[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-20{01,72,97}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-2001.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2001.wml	2016-07-28 18:24:28.460948471 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in PHP&nbsp;5, an
- -hypertext preprocessor. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? PHP&nbsp;5, пÑ?опÑ?оÑ?еÑ?Ñ?оÑ?е гипеÑ?Ñ?екÑ?Ñ?а, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4142";>CVE-2009-4142</a>
 
- -    <p>The htmlspecialchars function does not properly handle invalid
- -    multi-byte sequences.</p></li>
+    <p>ФÑ?нкÑ?иÑ? htmlspecialchars непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? некоÑ?Ñ?екÑ?нÑ?е
+    многобайÑ?овÑ?е поÑ?ледоваÑ?елÑ?ноÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4143";>CVE-2009-4143</a>
 
- -    <p>Memory corruption via session interruption.</p></li>
+    <p>Ð?овÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и из-за пÑ?еÑ?Ñ?ваниÑ? Ñ?еÑ?Ñ?ии.</p></li>
 
 </ul>
 
- -<p>In the stable distribution (lenny), this update also includes bug fixes
- -(bug #529278, #556459, #565387, #523073) that were to be included in a
- -stable point release as version 5.2.6.dfsg.1-1+lenny5.</p>
+<p>Ð?Ñ?оме Ñ?ого, обновление длÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (lenny) вклÑ?Ñ?аеÑ? в Ñ?ебÑ? иÑ?пÑ?авлениÑ? оÑ?ибок
+(оÑ?ибки #529278, #556459, #565387, #523073), коÑ?оÑ?Ñ?е вклÑ?Ñ?енÑ? в
+Ñ?едакÑ?иÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка под веÑ?Ñ?ией 5.2.6.dfsg.1-1+lenny5.</p>
 
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 5.2.6.dfsg.1-1+lenny6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.2.6.dfsg.1-1+lenny6.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution (sid),
- -these problems have been fixed in version 5.2.12.dfsg.1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 5.2.12.dfsg.1-1.</p>
 
 
- -<p>We recommend that you upgrade your php5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php5.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2072.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2072.wml	2016-07-28 18:29:33.061758545 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in libpng, a library for
- -reading and writing PNG files. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? libpng, библиоÑ?еке длÑ? Ñ?Ñ?ениÑ? и запиÑ?и Ñ?айлов в Ñ?оÑ?маÑ?е PNG, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1205";>CVE-2010-1205</a>
 
- -    <p>It was discovered a buffer overflow in libpng which allows remote
- -    attackers to execute arbitrary code via a PNG image that triggers 
- -    an additional data row.</p></li>
+    <p>Ð? libpng бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение бÑ?Ñ?еÑ?а, коÑ?оÑ?ое позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? изобÑ?ажениÑ? в Ñ?оÑ?маÑ?е PNG, вÑ?зÑ?ваÑ?Ñ?ем
+    дополниÑ?елÑ?нÑ?Ñ? Ñ?Ñ?Ñ?окÑ? даннÑ?Ñ?.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-2249";>CVE-2010-2249</a>
 
- -    <p>It was discovered a memory leak in libpng which allows remote
- -    attackers to cause a denial of service (memory consumption and
- -    application crash) via a PNG image containing malformed Physical
- -    Scale (aka sCAL) chunks.</p></li>
+    <p>Ð? libpng бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?еÑ?ка памÑ?Ñ?и, коÑ?оÑ?аÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление памÑ?Ñ?и и
+    аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) Ñ? помоÑ?Ñ?Ñ? изобÑ?ажениÑ? в Ñ?оÑ?маÑ?е PNG, Ñ?одеÑ?жаÑ?его некоÑ?Ñ?екÑ?нÑ?е
+    поÑ?Ñ?ии Physical Scale (извеÑ?Ñ?нÑ?е как sCAL).</p></li>
 
 </ul>
 
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.2.27-2+lenny4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.27-2+lenny4.</p>
 
- -<p>For the testing (squeeze) and unstable (sid) distribution, these
- -problems have been fixed in version 1.2.44-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.2.44-1.</p>
 
- -<p>We recommend that you upgrade your libpng package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? libpng.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2097.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2097.wml	2016-07-28 18:34:06.284422598 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>insufficient input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>недоÑ?Ñ?аÑ?оÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in phpMyAdmin, a tool
- -to administer MySQL over the web. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? phpMyAdmin, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL Ñ?еÑ?ез веб-инÑ?еÑ?Ñ?ейÑ?, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3055";>CVE-2010-3055</a>
 
- -  <p>The configuration setup script does not properly sanitise its output
- -  file, which allows remote attackers to execute arbitrary PHP code via
- -  a crafted POST request. In Debian, the setup tool is protected through
- -  Apache HTTP basic authentication by default.</p></li>
+  <p>СÑ?енаÑ?ий Ñ?Ñ?Ñ?ановки наÑ?Ñ?Ñ?оек непÑ?авилÑ?но вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? вÑ?Ñ?одного
+  Ñ?айла, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код на Ñ?зÑ?ке PHP Ñ? помоÑ?Ñ?Ñ?
+  Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного POST-запÑ?оÑ?а. Ð? Debian Ñ?Ñ?оÑ? инÑ?Ñ?Ñ?Ñ?менÑ? наÑ?Ñ?Ñ?ойки по Ñ?молÑ?аниÑ?
+  заÑ?иÑ?Ñ?н Ñ?еÑ?ез базовÑ?Ñ? аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ? Apache HTTP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3056";>CVE-2010-3056</a>
 
- -  <p>Various cross site scripting issues have been discovered that allow
- -  a remote attacker to inject arbitrary web script or HTML.</p></li>
+  <p>Ð?Ñ?ли обнаÑ?Ñ?женÑ? Ñ?азлиÑ?нÑ?е пÑ?облемÑ? Ñ? межÑ?айÑ?овÑ?м Ñ?кÑ?ипÑ?ингом, позволÑ?Ñ?Ñ?ие
+  Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?Ñ?авлÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.11.8.1-5+lenny5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.11.8.1-5+lenny5.</p>
 
- -<p>For the testing (squeeze) and unstable distribution (sid), these problems
- -have been fixed in version 3.3.5.1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и пÑ?облемÑ?
+бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.3.5.1-1.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=2V7u
-----END PGP SIGNATURE-----


Reply to: