[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{701,901,916}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-701.wml	2005-04-21 23:43:26.000000000 +0600
+++ russian/security/2005/dsa-701.wml	2016-07-09 13:28:33.983789354 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>integer overflows</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел</define-tag>
 <define-tag moreinfo>
- -<p>It has been discovered that the last security update for Samba, a
- -LanManager like file and printer server for GNU/Linux and Unix-like
- -systems caused the daemon to crash upon reload. This has been fixed.
- -For reference below is the original advisory text:</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о поÑ?леднее обновление Samba, LanManager-подобном
+Ñ?айловом Ñ?еÑ?веÑ?е и Ñ?еÑ?веÑ?е пеÑ?аÑ?и длÑ? GNU/Linux и Unix-подобнÑ?Ñ?
+Ñ?иÑ?Ñ?ем, пÑ?иводиÑ? к аваÑ?ийной оÑ?Ñ?ановке Ñ?лÑ?жбÑ? пÑ?и еÑ? пеÑ?езапÑ?Ñ?ке. ЭÑ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена.
+Ð?иже пÑ?иводиÑ?Ñ?Ñ? изнаÑ?алÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Greg MacManus discovered an integer overflow in the smb daemon from
- -Samba, a LanManager like file and printer server for GNU/Linux and
- -Unix-like systems.  Requesting a very large number of access control
- -descriptors from the server could exploit the integer overflow, which
- -may result in a buffer overflow which could lead to the execution of
- -arbitrary code with root privileges.  Upstream developers have
- -discovered more possible integer overflows that are fixed with this
- -update as well.</p>
+<p>Ð?Ñ?ег Ð?акманÑ?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?лÑ?жбе smb из
+Samba, LanManager-подобном Ñ?айловом Ñ?еÑ?веÑ?е и Ñ?еÑ?веÑ?е пеÑ?аÑ?и длÑ? GNU/Linux и
+Unix-подобнÑ?Ñ? Ñ?иÑ?Ñ?ем.  Ð?апÑ?оÑ? оÑ?енÑ? болÑ?Ñ?ого Ñ?иÑ?ла деÑ?кÑ?ипÑ?оÑ?ов Ñ?пÑ?авлениÑ? доÑ?Ñ?Ñ?пом
+Ñ? Ñ?еÑ?веÑ?а можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел, Ñ?Ñ?о
+можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода Ñ? пÑ?авами Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.  РазÑ?абоÑ?Ñ?ики оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки
+еÑ?Ñ? обнаÑ?Ñ?жили возможнÑ?е пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел, коÑ?оÑ?Ñ?е Ñ?оже бÑ?ли иÑ?пÑ?авленÑ? в
+данном обновлении.</p>
 </blockquote>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 2.2.3a-15.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.3a-15.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 3.0.10-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.10-1.</p>
 
- -<p>We recommend that you upgrade your samba packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? samba.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-901.wml	2005-11-19 12:17:24.000000000 +0500
+++ russian/security/2005/dsa-901.wml	2016-07-09 13:31:47.342715275 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>programming error</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ?</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in gnump3d, a streaming
- -server for MP3 and OGG files.  The Common Vulnerabilities and
- -Exposures Project identifies the following problems:</p>
+<p>Ð? gnump3d, Ñ?еÑ?веÑ?е поÑ?окового веÑ?аниÑ? Ñ?айлов MP3 и OGG, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3349";>CVE-2005-3349</a>
 
- -    <p>Ludwig Nussel discovered several temporary files that are created
- -    with predictable filenames in an insecure fashion and allows local
- -    attackers to craft symlink attacks.</p></li>
+    <p>Ð?Ñ?двиг Ð?Ñ?Ñ?Ñ?елÑ? обнаÑ?Ñ?жил неÑ?колÑ?ко вÑ?еменнÑ?Ñ? Ñ?айлов, коÑ?оÑ?Ñ?е Ñ?оздаÑ?Ñ?Ñ?Ñ?
+    небезопаÑ?нÑ?м обÑ?азом и имеÑ?Ñ? пÑ?едÑ?казÑ?емÑ?е имена, Ñ?Ñ?о позволÑ?еÑ? локалÑ?нÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3355";>CVE-2005-3355</a>
 
- -    <p>Ludwig Nussel discovered that the theme parameter to HTTP
- -    requests may be used for path traversal.</p></li>
+    <p>Ð?Ñ?двиг Ð?Ñ?Ñ?Ñ?елÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о паÑ?амеÑ?Ñ? Ñ?емÑ? в HTTP-запÑ?оÑ?аÑ?
+    можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? обÑ?ода пÑ?Ñ?и.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain a gnump3d package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ? gnump3d оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.9.3-1sarge3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.9.3-1sarge3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.9.8-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.9.8-1.</p>
 
- -<p>We recommend that you upgrade your gnump3 package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? gnump3.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-916.wml	2011-05-26 16:05:45.000000000 +0600
+++ russian/security/2005/dsa-916.wml	2016-07-09 13:37:34.995733144 +0500
@@ -1,33 +1,35 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Inkscape, a
- -vector-based drawing program.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Inkscape, векÑ?оÑ?ной пÑ?огÑ?амме длÑ? Ñ?иÑ?ованиÑ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3737";>CVE-2005-3737</a>
 
- -    <p>Joxean Koret discovered a buffer overflow in the SVG parsing
- -    routines that can lead to the execution of arbitrary code.</p></li>
+    <p>ХокÑ?ена Ð?оÑ?еÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?иÑ?Ñ? длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а
+    SVG, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3885";>CVE-2005-3885</a>
 
- -    <p>Javier Fernández-Sanguino Peña noticed that the ps2epsi extension
- -    shell script uses a hardcoded temporary file making it vulnerable
- -    to symlink attacks.</p></li>
+    <p>ХавÑ?еÑ? ФеÑ?нандез-СангÑ?ино Ð?ена замеÑ?ил, Ñ?Ñ?о Ñ?Ñ?енаÑ?ий командной оболоÑ?ки
+    из Ñ?аÑ?Ñ?иÑ?ениÑ? ps2epsi иÑ?полÑ?зÑ?еÑ? вÑ?еменнÑ?й Ñ?айл, имÑ? коÑ?оÑ?ого жÑ?Ñ?Ñ?ко
+    запÑ?огÑ?аммиÑ?овано, Ñ?Ñ?о делаеÑ? его Ñ?Ñ?звимÑ?м
+    к аÑ?аке Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain inkscape packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? inkscape оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) this problem has been fixed in
- -version 0.41-4.99.sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.41-4.99.sarge2.</p>
 
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 0.42.2+0.43pre1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.42.2+0.43pre1-1.</p>
 
- -<p>We recommend that you upgrade your inkscape package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? inkscape.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=vv5n
-----END PGP SIGNATURE-----


Reply to: