[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-2{131,014,113}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-2014.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2014.wml	2016-09-02 22:33:46.521955915 +0500
@@ -1,45 +1,46 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in moin, a python clone of
- -WikiWiki.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? moin, клоне WikiWiki на Ñ?зÑ?ке Python, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0668";>CVE-2010-0668</a>
 
- -<p>Multiple security issues in MoinMoin related to configurations that have
- -a non-empty superuser list, the xmlrpc action enabled, the SyncPages
- -action enabled, or OpenID configured.</p></li>
+<p>Ð?ногоÑ?иÑ?леннÑ?е пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и в MoinMoin, Ñ?вÑ?заннÑ?е Ñ? наÑ?Ñ?Ñ?ойками, Ñ?одеÑ?жаÑ?ими
+непÑ?Ñ?Ñ?ой Ñ?пиÑ?ок Ñ?Ñ?пеÑ?полÑ?зоваÑ?елей, вклÑ?Ñ?Ñ?ннÑ?е дейÑ?Ñ?виÑ? xmlrpc, вклÑ?Ñ?Ñ?ннÑ?е дейÑ?Ñ?ви
+SyncPages, или наÑ?Ñ?Ñ?оеннÑ?й OpenID.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0669";>CVE-2010-0669</a>
 
- -<p>MoinMoin does not properly sanitize user profiles.</p></li>
+<p>MoinMoin непÑ?авилÑ?но вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? пÑ?оÑ?илей полÑ?зоваÑ?елей.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0717";>CVE-2010-0717</a>
 
- -<p>The default configuration of cfg.packagepages_actions_excluded in MoinMoin
- -does not prevent unsafe package actions.</p></li>
+<p>Ð?аÑ?Ñ?Ñ?ойка cfg.packagepages_actions_excluded в MoinMoin по Ñ?молÑ?аниÑ?
+не пÑ?едоÑ?вÑ?аÑ?аеÑ? небезопаÑ?нÑ?е пакеÑ?нÑ?е дейÑ?Ñ?виÑ?.</p></li>
 
 </ul>
 
- -<p>In addition, this update fixes an error when processing hierarchical ACLs,
- -which can be exploited to access restricted sub-pages.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? оÑ?ибкÑ?, возникаÑ?Ñ?Ñ?Ñ? пÑ?и обÑ?абоÑ?ке иеÑ?аÑ?Ñ?иÑ?нÑ?Ñ? ACL,
+Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? полÑ?Ñ?ениÑ? доÑ?Ñ?Ñ?па к подÑ?Ñ?Ñ?аниÑ?ам.</p>
 
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.7.1-3+lenny3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.7.1-3+lenny3.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.9.2-1, and will migrate to the testing distribution (squeeze)
- -shortly.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.2-1, в Ñ?коÑ?ом вÑ?емени Ñ?Ñ?а веÑ?Ñ?иÑ? пеÑ?ейдÑ?Ñ? в Ñ?еÑ?Ñ?иÑ?Ñ?емÑ?й
+вÑ?пÑ?Ñ?к (squeeze).</p>
 
 
- -<p>We recommend that you upgrade your moin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? moin.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2113.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2113.wml	2016-09-02 22:39:18.454995427 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been discovered in Drupal 6 a fully-featured
- -content management framework. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Drupal 6, полноÑ?Ñ?нкÑ?ионалÑ?ной инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е Ñ?пÑ?авлениÑ? Ñ?одеÑ?жимÑ?м, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 
 <ul>
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3091";>CVE-2010-3091</a>
 
- -<p>Several issues have been discovered in the OpenID module that allows
- -malicious access to user accounts.</p>
+<p>Ð? модÑ?ле OpenID бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем, позволÑ?Ñ?Ñ?иÑ?
+злоÑ?мÑ?Ñ?ленникам полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п к Ñ?Ñ?Ñ?Ñ?нÑ?м запиÑ?Ñ?м полÑ?зоваÑ?елей.</p>
 </li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3092";>CVE-2010-3092</a>
 
- -<p>The upload module includes a potential bypass of access restrictions due
- -to not checking letter case-sensitivity.</p></li>
+<p>Ð?одÑ?лÑ? загÑ?Ñ?зки Ñ?одеÑ?жиÑ? поÑ?енÑ?иалÑ?нÑ?й обÑ?од огÑ?аниÑ?ений доÑ?Ñ?Ñ?па из-за Ñ?ого, Ñ?Ñ?о
+в нÑ?м не пÑ?оводиÑ?Ñ?Ñ? пÑ?овеÑ?ка Ñ?егиÑ?Ñ?Ñ?а бÑ?кв.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3093";>CVE-2010-3093</a>
 
- -<p>The comment module has a privilege escalation issue that allows certain
- -users to bypass limitations.</p></li>
+<p>Ð?одÑ?лÑ? комменÑ?иÑ?ованиÑ? Ñ?одеÑ?жиÑ? пÑ?облемÑ?, Ñ?вÑ?заннÑ?Ñ? Ñ? повÑ?Ñ?ением пÑ?ивилегий, коÑ?оÑ?аÑ? позволÑ?еÑ?
+опÑ?еделÑ?ннÑ?м полÑ?зоваÑ?елÑ?м обÑ?одиÑ?Ñ? огÑ?аниÑ?ениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3094";>CVE-2010-3094</a>
 
- -<p>Several cross-site scripting (XSS) issues have been discovered in the
- -Action feature.</p></li>
+<p>Ð? возможноÑ?Ñ?и Action бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?лÑ?Ñ?аев
+межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга (XSS).</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 6.6-3lenny6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 6.6-3lenny6.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems have been fixed in version 6.18-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 6.18-1.</p>
 
- -<p>We recommend that you upgrade your drupal6 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? drupal6.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2131.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2131.wml	2016-09-02 22:27:31.579623853 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>arbitrary code execution</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>вÑ?полнение пÑ?оизволÑ?ного кода</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in exim4 that allow a remote
- -attacker to execute arbitrary code as root user. Exploits for these
- -issues have been seen in the wild.</p>
+<p>Ð? exim4 бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е позволÑ?Ñ?Ñ? Ñ?далÑ?нномÑ?
+злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код оÑ? лиÑ?а Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?. ЭкÑ?плоиÑ?Ñ?
+длÑ? Ñ?Ñ?иÑ? пÑ?облем Ñ?же извеÑ?Ñ?нÑ?.</p>
 
- -<p>This update fixes a memory corruption issue that allows a remote
- -attacker to execute arbitrary code as the Debian-exim user
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и, позволÑ?Ñ?Ñ?ее Ñ?далÑ?нномÑ?
+злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код оÑ? лиÑ?а полÑ?зоваÑ?елÑ? exim в Debian
 (<a href="https://security-tracker.debian.org/tracker/CVE-2010-4344";>CVE-2010-4344</a>).</p>
 
- -<p>A fix for an additional issue that allows the Debian-exim user to
- -obtain root privileges (<a href="https://security-tracker.debian.org/tracker/CVE-2010-4345";>CVE-2010-4345</a>) is currently being checked for
- -compatibility issues. It is not yet included in this upgrade but will
- -released soon in an update to this advisory.</p>
- -
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 4.69-9+lenny1.</p>
- -
- -<p>This advisory only contains the packages for the alpha, amd64, hppa,
- -i386, ia64, powerpc, and s390 architectures. The packages for the
- -arm, armel, mips, mipsel, and sparc architectures will be released
- -as soon as they are built.</p>
+<p>Ð?Ñ?пÑ?авление еÑ?Ñ? одной пÑ?облемÑ?, позволÑ?Ñ?Ñ?ей полÑ?зоваÑ?елÑ? exim в Debian
+полÑ?Ñ?аÑ?Ñ? пÑ?ава Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ? (<a href="https://security-tracker.debian.org/tracker/CVE-2010-4345";>CVE-2010-4345</a>), в наÑ?Ñ?оÑ?Ñ?ее вÑ?емÑ?
+пÑ?овеÑ?Ñ?еÑ?Ñ?Ñ? на пÑ?едмеÑ? налиÑ?иÑ? в нÑ?м пÑ?облем Ñ?овмеÑ?Ñ?имоÑ?Ñ?и. Ð?но пока не вклÑ?Ñ?ено в данное обновление, но бÑ?деÑ?
+вÑ?пÑ?Ñ?ено позже в обновлении данной Ñ?екомендаÑ?ии.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.69-9+lenny1.</p>
+
+<p>Ð?аннаÑ? Ñ?екомендаÑ?иÑ? Ñ?одеÑ?жиÑ? пакеÑ?Ñ? Ñ?олÑ?ко длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? alpha, amd64, hppa,
+i386, ia64, powerpc и s390. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?
+arm, armel, mips, mipsel и sparc бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ?
+по меÑ?е завеÑ?Ñ?ениÑ? иÑ? Ñ?боÑ?ки.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), this problem has been fixed in version 4.70-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 4.70-1.</p>
 
- -<p>We strongly recommend that you upgrade your exim4 packages.</p>
+<p>Ð?аÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? exim4.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=+jLq
-----END PGP SIGNATURE-----


Reply to: