[DONE] wml://security/2005/dsa-{728,752,634}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2005/dsa-634.wml 2005-01-11 23:04:58.000000000 +0500
+++ russian/security/2005/dsa-634.wml 2016-08-26 13:56:21.143648295 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>weak hostname and username validation</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>Ñ?лабаÑ? пÑ?овеÑ?ка имени Ñ?зла и имени полÑ?зоваÑ?елÑ?</define-tag>
<define-tag moreinfo>
- -<p>Patrice Fournier discovered a vulnerability in the authorisation
- -subsystem of hylafax, a flexible client/server fax system. A local or
- -remote user guessing the contents of the hosts.hfaxd database could
- -gain unauthorised access to the fax system.</p>
- -
- -<p>Some installations of hylafax may actually utilise the weak hostname
- -and username validation for authorized uses. For example, hosts.hfaxd
- -entries that may be common are</p>
+<p>Ð?аÑ?Ñ?иÑ? ФÑ?Ñ?Ñ?е обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в подÑ?иÑ?Ñ?еме авÑ?оÑ?изаÑ?ии
+в hylafax, гибкой Ñ?акÑ?овой клиенÑ?-Ñ?еÑ?веÑ?ной Ñ?иÑ?Ñ?еме. Ð?окалÑ?нÑ?й или
+Ñ?далÑ?ннÑ?й полÑ?зоваÑ?елÑ?, оÑ?гадÑ?ваÑ?Ñ?ие Ñ?одеÑ?жимое базÑ? даннÑ?Ñ? hosts.hfaxd, могÑ?Ñ?
+полÑ?Ñ?иÑ?Ñ? неавÑ?оÑ?изованнÑ?й доÑ?Ñ?Ñ?п к Ñ?акÑ?овой Ñ?иÑ?Ñ?еме.</p>
+
+<p>Ð? некоÑ?оÑ?Ñ?Ñ? Ñ?Ñ?Ñ?ановкаÑ? hylafax длÑ? авÑ?оÑ?изаÑ?ии можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+Ñ?лабаÑ? пÑ?овеÑ?ка имÑ?н Ñ?зла и имÑ?н полÑ?зоваÑ?елÑ?. Ð?апÑ?имеÑ?, Ñ?аÑ?Ñ?о
+вÑ?Ñ?Ñ?еÑ?аÑ?Ñ?Ñ?Ñ? Ñ?ледÑ?Ñ?Ñ?ие запиÑ?и в hosts.hfaxd:</p>
<pre>
192.168.0
@@ -15,8 +16,8 @@
user@host
</pre>
- -<p>After updating, these entries will need to be modified in order to
- -continue to function. Respectively, the correct entries should be</p>
+<p>Ð?оÑ?ле обновлениÑ? длÑ? пÑ?одолжениÑ? Ñ?абоÑ?Ñ? Ñ?иÑ?Ñ?емÑ? Ñ?Ñ?и запиÑ?и
+Ñ?ледÑ?еÑ? измениÑ?Ñ?. СооÑ?веÑ?Ñ?Ñ?венно, пÑ?авилÑ?нÑ?е запиÑ?и должнÑ? имеÑ?Ñ? Ñ?ледÑ?Ñ?Ñ?ий вид:</p>
<pre>
192.168.0.[0-9]+
@@ -24,9 +25,9 @@
user@host
</pre>
- -<p>Unless such matching of "username" with "otherusername" and "host" with
- -"hostname" is desired, the proper form of these entries should include
- -the delimiter and markers like this</p>
+<p>Ð?Ñ?ли Ñ?акое Ñ?овпадение "username" и "otherusername" и "host" Ñ?
+"hostname" не желаÑ?елÑ?но, Ñ?о Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?аÑ? Ñ?оÑ?ма Ñ?Ñ?иÑ? запиÑ?ей должнÑ? вклÑ?Ñ?аÑ?Ñ?
+в Ñ?ебÑ? огÑ?аниÑ?иÑ?елÑ? и маÑ?кеÑ?Ñ? подобнÑ?е Ñ?ледÑ?Ñ?Ñ?им:</p>
<pre>
@192.168.0.[0-9]+$
@@ -34,13 +35,13 @@
^user@host$
</pre>
- -<p>For the stable distribution (woody) this problem has been fixed in
- -version 4.1.1-3.1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.1.1-3.1.</p>
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 4.2.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.2.1-1.</p>
- -<p>We recommend that you upgrade your hylafax packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? hylafax.</p>
</define-tag>
# do not modify the following line
- --- english/security/2005/dsa-728.wml 2006-12-06 19:23:28.000000000 +0500
+++ russian/security/2005/dsa-728.wml 2016-08-26 13:46:32.601908790 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>missing privilege release</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие Ñ?бÑ?оÑ?а пÑ?ивилегий</define-tag>
<define-tag moreinfo>
- -<p>This advisory does only cover updated packages for Debian 3.0
- -alias woody. For reference below is the original advisory text:</p>
+<p>Ð?аннаÑ? Ñ?екомендаÑ?иÑ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко обновлÑ?ннÑ?Ñ? пакеÑ?ов длÑ? Debian 3.0,
+кодовое имÑ? woody. Ð?иже пÑ?иводиÑ?Ñ?Ñ? Ñ?екÑ?Ñ? изнаÑ?алÑ?но Ñ?екомендаÑ?ии:</p>
<blockquote>
- -<p>Two bugs have been discovered in qpopper, an enhanced Post Office
- -Protocol (POP3) server. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? qpopper, Ñ?аÑ?Ñ?иÑ?енном Ñ?еÑ?веÑ?е POP3, бÑ?ли обнаÑ?Ñ?женÑ? две
+оÑ?ибки. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1151">CAN-2005-1151</a>
- - <p>Jens Steube discovered that while processing local files owned or
- - provided by a normal user privileges weren't dropped, which could
- - lead to the overwriting or creation of arbitrary files as root.</p>
+ <p>Ð?енÑ? ШÑ?ойбе обнаÑ?Ñ?жил, Ñ?Ñ?о в Ñ?оде обÑ?абоÑ?ки локалÑ?нÑ?Ñ? Ñ?айлов, владелÑ?Ñ?ем коÑ?оÑ?Ñ?Ñ? Ñ?влÑ?еÑ?Ñ?Ñ?
+ обÑ?Ñ?нÑ?й полÑ?зоваÑ?елÑ?, либо они пÑ?едоÑ?Ñ?авленÑ? обÑ?Ñ?нÑ?м полÑ?зоваÑ?елем, пÑ?ивилегии не Ñ?бÑ?аÑ?Ñ?ваÑ?Ñ?Ñ?Ñ?, Ñ?Ñ?о можеÑ?
+ пÑ?иводиÑ?Ñ? к пеÑ?езапиÑ?и и Ñ?озданиÑ? пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов оÑ? лиÑ?а Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.</p>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1152">CAN-2005-1152</a>
- - <p>The upstream developers noticed that qpopper could be tricked to
- - creating group- or world-writable files.</p>
+ <p>РазÑ?абоÑ?Ñ?ики оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки замеÑ?или, Ñ?Ñ?о Ñ? помоÑ?Ñ?Ñ? qpopper можно
+ Ñ?оздаÑ?Ñ? Ñ?айлÑ?, оÑ?кÑ?Ñ?Ñ?Ñ?е длÑ? запиÑ?и гÑ?Ñ?ппе или вÑ?ем полÑ?зоваÑ?елÑ?м.</p>
</ul>
</blockquote>
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 4.0.4-2.woody.5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.0.4-2.woody.5.</p>
- -<p>For the testing distribution (sarge) these problems have been fixed in
- -version 4.0.5-4sarge1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.0.5-4sarge1.</p>
- -<p>For the unstable distribution (sid) these problems will be fixed in
- -version 4.0.5-4sarge1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.0.5-4sarge1.</p>
- -<p>We recommend that you upgrade your qpopper package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? qpopper.</p>
</define-tag>
# do not modify the following line
- --- english/security/2005/dsa-752.wml 2011-05-26 16:05:44.000000000 +0600
+++ russian/security/2005/dsa-752.wml 2016-08-26 13:50:19.166186008 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Two problems have been discovered in gzip, the GNU compression
- -utility. The Common Vulnerabilities and Exposures project identifies
- -the following problems.</p>
+<p>Ð? gzip, Ñ?Ñ?илиÑ?е Ñ?жаÑ?иÑ? оÑ? GNU, бÑ?ли обнаÑ?Ñ?женÑ? две
+пÑ?облемÑ?. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?.</p>
<ul>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988">CAN-2005-0988</a>
- - <p>Imran Ghory discovered a race condition in the permissions setting
- - code in gzip. When decompressing a file in a directory an
- - attacker has access to, gunzip could be tricked to set the file
- - permissions to a different file the user has permissions to.</p>
+ <p>Ð?мÑ?ан Ð?оÑ?и обнаÑ?Ñ?жил Ñ?оÑ?Ñ?оÑ?ние гонки в коде Ñ?Ñ?Ñ?ановки пÑ?ав доÑ?Ñ?Ñ?па
+ в gzip. Ð?Ñ?и Ñ?аÑ?паковке Ñ?айла в каÑ?алог, к коÑ?оÑ?омÑ? имееÑ?
+ доÑ?Ñ?Ñ?п злоÑ?мÑ?Ñ?ленник, gunzip можеÑ? Ñ?Ñ?Ñ?ановиÑ?Ñ? пÑ?ава доÑ?Ñ?Ñ?па длÑ?
+ дÑ?Ñ?гого Ñ?айла, к коÑ?оÑ?омÑ? имееÑ? доÑ?Ñ?Ñ?п дÑ?Ñ?гой полÑ?зоваÑ?елÑ?.</p>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228">CAN-2005-1228</a>
- - <p>Ulf Härnhammar discovered a path traversal vulnerability in
- - gunzip. When gunzip is used with the -N option an attacker could
- - use
- - this vulnerability to create files in an arbitrary directory with
- - the permissions of the user.</p>
+ <p>УлÑ?Ñ? Ð¥Ñ?Ñ?нÑ?аммаÑ? обнаÑ?Ñ?жил обÑ?од пÑ?Ñ?и в
+ gunzip. Ð?Ñ?ли gunzip иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? Ñ? опÑ?ией -N, злоÑ?мÑ?Ñ?ленник можеÑ?
+ иÑ?полÑ?зоваÑ?Ñ?
+ даннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? Ñ?озданиÑ? Ñ?айлов в пÑ?оизволÑ?нÑ?Ñ? каÑ?алогаÑ? Ñ?
+ пÑ?авами полÑ?зоваÑ?елÑ?.</p>
</ul>
- -<p>For the oldstable distribution (woody) these problems have been fixed in
- -version 1.3.2-3woody5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.2-3woody5.</p>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.3.5-10.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.5-10.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.3.5-10.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.5-10.</p>
- -<p>We recommend that you upgrade your gzip package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? gzip.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=olsf
-----END PGP SIGNATURE-----
Reply to: