[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{426,403,330}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1330.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1330.wml	2016-08-23 13:38:58.671673321 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in PHP, a
- -server-side, HTML-embedded scripting language, which may lead to the
- -execution of arbitrary code. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? PHP, Ñ?еÑ?веÑ?ном Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев Ñ?о вÑ?Ñ?Ñ?оенной поддеÑ?жкой HTML, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1399";>CVE-2007-1399</a>
- -    
- -    <p>Stefan Esser discovered that a buffer overflow in the zip extension
- -    allows the execution of arbitrary code.</p></li>
+
+    <p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?аÑ?Ñ?иÑ?ении zip
+    позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1864";>CVE-2007-1864</a>
- -    
- -    <p>It was discovered that a buffer overflow in the xmlrpc extension
- -    allows the execution of arbitrary code.</p></li>
+
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?аÑ?Ñ?иÑ?ении xmlrpc
+    позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 </ul>
- -    
- -<p>The oldstable distribution (sarge) doesn't include php5.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 5.2.0-8+etch7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ?Ñ? php5 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 5.2.0-8+etch7.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 5.2.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.2.2-1.</p>
 
- -<p>We recommend that you upgrade your PHP packages. Packages for the littleendian Mips architecture are not yet available, due to problems on the
- -build host. They will be provided later.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? PHP. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? mips Ñ? поÑ?Ñ?дком байÑ?ов оÑ? младÑ?его к Ñ?Ñ?аÑ?Ñ?емÑ? пока оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? из-за пÑ?облем Ñ?о
+Ñ?боÑ?оÑ?нÑ?м Ñ?злом. Ð?ни бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1403.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1403.wml	2016-08-23 13:34:49.408764398 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>missing input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Omer Singer of the DigiTrust Group discovered several vulnerabilities in
- -phpMyAdmin, an application to administrate MySQL over the WWW. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð?меÑ? СингеÑ? из DigiTrust Group обнаÑ?Ñ?жил неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей в
+phpMyAdmin, пÑ?иложении длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL Ñ?еÑ?ез WWW. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5589";>CVE-2007-5589</a>
 
- -    <p>phpMyAdmin allows a remote attacker to inject arbitrary web script
- -    or HTML in the context of a logged in user's session (cross site
- -    scripting).</p></li>
+    <p>phpMyAdmin позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий
+    или код HTML в конÑ?екÑ?Ñ? Ñ?еÑ?Ñ?ии воÑ?едÑ?его полÑ?зоваÑ?елÑ? (межÑ?айÑ?овÑ?й
+    Ñ?кÑ?ипÑ?инг).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5386";>CVE-2007-5386</a>
 
- -    <p>phpMyAdmin, when accessed by a browser that does not URL-encode
- -    requests, allows remote attackers to inject arbitrary web script
- -    or HTML via the query string.</p></li>
+    <p>phpMyAdmin, пÑ?и обÑ?аÑ?ении бÑ?аÑ?зеÑ?а, коÑ?оÑ?Ñ?й не кодиÑ?Ñ?еÑ? Ñ? помоÑ?Ñ?Ñ? URL
+    запÑ?оÑ?Ñ?, позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий
+    или код HTML Ñ? помоÑ?Ñ?Ñ? Ñ?Ñ?енаÑ?ий запÑ?оÑ?а.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (sarge) this problem has been fixed in
- -version 4:2.6.2-3sarge6.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4:2.6.2-3sarge6.</p>
 
- -<p>For the stable distribution (etch) this problem has been fixed in
- -version 4:2.9.1.1-6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4:2.9.1.1-6.</p>
 
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 4:2.11.1.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4:2.11.1.2-1.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1426.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1426.wml	2016-08-23 13:30:49.839509730 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local/remote vulnerabilities have been discovered in the Qt GUI
- -library. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? GUI-библиоÑ?еке Qt бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко локалÑ?нÑ?Ñ?/Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3388";>CVE-2007-3388</a>
 
- -    <p>Tim Brown and Dirk Müller discovered several format string
- -    vulnerabilities in the handling of error messages, which might lead
- -    to the execution of arbitrary code.</p></li>
+    <p>Тим Ð?Ñ?аÑ?н и Ð?иÑ?к Ð?Ñ?ллеÑ? обнаÑ?Ñ?жили неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей Ñ?оÑ?маÑ?ной
+    Ñ?Ñ?Ñ?оки в Ñ?ообÑ?ениÑ?Ñ? об оÑ?ибкаÑ?, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ?
+    к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4137";>CVE-2007-4137</a>
 
- -    <p>Dirk Müller discovered an off-by-one buffer overflow in the Unicode
- -    handling, which might lead to the execution of arbitrary code.</p></li>
+    <p>Ð?иÑ?к Ð?Ñ?ллеÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде Ñ?абоÑ?Ñ? Ñ?
+    Unicode, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (sarge), these problems have been fixed
- -in version 3:3.3.4-3sarge3. Packages for m68k will be provided later.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3:3.3.4-3sarge3. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? m68k бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 3:3.3.7-4etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3:3.3.7-4etch1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 3:3.3.7-8.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3:3.3.7-8.</p>
 
- -<p>We recommend that you upgrade your qt-x11-free packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? qt-x11-free.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=8p2C
-----END PGP SIGNATURE-----


Reply to: