[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{896,782,770}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1770.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1770.wml	2016-08-24 17:30:35.692613496 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>Insufficient input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>недоÑ?Ñ?аÑ?оÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in imp4, a webmail component for
- -the horde framework. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? imp4, компоненÑ?е инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ? horde, Ñ?еализÑ?Ñ?Ñ?ем поÑ?Ñ?овÑ?й веб-инÑ?еÑ?Ñ?ейÑ?, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4182";>CVE-2008-4182</a>
 
- -<p>It was discovered that imp4 suffers from a cross-site scripting (XSS)
- -attack via the user field in an IMAP session, which allows attackers to
- -inject arbitrary HTML code.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о imp4 подвеÑ?жен межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ? (XSS)
+Ñ?еÑ?ез полÑ?зоваÑ?елÑ?Ñ?кое поле в Ñ?еÑ?Ñ?ии IMAP, Ñ?Ñ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам
+вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й код HTML.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0930";>CVE-2009-0930</a>
 
- -<p>It was discovered that imp4 is prone to several cross-site scripting
- -(XSS) attacks via several vectors in the mail code allowing attackers
- -to inject arbitrary HTML code.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о imp4 Ñ?Ñ?звим к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?
+(XSS) Ñ?еÑ?ез неÑ?колÑ?ко векÑ?оÑ?ов в поÑ?Ñ?овом коде, позволÑ?Ñ?Ñ?ем злоÑ?мÑ?Ñ?ленникам
+вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й код HTML.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed in
- -version 4.1.3-4etch1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.1.3-4etch1.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 4.2-4, which was already included in the lenny release.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.2-4, коÑ?оÑ?аÑ? Ñ?же вÑ?одиÑ? в вÑ?пÑ?Ñ?к lenny.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems have been fixed in version 4.2-4.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 4.2-4.</p>
 
 
- -<p>We recommend that you upgrade your imp4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? imp4.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1782.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1782.wml	2016-08-24 17:25:46.408261157 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been discovered in mplayer, a movie player
- -for Unix-like systems. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? mplayer, пÑ?оигÑ?Ñ?ваеÑ?е Ñ?илÑ?мов длÑ? Unix-подобнÑ?Ñ? Ñ?иÑ?Ñ?ем, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0385";>CVE-2009-0385</a>
- -<p>It was discovered that watching a malformed 4X movie file could lead to
- -the execution of arbitrary code.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пÑ?оÑ?моÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е 4X можеÑ?
+пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4866";>CVE-2008-4866</a>
- -<p>It was discovered that multiple buffer overflows could lead to the
- -execution of arbitrary code.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о многоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-5616";>CVE-2008-5616</a>
- -<p>It was discovered that watching a malformed TwinVQ file could lead to
- -the execution of arbitrary code.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пÑ?оÑ?моÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е TwinVQ можеÑ? пÑ?иводиÑ?Ñ?
+к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
 
- -<p>For the oldstable distribution (etch), these problems have been fixed
- -in version 1.0~rc1-12etch7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.0~rc1-12etch7.</p>
 
- -<p>For the stable distribution (lenny), mplayer links against
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) mplayer Ñ?компонован Ñ?
 ffmpeg-debian.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), mplayer links against ffmpeg-debian.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+mplayer Ñ?компонован Ñ? ffmpeg-debian.</p>
 
 
- -<p>We recommend that you upgrade your mplayer packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mplayer.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1896.wml	2009-09-28 14:18:24.000000000 +0600
+++ russian/security/2009/dsa-1896.wml	2016-08-24 17:21:09.052827473 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the opensaml and
- -shibboleth-sp packages, as used by Shibboleth 1.x:</p>
+<p>Ð? пакеÑ?аÑ? opensaml и shibboleth-sp, иÑ?полÑ?зÑ?емÑ?Ñ? Shibboleth 1.x, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
- -<li><p>Chris Ries discovered that decoding a crafted URL leads to a crash
- -(and potentially, arbitrary code execution).</p></li>
+<li><p>Ð?Ñ?иÑ? РиÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о декодиÑ?ование Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? URL пÑ?иводиÑ? к аваÑ?ийной
+оÑ?Ñ?ановке (а Ñ?акже можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода).</p></li>
 
- -<li><p>Ian Young discovered that embedded NUL characters in certificate names
- -were not correctly handled, exposing configurations using PKIX trust
- -validation to impersonation attacks.</p></li>
+<li><p>Ð?Ñ?н Янг обнаÑ?Ñ?жил, Ñ?Ñ?о вÑ?Ñ?Ñ?оеннÑ?е NUL-Ñ?имволÑ? в именаÑ? Ñ?еÑ?Ñ?иÑ?икаÑ?ов
+обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о наÑ?Ñ?Ñ?ойки, иÑ?полÑ?зÑ?Ñ?Ñ?ие пÑ?овеÑ?кÑ? довеÑ?иÑ?
+PKIX, Ñ?Ñ?ановÑ?Ñ?Ñ?Ñ? Ñ?Ñ?звимÑ? к аÑ?акам по подделке полÑ?зоваÑ?елей.</p></li>
 
- -<li><p>Incorrect processing of SAML metadata ignored key usage constraints.</p></li>
+<li><p>Ð?екоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка меÑ?аданнÑ?Ñ? SAML игноÑ?иÑ?Ñ?еÑ? огÑ?аниÑ?ениÑ? иÑ?полÑ?зованиÑ? клÑ?Ñ?а.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed
- -in version 1.3f.dfsg1-2+etch1 of the shibboleth-sp packages, and
- -version 1.1a-2+etch1 of the opensaml packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.3f.dfsg1-2+etch1 пакеÑ?а shibboleth-sp и в веÑ?Ñ?ии
+1.1a-2+etch1 пакеÑ?а opensaml.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.3.1.dfsg1-3+lenny1 of the shibboleth-sp packages, and
- -version 1.1.1-2+lenny1 of the opensaml packages.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.1.dfsg1-3+lenny1 пакеÑ?а shibboleth-sp и в веÑ?Ñ?ии
+1.1.1-2+lenny1 пакеÑ?а opensaml.</p>
 
- -<p>The unstable distribution (sid) does not contain Shibboleth 1.x
- -packages.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) пакеÑ?Ñ? Shibboleth 1.x
+оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>This update requires restarting the affected services (mainly Apache)
- -to become effective.</p>
+<p>Ð?лÑ? Ñ?ого, Ñ?Ñ?обÑ? данное обновление наÑ?ало дейÑ?Ñ?воваÑ?Ñ?, Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ? пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ?
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ие Ñ?лÑ?жбÑ? (в оÑ?новном, Apache).</p>
 
- -<p>We recommend that you upgrade your Shibboleth 1.x packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Shibboleth 1.x.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=2Ufr
-----END PGP SIGNATURE-----


Reply to: