[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-7{89,32}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-732.wml	2005-06-03 21:52:56.000000000 +0600
+++ russian/security/2005/dsa-732.wml	2016-09-18 01:22:30.122425118 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>"infamous41md" discovered several vulnerabilities in the GNU mailutils
- -package which contains utilities for handling mail.  These problems
- -can lead to a denial of service or the execution of arbitrary code.
- -The Common Vulnerabilities and Exposures project identifies the
- -following vulnerabilities.</p>
+<p>"infamous41md" обнаÑ?Ñ?жил неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей в пакеÑ?е mailutils оÑ?
+GNU, коÑ?оÑ?Ñ?й Ñ?одеÑ?жиÑ? Ñ?Ñ?илиÑ?Ñ? длÑ? Ñ?абоÑ?Ñ? Ñ? поÑ?Ñ?ой.  ЭÑ?и пÑ?облемÑ?
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ? пÑ?оизволÑ?ного кода.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?.</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1520";>CAN-2005-1520</a>
 
- -    <p>Buffer overflow mail header handling may allow a remote attacker
- -    to execute commands with the privileges of the targeted user.</p>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а пÑ?и обÑ?абоÑ?ке поÑ?Ñ?ового заголовка можеÑ? позволиÑ?Ñ? Ñ?далÑ?нномÑ?
+    злоÑ?мÑ?Ñ?ленникÑ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? Ñ? пÑ?авами Ñ?елевого полÑ?зоваÑ?елÑ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1521";>CAN-2005-1521</a>
 
- -    <p>Combined integer and heap overflow in the fetch routine can lead
- -    to the execution of arbitrary code.</p>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел и пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии fetch могÑ?Ñ? пÑ?иводиÑ?Ñ?
+    к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1522";>CAN-2005-1522</a>
 
- -    <p>Denial of service in the fetch routine.</p>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в Ñ?Ñ?нкÑ?ии fetch.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1523";>CAN-2005-1523</a>
 
- -    <p>Format string vulnerability can lead to the execution of arbitrary
- -    code.</p>
+    <p>УÑ?звимоÑ?Ñ?Ñ? Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 20020409-1woody2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 20020409-1woody2.</p>
 
- -<p>For the testing distribution (sarge) these problems have been fixed in
- -version 0.6.1-4.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.6.1-4.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.6.1-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.6.1-4.</p>
 
- -<p>We recommend that you upgrade your mailutils packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mailutils.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-789.wml	2005-08-29 21:32:04.000000000 +0600
+++ russian/security/2005/dsa-789.wml	2016-09-18 01:18:33.286766203 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been found in PHP4, the
- -server-side, HTML-embedded scripting language.  The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? PHP4, Ñ?еÑ?веÑ?ном Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев Ñ?о вÑ?Ñ?Ñ?оенной поддеÑ?жкой HTML, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облем.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1751";>CAN-2005-1751</a>
 
- -    <p>Eric Romang discovered insecure temporary files in the shtool
- -    utility shipped with PHP that can exploited by a local attacker to
- -    overwrite arbitrary files.  Only this vulnerability affects
- -    packages in oldstable.</p>
+    <p>ЭÑ?ик Роман обнаÑ?Ñ?жил небезопаÑ?нÑ?е вÑ?еменнÑ?е Ñ?айлÑ? в Ñ?Ñ?илиÑ?е shtool,
+    поÑ?Ñ?авлÑ?емой в Ñ?оÑ?Ñ?аве PHP, коÑ?оÑ?Ñ?е могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? локалÑ?нÑ?м злоÑ?мÑ?Ñ?ленником
+    длÑ? пеÑ?езапиÑ?и пÑ?оизволÑ?нÑ?й Ñ?айлов.  ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко пакеÑ?ов
+    из пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921";>CAN-2005-1921</a>
 
- -    <p>GulfTech has discovered that PEAR XML_RPC is vulnerable to a
- -    remote PHP code execution vulnerability that may allow an attacker
- -    to compromise a vulnerable server.</p>
+    <p>СоÑ?Ñ?Ñ?дники GulfTech обнаÑ?Ñ?жили, Ñ?Ñ?о PEAR XML_RPC Ñ?Ñ?звим к
+    Ñ?далÑ?нномÑ? вÑ?полнениÑ? PHP-кода, коÑ?оÑ?ое можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+    компÑ?омеÑ?иÑ?оваÑ?Ñ? Ñ?Ñ?звимÑ?й Ñ?еÑ?веÑ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498";>CAN-2005-2498</a>
 
- -    <p>Stefan Esser discovered another vulnerability in the XML-RPC
- -    libraries that allows injection of arbitrary PHP code into eval()
- -    statements.</p>
+    <p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил еÑ?Ñ? однÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ? в библиоÑ?екаÑ? XML-RPC,
+    коÑ?оÑ?аÑ? позволÑ?еÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й PHP-код в Ñ?Ñ?веÑ?ждениÑ?
+    eval().</p>
 
 </ul>
 
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 4.1.2-7.woody5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.1.2-7.woody5.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.3.10-16.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.3.10-16.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.4.0-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.4.0-2.</p>
 
- -<p>We recommend that you upgrade your PHP packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? PHP.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=zjNj
-----END PGP SIGNATURE-----


Reply to: