[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1{241,112,238}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1112.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1112.wml	2016-07-31 16:37:28.526608333 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local vulnerabilities have been discovered in the MySQL database
- -server, which may lead to denial of service. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? Ñ?еÑ?веÑ?е баз даннÑ?Ñ? MySQL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко локалÑ?нÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3081";>CVE-2006-3081</a>
 
- -    <p>"Kanatoko" discovered that the server can be crashed with feeding
- -    NULL values to the str_to_date() function.</p></li>
+    <p>"Kanatoko" обнаÑ?Ñ?жил, Ñ?Ñ?о можно аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? Ñ?еÑ?веÑ?а пÑ?Ñ?Ñ?м пеÑ?едаÑ?и
+    Ñ?Ñ?нкÑ?ии str_to_date() NULL-знаÑ?ений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3469";>CVE-2006-3469</a>
 
- -    <p>Jean-David Maillefer discovered that the server can be crashed with
- -    specially crafted date_format() function calls.</p></li>
+    <p>Ð?ан-Ð?авид Ð?айÑ?оÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о можно аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? Ñ?еÑ?веÑ?а Ñ? помоÑ?Ñ?Ñ?
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? вÑ?зовов Ñ?Ñ?нкÑ?ии date_format().</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.1.11a-4sarge5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.1.11a-4sarge5.</p>
 
- -<p>For the unstable distribution (sid) does no longer contain MySQL 4.1
- -packages. MySQL 5.0 from sid is not affected.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) пакеÑ?Ñ? MySQL 4.1
+оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?. MySQL 5.0 из sid не подвеÑ?жена Ñ?Ñ?им Ñ?Ñ?звимоÑ?Ñ?Ñ?м.</p>
 
- -<p>We recommend that you upgrade your mysql-dfsg-4.1 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql-dfsg-4.1.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1238.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1238.wml	2016-07-31 16:42:49.153891845 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Clam anti-virus
- -toolkit. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? наболе анÑ?ивиÑ?Ñ?Ñ?нÑ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?ов Clam бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6406";>CVE-2006-6406</a>
 
- -    <p>Hendrik Weimer discovered that invalid characters in base64 encoded
- -    data may lead to bypass of scanning mechanisms.</p></li>
+    <p>ХендÑ?ик Ð?аймеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?Ñ?екÑ?нÑ?е Ñ?имволÑ? в закодиÑ?ованнÑ?Ñ? Ñ?
+    помоÑ?Ñ?Ñ? base64 даннÑ?Ñ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к обÑ?одÑ? меÑ?анизмов Ñ?каниÑ?ованиÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6481";>CVE-2006-6481</a>
 
- -    <p>Hendrik Weimer discovered that deeply nested multipart/mime MIME
- -    data may lead to denial of service.</p></li>
+    <p>ХендÑ?ик Ð?аймеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о MIME-даннÑ?е Ñ? множеÑ?Ñ?вом вложеннÑ?Ñ? Ñ?аÑ?Ñ?ей/mime
+    могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.84-2.sarge.13.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.84-2.sarge.13.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been
- -fixed in version 0.88.7-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 0.88.7-1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.88.7-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.88.7-1.</p>
 
- -<p>We recommend that you upgrade your clamav packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? clamav.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1241.wml	2007-03-04 01:41:11.000000000 +0500
+++ russian/security/2006/dsa-1241.wml	2016-07-31 16:30:20.127255644 +0500
@@ -1,26 +1,27 @@
- -<define-tag description>cross-site scripting</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг</define-tag>
 <define-tag moreinfo>
- -<p>Martijn Brinkers discovered cross-site scripting vulnerabilities in
- -the mailto parameter of webmail.php, the session and delete_draft
- -parameters of compose.php and through a shortcoming in the magicHTML
- -filter. An attacker could abuse these to execute malicious JavaScript in
- -the user's webmail session. </p>
- -
- -<p>Also, a workaround was made for Internet Explorer &lt;= 5: IE will attempt
- -to guess the MIME type of attachments based on content, not the MIME 
- -header sent. Attachments could fake to be a 'harmless' JPEG, while they
- -were in fact HTML that Internet Explorer would render.</p>
- -
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2:1.4.4-10.</p>
+<p>Ð?аÑ?Ñ?ейн Ð?Ñ?инкеÑ?Ñ? обнаÑ?Ñ?жил межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в
+паÑ?амеÑ?Ñ?е mailto Ñ? webmail.php, паÑ?амеÑ?Ñ?аÑ? session и delete_draft
+Ñ? compose.php, а Ñ?акже из-за пÑ?облемÑ? в Ñ?илÑ?Ñ?Ñ?е
+magicHTML. Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и длÑ? вÑ?полнениÑ? кода
+на Ñ?зÑ?ке JavaScript в полÑ?зоваÑ?елÑ?Ñ?кой Ñ?еÑ?Ñ?ии webmail. </p>
+
+<p>Ð?Ñ?оме Ñ?ого, длÑ? Internet Explorer &lt;= 5 добавлено вÑ?еменное Ñ?еÑ?ение: IE пÑ?Ñ?аеÑ?Ñ?Ñ?
+опÑ?еделиÑ?Ñ? MIME-Ñ?ип вложений на оÑ?нове Ñ?одеÑ?жимого, а не оÑ?пÑ?авленного
+заголовка MIME. Ð?ложениÑ? могÑ?Ñ? вÑ?глÑ?деÑ?Ñ? как 'безопаÑ?нÑ?е' JPEG-Ñ?айлÑ?, но Ñ?акÑ?иÑ?еÑ?ки
+они могÑ?Ñ? Ñ?одеÑ?жаÑ?Ñ? HTML, коÑ?оÑ?Ñ?й бÑ?деÑ? оÑ?Ñ?иÑ?ован Internet Explorer.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2:1.4.4-10.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been fixed
- -in version 2:1.4.9a-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2:1.4.9a-1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2:1.4.9a-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2:1.4.9a-1.</p>
 
- -<p>We recommend that you upgrade your squirrelmail package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? squirrelmail.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=ARj2
-----END PGP SIGNATURE-----


Reply to: