[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{549,616,453}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1453.wml	2014-04-30 13:16:14.000000000 +0600
+++ russian/security/2008/dsa-1453.wml	2016-08-26 23:15:09.256492645 +0500
@@ -1,9 +1,10 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 <p>
- -Several remote vulnerabilities have been discovered in the Tomcat
- -servlet and JSP engine. The Common Vulnerabilities and Exposures project
- -identifies the following problems:
+Ð? Ñ?еÑ?влеÑ?е Tomcat и движке JSP бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:
 </p>
 
 <ul>
@@ -11,41 +12,41 @@
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3382";>CVE-2007-3382</a>
 
     <p>
- -    It was discovered that single quotes (') in cookies were treated
- -    as a delimiter, which could lead to an information leak.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о одиноÑ?нÑ?е кавÑ?Ñ?ки (') в кÑ?ки Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ?
+    Ñ?азделиÑ?елÑ?ми, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3385";>CVE-2007-3385</a>
 
     <p>
- -    It was discovered that the character sequence \" in cookies was
- -    handled incorrectly, which could lead to an information leak.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о поÑ?ледоваÑ?елÑ?ноÑ?Ñ?Ñ? Ñ?имволов \" в кÑ?ки
+    обÑ?абаÑ?Ñ?ваеÑ?Ñ?Ñ? непÑ?авилÑ?но, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5461";>CVE-2007-5461</a>
 
     <p>
- -    It was discovered that the WebDAV servlet is vulnerable to absolute
- -    path traversal.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?еÑ?влеÑ? WebDAV Ñ?Ñ?звим к изменениÑ?
+    каÑ?алога.
     </p></li>
 
 </ul>
 
 <p>
- -The old stable distribution (sarge) doesn't contain tomcat5.
+Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ?Ñ? tomcat5 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.
 </p>
 
 <p>
- -For the stable distribution (etch), these problems have been fixed in
- -version 5.0.30-12etch1.
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.0.30-12etch1.
 </p>
 
 <p>
- -The unstable distribution (sid) no longer contains tomcat5.
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) пакеÑ?Ñ? tomcat5 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.
 </p>
 
 <p>
- -We recommend that you upgrade your tomcat5 packages.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tomcat5.
 </p>
 
 </define-tag>
- --- english/security/2008/dsa-1549.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1549.wml	2016-08-26 23:03:30.470933656 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Clam anti-virus
- -toolkit. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? набоÑ? анÑ?ивиÑ?Ñ?Ñ?нÑ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?ов Clam бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0314";>CVE-2008-0314</a>
 
- -    <p>Damian Put discovered that a buffer overflow in the handler for
- -    PeSpin binaries may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?амиан Ð?Ñ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в обÑ?абоÑ?Ñ?ике
+    двоиÑ?нÑ?Ñ? Ñ?айлов PeSpin можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1100";>CVE-2008-1100</a>
 
- -    <p>Alin Rad Pop discovered that a buffer overflow in the handler for
- -    Upack PE binaries may lead to the execution of arbitrary code.</p>
+    <p>Ð?лин Рад Ð?оп обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в обÑ?абоÑ?Ñ?ике
+    двоиÑ?нÑ?Ñ? Ñ?айлов Upack PE можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1833";>CVE-2008-1833</a>
 
- -    <p>Damian Put and Thomas Pollet discovered that a buffer overflow in
- -    the handler for WWPack-compressed PE binaries may lead to the
- -    execution of arbitrary code.</p></li>
+    <p>Ð?амиан Ð?Ñ?Ñ? и Тома Ð?олле обнаÑ?Ñ?жили, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в
+    обÑ?абоÑ?Ñ?ике двоиÑ?нÑ?Ñ? Ñ?айлов WWPack-compressed PE можеÑ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 0.90.1dfsg-3etch11.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.90.1dfsg-3etch11.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.92.1~dfsg2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.92.1~dfsg2-1.</p>
 
- -<p>We recommend that you upgrade your clamav packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? clamav.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1616.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1616.wml	2016-08-26 23:11:32.377244380 +0500
@@ -1,29 +1,30 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>Damian Put discovered a vulnerability in the ClamAV anti-virus
- -toolkit's parsing of Petite-packed Win32 executables.  The weakness
- -leads to an invalid memory access, and could enable an attacker to
- -crash clamav by supplying a maliciously crafted Petite-compressed
- -binary for scanning.  In some configurations, such as when clamav
- -is used in combination with mail servers, this could cause a system
- -to <q>fail open</q>, facilitating a follow-on viral attack.</p>
- -
- -<p>A previous version of this advisory referenced packages that were
- -built incorrectly and omitted the intended correction.  This
- -issue was fixed in packages referenced by the -2 revision of the
- -advisory.</p>
- -
- -<p>The Common Vulnerabilities and Exposures project identifies this
- -weakness as <a href="https://security-tracker.debian.org/tracker/CVE-2008-2713";>CVE-2008-2713</a>
- -and <a href="https://security-tracker.debian.org/tracker/CVE-2008-3215";>CVE-2008-3215</a>.</p>
+<p>Ð?амиан Ð?Ñ?Ñ? обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в коде обÑ?абоÑ?ки иÑ?полнÑ?емÑ?Ñ? Ñ?айлов Win32,
+Ñ?жаÑ?Ñ?Ñ? Ñ? помоÑ?Ñ?Ñ? Petite, в набоÑ?е анÑ?ивиÑ?Ñ?Ñ?нÑ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?ов ClamAV.  ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+пÑ?иводиÑ? к непÑ?авилÑ?номÑ? доÑ?Ñ?Ñ?пÑ? к памÑ?Ñ?и и можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? clamav пÑ?Ñ?Ñ?м пеÑ?едаÑ?и длÑ? Ñ?каниÑ?ованиÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+двоиÑ?ного Ñ?айла, Ñ?жаÑ?ого Ñ? помоÑ?Ñ?Ñ? Petite.  Ð? некоÑ?оÑ?Ñ?Ñ? наÑ?Ñ?Ñ?ойкаÑ?, напÑ?имеÑ?, когда clamav
+иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? вмеÑ?Ñ?е Ñ? поÑ?Ñ?овÑ?ми Ñ?еÑ?веÑ?ами, Ñ?Ñ?о можеÑ? Ñ?делаÑ?Ñ? Ñ?иÑ?Ñ?емÑ?
+<q>аваÑ?ийно оÑ?кÑ?Ñ?Ñ?ой</q>, облегÑ?аÑ? поÑ?ледÑ?Ñ?Ñ?Ñ?Ñ? виÑ?Ñ?Ñ?нÑ?Ñ? аÑ?акÑ?.</p>
+
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ей веÑ?Ñ?ии Ñ?Ñ?ой Ñ?екомендаÑ?ии бÑ?ли пÑ?иведенÑ? Ñ?обÑ?аннÑ?е непÑ?авилÑ?но
+пакеÑ?Ñ?, иÑ?пÑ?авление бÑ?ло пÑ?опÑ?Ñ?ено.  ЭÑ?а
+пÑ?облема иÑ?пÑ?авлена в пакеÑ?аÑ?, Ñ?казаннÑ?Ñ? в Ñ?едакÑ?ии -2 наÑ?Ñ?оÑ?Ñ?ей
+Ñ?екомендаÑ?ии.</p>
+
+<p>Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?Ñ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?Ñ? как <a href="https://security-tracker.debian.org/tracker/CVE-2008-2713";>CVE-2008-2713</a>
+и <a href="https://security-tracker.debian.org/tracker/CVE-2008-3215";>CVE-2008-3215</a>.</p>
 
- -<p>For the stable distribution (etch), this problem has been fixed in
- -version 0.90.1dfsg-3.1+etch14.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.90.1dfsg-3.1+etch14.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 0.93.1.dfsg-1.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.93.1.dfsg-1.1.</p>
 
- -<p>We recommend that you upgrade your clamav packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? clamav.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=OT+v
-----END PGP SIGNATURE-----


Reply to: