[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-11{6,5}7.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1157.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1157.wml	2016-07-31 16:52:35.704749136 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the interpreter for the
- -Ruby language, which may lead to the bypass of security restrictions or
- -denial of service. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е Ñ?зÑ?ка Ruby бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к обÑ?одÑ? огÑ?аниÑ?ений безопаÑ?ноÑ?Ñ?и или
+оÑ?казÑ? в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1931";>CVE-2006-1931</a>
 
- -    <p>It was discovered that the use of blocking sockets can lead to denial
- -    of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о иÑ?полÑ?зование блокиÑ?Ñ?Ñ?Ñ?иÑ? Ñ?океÑ?ов можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ?
+    в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3964";>CVE-2006-3964</a>
 
- -    <p>It was discovered that Ruby does not properly maintain "safe levels"
- -    for aliasing, directory accesses and regular expressions, which might
- -    lead to a bypass of security restrictions.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ruby непÑ?авилÑ?но поддеÑ?живаеÑ? "Ñ?Ñ?овни безопаÑ?ноÑ?Ñ?и"
+    длÑ? пÑ?евдонимов, доÑ?Ñ?Ñ?па к каÑ?алогам и Ñ?егÑ?лÑ?Ñ?нÑ?Ñ? вÑ?Ñ?ажений, Ñ?Ñ?о можеÑ?
+    пÑ?иводиÑ?Ñ? к обÑ?одÑ? огÑ?аниÑ?ений безопаÑ?ноÑ?Ñ?и.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.8.2-7sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.2-7sarge4.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.8.4-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.4-3.</p>
 
- -<p>We recommend that you upgrade your Ruby packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Ruby.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1167.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1167.wml	2016-07-31 16:48:12.511283102 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>missing input sanitising </define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Apache, the
- -worlds most popular webserver, which may lead to the execution of arbitrary
- -web script.  The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? Apache, Ñ?амом попÑ?лÑ?Ñ?ном Ñ?еб-Ñ?еÑ?веÑ?е, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+веб-Ñ?Ñ?енаÑ?иÑ?.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3352";>CVE-2005-3352</a>
 
- -   <p>A cross-site scripting (XSS) flaw exists in the mod_imap component of
- -   the Apache server.</p></li>
+   <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в компоненÑ?е mod_imap длÑ?
+   Ñ?еÑ?веÑ?а Apache.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3918";>CVE-2006-3918</a>
 
- -   <p>Apache does not sanitize the Expect header from an HTTP request when 
- -   it is reflected back in an error message, which might allow cross-site 
- -   scripting (XSS) style attacks.</p></li>
+   <p>Apache не вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? заголовка Expect в HTTP-запÑ?оÑ?е, когда
+   Ñ?Ñ?оÑ? запÑ?оÑ? оÑ?Ñ?ажаеÑ?Ñ?Ñ? Ñ? Ñ?ообÑ?ением об оÑ?ибке, Ñ?Ñ?о можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+   вÑ?полниÑ?Ñ? аÑ?акÑ? Ñ? помоÑ?Ñ?Ñ? межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга (XSS).</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.3.33-6sarge3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.33-6sarge3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.3.34-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.34-3.</p>
 
- -<p>We recommend that you upgrade your apache package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? apache.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=MZRa
-----END PGP SIGNATURE-----


Reply to: