[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1{208,148,215}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1148.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1148.wml	2016-08-13 14:36:05.638325542 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in gallery, a web-based
- -photo album. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? gallery, Ñ?оÑ?оалÑ?боме длÑ? веб, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-2734";>CVE-2005-2734</a>
 
- -    <p>A cross-site scripting vulnerability allows injection of web script
- -    code through HTML or EXIF information.</p></li>
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг позволÑ?еÑ? вводиÑ?Ñ? веб-Ñ?Ñ?енаÑ?ий Ñ?еÑ?ез
+    HTML или инÑ?оÑ?маÑ?иÑ? EXIF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0330";>CVE-2006-0330</a>
 
- -    <p>A cross-site scripting vulnerability in the user registration allows
- -    injection of web script code.</p></li>
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг на Ñ?Ñ?Ñ?аниÑ?е Ñ?егиÑ?Ñ?Ñ?аÑ?ии полÑ?зоваÑ?елей позволÑ?еÑ?
+    вводиÑ?Ñ? веб-Ñ?Ñ?енаÑ?ий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4030";>CVE-2006-4030</a>
 
- -    <p>Missing input sanitising in the stats modules allows information
- -    disclosure.</p></li>
+    <p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в модÑ?лÑ?Ñ? Ñ?Ñ?аÑ?иÑ?Ñ?ики позволÑ?еÑ?
+    вÑ?полнÑ?Ñ?Ñ? Ñ?аÑ?кÑ?Ñ?Ñ?ие инÑ?оÑ?маÑ?ии.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.5-1sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5-1sarge2.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.5-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5-2.</p>
 
- -<p>We recommend that you upgrade your gallery package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? gallery.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1208.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1208.wml	2016-08-13 14:32:27.849288849 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Bugzilla
- -bug tracking system, which may lead to the execution of arbitrary code.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? оÑ?ибок Bugzilla бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4534";>CVE-2005-4534</a>
 
- -    <p>Javier Fernández-Sanguino Peña discovered that insecure temporary
- -    file usage may lead to denial of service through a symlink attack.</p></li>
+    <p>ХавÑ?еÑ? ФеÑ?нандез-СангÑ?ино Ð?ена обнаÑ?Ñ?жил, Ñ?Ñ?о небезопаÑ?нÑ?й вÑ?еменнÑ?й
+    Ñ?айл можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании из-за аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5453";>CVE-2006-5453</a>
 
- -    <p>Several cross-site scripting vulnerabilities may lead to injection
- -    of arbitrary web script code.</p></li>
+    <p>Ð?еÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, Ñ?вÑ?заннÑ?Ñ? Ñ? межÑ?айÑ?овÑ?м Ñ?кÑ?ипÑ?ингом, могÑ?Ñ? пÑ?иводиÑ?Ñ? к введениÑ?
+    пÑ?оизволÑ?ного веб-Ñ?Ñ?енаÑ?ий.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.16.7-7sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.16.7-7sarge2.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been
- -fixed in version 2.22.1-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.22.1-1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.22.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.22.1-1.</p>
 
- -<p>We recommend that you upgrade your bugzilla packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? bugzilla.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1215.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1215.wml	2016-08-13 14:39:22.317116701 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Xine multimedia
- -library, which may lead to the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? мÑ?лÑ?Ñ?имедиа-библиоÑ?еке Xine бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4799";>CVE-2006-4799</a>
 
- -    <p>The XFocus Security Team discovered that insufficient validation of
- -    AVI headers may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?оманда безопаÑ?ноÑ?Ñ?и XFocus обнаÑ?Ñ?жила, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка
+    заголовков AVI можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4800";>CVE-2006-4800</a>
 
- -    <p>Michael Niedermayer discovered that a buffer overflow in the 4XM
- -    codec may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?иÑ?аÑ?лÑ? Ð?идеÑ?майеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в кодеке 4XM
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.0.1-1sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.1-1sarge4.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been
- -fixed in version 1.1.2-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.1.2-1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.1.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.2-1.</p>
 
- -<p>We recommend that you upgrade your xine-lib packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xine-lib.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=fwik
-----END PGP SIGNATURE-----


Reply to: