[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-9{34,51,58}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-934.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-934.wml	2016-08-25 22:54:36.289513384 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in Pound, a reverse proxy and
- -load balancer for HTTP. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Pound, обÑ?аÑ?ном пÑ?окÑ?и и баланÑ?иÑ?овÑ?ике нагÑ?Ñ?зки длÑ? HTTP, бÑ?ли
+обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-1391";>CVE-2005-1391</a>:
- -     <p>Overly long HTTP Host: headers may trigger a buffer overflow in the
- -     add_port() function, which may lead to the execution of arbitrary
- -     code.</p></li>
+     <p>ЧеÑ?еÑ?Ñ?Ñ?Ñ? длинное знаÑ?ение HTTP Host: заголовки могÑ?Ñ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в
+     Ñ?Ñ?нкÑ?ии add_port(), Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+     кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3751";>CVE-2005-3751</a>:
- -     <p>HTTP requests with conflicting Content-Length and Transfer-Encoding
- -     headers could lead to HTTP Request Smuggling Attack, which can be
- -     exploited to bypass packet filters or poison web caches.</p></li>
+     <p>HTTP-запÑ?оÑ?Ñ? Ñ? пÑ?оÑ?ивоÑ?еÑ?аÑ?ими заголовками Content-Length и Transfer-Encoding
+     могÑ?Ñ? пÑ?иводиÑ?Ñ? к подделке HTTP-запÑ?оÑ?ов, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+     длÑ? обÑ?ода Ñ?илÑ?Ñ?Ñ?ов пакеÑ?ов или оÑ?Ñ?авлениÑ? веб-кеÑ?а.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain pound packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? pound оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.8.2-1sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.2-1sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.9.4-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.4-1.</p>
 
- -<p>We recommend that you upgrade your pound package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? pound.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-951.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-951.wml	2016-08-25 22:59:10.372416297 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>missing input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>This update corrects the search feature in trac, an enhanced wiki
- -and issue tracking system for software development projects, which
- -broke with the last security update.  For completeness please find
- -below the original advisory text:</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?нкÑ?ии поиÑ?ка в trac, Ñ?аÑ?Ñ?иÑ?енной вики и
+Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? пÑ?облем длÑ? пÑ?оекÑ?ов по Ñ?азÑ?абоÑ?ке Ð?Ð?, коÑ?оÑ?Ñ?е
+бÑ?ли Ñ?ломанÑ? в пÑ?едÑ?дÑ?Ñ?ем обновлении безопаÑ?ноÑ?Ñ?и.  Ð?лÑ? полноÑ?Ñ? ниже
+пÑ?иводиÑ?Ñ?Ñ? изнаÑ?алÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Several vulnerabilities have been discovered in trac, an enhanced wiki
- -and issue tracking system for software development projects.  The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? trac, Ñ?аÑ?Ñ?иÑ?енной вики и Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? пÑ?облем длÑ? пÑ?оекÑ?ов по Ñ?азÑ?абоÑ?ке
+Ð?Ð?, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4065";>CVE-2005-4065</a>
 
- -    <p>Due to missing input sanitising it is possible to inject arbitrary
- -    SQL code into the SQL statements.</p></li>
+    <p>Ð?з-за оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?виÑ? оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? можно вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й
+    SQL-код в Ñ?Ñ?веÑ?ждениÑ? SQL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4644";>CVE-2005-4644</a>
 
- -    <p>A cross-site scripting vulnerability has been discovered that
- -    allows remote attackers to inject arbitrary web script or HTML.</p></li>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг, позволÑ?Ñ?Ñ?ий Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 </ul>
 </blockquote>
 
- -<p>The old stable distribution (woody) does not contain trac packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? trac оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.8.1-3sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.8.1-3sarge4.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.9.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.3-1.</p>
 
- -<p>We recommend that you upgrade your trac package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? trac.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-958.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-958.wml	2016-08-25 23:03:03.284230149 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been discovered in drupal, a
- -fully-featured content management/discussion engine.  The Common
- -Vulnerabilities and Exposures project identifies the following
- -vulnerabilities:</p>
+<p>Ð? drupal, полноÑ?Ñ?нкÑ?ионалÑ?ном движке Ñ?пÑ?авлениÑ? Ñ?одеÑ?жимÑ?м, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?и пÑ?облем.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3973";>CVE-2005-3973</a>
 
- -    <p>Several cross-site scripting vulnerabilities allow remote
- -    attackers to inject arbitrary web script or HTML.</p></li>
+    <p>Ð?еÑ?колÑ?ко Ñ?лÑ?Ñ?аев межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3974";>CVE-2005-3974</a>
 
- -    <p>When running on PHP5, Drupal does not correctly enforce user
- -    privileges, which allows remote attackers to bypass the "access
- -    user profiles" permission.</p></li>
+    <p>Ð?Ñ?и Ñ?абоÑ?е на PHP5 Drupal непÑ?авилÑ?но вÑ?Ñ?Ñ?авлÑ?еÑ? пÑ?ава доÑ?Ñ?Ñ?па
+    полÑ?зоваÑ?елей, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам обÑ?одиÑ?Ñ? пÑ?ава "access
+    user profiles".</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3975";>CVE-2005-3975</a>
 
- -    <p>An interpretation conflict allows remote authenticated users to
- -    inject arbitrary web script or HTML via HTML in a file with a GIF
- -    or JPEG file extension.</p></li>
+    <p>Ð?онÑ?ликÑ? инÑ?еÑ?пÑ?еÑ?аÑ?ий позволÑ?еÑ? Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м
+    вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? HTML в Ñ?айле Ñ? Ñ?аÑ?Ñ?иÑ?ением
+    GIF или JPEG.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain drupal packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? drupal оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.5.3-5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.5.3-5.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.5.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.5.6-1.</p>
 
- -<p>We recommend that you upgrade your drupal package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? drupal.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=pqZO
-----END PGP SIGNATURE-----


Reply to: