[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-9{60,80,77}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-960.wml	2006-03-20 12:38:40.000000000 +0500
+++ russian/security/2006/dsa-960.wml	2016-08-13 13:55:19.838333290 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>insecure temporary file creation</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>небезопаÑ?ное Ñ?оздание вÑ?еменного Ñ?айла</define-tag>
 <define-tag moreinfo>
- -<p>The former update caused temporary files to be created in the current
- -working directory due to a wrong function argument.  This update will
- -create temporary files in the users home directory if HOME is set or
- -in the common temporary directory otherwise, usually /tmp.  For
- -completeness below is a copy of the original advisory text:</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ее обновление пÑ?ивело к Ñ?омÑ?, Ñ?Ñ?о из-за непÑ?авилÑ?ного аÑ?гÑ?менÑ?а
+Ñ?Ñ?нкÑ?ии вÑ?еменнÑ?е Ñ?айлÑ? Ñ?оздаÑ?Ñ?Ñ?Ñ? в Ñ?екÑ?Ñ?ем Ñ?абоÑ?ем каÑ?алоге.  Ð?анное обновление
+пÑ?иводиÑ? к Ñ?озданиÑ? вÑ?еменнÑ?Ñ? Ñ?айлов в домаÑ?ниÑ? каÑ?алогаÑ? полÑ?зоваÑ?елей в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?Ñ?Ñ?ановлена
+пеÑ?еменнаÑ? HOME, в пÑ?оÑ?ивном Ñ?лÑ?Ñ?ае они Ñ?оздаÑ?Ñ?Ñ?Ñ? в обÑ?ем вÑ?еменном каÑ?алоге, обÑ?Ñ?но /tmp.  Ð?лÑ?
+полноÑ?Ñ? ниже пÑ?иводиÑ?Ñ?Ñ? копиÑ? изнаÑ?алÑ?ной Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Niko Tyni discovered that the Mail::Audit module, a Perl library for
- -creating simple mail filters, logs to a temporary file with a
- -predictable filename in an insecure fashion when logging is turned on,
- -which is not the case by default.</p>
+<p>Ð?ико Тайни обнаÑ?Ñ?жил, Ñ?Ñ?о модÑ?лÑ? Mail::Audit, Perl-библиоÑ?ека длÑ?
+Ñ?озданиÑ? пÑ?оÑ?Ñ?Ñ?Ñ? поÑ?Ñ?овÑ?Ñ? Ñ?илÑ?Ñ?Ñ?ов, пÑ?и вклÑ?Ñ?ении жÑ?Ñ?нал запиÑ?Ñ?ваеÑ? жÑ?Ñ?нал в небезопаÑ?нÑ?й
+вÑ?еменнÑ?й Ñ?айл Ñ? пÑ?едÑ?казÑ?емÑ?м именем.
+Ð?о Ñ?молÑ?аниÑ?, запиÑ?Ñ? жÑ?Ñ?нала не пÑ?оизводиÑ?Ñ?Ñ?.</p>
 </blockquote>
 
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 2.0-4woody3.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0-4woody3.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.1-5sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1-5sarge4.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.1-5.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1-5.1.</p>
 
- -<p>We recommend that you upgrade your libmail-audit-perl package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? libmail-audit-perl.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-977.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-977.wml	2016-08-13 14:05:50.420163043 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in heimdal, a free
- -implementation of Kerberos 5.  The Common Vulnerabilities and
- -Exposures project identifies the following vulnerabilities:</p>
+<p>Ð? heimdal, Ñ?вободно Ñ?еализаÑ?ии Kerberos 5, бÑ?ли обнаÑ?Ñ?женÑ? две
+Ñ?Ñ?звимоÑ?Ñ?и.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0582";>CVE-2006-0582</a>
 
- -    <p>Privilege escalation in the rsh server allows an authenticated
- -    attacker to overwrite arbitrary files and gain ownership of them.</p></li>
+    <p>Ð?овÑ?Ñ?ение пÑ?ивилегий в Ñ?еÑ?веÑ?е rsh позволÑ?еÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованномÑ?
+    злоÑ?мÑ?Ñ?ленникÑ? пеÑ?езапиÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ? и Ñ?Ñ?ановиÑ?Ñ?Ñ? иÑ? владелÑ?Ñ?ем.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0677";>CVE-2006-0677</a>
 
- -    <p>A remote attacker could force the telnet server to crash before
- -    the user logged in, resulting in inetd turning telnetd off because
- -    it forked too fast.</p></li>
+    <p>УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? Ñ?еÑ?веÑ?а telnet
+    до моменÑ?а вÑ?ода полÑ?зоваÑ?елÑ?, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о Ñ?лÑ?жба inetd оÑ?клÑ?Ñ?аеÑ? telnetd, поÑ?колÑ?кÑ?
+    поÑ?леднÑ?Ñ? Ñ?лиÑ?ком бÑ?Ñ?Ñ?Ñ?о Ñ?оздаÑ?Ñ? доÑ?еÑ?ний пÑ?оÑ?еÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not expose rsh and telnet servers.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?еÑ?веÑ?Ñ? rsh и telnet не иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.6.3-10sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.6.3-10sarge2.</p>
 
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your heimdal packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? heimdal.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-980.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-980.wml	2016-08-13 14:00:53.619066918 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Joxean Koret discovered several security problems in tutos, a web-based
- -team organization software. The Common Vulnerabilities and Exposures Project
- -identifies the following problems:</p>
+<p>ХокÑ?еан Ð?оÑ?еÑ? обнаÑ?Ñ?жил неÑ?колÑ?ко пÑ?облем безопаÑ?ноÑ?Ñ?и в tutos, веб-пÑ?иложении
+длÑ? оÑ?ганизаÑ?ии Ñ?абоÑ?Ñ? команд. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2004-2161";>CVE-2004-2161</a>
 
- -     <p>An SQL injection vulnerability allows the execution of SQL commands
- -     through the link_id parameter in file_overview.php.</p></li>
+     <p>SQL-инÑ?екÑ?иÑ? позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? SQL-командÑ?
+     Ñ? помоÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?а link_id parameter в file_overview.php.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2004-2162";>CVE-2004-2162</a>
 
- -     <p>Cross-Site-Scripting vulnerabilities in the search function of the
- -     address book and in app_new.php allow the execution of web script
- -     code.</p></li>
+     <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в Ñ?Ñ?нкÑ?ии поиÑ?ка по
+     адÑ?еÑ?ной книге в app_new.php позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? код
+     веб-Ñ?Ñ?енаÑ?иев.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain tutos packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? tutos оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.1.20031017-2+1sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.20031017-2+1sarge1.</p>
 
- -<p>The unstable distribution (sid) does no longer contain tutos packages.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) пакеÑ?Ñ? tutos оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>We recommend that you upgrade your tutos package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? tutos.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Wr02
-----END PGP SIGNATURE-----


Reply to: