[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{893,737,823}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1737.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1737.wml	2016-08-24 18:31:21.563463706 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several security issues have been discovered in wesnoth, a fantasy
- -turn-based strategy game. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? wesnoth, Ñ?анÑ?азийной поÑ?аговой Ñ?Ñ?Ñ?аÑ?егиÑ?еÑ?кий игÑ?е, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+пÑ?облем безопаÑ?ноÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0366";>CVE-2009-0366</a>
 
- -<p>Daniel Franke discovered that the wesnoth server is prone to a denial of
- -service attack when receiving special crafted compressed data.</p></li>
+<p>Ð?Ñ?ниел ФÑ?Ñ?нк обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еÑ?веÑ? wesnoth подвеÑ?жен оÑ?казÑ? в
+обÑ?лÑ?живании, коÑ?оÑ?Ñ?й возникаеÑ? пÑ?и полÑ?Ñ?ении Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?жаÑ?Ñ?Ñ? даннÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0367";>CVE-2009-0367</a>
 
- -<p>Daniel Franke discovered that the sandbox implementation for the python
- -AIs can be used to execute arbitrary python code on wesnoth clients. In
- -order to prevent this issue, the python support has been disabled. A
- -compatibility patch was included, so that the affected campagne is still
- -working properly.</p></li>
+<p>Ð?Ñ?ниел ФÑ?Ñ?нк обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? пеÑ?оÑ?ниÑ?Ñ? длÑ? Ð?Ð? на Ñ?зÑ?ке python
+можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода на Ñ?зÑ?к python на клиенÑ?Ñ?киÑ? маÑ?инаÑ?. Ð?лÑ?
+Ñ?ого, Ñ?Ñ?обÑ? пÑ?едоÑ?вÑ?аÑ?иÑ?Ñ? Ñ?Ñ?о, поддеÑ?жка python бÑ?ла оÑ?клÑ?Ñ?ена. Ð?мееÑ?Ñ?Ñ? заплаÑ?а
+Ñ?овмеÑ?Ñ?имоÑ?Ñ?и, поÑ?Ñ?омÑ? Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ие кампании вÑ?Ñ? Ñ?авно
+Ñ?абоÑ?аÑ?Ñ? пÑ?авилÑ?но.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.4.4-2+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.4-2+lenny1.</p>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed
- -in version 1.2-5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.2-5.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems have been fixed in version 1.4.7-4.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.4.7-4.</p>
 
- -<p>We recommend that you upgrade your wesnoth packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wesnoth.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1823.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1823.wml	2016-08-24 18:37:08.211050469 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
- -print, and login server. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Samba, Ñ?айловом Ñ?еÑ?веÑ?е Ñ?еÑ?веÑ?е пеÑ?аÑ?и и аÑ?Ñ?енÑ?иÑ?икаÑ?ии SMB/CIFS, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1886";>CVE-2009-1886</a>
 
- -    <p>The smbclient utility contains a formatstring vulnerability where
- -    commands dealing with file names treat user input as format strings
- -    to asprintf.</p></li>
+    <p>УÑ?илиÑ?а smbclient Ñ?одеÑ?жиÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ? Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки, из-за коÑ?оÑ?ой
+    командÑ?, Ñ?абоÑ?аÑ?Ñ?ие Ñ? именами Ñ?айлов, Ñ?Ñ?иÑ?аÑ?Ñ? полÑ?зоваÑ?елÑ?Ñ?кие вÑ?однÑ?е даннÑ?е
+    Ñ?оÑ?маÑ?нÑ?ми Ñ?Ñ?Ñ?оками asprintf.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1888";>CVE-2009-1888</a>
 
- -    <p>In  the smbd daemon, if a user is trying to modify an access control
- -    list (ACL) and is denied permission, this deny may be overridden if
- -    the parameter "dos filemode" is set to "yes" in the smb.conf and the
- -    user already has write access to the file.</p></li>
+    <p>Ð?Ñ?ли в Ñ?лÑ?жбе smbd полÑ?зоваÑ?елÑ? пÑ?Ñ?аеÑ?Ñ?Ñ? измениÑ?Ñ? Ñ?пиÑ?ок Ñ?пÑ?авлениÑ?
+    доÑ?Ñ?Ñ?пом (ACL) и не полÑ?Ñ?аеÑ? на Ñ?Ñ?о Ñ?азÑ?еÑ?ениÑ?, Ñ?о Ñ?Ñ?оÑ? оÑ?каз можно обойÑ?и в Ñ?ом Ñ?лÑ?Ñ?ае,
+    еÑ?ли в Ñ?айле smb.conf паÑ?амеÑ?Ñ? "dos filemode" имееÑ? знаÑ?ение "yes", а
+    полÑ?зоваÑ?елÑ? Ñ?же имееÑ? доÑ?Ñ?Ñ?п Ñ? пÑ?авом на запиÑ?Ñ? к Ñ?Ñ?омÑ? Ñ?айлÑ?.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (etch) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (etch) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 3.2.5-4lenny6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.2.5-4lenny6.</p>
 
- -<p>The unstable distribution (sid), which is only affected by <a href="https://security-tracker.debian.org/tracker/CVE-2009-1888";>CVE-2009-1888</a>,
- -will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid), коÑ?оÑ?Ñ?й подвеÑ?жен Ñ?олÑ?ко <a href="https://security-tracker.debian.org/tracker/CVE-2009-1888";>CVE-2009-1888</a>,
+оÑ?Ñ?авÑ?аÑ?Ñ?Ñ? пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your samba package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? samba.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1893.wml	2009-09-24 00:33:55.000000000 +0600
+++ russian/security/2009/dsa-1893.wml	2016-08-24 18:24:10.502235653 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
 
- -<p>It was discovered that the SIEVE component of cyrus-imapd and
- -kolab-cyrus-imapd, the Cyrus mail system, is vulnerable to a buffer
- -overflow when processing SIEVE scripts.
- -This can be used to elevate privileges to the cyrus system user.  An
- -attacker who is able to install SIEVE scripts executed by the server is
- -therefore able to read and modify arbitrary email messages on the
- -system. The update introduced by <a href="$(HOME)/security/2009/dsa-1881">DSA
- -1881-1</a> was incomplete and the issue has been given an additional CVE id due
- -to its complexity.</p>
- -
- -
- -<p>For the oldstable distribution (etch), this problem has been fixed in
- -version 2.2.13-10+etch4 for cyrus-imapd-2.2 and version 2.2.13-2+etch2
- -for kolab-cyrus-imapd.</p>
- -
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 2.2.13-14+lenny3 for cyrus-imapd-2.2, version 2.2.13-5+lenny2
- -for kolab-cyrus-imapd.</p>
- -
- -<p>For the testing distribution (squeeze), this problem will be fixed soon.</p>
- -
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.2.13-15 for cyrus-imapd-2.2, and will be fixed soon for
- -kolab-cyrus-imapd.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о компоненÑ? SIEVE длÑ? cyrus-imapd и
+kolab-cyrus-imapd, поÑ?Ñ?овой Ñ?иÑ?Ñ?емÑ? Cyrus, Ñ?Ñ?звим к пеÑ?еполнениÑ?
+бÑ?Ñ?еÑ?а пÑ?и обÑ?абоÑ?ке Ñ?Ñ?енаÑ?иев SIEVE.
+ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий до Ñ?Ñ?овнÑ? Ñ?иÑ?Ñ?емного полÑ?зоваÑ?елÑ? cyrus.
+Ð?лоÑ?мÑ?Ñ?ленник, Ñ?поÑ?обнÑ?й Ñ?Ñ?Ñ?ановиÑ?Ñ? Ñ?Ñ?енаÑ?ии SIEVE, вÑ?полнÑ?емÑ?е Ñ?еÑ?веÑ?ом, можеÑ?
+Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? и изменÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?ообÑ?ениÑ? Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ? в
+Ñ?иÑ?Ñ?еме. Ð?бновление в Ñ?екомендаÑ?ии <a href="$(HOME)/security/2009/dsa-1881">DSA
+1881-1</a> оказалоÑ?Ñ? неполнÑ?м, в Ñ?вÑ?зи Ñ?о Ñ?ложноÑ?Ñ?Ñ?Ñ? Ñ?Ñ?ой пÑ?облеме бÑ?л пÑ?иÑ?воен
+дополниÑ?елÑ?нÑ?й иденÑ?иÑ?икаÑ?оÑ? CVE.</p>
+
+
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.13-10+etch4 пакеÑ?а cyrus-imapd-2.2 и веÑ?Ñ?ии 2.2.13-2+etch2
+пакеÑ?а kolab-cyrus-imapd.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.13-14+lenny3 пакеÑ?а cyrus-imapd-2.2, веÑ?Ñ?ии 2.2.13-5+lenny2
+пакеÑ?а kolab-cyrus-imapd.</p>
+
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
+
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.13-15 пакеÑ?а cyrus-imapd-2.2, а в пакеÑ?е kolab-cyrus-imapd
+бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
 
- -<p>We recommend that you upgrade your cyrus-imapd-2.2 and kolab-cyrus-imapd
- -packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? cyrus-imapd-2.2
+и kolab-cyrus-imapd.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=X5AC
-----END PGP SIGNATURE-----


Reply to: