[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{641,455,494}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1455.wml	2014-04-30 13:16:14.000000000 +0600
+++ russian/security/2008/dsa-1455.wml	2016-09-14 00:33:40.985402569 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>Several local/remote vulnerabilities have been discovered in libarchive1,
- -a single library to read/write tar, cpio, pax, zip, iso9660 archives.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? libarchive1, библиоÑ?еке длÑ? Ñ?Ñ?ениÑ?/запиÑ?и аÑ?Ñ?ивов tar, cpio, pax, zip, iso9660,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко локалÑ?нÑ?Ñ?/Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3641";>CVE-2007-3641</a>
 
- -  <p>It was discovered that libarchive1 would miscompute the length of a buffer
- -  resulting in a buffer overflow if yet another type of corruption occurred
- -  in a pax extension header.</p></li>
+  <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о libarchive1 непÑ?авилÑ?но вÑ?Ñ?иÑ?лÑ?еÑ? длинÑ? бÑ?Ñ?еÑ?а, Ñ?Ñ?о
+  пÑ?иводиÑ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в Ñ?лÑ?Ñ?ае еÑ?ли возникаеÑ? еÑ?Ñ? одно повÑ?еждение дÑ?Ñ?гого Ñ?ипа
+  в заголовке Ñ?аÑ?Ñ?иÑ?ениÑ? pax.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3644";>CVE-2007-3644</a>
 
- -  <p>It was discovered that if an archive prematurely ended within a pax
- -  extension header the libarchive1 library could enter an infinite loop.</p></li>
+  <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о еÑ?ли аÑ?Ñ?ив пÑ?еждевÑ?еменно завеÑ?Ñ?аеÑ?Ñ?Ñ? заголовком Ñ?аÑ?Ñ?иÑ?ениÑ?
+  pax, Ñ?о библиоÑ?ека libarchive1 можеÑ? войÑ?и в беÑ?конеÑ?нÑ?й Ñ?икл.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3645";>CVE-2007-3645</a>
 
- -  <p>If an archive prematurely ended within a tar header, immediately following
- -  a pax extension header, libarchive1 could dereference a NULL pointer.</p></li>
+  <p>Ð?Ñ?ли аÑ?Ñ?ив пÑ?еждевÑ?еменно завеÑ?Ñ?аеÑ?Ñ?Ñ? заголовком tar, за коÑ?оÑ?Ñ?м Ñ?Ñ?азÑ? же Ñ?ледÑ?еÑ?
+  заголовок Ñ?аÑ?Ñ?иÑ?ениÑ? pax, Ñ?о libarchive1 вÑ?зÑ?ваеÑ? Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (sarge), does not contain this package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?оÑ? пакеÑ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.2.53-2etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.53-2etch1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.2.4-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.4-1.</p>
 
- -<p>We recommend that you upgrade your libarchive package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? libarchive.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1494.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1494.wml	2016-09-14 00:40:49.958054306 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>missing access checks</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ок доÑ?Ñ?Ñ?па</define-tag>
 <define-tag moreinfo>
- -<p>The vmsplice system call did not properly verify address arguments
- -passed by user space processes, which allowed local attackers to
- -overwrite arbitrary kernel memory, gaining root privileges
+<p>СиÑ?Ñ?емнÑ?й вÑ?зов vmsplice непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? адÑ?еÑ?нÑ?Ñ? аÑ?гÑ?менÑ?ов,
+пеÑ?еданнÑ?Ñ? пÑ?оÑ?еÑ?Ñ?ами из пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва полÑ?зоваÑ?елÑ?, Ñ?Ñ?о позволÑ?еÑ? локалÑ?нÑ?м злоÑ?мÑ?Ñ?ленникам
+пеÑ?езапиÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?Ñ? памÑ?Ñ?Ñ? Ñ?дÑ?а, полÑ?Ñ?аÑ? пÑ?ава Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?
 (<a href="https://security-tracker.debian.org/tracker/CVE-2008-0010";>CVE-2008-0010</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2008-0600";>CVE-2008-0600</a>).</p>
 
- -<p>In the vserver-enabled kernels, a missing access check on certain
- -symlinks in /proc enabled local attackers to access resources in other
- -vservers (<a href="https://security-tracker.debian.org/tracker/CVE-2008-0163";>CVE-2008-0163</a>).</p>
+<p>Ð? Ñ?дÑ?аÑ?, в коÑ?оÑ?Ñ?Ñ? вклÑ?Ñ?ена поддеÑ?жка vserver, оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ки доÑ?Ñ?Ñ?па длÑ?
+опÑ?еделÑ?ннÑ?Ñ? Ñ?имволÑ?нÑ?Ñ? Ñ?Ñ?Ñ?лок в /proc позволÑ?еÑ? локалÑ?нÑ?м злоÑ?мÑ?Ñ?ленникам полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п к Ñ?еÑ?Ñ?Ñ?Ñ?ам
+дÑ?Ñ?гиÑ? Ñ?кземплÑ?Ñ?ов vserver (<a href="https://security-tracker.debian.org/tracker/CVE-2008-0163";>CVE-2008-0163</a>).</p>
 
- -<p>The old stable distribution (sarge) is not affected by this problem.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sarge) не подвеÑ?жен Ñ?Ñ?ой пÑ?облеме.</p>
 
- -<p>For the stable distribution (etch), this problem has been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии
 2.6.18.dfsg.1-18etch1.</p>
 
- -<p>In addition to these fixes, this update also incorporates changes from the
- -upcoming point release of the stable distribution.</p>
+<p>Ð? дополнение к Ñ?Ñ?им иÑ?пÑ?авлениÑ?м данное обновление Ñ?одеÑ?жиÑ? изменениÑ? из
+гоÑ?овÑ?Ñ?ейÑ?Ñ? Ñ?едакÑ?ии Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.</p>
 
- -<p>Some architecture builds were not yet available at the time of DSA-1494-1.
- -This update to DSA-1494 provides linux-2.6 packages for these remaining
- -architectures, as well as additional binary packages that are built
- -from source code provided by linux-2.6.</p>
+<p>СбоÑ?ки длÑ? некоÑ?оÑ?Ñ?Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? в моменÑ? вÑ?пÑ?Ñ?ка DSA-1494-1 не бÑ?ли доÑ?Ñ?Ñ?пнÑ?.
+Ð?анное обновление DSA-1494 Ñ?одеÑ?жиÑ? пакеÑ?Ñ? linux-2.6 длÑ? оÑ?Ñ?авÑ?иÑ?Ñ?Ñ?
+аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?, а Ñ?акже дополниÑ?елÑ?нÑ?е двоиÑ?нÑ?е пакеÑ?Ñ?, Ñ?обÑ?аннÑ?е
+из иÑ?Ñ?одного кода пакеÑ?а linux-2.6.</p>
 
- -<p>The unstable (sid) and testing (lenny) distributions will be fixed soon.</p>
+<p>Ð?еÑ?Ñ?абилÑ?нÑ?й (sid) и Ñ?еÑ?Ñ?иÑ?Ñ?емÑ?й (lenny) вÑ?пÑ?Ñ?ки бÑ?дÑ?Ñ? обновленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your linux-2.6, fai-kernels, and
- -user-mode-linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux-2.6, fai-kernels и
+user-mode-linux.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1641.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1641.wml	2016-09-14 00:28:04.200483555 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in phpMyAdmin, a
- -tool to administrate MySQL databases over the web. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? phpMyAdmin, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? баз даннÑ?Ñ? MySQL Ñ?еÑ?ез веб, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4096";>CVE-2008-4096</a>
 
- -    <p>Remote authenticated users could execute arbitrary code on the
- -    host running phpMyAdmin through manipulation of a script parameter.</p></li>
+    <p>УдалÑ?ннÑ?е аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е полÑ?зоваÑ?ели могÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код на
+    Ñ?зле, на коÑ?оÑ?ом запÑ?Ñ?ен phpMyAdmin, Ñ? помоÑ?Ñ?Ñ? манипÑ?лÑ?Ñ?ий над паÑ?амеÑ?Ñ?ом Ñ?Ñ?енаÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3457";>CVE-2008-3457</a>
 
- -    <p>Cross site scripting through the setup script was possible in
- -    rare circumstances.</p></li>
+    <p>Ð? Ñ?едкиÑ? Ñ?лÑ?Ñ?аÑ?Ñ? в Ñ?Ñ?енаÑ?ии наÑ?Ñ?Ñ?ойки возможен межÑ?айÑ?овÑ?й
+    Ñ?кÑ?ипÑ?инг.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3456";>CVE-2008-3456</a>
 
- -    <p>Protection has been added against remote websites loading phpMyAdmin
- -    into a frameset.</p></li>
+    <p>Ð?Ñ?ла добавлена заÑ?иÑ?а оÑ? загÑ?Ñ?зки phpMyAdmin Ñ?далÑ?ннÑ?м веб-Ñ?айÑ?ами
+    в Ñ?Ñ?ейм.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3197";>CVE-2008-3197</a>
 
- -    <p>Cross site request forgery allowed remote attackers to create a new
- -    database, but not perform any other action on it.</p></li>
+    <p>Ð?одделка межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам Ñ?оздаваÑ?Ñ? новÑ?е
+    базÑ? даннÑ?Ñ?, но не позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? над ними какие-либо дÑ?Ñ?гие дейÑ?Ñ?виÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 4:2.9.1.1-8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:2.9.1.1-8.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 4:2.11.8.1-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:2.11.8.1-2.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=c4Ph
-----END PGP SIGNATURE-----


Reply to: