[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{760,652,662}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-652.wml	2005-01-21 13:41:29.000000000 +0500
+++ russian/security/2005/dsa-652.wml	2016-08-29 12:46:01.995917443 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in unarj, a non-free ARJ
- -unarchive utility.  The Common Vulnerabilities and Exposures Project
- -identifies the following vulnerabilities:</p>
+<p>Ð? unarj, неÑ?вободной Ñ?Ñ?илиÑ?е длÑ? Ñ?азаÑ?Ñ?ивиÑ?ованиÑ? ARJ, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures Project
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947";>CAN-2004-0947</a>
 
- -    <p>A buffer overflow has been discovered when handling long file
- -    names contained in an archive.  An attacker could create a
- -    specially crafted archive which could cause unarj to crash or
- -    possibly execute arbitrary code when being extracted by a victim.</p>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено пеÑ?еполнение бÑ?Ñ?еÑ?а в коде обÑ?абоÑ?ки длиннÑ?Ñ? имÑ?н Ñ?айлов,
+    Ñ?одеÑ?жаÑ?иÑ?Ñ?Ñ? в аÑ?Ñ?иве.  Ð?лоÑ?мÑ?Ñ?ленник можеÑ? Ñ?оздаÑ?Ñ? Ñ?пеÑ?иалÑ?но
+    Ñ?Ñ?оÑ?миÑ?ованнÑ?й аÑ?Ñ?ив, Ñ?аÑ?паковка коÑ?оÑ?ого пÑ?иведÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке
+    unarj или возможномÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027";>CAN-2004-1027</a>
 
- -    <p>A directory traversal vulnerability has been found so that an
- -    attacker could create a specially crafted archive which would
- -    create files in the parent directory when being extracted by a
- -    victim.  When used recursively, this vulnerability could be used
- -    to overwrite critical system files and programs.</p>
+    <p>Ð?Ñ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?, Ñ?оÑ?Ñ?оÑ?Ñ?аÑ? в обÑ?оде каÑ?алога.
+    Ð?лоÑ?мÑ?Ñ?ленник можеÑ? Ñ?оздаÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й аÑ?Ñ?ив, пÑ?и Ñ?аÑ?паковке гоÑ?ового
+    бÑ?дÑ?Ñ? Ñ?озданÑ? Ñ?айлÑ? в Ñ?одиÑ?елÑ?Ñ?ком каÑ?алоге.  Ð?Ñ?и Ñ?екÑ?Ñ?Ñ?ивном иÑ?полÑ?зовании
+    Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ?
+    пеÑ?езапиÑ?и кÑ?иÑ?иÑ?еÑ?киÑ? Ñ?иÑ?Ñ?емнÑ?Ñ? Ñ?айлов и пÑ?огÑ?амм.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 2.43-3woody1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.43-3woody1.</p>
 
- -<p>For the unstable distribution (sid) these problems don't apply since
- -unstable/non-free does not contain the unarj package.</p>
+<p>Ð? неÑ?Ñ?абилÑ?номÑ? вÑ?пÑ?Ñ?кÑ? (sid) Ñ?Ñ?и пÑ?облемÑ? не оÑ?ноÑ?Ñ?Ñ?Ñ?Ñ?, поÑ?колÑ?кÑ?
+пакеÑ? unarj оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? в неÑ?вободном Ñ?азделе неÑ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.</p>
 
- -<p>We recommend that you upgrade your unarj package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? unarj.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-662.wml	2011-05-26 16:05:43.000000000 +0600
+++ russian/security/2005/dsa-662.wml	2016-08-29 12:52:12.220178084 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Andrew Archibald discovered that the last update to squirrelmail which
- -was intended to fix several problems caused a regression which got
- -exposed when the user hits a session timeout.  For completeness below
- -is the original advisory text:</p>
+<p>ЭндÑ?Ñ? Ð?Ñ?Ñ?ибалÑ?д обнаÑ?Ñ?жил, Ñ?Ñ?о поÑ?леднее обновление squirrelmail,
+пÑ?едназнаÑ?авÑ?ееÑ?Ñ? длÑ? иÑ?пÑ?авлениÑ? неÑ?колÑ?киÑ? пÑ?облем, вÑ?звало Ñ?егÑ?еÑ?Ñ?иÑ?, коÑ?оÑ?аÑ? возникаеÑ?
+в Ñ?лÑ?Ñ?ае, когда полÑ?зоваÑ?елÑ? доÑ?Ñ?игаеÑ? оконÑ?аниÑ? Ñ?Ñ?ока Ñ?еÑ?Ñ?ии.  Ð?лÑ? полноÑ?Ñ? ниже
+пÑ?иводиÑ?Ñ?Ñ? оÑ?игиналÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Several vulnerabilities have been discovered in Squirrelmail, a
- -commonly used webmail system.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Squirrelmail, Ñ?иÑ?око иÑ?полÑ?зÑ?емой Ñ?иÑ?Ñ?еме веб-поÑ?Ñ?Ñ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0104";>CAN-2005-0104</a>
 
- -    <p>Upstream developers noticed that an unsanitised variable could
- -    lead to cross site scripting.</p>
+    <p>РазÑ?абоÑ?Ñ?ики оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки замеÑ?или, Ñ?Ñ?о неоÑ?иÑ?еннаÑ? пеÑ?еменнаÑ? можеÑ?
+    пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0152";>CAN-2005-0152</a>
 
- -    <p>Grant Hollingworth discovered that under certain circumstances URL
- -    manipulation could lead to the execution of arbitrary code with
- -    the privileges of www-data.  This problem only exists in version
- -    1.2.6 of Squirrelmail.</p>
+    <p>Ð?Ñ?анÑ? ХоллингвоÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?и опÑ?еделÑ?ннÑ?Ñ? Ñ?Ñ?ловиÑ?Ñ? опеÑ?иÑ?ование Ñ? URL
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода Ñ?
+    пÑ?авами полÑ?зоваÑ?елÑ? www-data.  ЭÑ?а пÑ?облема пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? Ñ?олÑ?ко в веÑ?Ñ?ии
+    1.2.6 пакеÑ?а Squirrelmail.</p>
 
 </ul>
 </blockquote>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 1.2.6-3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.6-3.</p>
 
- -<p>For the unstable distribution (sid) the problem that affects unstable
- -has been fixed in version 1.4.4-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) пÑ?облема, каÑ?аÑ?Ñ?аÑ?Ñ?Ñ? неÑ?Ñ?абилÑ?ного
+вÑ?пÑ?Ñ?ка, бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 1.4.4-1.</p>
 
- -<p>We recommend that you upgrade your squirrelmail package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? squirrelmail.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-760.wml	2005-07-18 23:36:13.000000000 +0600
+++ russian/security/2005/dsa-760.wml	2016-08-29 12:40:18.803426528 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in ekg, a console Gadu
- -Gadu client, an instant messaging program.  The Common Vulnerabilities
- -and Exposures project identifies the following vulnerabilities:</p>
+<p>Ð? ekg, конÑ?олÑ?ном клиенÑ?е Gadu Gadu, пÑ?огÑ?амме длÑ? мгновенного обмена
+Ñ?ообÑ?ениÑ?ми, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1850";>CAN-2005-1850</a>
 
- -    <p>Marcin Owsiany and Wojtek Kaniewski discovered insecure temporary
- -    file creation in contributed scripts.</p>
+    <p>Ð?аÑ?Ñ?ин Ð?вÑ?Ñ?нÑ? и Ð?ойÑ?ек Ð?аневÑ?кий обнаÑ?Ñ?жили небезопаÑ?ное Ñ?оздание вÑ?еменного
+    Ñ?айла в Ñ?опÑ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ? Ñ?Ñ?енаÑ?иÑ?Ñ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1851";>CAN-2005-1851</a>
 
- -    <p>Marcin Owsiany and Wojtek Kaniewski discovered potential shell
- -    command injection in a contributed script.</p>
+    <p>Ð?аÑ?Ñ?ин Ð?вÑ?Ñ?нÑ? и Ð?ойÑ?ек Ð?аневÑ?кий обнаÑ?Ñ?жили поÑ?енÑ?иалÑ?нÑ?Ñ? инÑ?екÑ?иÑ? команд
+    командной оболоÑ?ки в Ñ?опÑ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?ем Ñ?Ñ?енаÑ?ии.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1916";>CAN-2005-1916</a>
 
- -    <p>Eric Romang discovered insecure temporary file creation and
- -    arbitrary command execution in a contributed script that can be
- -    exploited by a local attacker.</p>
+    <p>ЭÑ?ик Роман обнаÑ?Ñ?жил небезопаÑ?ное Ñ?оздание вÑ?еменного Ñ?айла и
+    вÑ?полнение пÑ?оизволÑ?ной командÑ? в Ñ?опÑ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?ем Ñ?Ñ?енаÑ?ии, коÑ?оÑ?Ñ?е могÑ?Ñ?
+    иÑ?полÑ?зоваÑ?Ñ? локалÑ?нÑ?ми злоÑ?мÑ?Ñ?ленниками.</p>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain an ekg package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ? ekg оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.5+20050411-4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5+20050411-4.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.5+20050712+1.6rc2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5+20050712+1.6rc2-1.</p>
 
- -<p>We recommend that you upgrade your ekg package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? ekg.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=eBNb
-----END PGP SIGNATURE-----


Reply to: