[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{778,809,813}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-778.wml	2005-10-02 22:09:34.000000000 +0600
+++ russian/security/2005/dsa-778.wml	2016-08-26 13:28:23.573382133 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>missing input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Two security related problems have been discovered in Mantis, a
- -web-based bug tracking system.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Mantis, Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? оÑ?ибок на базе веб, бÑ?ли обнаÑ?Ñ?женÑ?
+две Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облемÑ?.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2556";>CAN-2005-2556</a>
 
- -    <p>A remote attacker could supply a specially crafted URL to scan
- -    arbitrary ports on arbitrary hosts that may not be accessible
- -    otherwise.</p>
+    <p>УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? пеÑ?едаÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й URL длÑ?
+    Ñ?каниÑ?ованиÑ? пÑ?оизволÑ?нÑ?Ñ? поÑ?Ñ?ов на пÑ?оизволÑ?нÑ?Ñ? Ñ?злаÑ?, коÑ?оÑ?Ñ?е в пÑ?оÑ?ивном Ñ?лÑ?Ñ?ае
+    длÑ? него бÑ?ли бÑ? недоÑ?Ñ?Ñ?пнÑ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2557";>CAN-2005-2557</a>
 
- -    <p>A remote attacker was able to insert arbitrary HTML code in bug
- -    reports, hence, cross site scripting.</p>
+    <p>УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? ввеÑ?Ñ?и пÑ?оизволÑ?нÑ?й код HTML в Ñ?ообÑ?ение
+    об оÑ?ибке, вÑ?звав межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3090";>CAN-2005-3090</a>
 
- -    <p>A remote attacker was able to insert arbitrary HTML code in bug
- -    reports, hence, cross site scripting.</p>
+    <p>УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? ввеÑ?Ñ?и пÑ?оизволÑ?нÑ?й код HTML в Ñ?ообÑ?ение
+    об оÑ?ибке, вÑ?звав межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not seem to be affected by
- -these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (woody), как кажеÑ?Ñ?Ñ?, не подвеÑ?жен
+Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.19.2-4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.2-4.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.19.2-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.2-4.</p>
 
- -<p>We recommend that you upgrade your mantis package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mantis.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-809.wml	2011-05-26 16:05:44.000000000 +0600
+++ russian/security/2005/dsa-809.wml	2016-08-26 13:35:35.463172187 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Certain aborted requests that trigger an assertion in squid, the
- -popular WWW proxy cache, may allow remote attackers to cause a denial
- -of service.  This update also fixes a regression caused by
+<p>Ð?пÑ?еделÑ?ннÑ?е пÑ?еÑ?ваннÑ?е запÑ?оÑ?Ñ? могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?Ñ?абоÑ?кÑ? Ñ?Ñ?веÑ?ждениÑ? в squid,
+попÑ?лÑ?Ñ?ном пÑ?окÑ?и кеÑ?е длÑ? WWW, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+в обÑ?лÑ?живании.  Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?егÑ?еÑ?Ñ?иÑ?, вÑ?званнÑ?Ñ?
 <a href="dsa-751">DSA 751</a>.
- -For completeness below is the original advisory text:</p>
+Ð?лÑ? полноÑ?Ñ? ниже пÑ?иводиÑ?Ñ?Ñ? Ñ?екÑ?Ñ? оÑ?игиналÑ?ной Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Several vulnerabilities have been discovered in Squid, the popular WWW
- -proxy cache.  The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Squid, попÑ?лÑ?Ñ?ном пÑ?окÑ?и кеÑ?е длÑ? WWW, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2794";>CAN-2005-2794</a>
 
- -    <p>Certain aborted requests that trigger an assert may allow remote
- -    attackers to cause a denial of service.</p>
+    <p>Ð?пÑ?еделÑ?ннÑ?е пÑ?еÑ?ваннÑ?е запÑ?оÑ?Ñ? могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?Ñ?абоÑ?кÑ? Ñ?Ñ?веÑ?ждениÑ?, Ñ?Ñ?о позволÑ?еÑ?
+    Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2796";>CAN-2005-2796</a>
 
- -    <p>Specially crafted requests can cause a denial of service.</p>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е запÑ?оÑ?Ñ? могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p>
 
 </ul>
 </blockquote>
 
- -<p>For the oldstable distribution (woody) this problem has been fixed in
- -version 2.4.6-2woody10.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.4.6-2woody10.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.5.9-10sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5.9-10sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.5.10-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5.10-5.</p>
 
- -<p>We recommend that you upgrade your squid package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? squid.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-813.wml	2005-09-15 16:34:41.000000000 +0600
+++ russian/security/2005/dsa-813.wml	2016-08-26 13:40:34.960349227 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several problems have been discovered in libgadu which is also part of
- -centericq, a text-mode multi-protocol instant messenger client.  The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? libgadu, коÑ?оÑ?аÑ?, кÑ?оме Ñ?ого, Ñ?влÑ?еÑ?Ñ?Ñ? Ñ?аÑ?Ñ?Ñ?Ñ? centericq, Ñ?екÑ?Ñ?ового клиенÑ?а
+длÑ? обмена мгновеннÑ?ми Ñ?ообÑ?ениÑ?ми Ñ? поддеÑ?жкой множеÑ?Ñ?ва пÑ?оÑ?околов, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко пÑ?облем.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2369";>CAN-2005-2369</a>
 
- -    <p>Multiple integer signedness errors may allow remote attackers to
- -    cause a denial of service or execute arbitrary code.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е оÑ?ибки знаков Ñ?елÑ?Ñ? Ñ?иÑ?ел могÑ?Ñ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании или вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2370";>CAN-2005-2370</a>
 
- -    <p>Memory alignment errors may allows remote attackers to cause a
- -    denial of service on certain architectures such as sparc.</p></li>
+    <p>Ð?Ñ?ибки вÑ?Ñ?авниваниÑ? в памÑ?Ñ?и могÑ?Ñ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ?
+    оÑ?каз в обÑ?лÑ?живании на некоÑ?оÑ?Ñ?Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?аÑ? (напÑ?имеÑ?, sparc).</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2448";>CAN-2005-2448</a>
 
- -    <p>Several endianess errors may allow remote attackers to cause a
- -    denial of service.</p></li>
+    <p>Ð?еÑ?колÑ?ко оÑ?ибок поÑ?Ñ?дка Ñ?ледованиÑ? байÑ?ов могÑ?Ñ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (woody) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.20.0-1sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.20.0-1sarge2.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.20.0-9.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.20.0-9.</p>
 
- -<p>We recommend that you upgrade your centericq package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? centericq.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=cKsk
-----END PGP SIGNATURE-----


Reply to: