[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1{201,091,034}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1034.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1034.wml	2016-08-13 15:05:52.378611268 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Horde web
- -application framework, which may lead to the execution of arbitrary 
- -web script code. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Horde, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е веб-пÑ?иложений, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+веб-Ñ?Ñ?енаÑ?иÑ?. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1260";>CVE-2006-1260</a>
 
- -    <p>Null characters in the URL parameter bypass a sanity check, which
- -    allowed remote attackers to read arbitrary files, which allowed
- -    information disclosure.</p></li>
+    <p>Null-Ñ?имволÑ? в паÑ?амеÑ?Ñ?е URL пÑ?оÑ?одÑ?Ñ? пÑ?овеÑ?кÑ? даннÑ?Ñ?, Ñ?Ñ?о
+    позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ? и
+    Ñ?аÑ?кÑ?Ñ?ваÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1491";>CVE-2006-1491</a>
 
- -    <p>User input in the help viewer was passed unsanitised to the eval()
- -    function, which allowed injection of arbitrary web code.</p></li>
+    <p>Ð?олÑ?зоваÑ?елÑ?Ñ?кие вÑ?однÑ?Ñ? даннÑ?е в коде длÑ? пÑ?оÑ?моÑ?Ñ?а Ñ?пÑ?авки пеÑ?едаÑ?Ñ?Ñ?Ñ? Ñ?Ñ?нкÑ?ии eval()
+    без иÑ? оÑ?иÑ?Ñ?ки, Ñ?Ñ?о позволÑ?еÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) doesn't contain horde2 packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? horde2 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.2.8-1sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.8-1sarge2.</p>
 
- -<p>The unstable distribution (sid) does no longer contain horde2 packages.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) пакеÑ?Ñ? horde2 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>We recommend that you upgrade your horde2 package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? horde2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1091.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1091.wml	2016-08-13 15:01:46.172467606 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several problems have been discovered in the TIFF library.  The Common
- -Vulnerabilities and Exposures project identifies the following issues:</p>
+<p>Ð? библиоÑ?еке TIFF бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2193";>CVE-2006-2193</a>
 
- -    <p>SuSE discovered a buffer overflow in the conversion of TIFF files
- -    into PDF documents which could be exploited when tiff2pdf is used
- -    e.g. in a printer filter.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники SuSE обнаÑ?Ñ?жили пеÑ?еполнение бÑ?Ñ?еÑ?а в коде длÑ? пÑ?еобÑ?азованиÑ? Ñ?айлов TIFF
+    в докÑ?менÑ?Ñ? PDF, коÑ?оÑ?ое можеÑ? иÑ?полÑ?зоваÑ?Ñ? в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? tiff2pdf,
+    напÑ?имеÑ?, в Ñ?илÑ?Ñ?Ñ?е пеÑ?аÑ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2656";>CVE-2006-2656</a>
 
- -    <p>The tiffsplit command from the TIFF library contains a buffer
- -    overflow in the commandline handling which could be exploited when
- -    the program is executed automatically on unknown filenames.</p></li>
+    <p>Ð?оманда tiffsplit из библиоÑ?еки TIFF Ñ?одеÑ?жиÑ? пеÑ?еполнение
+    бÑ?Ñ?еÑ?а в коде обÑ?абоÑ?ки командной Ñ?Ñ?Ñ?оки, коÑ?оÑ?ое можеÑ? иÑ?полÑ?зоваÑ?Ñ? в Ñ?лÑ?Ñ?ае, когда
+    Ñ?Ñ?а пÑ?огÑ?амма вÑ?полнÑ?еÑ?Ñ?Ñ? авÑ?омаÑ?иÑ?еÑ?ки на неизвеÑ?Ñ?нÑ?Ñ? именаÑ? Ñ?айлов.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) this problem has been fixed in
- -version 3.5.5-7woody2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.5.5-7woody2.</p>
 
- -<p>For the stable distribution (sarge) this problem has been fixed in
- -version 3.7.2-5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.7.2-5.</p>
 
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 3.8.2-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.8.2-4.</p>
 
- -<p>We recommend that you upgrade your tiff packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tiff.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1201.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1201.wml	2016-08-13 14:46:19.327786176 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Ethereal network
- -scanner. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? Ñ?еÑ?евом Ñ?канеÑ?е Ethereal бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4574";>CVE-2005-4574</a>
 
- -    <p>It was discovered that the MIME multipart dissector is vulnerable to
- -    denial of service caused by an off-by-one overflow.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о диÑ?Ñ?екÑ?оÑ? многокомпоненÑ?ного MIME Ñ?Ñ?звим к
+    оÑ?казÑ? в обÑ?лÑ?живании из-за пеÑ?еполнениÑ? на единиÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4805";>CVE-2006-4805</a>
 
- -    <p>It was discovered that the XOT dissector is vulnerable to denial
- -    of service caused by memory corruption.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о диÑ?Ñ?екÑ?оÑ? XOT Ñ?Ñ?звим к оÑ?казÑ?
+    в обÑ?лÑ?живании из-за повÑ?еждениÑ? Ñ?одеÑ?жимого памÑ?Ñ?и.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.10.10-2sarge9. Due to technical problems with the security
- -buildd infrastructure this update lacks builds for the hppa and sparc
- -architecture. They will be released as soon as the problems are resolved.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.10.10-2sarge9. Ð?з-за Ñ?еÑ?ниÑ?еÑ?киÑ? пÑ?облем Ñ?о Ñ?боÑ?оÑ?ной buildd-инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?ой
+пÑ?оекÑ?а безопаÑ?ноÑ?Ñ?и в данном обновлении оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? Ñ?боÑ?ки длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?
+hppa и sparc. Ð?ни бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ? по меÑ?е Ñ?еÑ?ениÑ? Ñ?казаннÑ?Ñ? пÑ?облем.</p>
 
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your ethereal packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ethereal.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=GuBt
-----END PGP SIGNATURE-----


Reply to: