[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{684,573,557}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1557.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1557.wml	2016-08-27 00:06:14.353194380 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>insufficient input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>недоÑ?Ñ?аÑ?оÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in phpMyAdmin,
- -an application to administrate MySQL over the WWW. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? phpMyAdmin, пÑ?иложении длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL Ñ?еÑ?ез WWW, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1924";>CVE-2008-1924</a>
 
- -    <p>Attackers with CREATE table permissions were allowed to read
- -    arbitrary files readable by the webserver via a crafted
- -    HTTP POST request.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленники, имеÑ?Ñ?ие пÑ?ава на вÑ?полнение CREATE, могÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ?
+    пÑ?оизволÑ?нÑ?е Ñ?айлÑ?, оÑ?кÑ?Ñ?Ñ?Ñ?е длÑ? Ñ?Ñ?ениÑ? веб-Ñ?еÑ?веÑ?Ñ?, Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+    Ñ?Ñ?оÑ?миÑ?ованного HTTP POST-запÑ?оÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1567";>CVE-2008-1567</a>
 
- -    <p>The PHP session data file stored the username and password of
- -    a logged in user, which in some setups can be read by a local
- -    user.</p></li>
+    <p>Файл даннÑ?Ñ? Ñ?еÑ?Ñ?ии PHP Ñ?Ñ?аниÑ? имÑ? полÑ?зоваÑ?елÑ? и паÑ?олÑ?
+    воÑ?едÑ?его полÑ?зоваÑ?елÑ?, пÑ?и некоÑ?оÑ?Ñ?Ñ? наÑ?Ñ?Ñ?ойкаÑ? Ñ?Ñ?оÑ? Ñ?айл можеÑ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ?Ñ?Ñ?
+    локалÑ?нÑ?м полÑ?зоваÑ?елем.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1149";>CVE-2008-1149</a>
 
- -    <p>Cross site scripting and SQL injection were possible by attackers
- -    that had permission to create cookies in the same cookie domain
- -    as phpMyAdmin runs in.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленники, имеÑ?Ñ?ие пÑ?ава на Ñ?оздание кÑ?ки в Ñ?ом же домене
+    кÑ?ки, Ñ?Ñ?о и phpMyAdmin, могÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг и
+    SQL-инÑ?екÑ?ии.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 4:2.9.1.1-7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:2.9.1.1-7.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 4:2.11.5.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:2.11.5.2-1.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1573.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1573.wml	2016-08-27 00:01:18.024636126 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in rdesktop, a
- -Remote Desktop Protocol client. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? rdesktop, клиенÑ?е пÑ?оÑ?окола Ñ?далÑ?нного Ñ?абоÑ?его Ñ?Ñ?ола, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1801";>CVE-2008-1801</a>
 
- -    <p>Remote exploitation of an integer underflow vulnerability allows
- -    attackers to execute arbitrary code with the privileges of the
- -    logged-in user.</p></li>
+    <p>УдалÑ?нное иÑ?полÑ?зование оÑ?Ñ?иÑ?аÑ?елÑ?ного пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел позволÑ?еÑ?
+    злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? пÑ?авами
+    воÑ?едÑ?его полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1802";>CVE-2008-1802</a>
 
- -    <p>Remote exploitation of a BSS overflow vulnerability allows
- -    attackers to execute arbitrary code with the privileges of the
- -    logged-in user.</p></li>
+    <p>УдалÑ?нное иÑ?полÑ?зование пеÑ?еполнениÑ? BSS позволÑ?еÑ?
+    злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? пÑ?авами
+    воÑ?едÑ?его полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1803";>CVE-2008-1803</a>
 
- -    <p>Remote exploitation of an integer signedness vulnerability allows
- -    attackers to execute arbitrary code with the privileges of the
- -    logged-in user.</p></li>
+    <p>УдалÑ?нное иÑ?полÑ?зование оÑ?ибки знака Ñ?елÑ?Ñ? Ñ?иÑ?ел позволÑ?еÑ?
+    злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? пÑ?авами
+    воÑ?едÑ?его полÑ?зоваÑ?елÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.5.0-1etch2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5.0-1etch2.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.5.0-4+cvs20071006.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5.0-4+cvs20071006.</p>
 
- -<p>We recommend that you upgrade your rdesktop package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? rdesktop.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1684.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1684.wml	2016-08-26 23:57:22.092272461 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities have been found in lcms, a library and set of
- -commandline utilities for image color management.  The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? lcms, библиоÑ?еке и набоÑ?е Ñ?Ñ?илиÑ? командной Ñ?Ñ?Ñ?оки длÑ? Ñ?пÑ?авлениÑ?
+Ñ?веÑ?ами изобÑ?ажениÑ?, бÑ?ли обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-5316";>CVE-2008-5316</a>
 
- -    <p>Inadequate enforcement of fixed-length buffer limits allows an
- -    attacker to overflow a buffer on the stack, potentially enabling
- -    the execution of arbitrary code when a maliciously-crafted
- -    image is opened.</p></li>
+    <p>Ð?еадекваÑ?наÑ? Ñ?Ñ?Ñ?ановка огÑ?аниÑ?ений длÑ? бÑ?Ñ?еÑ?ов Ñ? Ñ?икÑ?иÑ?ованной длиной позволÑ?еÑ?
+    злоÑ?мÑ?Ñ?ленникÑ? вÑ?зваÑ?Ñ? пеÑ?еполнение бÑ?Ñ?еÑ?а, поÑ?енÑ?иалÑ?но даваÑ?
+    вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код пÑ?и оÑ?кÑ?Ñ?Ñ?ии Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+    изобÑ?ажениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVS-2008-5317";>CVS-2008-5317</a>
 
- -    <p>An integer sign error in reading image gamma data could allow an
- -    attacker to cause an under-sized buffer to be allocated for
- -    subsequent image data, with unknown consequences potentially
- -    including the execution of arbitrary code if a maliciously-crafted
- -    image is opened.</p></li>
+    <p>Ð?Ñ?ибка знака Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде Ñ?Ñ?ениÑ? даннÑ?Ñ? о гамме изобÑ?ажениÑ? можеÑ? позволиÑ?Ñ?
+    злоÑ?мÑ?Ñ?ленникÑ? вÑ?зваÑ?Ñ? вÑ?деление поÑ?ледÑ?Ñ?Ñ?им даннÑ?м изобÑ?ажениÑ? Ñ?лиÑ?ком
+    маленÑ?кого бÑ?Ñ?еÑ?а, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к неизвеÑ?Ñ?нÑ?м поÑ?ледÑ?Ñ?виÑ?м, поÑ?енÑ?иалÑ?но
+    вклÑ?Ñ?аÑ?Ñ?им в Ñ?ебÑ? вÑ?полнение пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае оÑ?кÑ?Ñ?Ñ?иÑ? Ñ?пеÑ?иалÑ?но
+    Ñ?Ñ?оÑ?миÑ?ованного изобÑ?ажениÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.15-1.1+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.15-1.1+etch1.</p>
 
- -<p>For the upcoming stable distribution (lenny), and the unstable
- -distribution (sid), these problems are fixed in version 1.17.dfsg-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (lenny) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.17.dfsg-1.</p>
 
- -<p>We recommend that you upgrade your lcms packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? lcms.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Es4q
-----END PGP SIGNATURE-----


Reply to: