[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{905,898}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-898.wml	2012-12-17 14:24:16.000000000 +0600
+++ russian/security/2005/dsa-898.wml	2016-09-18 01:13:45.039746866 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>programming errors</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>оÑ?ибки пÑ?огÑ?аммиÑ?ованиÑ?</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in phpsysinfo, a PHP
- -based host information application that is included in phpgroupware.
- -The Common Vulnerabilities and
- -Exposures project identifies the following problems: </p>
+<p>Ð? phpsysinfo, пÑ?иложении длÑ? оÑ?Ñ?леживаниÑ? инÑ?оÑ?маÑ?ии об Ñ?зле, напиÑ?анном на Ñ?зÑ?ке
+PHP и вклÑ?Ñ?Ñ?нном в пакеÑ? phpgroupware, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?: </p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0870";>CVE-2005-0870</a>
 
- -    <p>Maksymilian Arciemowicz discovered several cross site scripting
- -    problems, of which not all were fixed in
+    <p>Ð?акÑ?имилиан Ð?Ñ?Ñ?емовиÑ? обнаÑ?Ñ?жил неÑ?колÑ?ко Ñ?лÑ?Ñ?аев межÑ?айÑ?ового
+    Ñ?кÑ?ипÑ?инга, из коÑ?оÑ?Ñ?Ñ? не вÑ?е бÑ?ли иÑ?пÑ?авленÑ? в
     DSA <a href="dsa-724">724</a>.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3347";>CVE-2005-3347</a>
 
- -    <p>Christopher Kunz discovered that local variables get overwritten
- -    unconditionally and are trusted later, which could lead to the
- -    inclusion of arbitrary files.</p></li>
+    <p>Ð?Ñ?иÑ?Ñ?оÑ?еÑ? Ð?Ñ?нÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о локалÑ?нÑ?е пеÑ?еменнÑ?е пеÑ?езапиÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? без
+    огÑ?аниÑ?ений и иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ? позже, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+    вклÑ?Ñ?ениÑ? пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3348";>CVE-2005-3348</a>
 
- -    <p>Christopher Kunz discovered that user-supplied input is used
- -    unsanitised, causing a HTTP Response splitting problem.</p></li>
+    <p>Ð?Ñ?иÑ?Ñ?оÑ?еÑ? Ð?Ñ?нÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о полÑ?зоваÑ?елÑ?Ñ?кие вÑ?однÑ?е даннÑ?е иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ?
+    в неоÑ?иÑ?енном виде, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?азделениÑ? HTTP-оÑ?веÑ?а.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 0.9.14-0.RC3.2.woody5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.14-0.RC3.2.woody5.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.9.16.005-3.sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.16.005-3.sarge4.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.9.16.008-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.16.008-2.</p>
 
- -<p>We recommend that you upgrade your phpgroupware packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? phpgroupware.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-905.wml	2005-11-22 10:51:55.000000000 +0500
+++ russian/security/2005/dsa-905.wml	2016-09-18 01:07:55.963691768 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been discovered in Mantis, a
- -web-based bug tracking system.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Mantis, веб-Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? памÑ?Ñ?и, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облем.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3091";>CVE-2005-3091</a>
 
- -    <p>A cross-site scripting vulnerability allows attackers to inject
- -    arbitrary web script or HTML.</p></li>
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ?
+    пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3335";>CVE-2005-3335</a>
 
- -    <p>A file inclusion vulnerability allows remote attackers to execute
- -    arbitrary PHP code and include arbitrary local files.</p></li>
+    <p>Ð?клÑ?Ñ?ение Ñ?айла можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полниÑ?Ñ?
+    пÑ?оизволÑ?нÑ?й код на Ñ?зÑ?ке PHP и вклÑ?Ñ?иÑ?Ñ? пÑ?оизволÑ?нÑ?е локалÑ?нÑ?е Ñ?айлÑ?.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3336";>CVE-2005-3336</a>
 
- -    <p>An SQL injection vulnerability allows remote attackers to execute
- -    arbitrary SQL commands.</p></li>
+    <p>SQL-инÑ?екÑ?иÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ?
+    пÑ?оизволÑ?нÑ?й командÑ? SQL.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3338";>CVE-2005-3338</a>
 
- -    <p>Mantis can be tricked into displaying the otherwise hidden real
- -    mail address of its users.</p></li>
+    <p>Mantis можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? оÑ?обÑ?ажениÑ? Ñ?еалÑ?нÑ?Ñ? поÑ?Ñ?овÑ?Ñ? адÑ?еÑ?ов полÑ?зоваÑ?елей,
+    коÑ?оÑ?Ñ?е в пÑ?оÑ?ивном Ñ?лÑ?Ñ?ае Ñ?кÑ?Ñ?Ñ?Ñ?.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (woody) не подвеÑ?женÑ? Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.19.2-4.1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.2-4.1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.19.3-0.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.19.3-0.1.</p>
 
- -<p>We recommend that you upgrade your mantis package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mantis.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=chyc
-----END PGP SIGNATURE-----


Reply to: