[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{897,695,846}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-695.wml	2005-03-22 01:44:24.000000000 +0500
+++ russian/security/2005/dsa-695.wml	2016-08-29 13:03:08.095998731 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>buffer overflow, input sanitising, integer overflow</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а, оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ?, пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in xli, an image viewer
- -for X11.  The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? xli, пÑ?оÑ?моÑ?Ñ?Ñ?ике изобÑ?ажений длÑ? X11, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0775";>CAN-2001-0775</a>
 
- -    <p>A buffer overflow in the decoder for FACES format images could be
- -    exploited by an attacker to execute arbitrary code.  This problem
- -    has already been fixed in xloadimage in
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в декодеÑ?е изобÑ?ажений в Ñ?оÑ?маÑ?е FACES можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленником длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.  ЭÑ?а пÑ?облема
+    Ñ?же бÑ?ла иÑ?пÑ?авлена в xloadimage в
     <a href="../2001/dsa-069">DSA 069</a>.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0638";>CAN-2005-0638</a>
 
- -    <p>Tavis Ormandy of the Gentoo Linux Security Audit Team has reported
- -    a flaw in the handling of compressed images, where shell
- -    meta-characters are not adequately escaped.</p>
+    <p>ТÑ?виÑ? Ð?Ñ?манди из командÑ? аÑ?диÑ?а безопаÑ?ноÑ?Ñ?и Gentoo Linux Ñ?ообÑ?ил
+    об Ñ?Ñ?звимоÑ?Ñ?и в коде обÑ?абоÑ?ки Ñ?жаÑ?Ñ?Ñ? изобÑ?ажений, пÑ?и коÑ?оÑ?ой
+    меÑ?аÑ?имволÑ? командной оболоÑ?ки Ñ?кÑ?аниÑ?Ñ?Ñ?Ñ?Ñ?Ñ? недоÑ?Ñ?аÑ?оÑ?нÑ?м обÑ?азом.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0639";>CAN-2005-0639</a>
 
- -    <p>Insufficient validation of image properties in have been
- -    discovered which could potentially result in buffer management
- -    errors.</p>
+    <p>Ð?Ñ?ла обнаÑ?Ñ?женÑ? недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка Ñ?войÑ?Ñ?в изобÑ?ажениÑ?,
+    коÑ?оÑ?аÑ? поÑ?енÑ?иалÑ?но можеÑ? пÑ?иводиÑ?Ñ? к оÑ?ибкам в Ñ?пÑ?авлении
+    бÑ?Ñ?еÑ?ом.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 1.17.0-11woody1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.17.0-11woody1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.17.0-18.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.17.0-18.</p>
 
- -<p>We recommend that you upgrade your xli package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? xli.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-846.wml	2005-10-07 21:51:35.000000000 +0600
+++ russian/security/2005/dsa-846.wml	2016-08-29 13:07:55.579840313 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in cpio, a program to manage
- -archives of files.  The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? cpio, пÑ?огÑ?амме длÑ? Ñ?абоÑ?Ñ? Ñ? аÑ?Ñ?ивами Ñ?айлов, бÑ?ли обнаÑ?Ñ?женÑ? две
+Ñ?Ñ?звимоÑ?Ñ?и.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1111";>CAN-2005-1111</a>
 
- -    <p>Imran Ghory discovered a race condition in setting the file
- -    permissions of files extracted from cpio archives.  A local
- -    attacker with write access to the target directory could exploit
- -    this to alter the permissions of arbitrary files the extracting
- -    user has write permissions for.</p></li>
+    <p>Ð?мÑ?ан Ð?оÑ?и обнаÑ?Ñ?жил Ñ?оÑ?Ñ?оÑ?ние гонки в коде Ñ?Ñ?Ñ?ановки пÑ?ав доÑ?Ñ?Ñ?па
+    к Ñ?айлам, Ñ?аÑ?пакованнÑ?м из аÑ?Ñ?ивов cpio.  Ð?окалÑ?нÑ?й
+    злоÑ?мÑ?Ñ?ленник, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п Ñ? пÑ?авами на запиÑ?Ñ? в Ñ?елевой каÑ?алог, можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+    Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? изменениÑ? пÑ?ав доÑ?Ñ?Ñ?па пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов, пÑ?ава на запиÑ?Ñ? в коÑ?оÑ?Ñ?е имееÑ?
+    полÑ?зоваÑ?елÑ? вÑ?полнÑ?Ñ?Ñ?ий Ñ?аÑ?паковкÑ?.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1229";>CAN-2005-1229</a>
 
- -    <p>Imran Ghory discovered that cpio does not sanitise the path of
- -    extracted files even if the --no-absolute-filenames option was
- -    specified.  This can be exploited to install files in arbitrary
- -    locations where the extracting user has write permissions to.</p></li>
+    <p>Ð?мÑ?ан Ð?оÑ?и обнаÑ?Ñ?жил, Ñ?Ñ?о cpio не вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? пÑ?Ñ?и
+    Ñ?аÑ?пакованнÑ?Ñ? Ñ?айлов даже в Ñ?лÑ?Ñ?ае иÑ?полÑ?зовании опÑ?ии
+    --no-absolute-filenames.  ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? Ñ?Ñ?Ñ?ановки Ñ?айлов
+    в пÑ?оизволÑ?нÑ?е меÑ?Ñ?а, пÑ?ава на запиÑ?Ñ? в коÑ?оÑ?Ñ?е имееÑ? полÑ?зоваÑ?елÑ? вÑ?полнÑ?Ñ?Ñ?ий Ñ?аÑ?паковкÑ?.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 2.4.2-39woody2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.2-39woody2.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.5-1.3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5-1.3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.6-6.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6-6.</p>
 
- -<p>We recommend that you upgrade your cpio package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? cpio.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-897.wml	2012-12-17 01:12:33.000000000 +0600
+++ russian/security/2005/dsa-897.wml	2016-08-29 12:58:58.679011986 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>programming errors</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?ибки пÑ?огÑ?аммиÑ?ованиÑ?</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in phpsysinfo, a PHP
- -based host information application.  The Common Vulnerabilities and
- -Exposures project identifies the following problems: </p>
+<p>Ð? phpsysinfo, пÑ?иложении длÑ? полÑ?Ñ?ениÑ? инÑ?оÑ?маÑ?ии об Ñ?зле на Ñ?зÑ?ке PHP,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?: </p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0870";>CVE-2005-0870</a>
 
- -    <p>Maksymilian Arciemowicz discovered several cross site scripting
- -    problems, of which not all were fixed in DSA <a href="dsa-724">724</a>.</p></li>
+    <p>Ð?акÑ?имилиан Ð?Ñ?Ñ?емовиÑ? обнаÑ?Ñ?жил неÑ?колÑ?ко Ñ?лÑ?Ñ?аем межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга,
+    из коÑ?оÑ?Ñ?Ñ? не вÑ?е бÑ?ли иÑ?пÑ?авленÑ? в DSA <a href="dsa-724">724</a>.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3347";>CVE-2005-3347</a>
 
- -    <p>Christopher Kunz discovered that local variables get overwritten
- -    unconditionally and are trusted later, which could lead to the
- -    inclusion of arbitrary files.</p></li>
+    <p>Ð?Ñ?иÑ?Ñ?оÑ?еÑ? Ð?Ñ?нÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о локалÑ?нÑ?е пеÑ?еменнÑ?е могÑ?Ñ? бÑ?Ñ?Ñ? пеÑ?езапиÑ?анÑ? без
+    огÑ?аниÑ?ений, в далÑ?нейÑ?ем к ним Ñ?оÑ?Ñ?анÑ?еÑ?Ñ?Ñ? довеÑ?ие, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+    вклÑ?Ñ?ениÑ? пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3348";>CVE-2005-3348</a>
 
- -    <p>Christopher Kunz discovered that user-supplied input is used
- -    unsanitised, causing a HTTP Response splitting problem.</p></li>
+    <p>Ð?Ñ?иÑ?Ñ?оÑ?еÑ? Ð?Ñ?нÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?едаваемÑ?е полÑ?зоваÑ?елем вÑ?однÑ?Ñ? даннÑ?е иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ?
+    в неоÑ?иÑ?енном виде, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?азделениÑ? HTTP-оÑ?веÑ?ов.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 2.0-3woody3.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0-3woody3.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.3-4sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.3-4sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your phpsysinfo package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpsysinfo.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=vpEy
-----END PGP SIGNATURE-----


Reply to: