[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-203{8,5,2}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-2032.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2032.wml	2016-08-26 01:22:02.448598511 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been discovered in libpng, a library for
- -reading and writing PNG files. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? libpng, библиоÑ?еке длÑ? Ñ?Ñ?ениÑ? и запиÑ?и Ñ?айлов в Ñ?оÑ?маÑ?е PNG, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2042";>CVE-2009-2042</a>
 
- -<p>libpng does not properly parse 1-bit interlaced images with width values
- -that are not divisible by 8, which causes libpng to include
- -uninitialized bits in certain rows of a PNG file and might allow remote
- -attackers to read portions of sensitive memory via "out-of-bounds
- -pixels" in the file.</p></li>
+<p>libpng непÑ?авилÑ?но вÑ?полнÑ?еÑ? гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? изобÑ?ажений Ñ? 1-биÑ?нÑ?м Ñ?еÑ?едованием Ñ?о знаÑ?ениÑ?ми
+Ñ?иÑ?инÑ?, коÑ?оÑ?Ñ?е не делÑ?Ñ?Ñ?Ñ? на 8, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о libpng добавлÑ?еÑ?
+неиниÑ?иализиÑ?ованнÑ?е биÑ?Ñ? в опÑ?еделÑ?ннÑ?е Ñ?Ñ?Ñ?оки Ñ?айла PNG и можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м
+злоÑ?мÑ?Ñ?ленникам Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? Ñ?аÑ?Ñ?и Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?ной памÑ?Ñ?и Ñ? помоÑ?Ñ?Ñ? "пикÑ?елей за пÑ?еделами
+вÑ?деленной памÑ?Ñ?и" в Ñ?айле.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0205";>CVE-2010-0205</a>
 
- -<p>libpng does not properly handle compressed ancillary-chunk data that has
- -a disproportionately large uncompressed representation, which allows
- -remote attackers to cause a denial of service (memory and CPU
- -consumption, and  application hang) via a crafted PNG file</p></li>
+<p>libpng непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?жаÑ?Ñ?е дополниÑ?елÑ?нÑ?е поÑ?Ñ?ии даннÑ?Ñ?, имеÑ?Ñ?ие
+неÑ?оÑ?азмеÑ?но болÑ?Ñ?ие Ñ?аÑ?пакованнÑ?е пÑ?едÑ?Ñ?авлениÑ?, Ñ?Ñ?о позволÑ?еÑ?
+Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?
+и памÑ?Ñ?и, а Ñ?акже завиÑ?аниÑ? пÑ?иложениÑ?) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е PNG</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.2.27-2+lenny3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.27-2+lenny3.</p>
 
- -<p>For the testing (squeeze) and unstable (sid) distribution, these
- -problems have been fixed in version 1.2.43-1</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.2.43-1</p>
 
- -<p>We recommend that you upgrade your libpng package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? libpng.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2035.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2035.wml	2016-08-26 01:15:45.670452948 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>multiple issues</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е пÑ?облемÑ?</define-tag>
 <define-tag moreinfo>
 
- -<p>Two issues have been found in the Apache HTTPD web server:</p>
+<p>Ð? Apache, HTTPD веб-Ñ?еÑ?веÑ?е, бÑ?ли обнаÑ?Ñ?женÑ? две пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0408";>CVE-2010-0408</a>
 
- -<p>mod_proxy_ajp would return the wrong status code if it encountered an
- -error, causing a backend server to be put into an error state until the
- -retry timeout expired. A remote attacker could send malicious requests
- -to trigger this issue, resulting in denial of service.</p></li>
+<p>mod_proxy_ajp возвÑ?аÑ?аеÑ? непÑ?авилÑ?нÑ?й код Ñ?Ñ?аÑ?Ñ?Ñ?а в Ñ?лÑ?Ñ?ае, еÑ?ли возникаеÑ?
+оÑ?ибка, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о движок-Ñ?еÑ?веÑ? пеÑ?еÑ?одиÑ? в Ñ?оÑ?Ñ?оÑ?ние оÑ?ибки до
+моменÑ?а иÑ?Ñ?еÑ?ениÑ? вÑ?емени ожиданиÑ? повÑ?оÑ?а. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованнÑ?е запÑ?оÑ?Ñ?, вÑ?зÑ?ваÑ?Ñ?ие Ñ?казаннÑ?Ñ? пÑ?облемÑ?, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0434";>CVE-2010-0434</a>
 
- -<p>A flaw in the core subrequest process code was found, which could lead
- -to a daemon crash (segfault) or disclosure of sensitive information
- -if the headers of a subrequest were modified by modules such as
+<p>Ð?Ñ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ? в коде обÑ?абоÑ?ки подзапÑ?оÑ?ов Ñ?дÑ?а, коÑ?оÑ?аÑ? можеÑ? пÑ?иводиÑ?Ñ?
+к аваÑ?ийной оÑ?Ñ?ановке Ñ?лÑ?жбÑ? (оÑ?ибка Ñ?егменÑ?иÑ?ованиÑ?) или Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?ной инÑ?оÑ?маÑ?ии
+в Ñ?лÑ?Ñ?ае, еÑ?ли заголовки подзапÑ?оÑ?а изменÑ?Ñ?Ñ?Ñ?Ñ? Ñ?акими модÑ?лÑ?ми как
 mod_headers.</p></li>
 
 </ul>
 
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.2.9-10+lenny7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.9-10+lenny7.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems have been fixed in version 2.2.15-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.2.15-1.</p>
 
- -<p>This advisory also provides updated apache2-mpm-itk packages which
- -have been recompiled against the new apache2 packages.</p>
+<p>Ð?Ñ?оме Ñ?ого, в данной Ñ?екомендаÑ?ии пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?Ñ?Ñ? обновлÑ?ннÑ?е пакеÑ?Ñ? apache2-mpm-itk,
+коÑ?оÑ?Ñ?е бÑ?ли заново Ñ?компилиÑ?ованÑ? Ñ? поддеÑ?жкой новÑ?Ñ? пакеÑ?ов apache2.</p>
 
 
- -<p>We recommend that you upgrade your apache2 and apache2-mpm-itk packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? apache2 и apache2-mpm-itk.</p>
 
 </define-tag>
 
- --- english/security/2010/dsa-2038.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2038.wml	2016-08-26 01:08:55.558469913 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Pidgin, a multi
- -protocol instant messaging client. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Pidgin, клиенÑ?е обмена мгновеннÑ?ми Ñ?ообÑ?ениÑ?ми Ñ? поддеÑ?жкой множеÑ?Ñ?ва
+пÑ?оÑ?околов, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0420";>CVE-2010-0420</a>
 
- -	<p>Crafted nicknames in the XMPP protocol can crash Pidgin remotely.</p></li>
+	<p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е ники в пÑ?оÑ?околе XMPP могÑ?Ñ? пÑ?иводиÑ?Ñ? к Ñ?далÑ?нной аваÑ?ийной оÑ?Ñ?ановке Pidgin.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0423";>CVE-2010-0423</a>
 
- -	<p>Remote contacts may send too many custom smilies, crashing Pidgin.</p></li>
+	<p>УдалÑ?ннÑ?е конÑ?акÑ?Ñ? могÑ?Ñ? оÑ?пÑ?авиÑ?Ñ? Ñ?лиÑ?ком много Ñ?обÑ?Ñ?веннÑ?Ñ? Ñ?майлов, Ñ?Ñ?о пÑ?иводиÑ? к аваÑ?ийной оÑ?Ñ?ановке.</p></li>
 
 </ul>
 
- -<p>Since a few months, Microsoft's servers for MSN have changed the protocol,
- -making Pidgin non-functional for use with MSN. It is not feasible to port
- -these changes to the version of Pidgin in Debian Lenny. This update
- -formalises that situation by disabling the protocol in the client. Users
- -of the MSN protocol are advised to use the version of Pidgin in the
- -repositories of www.backports.org.</p>
+<p>Ð?еÑ?колÑ?ко меÑ?Ñ?Ñ?ев назад на Ñ?еÑ?веÑ?аÑ? Microsoft длÑ? MSN бÑ?л изменÑ?н пÑ?оÑ?окол,
+Ñ?Ñ?о пÑ?ивело к Ñ?омÑ?, Ñ?Ñ?о Pidgin более не Ñ?абоÑ?аеÑ? Ñ? MSN. Ð?еÑ?енеÑ?Ñ?и Ñ?Ñ?и изменениÑ?
+в веÑ?Ñ?иÑ? Pidgin в Debian Lenny не пÑ?едÑ?Ñ?авлÑ?еÑ?Ñ?Ñ? возможнÑ?м. Ð?анное обновление
+оÑ?иÑ?иалÑ?но закÑ?еплÑ?еÑ? Ñ?Ñ?Ñ? Ñ?иÑ?Ñ?аÑ?иÑ? пÑ?Ñ?Ñ?м оÑ?клÑ?Ñ?ениÑ? поддеÑ?жки Ñ?казанного пÑ?оÑ?окола в клиенÑ?е. Ð?олÑ?зоваÑ?елÑ?м
+пÑ?оÑ?окола MSN Ñ?екомендÑ?еÑ?Ñ?Ñ? иÑ?полÑ?зоваÑ?Ñ? веÑ?Ñ?иÑ? Pidgin из
+Ñ?епозиÑ?оÑ?иев www.backports.org.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.4.3-4lenny6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.3-4lenny6.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.6.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.6-1.</p>
 
- -<p>We recommend that you upgrade your pidgin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? pidgin.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=n8sQ
-----END PGP SIGNATURE-----


Reply to: