[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{720,842,833}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1720.wml	2011-10-09 17:11:00.000000000 +0600
+++ russian/security/2009/dsa-1720.wml	2016-08-24 16:53:58.232556401 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the TYPO3 web
- -content management framework.</p>
+<p>Ð? TYPO3, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е Ñ?пÑ?авлениÑ? веб-Ñ?одеÑ?жимÑ?м, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
- -<p>Marcus Krause and Michael Stucki from the TYPO3 security team
- -discovered that the jumpUrl mechanism discloses secret hashes enabling
- -a remote attacker to bypass access control by submitting the correct
- -value as a URL parameter and thus being able to read the content of
- -arbitrary files.</p>
+<p>Ð?аÑ?кÑ?Ñ? Ð?Ñ?аÑ?зе и Ð?иÑ?аÑ?лÑ? ШÑ?Ñ?ки из командÑ? безопаÑ?ноÑ?Ñ?и TYPO3
+обнаÑ?Ñ?жили, Ñ?Ñ?о меÑ?анизм jumpUrl Ñ?аÑ?кÑ?Ñ?ваеÑ? Ñ?екÑ?еÑ?нÑ?е Ñ?еÑ?и, позволÑ?Ñ?
+Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? обÑ?одиÑ?Ñ? Ñ?пÑ?авление доÑ?Ñ?Ñ?пом пÑ?Ñ?Ñ?м оÑ?пÑ?авки коÑ?Ñ?екÑ?ного
+знаÑ?ениÑ? в каÑ?еÑ?Ñ?ве паÑ?амеÑ?Ñ?а URL, Ñ?Ñ?о позволÑ?еÑ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? Ñ?одеÑ?жимое
+пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов.</p>
 
- -<p>Jelmer de Hen and Dmitry Dulepov discovered multiple cross-site
- -scripting vulnerabilities in the backend user interface allowing
- -remote attackers to inject arbitrary web script or HTML.</p>
+<p>Ð?елмеÑ? де Хен и Ð?миÑ?Ñ?ий Ð?Ñ?лепов обнаÑ?Ñ?жили многоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи
+межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга в инÑ?еÑ?Ñ?ейÑ?е полÑ?зоваÑ?елÑ?Ñ?кого движка, коÑ?оÑ?Ñ?е позволÑ?Ñ?Ñ?
+Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p>
 
- -<p>As it is very likely that your encryption key has been exposed we
- -strongly recommend to change your encryption key via the install tool
- -after installing the update.</p>
+<p>Ð?оÑ?колÑ?кÑ? вполне веÑ?оÑ?Ñ?но, Ñ?Ñ?о ваÑ? клÑ?Ñ? Ñ?иÑ?Ñ?ованиÑ? бÑ?л Ñ?аÑ?кÑ?Ñ?Ñ?,
+наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? измениÑ?Ñ? клÑ?Ñ? Ñ?иÑ?Ñ?ованиÑ? Ñ? помоÑ?Ñ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?а Ñ?Ñ?Ñ?ановки
+поÑ?ле Ñ?Ñ?Ñ?ановки данного обновлениÑ?.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in
- -version 4.0.2+debian-8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.0.2+debian-8.</p>
 
- -<p>For the testing distribution (lenny) these problems have been fixed in
- -version 4.2.5-1+lenny1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.2.5-1+lenny1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.2.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.2.6-1.</p>
 
- -<p>We recommend that you upgrade your typo3 package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? typo3.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1833.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1833.wml	2016-08-24 17:01:26.093208764 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in ISC's DHCP
- -implementation:</p>
+<p>Ð? Ñ?еализаÑ?ии DHCP оÑ? ISC бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0692";>CVE-2009-0692</a>
- -<p>It was discovered that dhclient does not properly handle overlong
- -subnet mask options, leading to a stack-based buffer overflow and
- -possible arbitrary code execution.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о dhclient непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?лиÑ?ком длиннÑ?е
+опÑ?ии маÑ?ки подÑ?еÑ?и, Ñ?Ñ?о пÑ?иводиÑ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а и
+возможномÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1892";>CVE-2009-1892</a>
- -<p>Christoph Biedl discovered that the DHCP server may terminate when
- -receiving certain well-formed DHCP requests, provided that the server
- -configuration mixes host definitions using "dhcp-client-identifier"
- -and "hardware ethernet".  This vulnerability only affects the lenny
- -versions of dhcp3-server and dhcp3-server-ldap.</p></li>
+<p>Ð?Ñ?иÑ?Ñ?оÑ? Ð?идлÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еÑ?веÑ? DHCP можеÑ? завеÑ?Ñ?иÑ?Ñ? Ñ?воÑ? Ñ?абоÑ?Ñ? пÑ?и
+полÑ?Ñ?ении опÑ?еделÑ?ннÑ?Ñ? пÑ?авилÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? DHCP-запÑ?оÑ?ов пÑ?и Ñ?Ñ?Ñ?Ñ?е Ñ?ого, Ñ?Ñ?о в наÑ?Ñ?ойкаÑ?
+Ñ?еÑ?веÑ?а Ñ?меÑ?анÑ? опÑ?еделениÑ? Ñ?зла, иÑ?полÑ?зÑ?Ñ?Ñ?ие "dhcp-client-identifier"
+и "hardware ethernet".  Ð?аннаÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко веÑ?Ñ?ий dhcp3-server и
+dhcp3-server-ldap в вÑ?пÑ?Ñ?ке lenny.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed
- -in version 3.0.4-13+etch2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.0.4-13+etch2.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 3.1.1-6+lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.1.1-6+lenny2.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed
- -soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ?
+позже.</p>
 
- -<p>We recommend that you upgrade your dhcp3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? dhcp3.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1842.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1842.wml	2016-08-24 16:57:14.950303343 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the OpenEXR image
- -library, which can lead to the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? OpenEXR, библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? изобÑ?ажениÑ?ми, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1720";>CVE-2009-1720</a>
 
- -   <p>Drew Yao discovered integer overflows in the preview and
- -   compression code.</p></li>
+   <p>Ð?Ñ?Ñ? Яо обнаÑ?Ñ?жил пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде пÑ?едваÑ?иÑ?елÑ?ного пÑ?оÑ?моÑ?Ñ?а и
+   Ñ?жаÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1721";>CVE-2009-1721</a>
 
- -   <p>Drew Yao discovered that an uninitialised pointer could be freed
- -   in the decompression code.</p></li>
+   <p>Ð?Ñ?Ñ? Яо обнаÑ?Ñ?жил, Ñ?Ñ?о можно оÑ?вободиÑ?Ñ? неиниÑ?иализиÑ?ованнÑ?й Ñ?казаÑ?елÑ?
+   в коде Ñ?аÑ?паковки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1722";>CVE-2009-1722</a>
 
- -   <p>A buffer overflow was discovered in the compression code.</p></li>
+   <p>Ð?Ñ?ло обнаÑ?Ñ?жено пеÑ?еполнение бÑ?Ñ?еÑ?а в коде Ñ?жаÑ?иÑ?.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed
- -in version 1.2.2-4.3+etch2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.2.2-4.3+etch2.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed
- -in version 1.6.1-3+lenny3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.6.1-3+lenny3.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your openexr packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openexr.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=0T51
-----END PGP SIGNATURE-----


Reply to: