[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{779,760,919}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1760.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1760.wml	2016-08-20 15:20:01.161614385 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
 
- -<p>Two vulnerabilities have been discovered in openswan, an IPSec
- -implementation for linux. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? openswan, Ñ?еализаÑ?ии IPSec длÑ? linux, бÑ?ли обнаÑ?Ñ?женÑ?
+две Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4190";>CVE-2008-4190</a>
 
- -<p>Dmitry E. Oboukhov discovered that the livetest tool is using temporary
- -files insecurely, which could lead to a denial of service attack.</p></li>
+<p>Ð?миÑ?Ñ?ий Ð?бÑ?Ñ?ов обнаÑ?Ñ?жил, Ñ?Ñ?о инÑ?Ñ?Ñ?Ñ?менÑ? livetest иÑ?полÑ?зÑ?еÑ? вÑ?еменнÑ?е
+Ñ?айлÑ? небезопаÑ?нÑ?м Ñ?поÑ?обом, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0790";>CVE-2009-0790</a>
 
- -<p>Gerd v. Egidy discovered that the Pluto IKE daemon in openswan is prone
- -to a denial of service attack via a malicious packet.</p></li>
+<p>Ð?еÑ?д Ð?гиди обнаÑ?Ñ?жил, Ñ?Ñ?о IKE-Ñ?лÑ?жба Pluto в openswan Ñ?Ñ?звима к аÑ?аке по
+вÑ?зовÑ? оÑ?каза в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного пакеÑ?а.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (etch), this problem has been fixed in
- -version 2.4.6+dfsg.2-1.1+etch1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.4.6+dfsg.2-1.1+etch1.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 2.4.12+dfsg-1.3+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.4.12+dfsg-1.3+lenny1.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), this problem will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your openswan packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openswan.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1779.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1779.wml	2016-08-20 15:13:12.137177045 +0500
@@ -1,5 +1,6 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in APT, the well-known dpkg
- -frontend. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? APT, Ñ?иÑ?око извеÑ?Ñ?ном инÑ?еÑ?Ñ?ейÑ?е длÑ? dpkg, бÑ?ли обнаÑ?Ñ?женÑ? две
+Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>

 <ul>

 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1300";>CVE-2009-1300</a>

- -    <p>In time zones where daylight savings time occurs at midnight,
- -    the apt cron.daily script fails, stopping new security updates
- -    from being applied automatically.</p></li>
+    <p>Ð?о вÑ?еменнÑ?Ñ? зонаÑ?, в коÑ?оÑ?Ñ?Ñ? пеÑ?еÑ?од на леÑ?нее вÑ?емÑ? пÑ?оиÑ?Ñ?одиÑ? в полноÑ?Ñ?,
+    Ñ?Ñ?енаÑ?ий apt cron.daily не Ñ?Ñ?абаÑ?Ñ?ваеÑ?, оÑ?Ñ?анавливаÑ? авÑ?омаÑ?иÑ?еÑ?кое пÑ?именение
+    новÑ?Ñ? обновлений безопаÑ?ноÑ?Ñ?и.</p></li>

 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1358";>CVE-2009-1358</a>

- -    <p>A repository that has been signed with an expired or revoked
- -    OpenPGP key would still be considered valid by APT.</p></li>
+    <p>РепозиÑ?оÑ?ий, подпиÑ?аннÑ?й пÑ?оÑ?Ñ?оÑ?еннÑ?м или оÑ?озваннÑ?м клÑ?Ñ?ом
+    OpenPGP, Ñ?Ñ?иÑ?аеÑ?Ñ?Ñ? коÑ?Ñ?екÑ?нÑ?м.</p></li>

 </ul>

- -<p>For the old stable distribution (etch), these problems have been fixed in
- -version 0.6.46.4-0.1+etch1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.6.46.4-0.1+etch1.</p>

- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 0.7.20.2+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.7.20.2+lenny1.</p>

- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 0.7.21.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.7.21.</p>

- -<p>We recommend that you upgrade your apt package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? apt.</p>
 </define-tag>

 # do not modify the following line
- --- english/security/2009/dsa-1919.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1919.wml	2016-08-20 15:25:33.756805169 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Smarty, a PHP
- -templating engine. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Smarty, движке Ñ?аблонизаÑ?ии длÑ? PHP, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4810";>CVE-2008-4810</a>
 
- -  <p>The _expand_quoted_text function allows for certain restrictions in
- -  templates, like function calling and PHP execution, to be bypassed.</p></li>
+  <p>ФÑ?нкÑ?иÑ? _expand_quoted_text позволÑ?еÑ? обÑ?одиÑ? некоÑ?оÑ?Ñ?е огÑ?аниÑ?ениÑ?
+  в Ñ?аблонаÑ?, напÑ?имеÑ? вÑ?зов Ñ?Ñ?нкÑ?ии и вÑ?полнение кода PHP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1669";>CVE-2009-1669</a>
 
- -  <p>The smarty_function_math function allows context-dependent attackers
- -  to execute arbitrary commands via shell metacharacters in the equation
- -  attribute of the math function.</p></li>
+  <p>ФÑ?нкÑ?иÑ? smarty_function_math позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам в завиÑ?имоÑ?Ñ?и оÑ?
+  конÑ?екÑ?Ñ?а вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? Ñ? помоÑ?Ñ?Ñ? меÑ?аÑ?имволов командной оболоÑ?ки в
+  аÑ?Ñ?ибÑ?Ñ?е маÑ?емаÑ?иÑ?еÑ?киÑ? вÑ?Ñ?ажений Ñ?Ñ?нкÑ?ии math.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed
- -in version 2.6.14-1etch2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.6.14-1etch2.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.6.20-1.2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.20-1.2.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your smarty package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? smarty.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Yg43
-----END PGP SIGNATURE-----


Reply to: