[DONE] wml://security/2005/dsa-{905,898}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2005/dsa-898.wml 2012-12-17 14:24:16.000000000 +0600
+++ russian/security/2005/dsa-898.wml 2016-09-18 01:13:45.039746866 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>programming errors</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>оÑ?ибки пÑ?огÑ?аммиÑ?ованиÑ?</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in phpsysinfo, a PHP
- -based host information application that is included in phpgroupware.
- -The Common Vulnerabilities and
- -Exposures project identifies the following problems: </p>
+<p>Ð? phpsysinfo, пÑ?иложении длÑ? оÑ?Ñ?леживаниÑ? инÑ?оÑ?маÑ?ии об Ñ?зле, напиÑ?анном на Ñ?зÑ?ке
+PHP и вклÑ?Ñ?Ñ?нном в пакеÑ? phpgroupware, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?: </p>
<ul>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0870">CVE-2005-0870</a>
- - <p>Maksymilian Arciemowicz discovered several cross site scripting
- - problems, of which not all were fixed in
+ <p>Ð?акÑ?имилиан Ð?Ñ?Ñ?емовиÑ? обнаÑ?Ñ?жил неÑ?колÑ?ко Ñ?лÑ?Ñ?аев межÑ?айÑ?ового
+ Ñ?кÑ?ипÑ?инга, из коÑ?оÑ?Ñ?Ñ? не вÑ?е бÑ?ли иÑ?пÑ?авленÑ? в
DSA <a href="dsa-724">724</a>.</p></li>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3347">CVE-2005-3347</a>
- - <p>Christopher Kunz discovered that local variables get overwritten
- - unconditionally and are trusted later, which could lead to the
- - inclusion of arbitrary files.</p></li>
+ <p>Ð?Ñ?иÑ?Ñ?оÑ?еÑ? Ð?Ñ?нÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о локалÑ?нÑ?е пеÑ?еменнÑ?е пеÑ?езапиÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? без
+ огÑ?аниÑ?ений и иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ? позже, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+ вклÑ?Ñ?ениÑ? пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов.</p></li>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3348">CVE-2005-3348</a>
- - <p>Christopher Kunz discovered that user-supplied input is used
- - unsanitised, causing a HTTP Response splitting problem.</p></li>
+ <p>Ð?Ñ?иÑ?Ñ?оÑ?еÑ? Ð?Ñ?нÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о полÑ?зоваÑ?елÑ?Ñ?кие вÑ?однÑ?е даннÑ?е иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ?
+ в неоÑ?иÑ?енном виде, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?азделениÑ? HTTP-оÑ?веÑ?а.</p></li>
</ul>
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 0.9.14-0.RC3.2.woody5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.14-0.RC3.2.woody5.</p>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.9.16.005-3.sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.16.005-3.sarge4.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.9.16.008-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.16.008-2.</p>
- -<p>We recommend that you upgrade your phpgroupware packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? phpgroupware.</p>
</define-tag>
# do not modify the following line
- --- english/security/2005/dsa-905.wml 2005-11-22 10:51:55.000000000 +0500
+++ russian/security/2005/dsa-905.wml 2016-09-18 01:07:55.963691768 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several security related problems have been discovered in Mantis, a
- -web-based bug tracking system. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Mantis, веб-Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? памÑ?Ñ?и, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облем. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3091">CVE-2005-3091</a>
- - <p>A cross-site scripting vulnerability allows attackers to inject
- - arbitrary web script or HTML.</p></li>
+ <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ?
+ пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3335">CVE-2005-3335</a>
- - <p>A file inclusion vulnerability allows remote attackers to execute
- - arbitrary PHP code and include arbitrary local files.</p></li>
+ <p>Ð?клÑ?Ñ?ение Ñ?айла можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полниÑ?Ñ?
+ пÑ?оизволÑ?нÑ?й код на Ñ?зÑ?ке PHP и вклÑ?Ñ?иÑ?Ñ? пÑ?оизволÑ?нÑ?е локалÑ?нÑ?е Ñ?айлÑ?.</p></li>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3336">CVE-2005-3336</a>
- - <p>An SQL injection vulnerability allows remote attackers to execute
- - arbitrary SQL commands.</p></li>
+ <p>SQL-инÑ?екÑ?иÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ?
+ пÑ?оизволÑ?нÑ?й командÑ? SQL.</p></li>
<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3338">CVE-2005-3338</a>
- - <p>Mantis can be tricked into displaying the otherwise hidden real
- - mail address of its users.</p></li>
+ <p>Mantis можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? оÑ?обÑ?ажениÑ? Ñ?еалÑ?нÑ?Ñ? поÑ?Ñ?овÑ?Ñ? адÑ?еÑ?ов полÑ?зоваÑ?елей,
+ коÑ?оÑ?Ñ?е в пÑ?оÑ?ивном Ñ?лÑ?Ñ?ае Ñ?кÑ?Ñ?Ñ?Ñ?.</p></li>
</ul>
- -<p>The old stable distribution (woody) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (woody) не подвеÑ?женÑ? Ñ?Ñ?им пÑ?облемам.</p>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.19.2-4.1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.2-4.1.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.19.3-0.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.3-0.1.</p>
- -<p>We recommend that you upgrade your mantis package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mantis.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=chyc
-----END PGP SIGNATURE-----
Reply to: