[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{771,715,918}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-715.wml	2006-12-06 19:23:28.000000000 +0500
+++ russian/security/2005/dsa-715.wml	2016-08-26 13:01:55.856068615 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several problems have been discovered in the CVS server, which serves
- -the popular Concurrent Versions System.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Ñ?еÑ?веÑ?е CVS, обÑ?лÑ?живаÑ?Ñ?ем попÑ?лÑ?Ñ?нÑ?Ñ? Ñ?иÑ?Ñ?емÑ? одновÑ?еменнÑ?Ñ? веÑ?Ñ?ий, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1342";>CAN-2004-1342</a>
 
- -    <p>Maks Polunin and Alberto Garcia discovered independently that
- -    using the pserver access method in connection with the repouid
- -    patch that Debian uses it is possible to bypass the password and
- -    gain access to the repository in question.</p>
+    <p>Ð?акÑ? Ð?олÑ?нин и Ð?лÑ?беÑ?Ñ?о Ð?аÑ?Ñ?иа незавиÑ?имо обнаÑ?Ñ?жили, Ñ?Ñ?о
+    иÑ?полÑ?зование меÑ?ода доÑ?Ñ?Ñ?па pserver вмеÑ?Ñ?Ñ?е Ñ? заплаÑ?ой repouid,
+    иÑ?полÑ?зÑ?емой в Debian, позволÑ?еÑ? обÑ?одиÑ?Ñ? пÑ?овеÑ?кÑ? паÑ?олÑ? и
+    полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п к данномÑ? Ñ?епозиÑ?оÑ?иÑ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1343";>CAN-2004-1343</a>
 
- -    <p>Alberto Garcia discovered that a remote user can cause the cvs
- -    server to crash when the cvs-repouids file exists but does not
- -    contain a mapping for the current repository, which can be used as
- -    a denial of service attack.</p>
+    <p>Ð?лÑ?беÑ?Ñ?о Ð?аÑ?Ñ?иа обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?далÑ?ннÑ?й полÑ?зоваÑ?елÑ? можеÑ? вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ?
+    оÑ?Ñ?ановкÑ? Ñ?еÑ?веÑ?а cvs в Ñ?лÑ?Ñ?ае, еÑ?ли имееÑ?Ñ?Ñ? Ñ?айл cvs-repouids, но он
+    не Ñ?одеÑ?жиÑ? оÑ?обÑ?ажениÑ? длÑ? Ñ?екÑ?Ñ?его Ñ?епозиÑ?оÑ?иÑ?, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+    длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 1.11.1p1debian-10.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.11.1p1debian-10.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.12.9-11.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.12.9-11.</p>
 
- -<p>We recommend that you upgrade your cvs package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? cvs.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-771.wml	2005-09-15 17:19:17.000000000 +0600
+++ russian/security/2005/dsa-771.wml	2016-08-26 12:56:16.058839850 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several problems have been discovered in pdns, a versatile nameserver
- -that can lead to a denial of service.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? pdns, Ñ?нивеÑ?Ñ?алÑ?ном Ñ?еÑ?веÑ?е имÑ?н, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2301";>CAN-2005-2301</a>
 
- -    <p>Norbert Sendetzky and Jan de Groot discovered that the LDAP backend
- -    did not properly escape all queries, allowing it to fail and not
- -    answer queries anymore.</p>
+    <p>Ð?оÑ?беÑ?Ñ? СендеÑ?ки и Ян де Ð?Ñ?ооÑ? обнаÑ?Ñ?жили, Ñ?Ñ?о движок LDAP
+    непÑ?авилÑ?но Ñ?кÑ?аниÑ?Ñ?еÑ? вÑ?е запÑ?оÑ?Ñ?, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?Ñ?ановке,
+    и он болÑ?Ñ?е не оÑ?веÑ?аеÑ? на запÑ?оÑ?Ñ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2302";>CAN-2005-2302</a>
 
- -    <p>Wilco Baan discovered that queries from clients without recursion
- -    permission can temporarily blank out domains to clients with
- -    recursion permitted.  This enables outside users to blank out a
- -    domain temporarily to normal users.</p>
+    <p>Ð?илко Ð?аан обнаÑ?Ñ?жил, Ñ?Ñ?о запÑ?оÑ?Ñ? из клиенÑ?ов без Ñ?екÑ?Ñ?Ñ?ивнÑ?Ñ?
+    пÑ?ав доÑ?Ñ?Ñ?па могÑ?Ñ? вÑ?еменно оÑ?иÑ?аÑ?Ñ? доменÑ? длÑ? клиенÑ?ов, длÑ? коÑ?оÑ?Ñ?Ñ?
+    Ñ?азÑ?еÑ?ена Ñ?екÑ?Ñ?Ñ?иÑ?.  ЭÑ?о позволÑ?еÑ? поÑ?Ñ?оÑ?онним полÑ?зоваÑ?елÑ?м вÑ?еменно
+    вÑ?Ñ?иÑ?аÑ?Ñ? доменÑ? длÑ? обÑ?Ñ?нÑ?Ñ? полÑ?зоваÑ?елей.</p>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain pdns packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? pdns оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.9.17-13sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.9.17-13sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.9.18-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.9.18-1.</p>
 
- -<p>We recommend that you upgrade your pdns package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? pdns.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-918.wml	2005-12-09 18:46:15.000000000 +0500
+++ russian/security/2005/dsa-918.wml	2016-08-26 13:10:54.220629962 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>programming error</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ?</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been discovered in osh, the
- -operator's shell for executing defined programs in a privileged
- -environment.  The Common Vulnerabilities and Exposures project
- -identifies the following vulnerabilities:</p>
+<p>Ð? osh, командной Ñ?Ñ?Ñ?оке опеÑ?аÑ?оÑ?а длÑ? вÑ?полнениÑ? опÑ?еделÑ?ннÑ?Ñ? пÑ?огÑ?амм
+в пÑ?ивилегиÑ?ованном окÑ?Ñ?жении, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?вÑ?заннÑ?Ñ? Ñ?
+безопаÑ?ноÑ?Ñ?и пÑ?облем.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3346";>CVE-2005-3346</a>
 
- -    <p>Charles Stevenson discovered a bug in the substitution of
- -    variables that allows a local attacker to open a root shell.</p></li>
+    <p>ЧаÑ?лÑ?з СÑ?ивенÑ?он обнаÑ?Ñ?жил оÑ?ибкÑ? в подÑ?Ñ?ановке пеÑ?еменнÑ?Ñ?, коÑ?оÑ?аÑ?
+    позволÑ?еÑ? локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? оÑ?кÑ?Ñ?ваÑ?Ñ? команднÑ?Ñ? Ñ?Ñ?Ñ?окÑ? Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3533";>CVE-2005-3533</a>
 
- -    <p>Solar Eclipse discovered a buffer overflow caused by the current
- -    working directory plus a filename that could be used to execute
- -    arbitrary code and e.g. open a root shell.</p></li>
+    <p>Solar Eclipse обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а, вÑ?зÑ?ваемое Ñ?оÑ?еÑ?анием Ñ?екÑ?Ñ?его
+    Ñ?абоÑ?его каÑ?алога и имени Ñ?айла, коÑ?оÑ?ое можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода и, к пÑ?имеÑ?Ñ?, оÑ?кÑ?Ñ?Ñ?иÑ? командной Ñ?Ñ?Ñ?оки Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 1.7-11woody2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.7-11woody2.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.7-13sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.7-13sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.7-15, however, the package has been removed entirely.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.7-15. Тем не менее, пакеÑ? бÑ?л полноÑ?Ñ?Ñ?Ñ? Ñ?далÑ?н.</p>
 
- -<p>We recommend that you upgrade your osh package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? osh.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=uWp2
-----END PGP SIGNATURE-----


Reply to: