[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-{667,798}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-667.wml	2005-02-05 03:14:07.000000000 +0500
+++ russian/security/2005/dsa-667.wml	2016-10-13 18:06:03.108979562 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Squid, the internet
- -object cache, the popular WWW proxy cache.  The Common Vulnerabilities
- -and Exposures project identifies the following vulnerabilities:</p>
+<p>Ð? Squid, кеÑ?е Ð?нÑ?еÑ?неÑ?-обÑ?екÑ?ов, попÑ?лÑ?Ñ?ном кеÑ?иÑ?Ñ?Ñ?Ñ?ем WWW-пÑ?окÑ?и, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173";>CAN-2005-0173</a>
 
- -    <p>LDAP is very forgiving about spaces in search filters and this
- -    could be abused to log in using several variants of the login
- -    name, possibly bypassing explicit access controls or confusing
- -    accounting.</p>
+    <p>LDAP забÑ?ваеÑ? о пÑ?обелаÑ? в поиÑ?ковÑ?Ñ? Ñ?илÑ?Ñ?Ñ?аÑ?, Ñ?Ñ?о можеÑ?
+    пÑ?иводиÑ?Ñ? к вÑ?одÑ? в Ñ?иÑ?Ñ?емÑ?, иÑ?полÑ?зÑ?Ñ? неÑ?колÑ?ко ваÑ?ианÑ?ов имени
+    полÑ?зоваÑ?елÑ?, и возможномÑ? обÑ?одÑ? Ñ?внÑ?Ñ? огÑ?аниÑ?ений доÑ?Ñ?Ñ?па или пÑ?Ñ?аниÑ?е
+    Ñ?Ñ?Ñ?Ñ?нÑ?Ñ? даннÑ?Ñ?.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175";>CAN-2005-0175</a>
 
- -    <p>Cache pollution/poisoning via HTTP response splitting has been
- -    discovered.</p>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено оÑ?Ñ?авление кеÑ?а Ñ? помоÑ?Ñ?Ñ? Ñ?азделениÑ?
+    HTTP-оÑ?веÑ?а.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0194";>CAN-2005-0194</a>
 
- -    <p>The meaning of the access controls becomes somewhat confusing if
- -    any of the referenced ACLs (access control lists) is declared
- -    empty, without any members.</p>
+    <p>Ð?наÑ?ение огÑ?аниÑ?ений доÑ?Ñ?Ñ?па Ñ?Ñ?ановиÑ?Ñ?Ñ? запÑ?Ñ?аннÑ?м в Ñ?лÑ?Ñ?ае, еÑ?ли
+    лÑ?бой из Ñ?казаннÑ?Ñ? ACL (Ñ?пиÑ?ок Ñ?пÑ?авлениÑ? доÑ?Ñ?Ñ?пом) обÑ?Ñ?влÑ?еÑ?Ñ?Ñ?
+    пÑ?Ñ?Ñ?Ñ?м и без Ñ?ленов.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211";>CAN-2005-0211</a>
 
- -    <p>The length argument of the WCCP recvfrom() call is larger than it
- -    should be.  An attacker may send a larger than normal WCCP packet
- -    that could overflow a buffer.</p>
+    <p>Ð?лина аÑ?гÑ?менÑ?а WCCP-вÑ?зова recvfrom() болÑ?Ñ?е, Ñ?ем она
+    должна бÑ?Ñ?Ñ?.  Ð?лоÑ?мÑ?Ñ?ленник можеÑ? оÑ?пÑ?авиÑ?Ñ? болÑ?Ñ?ий WCCP-пакеÑ?,
+    коÑ?оÑ?Ñ?й вÑ?зовеÑ? пеÑ?еполнение бÑ?Ñ?еÑ?а.</p>
 
 </ul>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 2.4.6-2woody6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.6-2woody6.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.5.7-7.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5.7-7.</p>
 
- -<p>We recommend that you upgrade your squid package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? squid.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-798.wml	2005-09-02 17:48:47.000000000 +0600
+++ russian/security/2005/dsa-798.wml	2016-10-13 18:12:36.979398189 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in phpgroupware, a web
- -based groupware system written in PHP.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? phpgroupware, веб-Ñ?иÑ?Ñ?еме Ñ?овмеÑ?Ñ?ной Ñ?абоÑ?Ñ?, напиÑ?анной на PHP,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498";>CAN-2005-2498</a>
 
- -    <p>Stefan Esser discovered another vulnerability in the XML-RPC
- -    libraries that allows injection of arbitrary PHP code into eval()
- -    statements.  The XMLRPC component has been disabled.</p>
+    <p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил еÑ?Ñ? однÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ? в библиоÑ?екаÑ? XML-RPC,
+    коÑ?оÑ?аÑ? позволÑ?еÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й код на Ñ?зÑ?ке PHP в Ñ?Ñ?веÑ?ждениÑ?
+    eval().  Ð?омпоненÑ? XMLRPC бÑ?л оÑ?клÑ?Ñ?ен.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2600";>CAN-2005-2600</a>
 
- -    <p>Alexander Heidenreich discovered a cross-site scripting problem
- -    in the tree view of FUD Forum Bulletin Board Software, which is
- -    also present in phpgroupware.</p>
+    <p>Ð?лекÑ?андÑ? ХайденÑ?айÑ? обнаÑ?Ñ?жил межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг
+    в дÑ?евовидном окне пÑ?оÑ?моÑ?Ñ?а FUD Forum Bulletin Board Software, коÑ?оÑ?ое
+    пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? в phpgroupware.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2761";>CAN-2005-2761</a>
 
- -    <p>A global cross-site scripting fix has also been included that
- -    protects against potential malicious scripts embedded in CSS and
- -    xmlns in various parts of the application and modules.</p>
+    <p>Ð?Ñ?ло добавлено иÑ?пÑ?авление глобалÑ?ного межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга, коÑ?оÑ?ое
+    заÑ?иÑ?аеÑ? оÑ? поÑ?енÑ?иалÑ?нÑ?Ñ? вÑ?едоноÑ?нÑ?Ñ? Ñ?Ñ?енаÑ?иев, внедÑ?Ñ?емÑ?Ñ? в CSS и
+    xmlns в Ñ?азлиÑ?нÑ?Ñ? Ñ?аÑ?Ñ?Ñ?Ñ? пÑ?иложениÑ? и модÑ?лей.</p>
 
 </ul>
 
- -<p>This update also contains a postinst bugfix that has been approved for
- -the next update to the stable release.</p>
+<p>Ð?анное обновление Ñ?одеÑ?жиÑ? иÑ?пÑ?авление Ñ?Ñ?енаÑ?иÑ?Ñ?, запÑ?Ñ?каемого поÑ?ле Ñ?Ñ?Ñ?ановки пакеÑ?а, коÑ?оÑ?ое
+бÑ?ло запланиÑ?овано к вклÑ?Ñ?ениÑ? в Ñ?ледÑ?Ñ?Ñ?Ñ?Ñ? Ñ?едакÑ?иÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.</p>
 
- -<p>For the old stable distribution (woody) these problems don't apply.</p>
+<p>Ð?лÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (woody) Ñ?Ñ?и пÑ?облемÑ? не акÑ?Ñ?алÑ?нÑ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.9.16.005-3.sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.16.005-3.sarge2.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.9.16.008.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.16.008.</p>
 
- -<p>We recommend that you upgrade your phpgroupware packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? phpgroupware.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX/4hHAAoJEF7nbuICFtKlOUIQAKB1nIGfG9jaKWMPAnbns+LH
i38AJiZiciXM0D+CthBvJp3NrHBc//3b0k4hEimLZw3mYSiiY7LQgbUhSi4DqOS9
II/k5w7NY3sgQcn+/taxWJRcKWZZOwPeGWSCLRyti91dO7VGKpJpWiPzFtzwQxaL
IO5bQqkMo8U+yLM4A/Q5VCD5ES76Jh570wwwsdvBbxlyYXzApbsa0PXrSaBbEz/M
2PoYxfo8THFbCYHIze55qq1bEgNgPxVb5YYqH4Jmu+qYjJmkY06XiTWaV0Fp7ByB
WZh/tUvFt5sUVVrWurfYWKz2rUWCxTtDoSaPQLwzG28E7EJLY932JJthWeLQgb0M
t1idzmdBDbw0D1ZRa+idB/5K4MVcT3ndNXYHeK94sA6ndHVJmnZbFxykLxYIMoF/
7g2zD5DfRuPdVdo1FU6EV6ycNBWCwZ2z5/EX4ZyTAQbZEIMC+eOCYnTeL5Apjak4
rNKU5fy5oLfqH5/Sq/OZS6dz1RS3Th48FKoLyac6VvYRy1pRPt2zLR5m5yDSXdyd
GwhA+vjImxgMu1Py0zbGf/y3mLnYnaPVCAkHXZBVCGhTPC69X8YOuwsyT0qnINJU
Y+hYXkoavvsvUTY1uZ1ASOiY/lmPpQ5DfnIkLB5/hf81mISBnyxOr8G4QGFcSp1Y
xRRqNelEj/5JvjvIszVb
=Sy4D
-----END PGP SIGNATURE-----


Reply to: