[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-{2051,1976}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-1976.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1976.wml	2016-09-30 23:53:23.604205197 +0500
@@ -1,47 +1,48 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been discovered in dokuwiki, a standards compliant
- -simple to use wiki.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? dokuwiki, пÑ?оÑ?Ñ?ой в иÑ?полÑ?зовании и Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?андаÑ?Ñ?ам Ñ?еализаÑ?ии вики,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0287";>CVE-2010-0287</a>
 
- -<p>It was discovered that an internal variable is not properly sanitized before
- -being used to list directories. This can be exploited to list contents of
- -arbitrary directories.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о внÑ?Ñ?Ñ?еннÑ?Ñ? пеÑ?еменнаÑ? непÑ?авилÑ?но оÑ?иÑ?аеÑ?Ñ?Ñ? до еÑ?
+иÑ?полÑ?зованиÑ? длÑ? вÑ?вода Ñ?пиÑ?ка Ñ?одеÑ?жимого каÑ?алогов. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+длÑ? вÑ?вода Ñ?пиÑ?ка Ñ?одеÑ?жимого пÑ?оизволÑ?нÑ?Ñ? каÑ?алогов.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0288";>CVE-2010-0288</a>
 
- -<p>It was discovered that the ACL Manager plugin doesn't properly check the
- -administrator permissions. This allow an attacker to introduce arbitrary ACL
- -rules and thus gaining access to a closed Wiki.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о дополнение ACL Manager непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ?
+пÑ?ав доÑ?Ñ?Ñ?па админиÑ?Ñ?Ñ?аÑ?оÑ?а. ЭÑ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? добавлÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е
+ACL-пÑ?авила и полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п к закÑ?Ñ?Ñ?ой вики.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0289";>CVE-2010-0289</a>
 
- -<p>It was discovered that the ACL Manager plugin doesn't have protections against
- -cross-site request forgeries (CSRF). This can be exploited to change the
- -access control rules by tricking a logged in administrator into visiting
- -a malicious web site.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о дополнение ACL не имееÑ? заÑ?иÑ?Ñ? оÑ? подделки
+межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов (CSRF). ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? изменениÑ?
+пÑ?авил доÑ?Ñ?Ñ?па в Ñ?лÑ?Ñ?ае, еÑ?ли воÑ?едÑ?ий в вики админиÑ?Ñ?Ñ?аÑ?оÑ? оÑ?кÑ?оеÑ?
+подконÑ?Ñ?олÑ?нÑ?й злоÑ?мÑ?Ñ?ленникÑ? веб-Ñ?айÑ?.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (etch) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?ке (etch) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 0.0.20080505-4+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.0.20080505-4+lenny1.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems have been fixed in version 0.0.20090214b-3.1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 0.0.20090214b-3.1.</p>
 
 
- -<p>We recommend that you upgrade your dokuwiki package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? dokuwiki.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2051.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2051.wml	2016-09-30 23:46:06.205873140 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local vulnerabilities have been discovered in PostgreSQL, an
- -object-relational SQL database. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? PostgreSQL, обÑ?екÑ?но-Ñ?елÑ?Ñ?ионной базе даннÑ?Ñ? SQL, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко локалÑ?нÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1169";>CVE-2010-1169</a>
 
- -    <p>Tim Bunce discovered that the implementation of the procedural
- -    language PL/Perl insufficiently restricts the subset of allowed
- -    code, which allows authenticated users the execution of arbitrary
- -    Perl code.</p></li>
+    <p>Тим Ð?анÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? пÑ?оÑ?едÑ?Ñ?ного Ñ?зÑ?ка
+    PL/Perl недоÑ?Ñ?аÑ?оÑ?но огÑ?аниÑ?иваеÑ? подмножеÑ?Ñ?во Ñ?азÑ?еÑ?Ñ?нного
+    кода, Ñ?Ñ?о позволÑ?еÑ? аÑ?Ñ?еÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+    код на Ñ?зÑ?ке Perl.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1170";>CVE-2010-1170</a>
 
- -    <p>Tom Lane discovered that the implementation of the procedural
- -    language PL/Tcl insufficiently restricts the subset of allowed
- -    code, which allows authenticated users the execution of arbitrary
- -    Tcl code.</p></li>
+    <p>Том Ð?Ñ?йн обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? пÑ?оÑ?едÑ?Ñ?ного Ñ?зÑ?ка
+    PL/Tcl недоÑ?Ñ?аÑ?оÑ?но огÑ?аниÑ?иваеÑ? подмножеÑ?Ñ?во Ñ?азÑ?еÑ?Ñ?нного
+    кода, Ñ?Ñ?о позволÑ?еÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+    код на Ñ?зÑ?ке Tcl.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1975";>CVE-2010-1975</a>
 
- -    <p>It was discovered that an unprivileged user could reset
- -    superuser-only parameter settings.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о непÑ?ивилегиÑ?ованнÑ?й полÑ?зоваÑ?елÑ? можеÑ? Ñ?бÑ?оÑ?иÑ?Ñ?
+    наÑ?Ñ?Ñ?ойки паÑ?амеÑ?Ñ?ов, доÑ?Ñ?Ñ?пнÑ?Ñ? Ñ?олÑ?ко Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 8.3.11-0lenny1. This update also introduces a fix for 
- -<a href="https://security-tracker.debian.org/tracker/CVE-2010-0442";>CVE-2010-0442</a>, which was originally scheduled for the next Lenny point
- -update.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8.3.11-0lenny1. Ð?анное обновление Ñ?одеÑ?жиÑ? иÑ?пÑ?авление длÑ?
+<a href="https://security-tracker.debian.org/tracker/CVE-2010-0442";>CVE-2010-0442</a>, коÑ?оÑ?ое изнаÑ?алÑ?но бÑ?ло запланиÑ?ованÑ? длÑ? вклÑ?Ñ?ениÑ? в
+Ñ?ледÑ?Ñ?Ñ?Ñ?Ñ? Ñ?едакÑ?иÑ? Lenny.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 8.4.4-1 of postgresql-8.4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8.4.4-1 пакеÑ?а postgresql-8.4.</p>
 
- -<p>We recommend that you upgrade your postgresql-8.3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-8.3.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX7rSmAAoJEF7nbuICFtKlpg0P/RqW1mFFMg8K0sVznUNrm/Yq
4XqbjO8uRVSxrioRAUu7mBAGsDao/jPjA8GQ4QJYO/ZmTMpj208gZE7Ct2kLlCeg
asTA5xp0EOH0qDl/FgDN5OO16tgjufMk7+stq3sqW93TGMOD6varj8teho6pjsL9
zwi7RPNkHZMA0oenE4ZK45VWxuaSpPfw4OvWBYBk4QSaU7eospH54/uG8h4xTiwD
H1tkfwQDXvip2Y4TVIdN7Ch15WYBcdDhO0LKpGYTEpdjfkhj6DU2E2OjihY2LUI5
eIPag9NYDiqXw6ZjkLddS4v1UZyBZ5v1Hv41Qj7CJAKkVocTTCw+BIQvni1XB9Gx
7glKgi1RbFDRU9RXEYqbXDQr7Fq+oaQ0wuihlHsLc1Ki4RMHUJ4Mr9sU1iAnPmen
3H4Q+S86kUw950mvysd9zym4FbDQ/RfKovVDl8sLLtRb3tt4HwnQNhG1UthC+Pn0
Kt3J947wsNcI480sCYBqGIbG37uBuFknwtmJIkVIZRIo0Qq6kUxp+H6BcY2+Nl9S
8sBZKT9a2vIkl/bVH/2Afa5rMGKGM1lBOZC/t55BsPdyx1tlRP9kE9ph565kDdtq
Qbve66oGM2e1s9DV00ty+lS4mOKx2N6nIthDhIwQTfQ3VK8E5oxQmLDGBFGMv4w+
XH/6Xc1lqc1c1u9C3YDi
=eKyn
-----END PGP SIGNATURE-----


Reply to: