÑ?авлена:</p>
<div class="centerdiv">
<table border=1 cellspacing=0 cellpadding=2>
@@ -20,31 +21,31 @@
<tr>
<td>mysql</td>
<td>3.23.49-8.14</td>
- - <td>n/a</td>
- - <td>n/a</td>
+ <td>не доÑ?Ñ?Ñ?пно</td>
+ <td>не доÑ?Ñ?Ñ?пно</td>
</tr>
<tr>
<td>mysql-dfsg</td>
- - <td>n/a</td>
+ <td>не доÑ?Ñ?Ñ?пно</td>
<td>4.0.24-10sarge1</td>
<td>4.0.24-10sarge1</td>
</tr>
<tr>
<td>mysql-dfsg-4.1</td>
- - <td>n/a</td>
+ <td>не доÑ?Ñ?Ñ?пно</td>
<td>4.1.11a-4sarge2</td>
<td>4.1.14-2</td>
</tr>
<tr>
<td>mysql-dfsg-5.0</td>
- - <td>n/a</td>
- - <td>n/a</td>
+ <td>не доÑ?Ñ?Ñ?пно</td>
+ <td>не доÑ?Ñ?Ñ?пно</td>
<td>5.0.11beta-3</td>
</tr>
</table>
</div>
- -<p>We recommend that you upgrade your mysql packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=YMvQ
-----END PGP SIGNATURE-----
Reply to: