[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{866,727,708}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1708.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1708.wml	2016-08-24 17:14:21.648550903 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>shell command injection</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>инÑ?екÑ?иÑ? команд командной оболоÑ?ки</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that gitweb, the web interface for the Git version
- -control system, contained several vulnerabilities:</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о gitweb, веб-инÑ?еÑ?Ñ?ейÑ? длÑ? Ñ?иÑ?Ñ?емÑ? Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми
+Git, Ñ?одеÑ?жиÑ? неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
- -<p>Remote attackers could use crafted requests to execute shell commands on
- -the web server, using the snapshot generation and pickaxe search
- -functionality (<a href="https://security-tracker.debian.org/tracker/CVE-2008-5916";>CVE-2008-5916</a>).</p>
+<p>УдалÑ?ннÑ?е злоÑ?мÑ?Ñ?ленники могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е запÑ?оÑ?Ñ? длÑ? вÑ?полнениÑ? команд
+командной оболоÑ?ки на веб-Ñ?еÑ?веÑ?е, иÑ?полÑ?зÑ?Ñ? Ñ?Ñ?нкÑ?ионалÑ?ноÑ?Ñ?Ñ? поÑ?ождениÑ? Ñ?Ñ?езов и
+pickaxe-поиÑ?ка (<a href="https://security-tracker.debian.org/tracker/CVE-2008-5916";>CVE-2008-5916</a>).</p>
 
- -<p>Local users with write access to the configuration of a Git repository
- -served by gitweb could cause gitweb to execute arbitrary shell commands
- -with the permission of the web server (<a href="https://security-tracker.debian.org/tracker/CVE-2008-5516";>CVE-2008-5516</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2008-5517";>CVE-2008-5517</a>).</p>
+<p>Ð?окалÑ?нÑ?е полÑ?зоваÑ?ели, имеÑ?Ñ?ие пÑ?ава на запиÑ?Ñ? в Ñ?айл наÑ?Ñ?Ñ?оек Ñ?епозиÑ?оÑ?иÑ? Git,
+обÑ?лÑ?живаемого gitweb, могÑ?Ñ? заÑ?Ñ?авиÑ?Ñ? gitweb вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? командной оболоÑ?ки
+Ñ? пÑ?авами веб-Ñ?еÑ?веÑ?а (<a href="https://security-tracker.debian.org/tracker/CVE-2008-5516";>CVE-2008-5516</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2008-5517";>CVE-2008-5517</a>).</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.4.4.4-4+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.4.4-4+etch1.</p>
 
- -<p>For the unstable distribution (sid) and testing distribution (lenny),
- -the remote shell command injection issue (<a href="https://security-tracker.debian.org/tracker/CVE-2008-5516";>CVE-2008-5516</a>) has been fixed
- -in version 1.5.6-1.  The other issue will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном (sid) и Ñ?еÑ?Ñ?иÑ?Ñ?емом (lenny) вÑ?пÑ?Ñ?каÑ?
+пÑ?облема Ñ? Ñ?далÑ?ннÑ?м введением команд командной оболоÑ?ки (<a href="https://security-tracker.debian.org/tracker/CVE-2008-5516";>CVE-2008-5516</a>) бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 1.5.6-1.  Ð?Ñ?Ñ?гаÑ? пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your Git packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Git.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1727.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1727.wml	2016-08-24 17:09:17.407833468 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>SQL injection vulnerabilites</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>SQL-инÑ?екÑ?ии</define-tag>
 <define-tag moreinfo>
- -<p>Two SQL injection vulnerabilities have been found in proftpd, a
- -virtual-hosting FTP daemon.  The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? proftdp, Ñ?лÑ?жбе виÑ?Ñ?Ñ?алÑ?ного Ñ?азмеÑ?ениÑ? FTP, бÑ?ли обнаÑ?Ñ?женÑ? две
+SQL-инÑ?Ñ?екÑ?ии.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0542";>CVE-2009-0542</a>
 
- -    <p>Shino discovered that proftpd is prone to an SQL injection
- -    vulnerability via the use of certain characters in the username.</p></li>
+    <p>Shino обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?лÑ?жба proftpd Ñ?Ñ?звима к SQL-инÑ?екÑ?ии
+    Ñ?еÑ?ез иÑ?полÑ?зование опÑ?еделÑ?ннÑ?Ñ? Ñ?имволов в имени полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0543";>CVE-2009-0543</a>
 
- -    <p>TJ Saunders discovered that proftpd is prone to an SQL injection
- -    vulnerability due to insufficient escaping mechanisms, when
- -    multybite character encodings are used.</p></li>
+    <p>Тиджей СандеÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?лÑ?жба proftpd Ñ?Ñ?звима к SQL-инÑ?екÑ?ии
+    из-за недоÑ?Ñ?аÑ?оÑ?ного Ñ?кÑ?аниÑ?ованиÑ? меÑ?анизмов пÑ?и иÑ?полÑ?зовании
+    мÑ?лÑ?Ñ?ибайÑ?овÑ?Ñ? кодиÑ?овок Ñ?имволов.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.3.1-17lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.1-17lenny1.</p>
 
- -<p>For the oldstable distribution (etch), these problems will be fixed
- -soon.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ?
+позже.</p>
 
- -<p>For the testing distribution (squeeze), these problems will be fixed
- -soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ?
+позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.3.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.2-1.</p>
 
- -<p>We recommend that you upgrade your proftpd-dfsg package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? proftpd-dfsg.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1866.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1866.wml	2016-08-24 17:04:51.898272881 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two security issues have been discovered in kdegraphics, the graphics
- -apps from the official KDE release. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? kdegraphics, гÑ?аÑ?иÑ?еÑ?киÑ? пÑ?иложениÑ?Ñ? длÑ? оÑ?иÑ?иалÑ?ного вÑ?пÑ?Ñ?ка KDE, бÑ?ли
+обнаÑ?Ñ?женÑ? две пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0945";>CVE-2009-0945</a>
- -<p>It was discovered that the KSVG animation element implementation suffers
- -from a null pointer dereference flaw, which could lead to the execution
- -of arbitrary code.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?еализаÑ?иÑ? Ñ?леменÑ?а анимаÑ?ии KSVG Ñ?Ñ?звима
+к Ñ?азÑ?менованиÑ? null-Ñ?казаÑ?елÑ?, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1709";>CVE-2009-1709</a>
- -<p>It was discovered that the KSVG animation element implementation is
- -prone to a use-after-free flaw, which could lead to the execution of
- -arbitrary code.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?еализаÑ?иÑ? Ñ?леменÑ?а анимаÑ?ии KSVG Ñ?Ñ?звима
+к иÑ?полÑ?зованиÑ? Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
 
- -<p>For the oldstable distribution (etch), these problems have been fixed
- -in version 4:3.5.5-3etch4.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4:3.5.5-3etch4.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 4:3.5.9-3+lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:3.5.9-3+lenny2.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems have been fixed in version 4:4.0.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 4:4.0.</p>
 
 
- -<p>We recommend that you upgrade your kdegraphics packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? kdegraphics.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=/8u1
-----END PGP SIGNATURE-----


Reply to: