[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-7{13,62,03}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-703.wml	2011-05-26 16:05:44.000000000 +0600
+++ russian/security/2005/dsa-703.wml	2016-07-09 13:23:57.420583897 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several problems have been discovered in telnet clients that could be
- -exploited by malicious daemons the client connects to.  The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? клиенÑ?аÑ? telnet бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем, коÑ?оÑ?Ñ?е могÑ?Ñ?
+иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?лÑ?жбами под Ñ?пÑ?авлением злоÑ?мÑ?Ñ?ленников, к коÑ?оÑ?Ñ?м (Ñ?лÑ?жбам) подклÑ?Ñ?аеÑ?Ñ?Ñ? клиенÑ?.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0468";>CAN-2005-0468</a>
 
- -    <p>Gaël Delalleau discovered a buffer overflow in the env_opt_add()
- -    function that allow a remote attacker to execute arbitrary code.</p>
+    <p>Ð?аÑ?лÑ? Ð?елалÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии env_opt_add(),
+    коÑ?оÑ?ое позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469";>CAN-2005-0469</a>
 
- -    <p>Gaël Delalleau discovered a buffer overflow in the handling of the
- -    LINEMODE suboptions in telnet clients.  This can lead to the
- -    execution of arbitrary code when connected to a malicious server.</p>
+    <p>Ð?аÑ?лÑ? Ð?елалÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде обÑ?абоÑ?ки подопÑ?ий
+    LINEMODE в клиенÑ?аÑ? telnet.  ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода пÑ?и подклÑ?Ñ?ении к Ñ?еÑ?веÑ?Ñ? злоÑ?мÑ?Ñ?ленника.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 1.2.4-5woody8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.4-5woody8.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.3.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.6-1.</p>
 
- -<p>We recommend that you upgrade your krb5 package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? krb5.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-713.wml	2006-12-06 19:23:28.000000000 +0500
+++ russian/security/2005/dsa-713.wml	2016-07-09 13:15:40.822195123 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several bugs have been found in junkbuster, a HTTP proxy and filter.
- -The Common Vulnerabilities and Exposures project identifies the
- -following vulnerabilities:</p>
+<p>Ð? junkbuster, HTTP-пÑ?окÑ?и и Ñ?илÑ?Ñ?Ñ?е, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко оÑ?ибок.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1108";>CAN-2005-1108</a>
 
- -    <p>James Ranson discovered that an attacker can modify the referrer
- -    setting with a carefully crafted URL by accidentally overwriting a
- -    global variable.</p>
+    <p>Ð?жеймÑ? РÑ?нÑ?он обнаÑ?Ñ?жил, Ñ?Ñ?о злоÑ?мÑ?Ñ?ленник можеÑ? измениÑ?Ñ? наÑ?Ñ?Ñ?ойки Ñ?Ñ?Ñ?лаÑ?Ñ?егоÑ?Ñ?
+    домена на Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й URL пÑ?Ñ?Ñ?м Ñ?лÑ?Ñ?айной пеÑ?езапиÑ?и
+    знаÑ?ениÑ? глобалÑ?ной пеÑ?еменной.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1109";>CAN-2005-1109</a>
 
- -    <p>Tavis Ormandy from the Gentoo Security Team discovered several
- -    heap corruptions due to inconsistent use of an internal function
- -    that can crash the daemon or possibly lead to the execution of
- -    arbitrary code.</p>
+    <p>ТÑ?виÑ? Ð?Ñ?манди из Gentoo Security Team обнаÑ?Ñ?жил неÑ?колÑ?ко
+    повÑ?еждений Ñ?одеÑ?жимого динамиÑ?еÑ?кой памÑ?Ñ?и из-за некоÑ?Ñ?екÑ?ного иÑ?полÑ?зованиÑ? внÑ?Ñ?Ñ?енней
+    Ñ?Ñ?нкÑ?ии, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке Ñ?лÑ?жбÑ? или возможномÑ? вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 2.0.2-0.2woody1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.2-0.2woody1.</p>
 
- -<p>The unstable distribution (sid) doesn't contain the junkbuster package
- -anymore.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) пакеÑ? junkbuster
+оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>We recommend that you upgrade your junkbuster package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? junkbuster.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-762.wml	2005-07-19 14:14:36.000000000 +0600
+++ russian/security/2005/dsa-762.wml	2016-07-09 13:19:21.333443921 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Kevin Finisterre discovered two problems in the Bluetooth FTP client
- -from affix, user space utilities for the Affix Bluetooth protocol
- -stack.  The Common Vulnerabilities and Exposures project identifies
- -the following vulnerabilities:</p>
+<p>Ð?евин ФиниÑ?Ñ?еÑ? обнаÑ?Ñ?жил две пÑ?облемÑ? в Bluetooth FTP-клиенÑ?е
+из Ñ?оÑ?Ñ?ава affix, пакеÑ?а Ñ?Ñ?илиÑ? полÑ?зоваÑ?елÑ?Ñ?кого пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва длÑ? Ñ?абоÑ?Ñ? по набоÑ?Ñ?
+пÑ?оÑ?околов Affix Bluetooth.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2250";>CAN-2005-2250</a>
 
- -    <p>A buffer overflow allows remote attackers to execute arbitrary
- -    code via a long filename in an OBEX file share.</p>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+    код Ñ? помоÑ?Ñ?Ñ? длиннÑ?Ñ? имÑ?н Ñ?айлов в коде обÑ?его доÑ?Ñ?Ñ?па к Ñ?айлам по OBEX.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2277";>CAN-2005-2277</a>
 
- -    <p>Missing input sanitising before executing shell commands allow an
- -    attacker to execute arbitrary commands as root.</p>
+    <p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? до вÑ?полнениÑ? команд командной оболоÑ?ки позволÑ?еÑ?
+    злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? оÑ? лиÑ?а Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.</p>
 
 </ul>
 
- -<p>The old stable distribution (woody) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (woody) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.1.1-2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1.1-2.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.1.2-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1.2-2.</p>
 
- -<p>We recommend that you upgrade your affix package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? affix.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=GaV6
-----END PGP SIGNATURE-----


Reply to: