[DONE] wml://security/2010/dsa-{1970,2002,1978,2000}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2010/dsa-1970.wml 2010-01-14 00:49:26.000000000 +0500
+++ russian/security/2010/dsa-1970.wml 2016-07-28 18:07:44.492297193 +0500
@@ -1,26 +1,27 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
<define-tag moreinfo>
- -<p>It was discovered that a significant memory leak could occur in OpenSSL,
- -related to the reinitialization of zlib. This could result in a remotely
- -exploitable denial of service vulnerability when using the Apache httpd
- -server in a configuration where mod_ssl, mod_php5, and the php5-curl
- -extension are loaded.</p>
- -
- -<p>The old stable distribution (etch) is not affected by this issue.</p>
- -
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 0.9.8g-15+lenny6.</p>
- -
- -<p>The packages for the arm architecture are not included in this advisory.
- -They will be released as soon as they become available.</p>
- -
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), this problem will be fixed soon. The issue does not seem to be
- -exploitable with the apache2 package contained in squeeze/sid.</p>
- -
- -<p>We recommend that you upgrade your openssl packages. You also need to
- -restart your Apache httpd server to make sure it uses the updated
- -libraries.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о в OpenSSL можеÑ? пÑ?оиÑ?Ñ?одиÑ?Ñ? Ñ?Ñ?Ñ?еÑ?Ñ?веннаÑ? Ñ?Ñ?еÑ?ка памÑ?Ñ?и,
+Ñ?вÑ?заннаÑ? Ñ? повÑ?оÑ?ной иниÑ?иализаÑ?ией zlib. ÐÑ?о можеÑ? пÑ?иводиÑ?Ñ? к возникновениÑ?
+Ñ?далÑ?нного оÑ?каза в обÑ?лÑ?живании пÑ?и иÑ?полÑ?зовании httpd-Ñ?еÑ?веÑ?а Apache
+Ñ? наÑ?Ñ?Ñ?ойками, пÑ?и коÑ?оÑ?Ñ?Ñ? загÑ?Ñ?жаÑ?Ñ?Ñ?Ñ? Ñ?аÑ?Ñ?иÑ?ениÑ? mod_ssl, mod_php5
+и php5-curl.</p>
+
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (etch) не подвеÑ?жен данной пÑ?облеме.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.9.8g-15+lenny6.</p>
+
+<p>Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? arm в данной Ñ?екомендаÑ?ии оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.
+Ð?ни бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ? по меÑ?е гоÑ?овноÑ?Ñ?и.</p>
+
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже. Ð?Ñ?едÑ?Ñ?авлÑ?еÑ?Ñ?Ñ?, Ñ?Ñ?о даннаÑ? пÑ?облема
+не можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленниками пÑ?и иÑ?полÑ?зовании в Ñ?иÑ?Ñ?еме пакеÑ?а apache2 из вÑ?пÑ?Ñ?ков squeeze/sid.</p>
+
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openssl. Ð?Ñ?оме Ñ?ого, вам поÑ?Ñ?ебÑ?еÑ?Ñ?Ñ?
+пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ? httpd-Ñ?еÑ?веÑ? Apache, Ñ?Ñ?обÑ? Ñ?бедиÑ?Ñ?Ñ?Ñ?, Ñ?Ñ?о он иÑ?полÑ?зÑ?еÑ? обновлÑ?ннÑ?е
+библиоÑ?еки.</p>
</define-tag>
# do not modify the following line
- --- english/security/2010/dsa-1978.wml 2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1978.wml 2016-07-28 18:15:20.851521660 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in phpgroupware, a
- -Web based groupware system written in PHP. The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? phpgroupware, веб-Ñ?иÑ?Ñ?еме длÑ? Ñ?овмеÑ?Ñ?ной Ñ?абоÑ?Ñ?, напиÑ?анной на Ñ?зÑ?ке PHP,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4414">CVE-2009-4414</a>
- - <p>An SQL injection vulnerability was found in the authentication
- - module.</p></li>
+ <p>SQL-инÑ?екÑ?иÑ? бÑ?ла обнаÑ?Ñ?жена в модÑ?ле
+ аÑ?Ñ?енÑ?иÑ?икаÑ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4415">CVE-2009-4415</a>
- - <p>Multiple directory traversal vulnerabilities were found in the
- - addressbook module.</p></li>
+ <p>Ð?ногоÑ?иÑ?леннÑ?е обÑ?одÑ? каÑ?алога бÑ?ли обнаÑ?Ñ?женÑ? в
+ модÑ?ле адÑ?еÑ?ной книги.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4416">CVE-2009-4416</a>
- - <p>The authentication module is affected by cross-site scripting.</p></li>
+ <p>Ð?одÑ?лÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии подвеÑ?жен межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
</ul>
- -<p>For the stable distribution (lenny) these problems have been fixed in
- -version 0.9.16.012+dfsg-8+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.16.012+dfsg-8+lenny1.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.9.16.012+dfsg-9.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.16.012+dfsg-9.</p>
- -<p>We recommend that you upgrade your phpgroupware packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? phpgroupware.</p>
</define-tag>
# do not modify the following line
- --- english/security/2010/dsa-2000.wml 2010-02-19 13:04:56.000000000 +0500
+++ russian/security/2010/dsa-2000.wml 2016-07-28 18:20:22.784160691 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in ffmpeg, a multimedia
- -player, server and encoder, which also provides a range of multimedia
- -libraries used in applications like MPlayer:</p>
- -
- -<p>Various programming errors in container and codec implementations
- -may lead to denial of service or the execution of arbitrary code
- -if the user is tricked into opening a malformed media file or stream.</p>
+<p>Ð? ffmpeg, пÑ?оигÑ?Ñ?ваÑ?еле, Ñ?еÑ?веÑ?е и кодиÑ?овÑ?ике мÑ?лÑ?Ñ?имедиа, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ем
+Ñ?Ñ?д мÑ?лÑ?Ñ?имедиа-библиоÑ?ек, иÑ?полÑ?зÑ?емÑ?Ñ? в Ñ?акиÑ? пÑ?иложениÑ?Ñ? как MPlayer, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
+
+<p>РазлиÑ?нÑ?е оÑ?ибки пÑ?огÑ?аммиÑ?ованиÑ? в Ñ?еализаÑ?ии конÑ?ейнеÑ?ов и кодеков
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ? пÑ?оизволÑ?ного кода
+в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ? оÑ?кÑ?оеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл или поÑ?ок.</p>
- -<p>The implementations of the following affected codecs and container formats
- -have been updated:</p>
+<p>Ð?Ñ?ли обновленÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?еализаÑ?ии кодеков и
+конÑ?ейнеÑ?ов:</p>
<ul>
- -<li>the Vorbis audio codec</li>
- -<li>the Ogg container implementation</li>
- -<li>the FF Video 1 codec</li>
- -<li>the MPEG audio codec</li>
- -<li>the H264 video codec</li>
- -<li>the MOV container implementation</li>
- -<li>the Oggedc container implementation</li>
+<li>аÑ?диокодек Vorbis</li>
+<li>Ñ?еализаÑ?иÑ? конÑ?ейнеÑ?а Ogg</li>
+<li>кодек FF Video 1</li>
+<li>аÑ?диокодек MPEG</li>
+<li>видеокодек H264</li>
+<li>Ñ?еализаÑ?иÑ? конÑ?ейнеÑ?а MOV</li>
+<li>Ñ?еализаÑ?иÑ? конÑ?ейнеÑ?а Oggedc</li>
</ul>
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 0.svn20080206-18+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.svn20080206-18+lenny1.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 4:0.5+svn20090706-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:0.5+svn20090706-5.</p>
- -<p>We recommend that you upgrade your ffmpeg packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ffmpeg.</p>
</define-tag>
# do not modify the following line
- --- english/security/2010/dsa-2002.wml 2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2002.wml 2016-07-28 18:11:21.447147507 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
<define-tag moreinfo>
- -<p>Several denial of service vulnerabilities have been discovered in polipo, a
- -small, caching web proxy. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? polipo, неболÑ?Ñ?ом кеÑ?иÑ?Ñ?Ñ?Ñ?ем веб-пÑ?окÑ?и, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+оÑ?казов в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3305">CVE-2009-3305</a>
- - <p>A malicous remote sever could cause polipo to crash by sending an
- - invalid Cache-Control header.</p></li>
+ <p>УдалÑ?ннÑ?й Ñ?еÑ?веÑ? злоÑ?мÑ?Ñ?ленника можеÑ? вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? polipo, оÑ?пÑ?авив
+ некоÑ?Ñ?екÑ?нÑ?й заголовок Cache-Control.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4143">CVE-2009-4143</a>
- - <p>A malicous client could cause polipo to crash by sending a large
- - Content-Length value.</p></li>
+ <p>Ð?лоÑ?мÑ?Ñ?ленник можеÑ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? polipo, оÑ?пÑ?авив болÑ?Ñ?ое
+ знаÑ?ение заголовка Content-Length.</p></li>
</ul>
- -<p>This upgrade also fixes some other bugs that could lead to a daemon crash
- -or an infinite loop and may be triggerable remotely.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? некоÑ?оÑ?Ñ?е дÑ?Ñ?гие оÑ?ибки, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к аваÑ?ийной
+оÑ?Ñ?ановке Ñ?лÑ?жбÑ? или беÑ?конеÑ?номÑ? Ñ?иклÑ?, и коÑ?оÑ?Ñ?е могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?далÑ?нно.</p>
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.0.4-1+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.4-1+lenny1.</p>
- -<p>For the testing distribution (squeeze) and the unstable distribution (sid),
- -these problems have been fixed in version 1.0.4-3.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.0.4-3.</p>
- -<p>We recommend that you upgrade your polipo packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? polipo.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=p0eS
-----END PGP SIGNATURE-----
Reply to: