[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-2{079,114,123}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-2079.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2079.wml	2016-08-26 00:25:47.349968634 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in mapserver, a CGI-based
- -web framework to publish spatial data and interactive mapping applications.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? mapserver, веб-инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е длÑ? пÑ?бликаÑ?ии пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?веннÑ?Ñ? даннÑ?Ñ? и инÑ?еÑ?акÑ?ивнÑ?Ñ?
+каÑ?Ñ?огÑ?аÑ?иÑ?еÑ?киÑ? пÑ?иложений на оÑ?нове CGI, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-2539";>CVE-2010-2539</a>
 
- -  <p>A stack-based buffer overflow in the msTmpFile function might lead to
- -  arbitrary code execution under some conditions.</p></li>
+  <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии msTmpFile можеÑ? пÑ?и некоÑ?оÑ?Ñ?Ñ? Ñ?Ñ?ловиÑ?Ñ? пÑ?иводиÑ?Ñ? к
+  вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-2540";>CVE-2010-2540</a>
 
- -  <p>It was discovered that the CGI debug command-line arguments which are
- -  enabled by default are insecure and may allow a remote attacker to
- -  execute arbitrary code. Therefore they have been disabled by default.</p></li>
+  <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о аÑ?гÑ?менÑ?Ñ? командной Ñ?Ñ?Ñ?оки длÑ? CGI-оÑ?ладки, коÑ?оÑ?Ñ?е
+  вклÑ?Ñ?аÑ?Ñ?Ñ?Ñ? по Ñ?молÑ?аниÑ?, небезопаÑ?нÑ? и могÑ?Ñ? позволиÑ?Ñ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ?
+  вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код. СледоваÑ?елÑ?но, они бÑ?ли по Ñ?молÑ?аниÑ? оÑ?клÑ?Ñ?енÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 5.0.3-3+lenny5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.0.3-3+lenny5.</p>
 
- -<p>For the testing distribution (squeeze), this problem has been fixed in
- -version 5.6.4-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.6.4-1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 5.6.4-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.6.4-1.</p>
 
 
- -<p>We recommend that you upgrade your mapserver packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mapserver.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2114.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2114.wml	2016-08-26 00:30:58.755170406 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>The Debian stable point release 5.0.6 included updated packages of
- -the Git revision control system in order to fix a security issue.
- -Unfortunately, the update introduced a regression which could make
- -it impossible to clone or create Git repositories.  This upgrade
- -fixes this regression, which is tracked as
- -<a href="https://bugs.debian.org/595728";>Debian bug #595728</a>.</p>
- -
- -<p>The original security issue allowed an attacker to execute arbitrary
- -code if he could trick a local user to execute a git command in a
- -crafted working directory (<a href="https://security-tracker.debian.org/tracker/CVE-2010-2542";>CVE-2010-2542</a>).</p>
- -
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 1.5.6.5-3+lenny3.2.</p>
- -
- -<p>The packages for the hppa architecture are not included in this
- -advisory.  However, the hppa architecture is not known to be affected
- -by the regression.</p>
- -
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), the security issue has been fixed in version 1.7.1-1.1. These
- -distributions were not affected by the regression.</p>
+<p>Ð? Ñ?едакÑ?ии 5.0.6 Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка Debian Ñ?одеÑ?жаÑ?Ñ?Ñ? обновлÑ?ннÑ?е пакеÑ?Ñ?
+Git, Ñ?иÑ?Ñ?емÑ? Ñ?пÑ?авлениÑ? Ñ?евизиÑ?ми. Ð?ни добавленÑ? Ñ? Ñ?елÑ?Ñ? иÑ?пÑ?авлениÑ? пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и.
+Ð? Ñ?ожалениÑ?, обновление Ñ?одеÑ?жиÑ? Ñ?егÑ?еÑ?Ñ?иÑ?, коÑ?оÑ?аÑ? делаеÑ? невозможнÑ?м
+клониÑ?ование или Ñ?оздание Git-Ñ?епозиÑ?оÑ?иев.  Ð?анное обновление
+иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?Ñ? Ñ?егÑ?еÑ?Ñ?иÑ?, коÑ?оÑ?аÑ? оÑ?Ñ?леживаеÑ?Ñ?Ñ? как
+<a href="https://bugs.debian.org/595728";>оÑ?ибка Debian #595728</a>.</p>
+
+<p>Ð?знаÑ?алÑ?наÑ? пÑ?облема безопаÑ?ноÑ?Ñ?и позволÑ?ла злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+код в Ñ?лÑ?Ñ?ае, еÑ?ли локалÑ?нÑ?й полÑ?зоваÑ?елÑ? вÑ?полнÑ?еÑ? командÑ? git в
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованном Ñ?абоÑ?ем каÑ?алоге (<a href="https://security-tracker.debian.org/tracker/CVE-2010-2542";>CVE-2010-2542</a>).</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.5.6.5-3+lenny3.2.</p>
+
+<p>Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? hppa не вклÑ?Ñ?енÑ? в даннÑ?Ñ?
+Ñ?екомендаÑ?иÑ?.  Тем не менее, аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?а hppa, кажеÑ?Ñ?Ñ?, не подвеÑ?жена
+данной Ñ?егÑ?еÑ?Ñ?ии.</p>
+
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема безопаÑ?ноÑ?Ñ?и бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 1.7.1-1.1. ЭÑ?и
+вÑ?пÑ?Ñ?ки не подвеÑ?женÑ? Ñ?егÑ?еÑ?Ñ?ии.</p>
 
- -<p>We recommend that you upgrade your git-core packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? git-core.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2123.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2123.wml	2016-08-26 00:35:47.870873837 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Mozilla's Network
- -Security Services (NSS) library.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? библиоÑ?еке Network Security Services оÑ? Mozilla бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3170";>CVE-2010-3170</a>
- -	<p>NSS recognizes a wildcard IP address in the subject's Common
- -	Name field of an X.509 certificate, which might allow
- -	man-in-the-middle attackers to spoof arbitrary SSL servers via
- -	a crafted certificate issued by a legitimate Certification
- -	Authority.</p></li>
+	<p>NSS Ñ?аÑ?познаÑ?Ñ? IP адÑ?еÑ?а Ñ? подÑ?Ñ?ановоÑ?нÑ?ми знаками в поле Common
+	Name Ñ?еÑ?Ñ?иÑ?икаÑ?а X.509, Ñ?Ñ?о можеÑ? позволиÑ?Ñ?
+	вÑ?полнÑ?Ñ?Ñ? аÑ?аки по пÑ?инÑ?ипÑ? Ñ?еловек-в-Ñ?еÑ?едине по подделке пÑ?оизволÑ?нÑ?Ñ? SSL-Ñ?еÑ?веÑ?ов Ñ? помоÑ?Ñ?Ñ?
+	Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?еÑ?Ñ?иÑ?икаÑ?а, вÑ?данного коÑ?Ñ?екÑ?нÑ?м
+	авÑ?оÑ?иÑ?еÑ?ом.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3173";>CVE-2010-3173</a>
- -	<p>NSS does not properly set the minimum key length for
- -	Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for
- -	remote attackers to defeat cryptographic protection mechanisms
- -	via a brute-force attack.</p></li>
+	<p>NSS непÑ?авилÑ?но Ñ?Ñ?Ñ?анавливаеÑ? минималÑ?нÑ?Ñ? длинÑ? клÑ?Ñ?а
+	длÑ? Ñ?ежима Diffie-Hellman Ephemeral (DHE), Ñ?Ñ?о Ñ?пÑ?оÑ?аеÑ?
+	Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам задаÑ?Ñ? по взломÑ? кÑ?ипÑ?огÑ?аÑ?иÑ?еÑ?киÑ? меÑ?анизмов заÑ?иÑ?Ñ?
+	Ñ?еÑ?ез аÑ?акÑ? пеÑ?ебоÑ?ом.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 3.12.3.1-0lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.12.3.1-0lenny2.</p>
 
- -<p>For the unstable distribution (sid) and the upcoming stable
- -distribution (squeeze), these problems have been fixed in version
+<p>Ð? неÑ?Ñ?абилÑ?ном (sid) и гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (squeeze) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 3.12.8-1.</p>
 
- -<p>We recommend that you upgrade your NSS packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? NSS.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=a0rN
-----END PGP SIGNATURE-----


Reply to: