[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1{054,231,022}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1022.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1022.wml	2016-08-25 23:43:10.152059134 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the backup utility 
- -storebackup. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? storebackup, Ñ?Ñ?илиÑ?е длÑ? Ñ?езеÑ?вного копиÑ?ованиÑ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3146";>CVE-2005-3146</a>
 
- -    <p>Storebackup creates a temporary file predictably, which can be
- -    exploited to overwrite arbitrary files on the system with a symlink
- -    attack.</p></li>
+    <p>Storebackup Ñ?оздаÑ?Ñ? пÑ?едÑ?казÑ?емÑ?й вÑ?еменнÑ?й Ñ?айл, Ñ?Ñ?о можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ? длÑ? пеÑ?езапиÑ?и пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов в Ñ?иÑ?Ñ?еме пÑ?и помоÑ?и аÑ?аки
+    Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3147";>CVE-2005-3147</a>
 
- -    <p>The backup root directory wasn't created with fixed permissions, which may lead to
- -       inproper permissions if the umask is too lax.</p></li>
+    <p>Ð?оÑ?невой каÑ?алог Ñ?езеÑ?вной копии не Ñ?оздаÑ?Ñ?Ñ?Ñ? Ñ? Ñ?икÑ?иÑ?ованнÑ?ми пÑ?авами доÑ?Ñ?Ñ?па, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ?
+       к непÑ?авилÑ?нÑ?м пÑ?авам доÑ?Ñ?Ñ?па в Ñ?лÑ?Ñ?ае, еÑ?ли иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? Ñ?лиÑ?ком Ñ?лабое знаÑ?ение umask.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3148";>CVE-2005-3148</a>
 
- -    <p>The user and group rights of symlinks are set incorrectly when making
- -    or restoring a backup, which may leak sensitive data.</p></li>
+    <p>Ð?Ñ?ава полÑ?зоваÑ?елÑ? и гÑ?Ñ?ппÑ? Ñ?имволÑ?нÑ?Ñ? Ñ?Ñ?Ñ?лок Ñ?Ñ?Ñ?анавливаÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но пÑ?и Ñ?оздании
+    или воÑ?Ñ?Ñ?ановлении Ñ?езеÑ?вной копии, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ке Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? даннÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) doesn't contain storebackup packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? storebackup оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.18.4-2sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.18.4-2sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.19-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.19-2.</p>
 
- -<p>We recommend that you upgrade your storebackup package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? storebackup.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1054.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1054.wml	2016-08-25 23:33:55.050475505 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Tavis Ormandy discovered several vulnerabilities in the TIFF library
- -that can lead to a denial of service or the execution of arbitrary
- -code.  The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>ТÑ?виÑ? Ð?Ñ?манди обнаÑ?Ñ?жил неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей в библиоÑ?еке TIFF,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ? пÑ?оизволÑ?ного
+кода.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2024";>CVE-2006-2024</a>
 
- -    <p>Multiple vulnerabilities allow attackers to cause a denial of
- -    service.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и позволÑ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+    в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2025";>CVE-2006-2025</a>
 
- -    <p>An integer overflow allows attackers to cause a denial of service
- -    and possibly execute arbitrary code.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+    и поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2026";>CVE-2006-2026</a>
 
- -    <p>A double-free vulnerability allows attackers to cause a denial of
- -    service and possibly execute arbitrary code.</p></li>
+    <p>Ð?войное оÑ?вобождение памÑ?Ñ?и позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+    или поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) these problems have been fixed
- -in version 3.5.5-7woody1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.5.5-7woody1.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 3.7.2-3sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.7.2-3sarge1.</p>
 
- -<p>The unstable distribution (sid) is not vulnerable to these problems.</p>
+<p>Ð?еÑ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sid) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>We recommend that you upgrade your libtiff packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libtiff.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1231.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1231.wml	2016-08-25 23:37:35.289388776 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the GNU privacy guard,
- -a free PGP replacement, which may lead to the execution of arbitrary code.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? GNU privacy guard, Ñ?вободной замене PGP, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6169";>CVE-2006-6169</a>
 
- -    <p>Werner Koch discovered that a buffer overflow in a sanitising function
- -    may lead to execution of arbitrary code when running gnupg
- -    interactively.</p></li>
+    <p>Ð?еÑ?неÑ? Ð?оÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии оÑ?иÑ?Ñ?ки
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода пÑ?и инÑ?еÑ?акÑ?ивном
+    запÑ?Ñ?ке gnupg.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6235";>CVE-2006-6235</a>
 
- -    <p>Tavis Ormandy discovered that parsing a carefully crafted OpenPGP
- -    packet may lead to the execution of arbitrary code, as a function
- -    pointer of an internal structure may be controlled through the
- -    decryption routines.</p></li>
+    <p>ТÑ?виÑ? Ð?Ñ?манди обнаÑ?Ñ?жил, Ñ?Ñ?о гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+    пакеÑ?а OpenPGP можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода, поÑ?колÑ?кÑ? Ñ?казаÑ?елÑ?
+    Ñ?Ñ?нкÑ?ии внÑ?Ñ?Ñ?енней Ñ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ? можеÑ? Ñ?пÑ?авлÑ?Ñ?Ñ?Ñ?Ñ? Ñ?еÑ?ез
+    Ñ?Ñ?нкÑ?ии Ñ?аÑ?Ñ?иÑ?Ñ?овки.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.4.1-1.sarge6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.1-1.sarge6.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been
- -fixed in version 1.4.6-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.4.6-1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.4.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.6-1.</p>
 
- -<p>We recommend that you upgrade your gnupg packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gnupg.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXvzxAAAoJEF7nbuICFtKlM/4P/0YZeh0WlznYSUml9GGA01BU
do1o1vcnMhilb28S+rPCvn6M22LAgDeuCtlTwOBcjX6MAYbF45YGz8FeQKTIvurU
J6czFdBL2PtOhKKFZIYCOQE/5P0fYqtWmANPfiFqlQPmv5660jryCUXlJe0pmZ72
wjTN/TkTylRNOUYL+j/OjYBgu9gwGwaFjjKloJ3evwIrWnjUfmaFmxQfCm+abtiF
+ETZQskSS1cs9iHi9cSwedBlMYSgoszBTGdxADvZP43+L9Dd0N+/Ff9sZo80LEYC
8/lrxsn5cSFjDVuGo1FDtN/YdOtNHPV0CUY2XcTdJAsem1SHqiWAfUfxu6f7XyQK
fLaDTdm9xPQdHibaC/6Acz+aTIoReybN/3XUENoswkDDes7J6i7LuO59bPgFFM3i
GzbBFf7zir4LhR6THgw8WzPYBQGhyY8uzLH5mIJ263yDe4/Fo05RfUNKSLu94w8X
wFeoQbt2ahB7/4VJt8HSJa0ECSE1c8Ju/md5K/fIROZ3qLUPkVNNNCzxXsQFZCQF
1AClf22wZtMD+4S5O6Vn7ImfW0Z1I8pmL71NePEudkbMnKgn2yoBn/AN5xzC2d+T
91zJCCWCAwda3amGrlZ/9zpj9YMoxZbtnINy8TRjml8VAqBvfK0PYiyKhTg2xuMY
LtICtrPHVgu2J5F9aK1N
=77hG
-----END PGP SIGNATURE-----


Reply to: