[DONE] wml://security/2008/dsa-16{29,93,47}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2008/dsa-1629.wml 2008-08-20 16:27:33.000000000 +0600
+++ russian/security/2008/dsa-1629.wml 2016-08-26 23:22:27.995010537 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>programming error</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ?</define-tag>
<define-tag moreinfo>
- -<p>Sebastian Krahmer discovered that Postfix, a mail transfer agent,
- -incorrectly checks the ownership of a mailbox. In some configurations,
- -this allows for appending data to arbitrary files as root.</p>
- -
- -<p>Note that only specific configurations are vulnerable; the default
- -Debian installation is not affected. Only a configuration meeting
- -the following requirements is vulnerable:</p>
+<p>СебаÑ?Ñ?иан Ð?Ñ?амеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Postfix, агенÑ? пеÑ?едаÑ?и Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ?,
+непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? владелÑ?Ñ?ев поÑ?Ñ?ового Ñ?Ñ?ика. Ð?Ñ?и некоÑ?оÑ?Ñ?Ñ? наÑ?Ñ?Ñ?ойкаÑ?
+Ñ?Ñ?о позволÑ?еÑ? добавлÑ?Ñ?Ñ? даннÑ?е к пÑ?оизволÑ?нÑ?м Ñ?айлам оÑ? лиÑ?а Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.</p>
+
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?олÑ?ко опÑ?еделÑ?ннÑ?е наÑ?Ñ?Ñ?ойки подвеÑ?женÑ? данной Ñ?Ñ?звимоÑ?Ñ?и; наÑ?Ñ?Ñ?ойки
+Debian по Ñ?молÑ?аниÑ? ей не подвеÑ?женÑ?. УÑ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко наÑ?Ñ?Ñ?оек, длÑ?
+коÑ?оÑ?Ñ?Ñ? вÑ?полнÑ?Ñ?Ñ?Ñ?Ñ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?ебованиÑ?:</p>
<ul>
- - <li> The mail delivery style is mailbox, with the Postfix built-in
- - local(8) or virtual(8) delivery agents.</li>
- - <li> The mail spool directory (/var/spool/mail) is user-writeable.</li>
- - <li> The user can create hardlinks pointing to root-owned symlinks
- - located in other directories.</li>
+ <li>Ð? каÑ?еÑ?Ñ?ве Ñ?поÑ?оба доÑ?Ñ?авки поÑ?Ñ?Ñ? вÑ?бÑ?ан поÑ?Ñ?овÑ?й Ñ?Ñ?ик (mailbox) Ñ?о вÑ?Ñ?Ñ?оеннÑ?ми
+ агенÑ?ами доÑ?Ñ?авки Postfix local(8) или virtual(8).</li>
+ <li>Ð?аÑ?алог подкаÑ?ки поÑ?Ñ?Ñ? (/var/spool/mail) оÑ?кÑ?Ñ?Ñ? длÑ? запиÑ?и полÑ?зоваÑ?елÑ?м.</li>
+ <li>Ð?олÑ?зоваÑ?елÑ? можеÑ? Ñ?оздаваÑ?Ñ? жÑ?Ñ?Ñ?кие Ñ?Ñ?Ñ?лки, Ñ?казÑ?ваÑ?Ñ?ие на Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки, владелÑ?Ñ?ем
+ коÑ?оÑ?Ñ?Ñ? Ñ?влÑ?еÑ?Ñ?Ñ? Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?, и коÑ?оÑ?Ñ?е Ñ?аÑ?положенÑ? в дÑ?Ñ?гиÑ? каÑ?алогаÑ?.</li>
</ul>
- -<p>For a detailed treating of the issue, please refer to the upstream
- -<a href="http://article.gmane.org/gmane.mail.postfix.announce/110">author's announcement</a>.</p>
+<p>Ð?одÑ?обное опиÑ?ание пÑ?облемÑ? Ñ?моÑ?Ñ?иÑ?е в <a href="http://article.gmane.org/gmane.mail.postfix.announce/110">
+Ñ?ообÑ?ении авÑ?оÑ?а</a> оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки.</p>
- -<p>For the stable distribution (etch), this problem has been fixed in
- -version 2.3.8-2+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.3.8-2+etch1.</p>
- -<p>For the testing distribution (lenny), this problem has been fixed in
- -version 2.5.2-2lenny1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.5.2-2lenny1.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed
- -in version 2.5.4-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 2.5.4-1.</p>
- -<p>We recommend that you upgrade your postfix package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? postfix.</p>
</define-tag>
# do not modify the following line
- --- english/security/2008/dsa-1647.wml 2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1647.wml 2016-08-26 23:30:12.303193737 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in PHP, a server-side,
- -HTML-embedded scripting language. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? PHP, Ñ?еÑ?веÑ?ном Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев Ñ?о вÑ?Ñ?Ñ?оенной поддеÑ?жкой HTML, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3658">CVE-2008-3658</a>
- - <p>Buffer overflow in the imageloadfont function allows a denial
- - of service or code execution through a crafted font file.</p></li>
+ <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии imageloadfont позволÑ?еÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+ в обÑ?лÑ?живании или вÑ?полнÑ?Ñ?Ñ? код пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла Ñ?Ñ?иÑ?Ñ?ов.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3659">CVE-2008-3659</a>
- - <p>Buffer overflow in the memnstr function allows a denial of
- - service or code execution via a crafted delimiter parameter
- - to the explode function.</p></li>
+ <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии memnstr позволÑ?еÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+ в обÑ?лÑ?живании или вÑ?полнÑ?Ñ?Ñ? код пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного паÑ?амеÑ?Ñ?а огÑ?аниÑ?ениÑ?
+ длÑ? Ñ?Ñ?нкÑ?ии explode.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3660">CVE-2008-3660</a>
- - <p>Denial of service is possible in the FastCGI module by a
- - remote attacker by making a request with multiple dots
- - before the extension.</p></li>
+ <p>Ð?озможен оÑ?каз в обÑ?лÑ?живании в модÑ?ле FastCGI, еÑ?ли
+ Ñ?далÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник делаеÑ? запÑ?оÑ? Ñ? болÑ?Ñ?им колиÑ?еÑ?Ñ?вом Ñ?оÑ?ек
+ пеÑ?ед Ñ?аÑ?Ñ?иÑ?ением.</p></li>
</ul>
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 5.2.0-8+etch13.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.2.0-8+etch13.</p>
- -<p>For the testing (lenny) and unstable distribution (sid), these problems
- -have been fixed in version 5.2.6-4.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (lenny) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и пÑ?облемÑ?
+бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 5.2.6-4.</p>
- -<p>We recommend that you upgrade your php5 package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? php5.</p>
</define-tag>
# do not modify the following line
- --- english/security/2008/dsa-1693.wml 2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1693.wml 2016-08-26 23:25:57.945557707 +0500
@@ -1,9 +1,10 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
<p>
- -Several remote vulnerabilities have been discovered in phpPgAdmin, a tool
- -to administrate PostgreSQL database over the web. The Common
- -Vulnerabilities and Exposures project identifies the following problems:
+Ð? phpPgAdmin, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? базÑ? даннÑ?Ñ? PostgreSQL Ñ?еÑ?ез веб, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:
</p>
<ul>
@@ -11,38 +12,38 @@
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2865">CVE-2007-2865</a>
<p>
- - Cross-site scripting vulnerability allows remote attackers to inject
- - arbitrary web script or HTML via the server parameter.
+ Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ?
+ пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?а Ñ?еÑ?веÑ?а.
</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5728">CVE-2007-5728</a>
<p>
- - Cross-site scripting vulnerability allows remote attackers to inject
- - arbitrary web script or HTML via PHP_SELF.
+ Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ?
+ пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? PHP_SELF.
</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-5587">CVE-2008-5587</a>
<p>
- - Directory traversal vulnerability allows remote attackers to read
- - arbitrary files via _language parameter.
+ Ð?бÑ?од каÑ?алога позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ?
+ пÑ?оизволÑ?нÑ?е Ñ?айлÑ? Ñ? помоÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?а _language.
</p></li>
</ul>
<p>
- -For the stable distribution (etch), these problems have been fixed in
- -version 4.0.1-3.1etch2.
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.0.1-3.1etch2.
</p>
<p>
- -For the unstable distribution (sid), these problems have been fixed in
- -version 4.2.1-1.1.
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.2.1-1.1.
</p>
<p>
- -We recommend that you upgrade your phppgadmin package.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phppgadmin.
</p>
</define-tag>
-----BEGIN PGP SIGNATURE-----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=IVDF
-----END PGP SIGNATURE-----
Reply to: