[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{764,917,816}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1764.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1764.wml	2016-08-24 17:55:56.289012350 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Tunapie, a GUI frontend
- -to video and radio streams. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Tunapie, гÑ?аÑ?иÑ?еÑ?ком инÑ?еÑ?Ñ?ейÑ?е длÑ? видео- и Ñ?адиовеÑ?аÑ?елÑ?нÑ?Ñ?
+поÑ?оков, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1253";>CVE-2009-1253</a>
 
- -    <p>Kees Cook discovered that insecure handling of temporary files may
- -    lead to local denial of service through symlink attacks.</p></li>
+    <p>Ð?иÑ? Ð?Ñ?к обнаÑ?Ñ?жил, Ñ?Ñ?о небезопаÑ?наÑ? Ñ?абоÑ?а Ñ? вÑ?еменнÑ?ми Ñ?айлами можеÑ?
+    пÑ?иводиÑ?Ñ? к локалÑ?номÑ? оÑ?казÑ? в обÑ?лÑ?живании из-за аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1254";>CVE-2009-1254</a>
 
- -    <p>Mike Coleman discovered that insufficient escaping of stream
- -    URLs may lead to the execution of arbitrary commands if a user
- -    is tricked into opening a malformed stream URL.</p></li>
+    <p>Ð?айк Ð?оÑ?лман обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?ное Ñ?кÑ?аниÑ?ование URL поÑ?оков
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?й команд в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ?
+    оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й URL поÑ?ока.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed
- -in version 1.3.1-1+etch2. Due to a technical problem, this update cannot
- -be released synchronously with the stable (lenny) version, but will
- -appear soon.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.3.1-1+etch2. Ð?з-за Ñ?еÑ?ниÑ?еÑ?киÑ? пÑ?облем данное обновление не можеÑ?
+бÑ?Ñ?Ñ? вÑ?пÑ?Ñ?ено одновÑ?еменно Ñ? обновлением Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (lenny), оно
+поÑ?виÑ?Ñ?Ñ? позже.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.1.8-2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1.8-2.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your tunapie package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? tunapie.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1816.wml	2009-06-17 21:21:14.000000000 +0600
+++ russian/security/2009/dsa-1816.wml	2016-08-24 18:04:42.741369940 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>insufficient security check</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that the Apache web server did not properly handle
- -the "Options=" parameter to the AllowOverride directive:</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о веб-Ñ?еÑ?веÑ? Apache непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ?
+паÑ?амеÑ?Ñ? "Options=" диÑ?екÑ?ивÑ? AllowOverride:</p>
 
 <ul>
 
- -<li><p>In the stable distribution (lenny), local users could (via .htaccess)
- -enable script execution in Server Side Includes even in configurations
- -where the AllowOverride directive contained only
+<li><p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) локалÑ?нÑ?е полÑ?зоваÑ?ели могÑ?Ñ? (Ñ? помоÑ?Ñ?Ñ? .htaccess)
+вклÑ?Ñ?иÑ?Ñ? вÑ?полнение Ñ?Ñ?енаÑ?иÑ? в Server Side Includes даже пÑ?и наÑ?Ñ?Ñ?ойкаÑ?,
+в коÑ?оÑ?Ñ?Ñ? диÑ?екÑ?ива AllowOverride Ñ?одеÑ?жиÑ? Ñ?олÑ?ко
 Options=IncludesNoEXEC.</p></li>
 
- -<li><p>In the oldstable distribution (etch), local users could (via
- -.htaccess) enable script execution in Server Side Includes and CGI
- -script execution in configurations where the AllowOverride directive
- -contained any "Options=" value.</p></li>
+<li><p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) локалÑ?нÑ?е полÑ?зоваÑ?ели могÑ?Ñ? (Ñ? помоÑ?Ñ?Ñ?
+.htaccess) вклÑ?Ñ?иÑ?Ñ? вÑ?полнение Ñ?Ñ?енаÑ?иÑ? в Server Side Includes и CGI
+пÑ?и наÑ?Ñ?Ñ?ойкаÑ?, в коÑ?оÑ?Ñ?Ñ? диÑ?екÑ?ива AllowOverride Ñ?одеÑ?жиÑ?
+лÑ?бое знаÑ?ение "Options=".</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (etch), this problem has been fixed in
- -version 2.2.3-4+etch8.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.3-4+etch8.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 2.2.9-10+lenny3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.9-10+lenny3.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), this problem will be fixed in version 2.2.11-6.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена в веÑ?Ñ?ии 2.2.11-6.</p>
 
- -<p>This advisory also provides updated apache2-mpm-itk packages which
- -have been recompiled against the new apache2 packages (except for the
- -s390 architecture where updated packages will follow shortly).</p>
+<p>Ð?Ñ?оме Ñ?ого, в данной Ñ?екомендаÑ?ии пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?Ñ?Ñ? обновлÑ?ннÑ?е пакеÑ?Ñ? apache2-mpm-itk,
+коÑ?оÑ?Ñ?е бÑ?ли заново Ñ?компилиÑ?ованÑ? в Ñ?ооÑ?веÑ?Ñ?Ñ?вии Ñ? новÑ?ми пакеÑ?ами apache2 (за иÑ?клÑ?Ñ?ением
+аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? s390, длÑ? коÑ?оÑ?ой обновлÑ?ннÑ?е пакеÑ?Ñ? бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? в Ñ?коÑ?ом вÑ?емени).</p>
 
- -<p>We recommend that you upgrade your apache2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? apache2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1917.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1917.wml	2016-08-24 17:59:55.801530079 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been discovered in mimetex, a lightweight
- -alternative to MathML. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? mimetex, легковеÑ?ной алÑ?Ñ?еÑ?наÑ?иве MathML, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1382";>CVE-2009-1382</a>
 
- -<p>Chris Evans and Damien Miller, discovered multiple stack-based buffer overflow.
- -An attacker could execute arbitrary code via a TeX file with long picture,
- -circle, input tags.</p></li>
+<p>Ð?Ñ?иÑ? ЭванÑ? и Ð?Ñ?миен Ð?иллеÑ? обнаÑ?Ñ?жили многоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а.
+Ð?лоÑ?мÑ?Ñ?ленник можеÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? TeX-Ñ?айла Ñ? длиннÑ?м изобÑ?ажением,
+кÑ?Ñ?гом, вÑ?однÑ?ми Ñ?егами.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2459";>CVE-2009-2459</a>
 
- -<p>Chris Evans discovered that mimeTeX contained certain directives that may be
- -unsuitable for handling untrusted user input. A remote attacker can obtain
- -sensitive information.</p></li>
+<p>Ð?Ñ?иÑ? ЭванÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о mimeTeX Ñ?одеÑ?жиÑ? опÑ?еделÑ?ннÑ?е диÑ?екÑ?ивÑ?, коÑ?оÑ?Ñ?е могÑ?Ñ?
+оказаÑ?Ñ?Ñ?Ñ? неподÑ?одÑ?Ñ?ими длÑ? обÑ?абоÑ?ки недовеÑ?еннÑ?Ñ? полÑ?зоваÑ?елÑ?Ñ?киÑ? вÑ?однÑ?Ñ? даннÑ?Ñ?. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник
+можеÑ? полÑ?Ñ?иÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed in
- -version 1.50-1+etch1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.50-1+etch1.</p>
 
- -<p>Due to a bug in the archive system, the fix for the stable distribution
- -(lenny) will be released as version 1.50-1+lenny1 once it is available.</p>
+<p>Ð?з-за оÑ?ибки в Ñ?иÑ?Ñ?еме аÑ?Ñ?ива иÑ?пÑ?авление длÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка
+(lenny) бÑ?деÑ? вÑ?пÑ?Ñ?ено под веÑ?Ñ?ией 1.50-1+lenny1 по меÑ?е доÑ?Ñ?Ñ?пноÑ?Ñ?и.</p>
 
- -<p>For the testing distribution (squeeze), and the unstable distribution (sid),
- -these problems have been fixed in version 1.50-1.1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.50-1.1.</p>
 
- -<p>We recommend that you upgrade your mimetex packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mimetex.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=tWkY
-----END PGP SIGNATURE-----


Reply to: