[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1{196,169,048}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1048.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1048.wml	2016-08-13 15:22:54.461566519 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several problems have been discovered in Asterisk, an Open Source
- -Private Branch Exchange (telephone control center).  The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? Asterisk, Ñ?аÑ?Ñ?ной Ñ?елеÑ?онной Ñ?Ñ?анÑ?ии Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м иÑ?Ñ?однÑ?м кодом,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3559";>CVE-2005-3559</a>
 
- -    <p>Adam Pointon discovered that due to missing input sanitising it is
- -    possible to retrieve recorded phone messages for a different
- -    extension.</p></li>
+    <p>Ð?дам Ð?оинÑ?он обнаÑ?Ñ?жил, Ñ?Ñ?о из-за оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?виÑ? оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? можно
+    полÑ?Ñ?иÑ?Ñ? запиÑ?аннÑ?е Ñ?елеÑ?оннÑ?е Ñ?ообÑ?ениÑ? длÑ? дÑ?Ñ?гого
+    Ñ?аÑ?Ñ?иÑ?ениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1827";>CVE-2006-1827</a>
 
- -    <p>Emmanouel Kellinis discovered an integer signedness error that
- -    could trigger a buffer overflow and hence allow the execution of
- -    arbitrary code.</p></li>
+    <p>ЭмманÑ?Ñ?лÑ? Ð?еллиниÑ? обнаÑ?Ñ?жил оÑ?ибкÑ? Ñ?о знаками Ñ?елÑ?Ñ? Ñ?иÑ?ел, коÑ?оÑ?аÑ?
+    можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а и позволÑ?Ñ?Ñ? вÑ?полнение
+    пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) this problem has been fixed in
- -version 0.1.11-3woody1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.1.11-3woody1.</p>
 
- -<p>For the stable distribution (sarge) this problem has been fixed in
- -version 1.0.7.dfsg.1-2sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.7.dfsg.1-2sarge2.</p>
 
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 1.2.7.1.dfsg-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.7.1.dfsg-1.</p>
 
- -<p>We recommend that you upgrade your asterisk package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? asterisk.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1169.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1169.wml	2016-08-13 15:18:09.085344430 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local vulnerabilities have been discovered in the MySQL
- -database server.  The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Ñ?еÑ?веÑ?е баз даннÑ?Ñ? MySQL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко локалÑ?нÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4226";>CVE-2006-4226</a>
 
- -    <p>Michal Prokopiuk discovered that remote authenticated users are
- -    permitted to create and access a database if the lowercase
- -    spelling is the same as one they have been granted access to.</p></li>
+    <p>Ð?иÑ?ал Ð?Ñ?окопÑ?к обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м
+    Ñ?азÑ?еÑ?ено Ñ?оздаваÑ?Ñ? и полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п к базе даннÑ?Ñ? в Ñ?лÑ?Ñ?ае, еÑ?ли они имеÑ?Ñ? доÑ?Ñ?Ñ?п к
+    базе даннÑ?Ñ?, Ñ?Ñ?Ñ? имÑ? в нижнем Ñ?егиÑ?Ñ?Ñ?е Ñ?овпадаеÑ? Ñ? Ñ?ем, к коÑ?оÑ?омÑ? они Ñ?ами обÑ?аÑ?аÑ?Ñ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4380";>CVE-2006-4380</a>
 
- -    <p>Beat Vontobel discovered that certain queries replicated to a
- -    slave could crash the client and thus terminate the replication.</p></li>
+    <p>Ð?еаÑ? ФонÑ?обелÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о опÑ?еделÑ?ннÑ?е запÑ?оÑ?Ñ?, Ñ?еплиÑ?иÑ?Ñ?емÑ?е
+    подÑ?иненной Ñ?иÑ?Ñ?еме, могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? клиенÑ?Ñ?кого пÑ?иложениÑ? и завеÑ?Ñ?аÑ?Ñ? Ñ?епликаÑ?иÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.1.11a-4sarge7.  Version 4.0 is not affected by these
- -problems.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.1.11a-4sarge7.  Ð?еÑ?Ñ?иÑ? 4.0 не подвеÑ?жена Ñ?Ñ?им
+пÑ?облемам.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 5.0.24-3.  The replication problem only exists in version 4.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.0.24-3.  Ð?Ñ?облема Ñ?епликаÑ?ии пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? Ñ?олÑ?ко в веÑ?Ñ?ии 4.1.</p>
 
- -<p>We recommend that you upgrade your mysql-server-4.1 package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mysql-server-4.1.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1196.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1196.wml	2016-08-13 15:10:10.910049752 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the ClamAV malware
- -scan engine, which may lead to the execution of arbitrary code. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? ClamAV, движке Ñ?каниÑ?ованиÑ? на пÑ?едмеÑ? вÑ?едоноÑ?ного Ð?Ð?, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4182";>CVE-2006-4182</a>
 
- -    <p>Damian Put discovered a heap overflow error in the script to rebuild
- -    PE files, which could lead to the execution of arbitrary code.</p></li>
+    <p>Ð?амиан Ð?Ñ?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в Ñ?Ñ?енаÑ?ии длÑ? повÑ?оÑ?ной Ñ?боÑ?ки
+    PE-Ñ?айлов, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5295";>CVE-2006-5295</a>
 
- -    <p>Damian Put discovered that missing input sanitising in the CHM
- -    handling code might lead to denial of service.</p></li>
+    <p>Ð?амиан Ð?Ñ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в коде обÑ?абоÑ?ки Ñ?айлов в Ñ?оÑ?маÑ?е
+    CHM можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.84-2.sarge.11. Due to technical problems with the build host
- -this update lacks a build for the Sparc architecture. It will be
- -provided soon.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.84-2.sarge.11. Ð?з-за Ñ?еÑ?ниÑ?еÑ?киÑ? пÑ?облем Ñ?о Ñ?боÑ?оÑ?нÑ?м Ñ?злом
+в данном обновлении оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? пакеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? Sparc. Ð?ни бÑ?дÑ?Ñ?
+пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.88.5-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.88.5-1.</p>
 
- -<p>We recommend that you upgrade your clamav packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? clamav.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=dkDK
-----END PGP SIGNATURE-----


Reply to: