[DONE] wml://security/2006/dsa-9{34,51,58}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2006/dsa-934.wml 2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-934.wml 2016-08-25 22:54:36.289513384 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in Pound, a reverse proxy and
- -load balancer for HTTP. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Pound, обÑ?аÑ?ном пÑ?окÑ?и и баланÑ?иÑ?овÑ?ике нагÑ?Ñ?зки длÑ? HTTP, бÑ?ли
+обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-1391">CVE-2005-1391</a>:
- - <p>Overly long HTTP Host: headers may trigger a buffer overflow in the
- - add_port() function, which may lead to the execution of arbitrary
- - code.</p></li>
+ <p>ЧеÑ?еÑ?Ñ?Ñ?Ñ? длинное знаÑ?ение HTTP Host: заголовки могÑ?Ñ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в
+ Ñ?Ñ?нкÑ?ии add_port(), Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+ кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3751">CVE-2005-3751</a>:
- - <p>HTTP requests with conflicting Content-Length and Transfer-Encoding
- - headers could lead to HTTP Request Smuggling Attack, which can be
- - exploited to bypass packet filters or poison web caches.</p></li>
+ <p>HTTP-запÑ?оÑ?Ñ? Ñ? пÑ?оÑ?ивоÑ?еÑ?аÑ?ими заголовками Content-Length и Transfer-Encoding
+ могÑ?Ñ? пÑ?иводиÑ?Ñ? к подделке HTTP-запÑ?оÑ?ов, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+ длÑ? обÑ?ода Ñ?илÑ?Ñ?Ñ?ов пакеÑ?ов или оÑ?Ñ?авлениÑ? веб-кеÑ?а.</p></li>
</ul>
- -<p>The old stable distribution (woody) does not contain pound packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? pound оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.8.2-1sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.2-1sarge1.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.9.4-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.4-1.</p>
- -<p>We recommend that you upgrade your pound package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? pound.</p>
</define-tag>
# do not modify the following line
- --- english/security/2006/dsa-951.wml 2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-951.wml 2016-08-25 22:59:10.372416297 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>missing input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
<define-tag moreinfo>
- -<p>This update corrects the search feature in trac, an enhanced wiki
- -and issue tracking system for software development projects, which
- -broke with the last security update. For completeness please find
- -below the original advisory text:</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?нкÑ?ии поиÑ?ка в trac, Ñ?аÑ?Ñ?иÑ?енной вики и
+Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? пÑ?облем длÑ? пÑ?оекÑ?ов по Ñ?азÑ?абоÑ?ке Ð?Ð?, коÑ?оÑ?Ñ?е
+бÑ?ли Ñ?ломанÑ? в пÑ?едÑ?дÑ?Ñ?ем обновлении безопаÑ?ноÑ?Ñ?и. Ð?лÑ? полноÑ?Ñ? ниже
+пÑ?иводиÑ?Ñ?Ñ? изнаÑ?алÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии:</p>
<blockquote>
- -<p>Several vulnerabilities have been discovered in trac, an enhanced wiki
- -and issue tracking system for software development projects. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? trac, Ñ?аÑ?Ñ?иÑ?енной вики и Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? пÑ?облем длÑ? пÑ?оекÑ?ов по Ñ?азÑ?абоÑ?ке
+Ð?Ð?, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4065">CVE-2005-4065</a>
- - <p>Due to missing input sanitising it is possible to inject arbitrary
- - SQL code into the SQL statements.</p></li>
+ <p>Ð?з-за оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?виÑ? оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? можно вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й
+ SQL-код в Ñ?Ñ?веÑ?ждениÑ? SQL.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4644">CVE-2005-4644</a>
- - <p>A cross-site scripting vulnerability has been discovered that
- - allows remote attackers to inject arbitrary web script or HTML.</p></li>
+ <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг, позволÑ?Ñ?Ñ?ий Ñ?далÑ?ннÑ?м
+ злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
</ul>
</blockquote>
- -<p>The old stable distribution (woody) does not contain trac packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? trac оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.8.1-3sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.8.1-3sarge4.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.9.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.3-1.</p>
- -<p>We recommend that you upgrade your trac package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? trac.</p>
</define-tag>
# do not modify the following line
- --- english/security/2006/dsa-958.wml 2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-958.wml 2016-08-25 23:03:03.284230149 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several security related problems have been discovered in drupal, a
- -fully-featured content management/discussion engine. The Common
- -Vulnerabilities and Exposures project identifies the following
- -vulnerabilities:</p>
+<p>Ð? drupal, полноÑ?Ñ?нкÑ?ионалÑ?ном движке Ñ?пÑ?авлениÑ? Ñ?одеÑ?жимÑ?м, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?и пÑ?облем. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+Ñ?Ñ?звимоÑ?Ñ?и:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3973">CVE-2005-3973</a>
- - <p>Several cross-site scripting vulnerabilities allow remote
- - attackers to inject arbitrary web script or HTML.</p></li>
+ <p>Ð?еÑ?колÑ?ко Ñ?лÑ?Ñ?аев межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м
+ злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3974">CVE-2005-3974</a>
- - <p>When running on PHP5, Drupal does not correctly enforce user
- - privileges, which allows remote attackers to bypass the "access
- - user profiles" permission.</p></li>
+ <p>Ð?Ñ?и Ñ?абоÑ?е на PHP5 Drupal непÑ?авилÑ?но вÑ?Ñ?Ñ?авлÑ?еÑ? пÑ?ава доÑ?Ñ?Ñ?па
+ полÑ?зоваÑ?елей, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам обÑ?одиÑ?Ñ? пÑ?ава "access
+ user profiles".</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3975">CVE-2005-3975</a>
- - <p>An interpretation conflict allows remote authenticated users to
- - inject arbitrary web script or HTML via HTML in a file with a GIF
- - or JPEG file extension.</p></li>
+ <p>Ð?онÑ?ликÑ? инÑ?еÑ?пÑ?еÑ?аÑ?ий позволÑ?еÑ? Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м
+ вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? HTML в Ñ?айле Ñ? Ñ?аÑ?Ñ?иÑ?ением
+ GIF или JPEG.</p></li>
</ul>
- -<p>The old stable distribution (woody) does not contain drupal packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? drupal оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.5.3-5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.5.3-5.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.5.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.5.6-1.</p>
- -<p>We recommend that you upgrade your drupal package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? drupal.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=pqZO
-----END PGP SIGNATURE-----
Reply to: