[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-18{35,97,01}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1801.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1801.wml	2016-08-20 15:44:08.505382689 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in NTP, the Network
- -Time Protocol reference implementation. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? NTP, Ñ?Ñ?алонной Ñ?еализаÑ?ии Ñ?еÑ?евого пÑ?оÑ?окола Ñ?инÑ?Ñ?онизаÑ?ии вÑ?емени, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0159";>CVE-2009-0159</a>
 
- -    <p>A buffer overflow in ntpq allow a remote NTP server to create a
- -    denial of service attack or to execute arbitrary code via a crafted
- -    response.</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в ntpq можеÑ? позволиÑ?Ñ? Ñ?далÑ?нномÑ? NTP-Ñ?еÑ?веÑ?Ñ?
+    вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании или вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ?
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного запÑ?оÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1252";>CVE-2009-1252</a>
 
- -    <p>A buffer overflow in ntpd allows a remote attacker to create a
- -    denial of service attack or to execute arbitrary code when the
- -    autokey functionality is enabled.</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в ntpd позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?зваÑ?Ñ?
+    оÑ?каз в обÑ?лÑ?живании или вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код в Ñ?лÑ?Ñ?ае вклÑ?Ñ?ениÑ?
+    autokey.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed in
- -version 4.2.2.p4+dfsg-2etch3.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.2.2.p4+dfsg-2etch3.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 4.2.4p4+dfsg-8lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.2.4p4+dfsg-8lenny2.</p>
 
- -<p>The unstable distribution (sid) will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your ntp package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? ntp.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1835.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1835.wml	2016-08-20 15:31:15.444097124 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the library for the
- -Tag Image File Format (TIFF). The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? библиоÑ?еке длÑ? поддеÑ?жки Ñ?айлов в Ñ?оÑ?маÑ?е TIFF бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2285";>CVE-2009-2285</a>
 
- -   <p>It was discovered that malformed TIFF images can lead to a crash
- -   in the decompression code, resulting in denial of service.</p></li>
+   <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е изобÑ?ажениÑ? в Ñ?оÑ?маÑ?е TIFF могÑ?Ñ? пÑ?иводиÑ?Ñ?
+   к аваÑ?ийной оÑ?Ñ?ановке в коде Ñ?аÑ?паковки, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2347";>CVE-2009-2347</a>
 
- -   <p>Andrea Barisani discovered several integer overflows, which
- -   can lead to the execution of arbitrary code if malformed
- -   images are passed to the rgb2ycbcr or tiff2rgba tools.</p></li>
+   <p>Ð?ндÑ?еа Ð?аÑ?иÑ?ани обнаÑ?Ñ?жила неÑ?колÑ?ко пеÑ?еполнений Ñ?елÑ?Ñ? Ñ?иÑ?ел, коÑ?оÑ?Ñ?е
+   могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае пеÑ?едаÑ?и Ñ?пеÑ?иалÑ?но
+   Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? изобÑ?ажений инÑ?Ñ?Ñ?Ñ?менÑ?ам rgb2ycbcr или tiff2rgba.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed
- -in version 3.8.2-7+etch3.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.8.2-7+etch3.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 3.8.2-11.2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.8.2-11.2.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your tiff packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tiff.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1897.wml	2009-09-28 17:31:42.000000000 +0600
+++ russian/security/2009/dsa-1897.wml	2016-08-20 15:36:30.491685196 +0500
@@ -1,29 +1,30 @@
- -<define-tag description>insufficient input sanitization</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>недоÑ?Ñ?аÑ?оÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Stefan Esser discovered that Horde, a web application framework providing
- -classes for dealing with preferences, compression, browser detection,
- -connection tracking, MIME, and more, is insufficiently validating and
- -escaping user provided input.  The Horde_Form_Type_image form element
- -allows to reuse a temporary filename on reuploads which are stored in a
- -hidden HTML field and then trusted without prior validation.  An attacker
- -can use this to overwrite arbitrary files on the system or to upload PHP
- -code and thus execute arbitrary code with the rights of the webserver.</p>
+<p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Horde, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?а веб-пÑ?иложений, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?аÑ?
+клаÑ?Ñ?Ñ? длÑ? Ñ?абоÑ?Ñ? Ñ? паÑ?амеÑ?Ñ?ами, Ñ?жаÑ?ием, опÑ?еделением бÑ?аÑ?зеÑ?а,
+оÑ?Ñ?леживанием подклÑ?Ñ?ений, MIME и дÑ?Ñ?гого, недоÑ?Ñ?аÑ?оÑ?но пÑ?овеÑ?Ñ?еÑ? и
+Ñ?кÑ?аниÑ?Ñ?еÑ? полÑ?зоваÑ?елÑ?Ñ?кие вÑ?однÑ?е даннÑ?е.  ЭлеменÑ? Ñ?оÑ?мÑ? Horde_Form_Type_image
+позволÑ?еÑ? повÑ?оÑ?но иÑ?полÑ?зоваÑ?Ñ? имÑ? вÑ?еменного Ñ?айла пÑ?и повÑ?оÑ?нÑ?Ñ? загÑ?Ñ?зкаÑ?, коÑ?оÑ?ое Ñ?оÑ?Ñ?анÑ?еÑ?Ñ?Ñ? в
+Ñ?кÑ?Ñ?Ñ?ом поле HTML, а заÑ?ем иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? без Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей пÑ?овеÑ?ки.  Ð?лоÑ?мÑ?Ñ?ленник
+можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?о длÑ? пеÑ?езапиÑ?и пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов в Ñ?иÑ?Ñ?еме или длÑ? загÑ?Ñ?зки PHP-кода
+и вÑ?полнениÑ? пÑ?оизволÑ?ного кода Ñ? пÑ?авами веб-Ñ?еÑ?веÑ?а.</p>
 
 
- -<p>For the oldstable distribution (etch), this problem has been fixed in
- -version 3.1.3-4etch6.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.1.3-4etch6.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 3.2.2+debian0-2+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.2.2+debian0-2+lenny1.</p>
 
- -<p>For the testing distribution (squeeze), this problem has been fixed in
- -version 3.3.5+debian0-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.3.5+debian0-1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 3.3.5+debian0-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.3.5+debian0-1.</p>
 
 
- -<p>We recommend that you upgrade your horde3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? horde3.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXuDR7AAoJEF7nbuICFtKlMLkQAKzGLvNansrXb4YGuX6iYym4
a3ROETiy4crFMqBGrHKDDgLRP5LAr+YAltRSGbbwP3vna35Y4neLqaWgRTpp/E8K
ZpOS+78YDPP9JuVC0v6UZQ6nRo6adt20frkf3NrkU5AdcAKzE7f608lr+nWsTMdx
PPu5Q8GDkAiFO5cjgKYzNerrZqKNtflIPT1nSUgVgGu6F23zOI7aVBtsyr8F2zWP
86zG9stB7nYDnpRDIZ+rBAF7PpMQ34BDW1MJNuxDynmBPvgle/18QbJqnBWld843
laN5lTZlsjydemtHIxKgErJDDRz+fAlJIVul0qFHc2vTVIvxWnWbPP2AWlaeFf/f
oFteEb1QN8bEraIOUSdWvYbQ6ohhLZXrGEfr7GJWxOzxUgy4ArNAaTIwhtwe0lG4
qzkI/cNuvRHvSeuV2Eud0xvICWCBqD8SxKGoZoUL2OzkU8LnossdDqchR89fK1lq
QoOmJz/Oxuiekt4a6sUgG6LUmWsxUHXE+Tadeq5xiQkpSYodM2yAUyv7/qzb0bN3
SSqJl3QI6e8aRFwaSpRYoxlXtkghgHisbw/YugNV77ak1Hc1tVD9nUdBn9GtZHyT
HbljEDLhipjR5DAv7e7kdgnXLjrvQQfRh5mtnnfIjFiIyrsl95OFAneaXqKy2apO
ma5IE8dl1dLUEcVET7Sv
=IdyB
-----END PGP SIGNATURE-----


Reply to: