[DONE] wml://security/2006/dsa-11{33,68}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2006/dsa-1133.wml 2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1133.wml 2016-09-09 23:08:40.963637269 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>missing input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Mantis bug
- -tracking system, which may lead to the execution of arbitrary web script.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? Mantis, Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? оÑ?ибок, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного веб-Ñ?Ñ?енаÑ?иÑ?.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0664">CVE-2006-0664</a>
- - <p>A cross-site scripting vulnerability was discovered in
- - config_defaults_inc.php.</p></li>
+ <p>Ð? config_defaults_inc.php бÑ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й
+ Ñ?кÑ?ипÑ?инг.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0665">CVE-2006-0665</a>
- - <p>Cross-site scripting vulnerabilities were discovered in query_store.php
- - and manage_proj_create.php.</p></li>
+ <p>Ð? query_store.php и manage_proj_create.php бÑ?л обнаÑ?Ñ?жен
+ межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0841">CVE-2006-0841</a>
- - <p>Multiple cross-site scripting vulnerabilities were discovered in
- - view_all_set.php, manage_user_page.php, view_filters_page.php and
+ <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга бÑ?ли обнаÑ?Ñ?женÑ? в
+ view_all_set.php, manage_user_page.php, view_filters_page.php и
proj_doc_delete.php.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1577">CVE-2006-1577</a>
- - <p>Multiple cross-site scripting vulnerabilities were discovered in
+ <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга бÑ?ли обнаÑ?Ñ?женÑ? в
view_all_set.php.</p></li>
</ul>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.19.2-5sarge4.1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.2-5sarge4.1.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.19.4-3.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.4-3.1.</p>
- -<p>We recommend that you upgrade your mantis package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mantis.</p>
</define-tag>
# do not modify the following line
- --- english/security/2006/dsa-1168.wml 2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1168.wml 2016-09-09 23:13:28.123499708 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Imagemagick, a
- -collection of image manipulation tools, which may lead to the execution
- -of arbitrary code. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Imagemagick, набоÑ?е инÑ?Ñ?Ñ?Ñ?менÑ?ов длÑ? Ñ?абоÑ?Ñ? Ñ? изобÑ?ажениÑ?ми, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2440">CVE-2006-2440</a>
- - <p>Eero Häkkinen discovered that the display tool allocates insufficient
- - memory for globbing patterns, which might lead to a buffer overflow.</p></li>
+ <p>Ð?еÑ?о Ð¥Ñ?ккинен обнаÑ?Ñ?жил, Ñ?Ñ?о инÑ?Ñ?Ñ?Ñ?менÑ? оÑ?обÑ?ажениÑ? вÑ?делÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?й
+ обÑ?Ñ?м памÑ?Ñ?и длÑ? Ñ?аблонов подÑ?Ñ?ановки, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3743">CVE-2006-3743</a>
- - <p>Tavis Ormandy from the Google Security Team discovered that the Sun
- - bitmap decoder performs insufficient input sanitising, which might
- - lead to buffer overflows and the execution of arbitrary code.</p></li>
- -
+ <p>ТÑ?виÑ? Ð?Ñ?манди из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил, Ñ?Ñ?о декодеÑ? Ñ?аÑ?Ñ?Ñ?овÑ?Ñ?
+ изобÑ?ажений Sun вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?Ñ? оÑ?иÑ?Ñ?кÑ? вÑ?однÑ?Ñ? даннÑ?Ñ?, Ñ?Ñ?о можеÑ?
+ пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ?м бÑ?Ñ?еÑ?а и вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
+
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3744">CVE-2006-3744</a>
- - <p>Tavis Ormandy from the Google Security Team discovered that the XCF
- - image decoder performs insufficient input sanitising, which might
- - lead to buffer overflows and the execution of arbitrary code.</p></li>
+ <p>ТÑ?виÑ? Ð?Ñ?манди из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил, Ñ?Ñ?о декодеÑ? изобÑ?ажений
+ в Ñ?оÑ?маÑ?е XCF вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?Ñ? оÑ?иÑ?Ñ?кÑ? вÑ?однÑ?Ñ? даннÑ?Ñ?, Ñ?Ñ?о можеÑ?
+ пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ?ми бÑ?Ñ?еÑ?а и вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
</ul>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 6:6.0.6.2-2.7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 6:6.0.6.2-2.7.</p>
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
- -<p>We recommend that you upgrade your imagemagick packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? imagemagick.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=lfL1
-----END PGP SIGNATURE-----
Reply to: