[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-18{34,67}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1834.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1834.wml	2016-10-18 00:48:25.672356462 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1890";>CVE-2009-1890</a>
- -<p>A denial of service flaw was found in the Apache mod_proxy module when
- -it was used as a reverse proxy. A remote attacker could use this flaw
- -to force a proxy process to consume large amounts of CPU time. This
- -issue did not affect Debian 4.0 "etch".</p></li>
+<p>Ð? модÑ?ле mod_proxy длÑ? Apache бÑ?л обнаÑ?Ñ?жен оÑ?каз в обÑ?лÑ?живании, коÑ?оÑ?Ñ?е возникаеÑ?
+пÑ?и иÑ?полÑ?зовании веб-Ñ?еÑ?веÑ?а в каÑ?еÑ?Ñ?ве обÑ?аÑ?ного пÑ?окÑ?и. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?, Ñ?Ñ?обÑ? вÑ?зваÑ?Ñ? Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление вÑ?емени ЦÐ? пÑ?оÑ?еÑ?Ñ?ом пÑ?окÑ?и. ЭÑ?а
+пÑ?облема не каÑ?аеÑ?Ñ?Ñ? Debian 4.0 "etch".</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1891";>CVE-2009-1891</a>
- -<p>A denial of service flaw was found in the Apache mod_deflate module.
- -This module continued to compress large files until compression was
- -complete, even if the network connection that requested the content
- -was closed before compression completed. This would cause mod_deflate
- -to consume large amounts of CPU if mod_deflate was enabled for a large
- -file. A similar flaw related to HEAD requests for compressed content
- -was also fixed.</p></li>
+<p>Ð? модÑ?ле mod_deflate длÑ? Apache бÑ?л обнаÑ?Ñ?жен оÑ?каз в обÑ?лÑ?живании.
+ЭÑ?оÑ? модÑ?лÑ? пÑ?одолжаеÑ? Ñ?жимаÑ?Ñ? болÑ?Ñ?ие Ñ?айлÑ? до завеÑ?Ñ?ениÑ?
+Ñ?жаÑ?иÑ?, даже в Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?еÑ?евое Ñ?оединение, запÑ?оÑ?ивÑ?ее Ñ?одеÑ?жимое
+бÑ?ло закÑ?Ñ?Ñ?о до моменÑ?а завеÑ?Ñ?ениÑ? Ñ?жаÑ?иÑ?. ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о mod_deflate
+бÑ?деÑ? поÑ?Ñ?еблÑ?Ñ?Ñ? Ñ?Ñ?езмеÑ?нÑ?е Ñ?еÑ?Ñ?Ñ?Ñ?Ñ? ЦÐ? в Ñ?лÑ?Ñ?ае вклÑ?Ñ?ениÑ? mod_deflate длÑ? болÑ?Ñ?ого
+Ñ?айла. Ð?Ñ?оме Ñ?ого бÑ?ла иÑ?пÑ?авлена Ñ?Ñ?однаÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ?, Ñ?вÑ?заннаÑ? Ñ? HEAD-запÑ?оÑ?ами длÑ?
+Ñ?жаÑ?ого Ñ?одеÑ?жимого.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (etch), these problems have been fixed in
- -version 2.2.3-4+etch9.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.3-4+etch9.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.2.9-10+lenny4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.9-10+lenny4.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems will be fixed in version 2.2.11-7.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.2.11-7.</p>
 
- -<p>This advisory also provides updated apache2-mpm-itk packages which
- -have been recompiled against the new apache2 packages.</p>
+<p>Ð?Ñ?оме Ñ?ого, даннаÑ? Ñ?екомендаÑ?иÑ? пÑ?едоÑ?Ñ?авлÑ?еÑ? обновлÑ?ннÑ?е пакеÑ?Ñ? apache2-mpm-itk,
+коÑ?оÑ?Ñ?е бÑ?ли заново Ñ?компилиÑ?ованÑ? Ñ? новÑ?ми пакеÑ?ами apache2.</p>
 
- -<p>Updated packages for the s390 and mipsel architectures are not
- -included yet. They will be released as soon as they become available.</p>
+<p>Ð?бновлÑ?ннÑ?е пакеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? s390 и mipsel пока
+недоÑ?Ñ?Ñ?пнÑ?. Ð?ни бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ? по меÑ?е доÑ?Ñ?Ñ?пноÑ?Ñ?и.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1867.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1867.wml	2016-10-18 00:54:00.298841310 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security issues have been discovered in kdelibs, core libraries
- -from the official KDE release. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? kdelibs, базовÑ?Ñ? библиоÑ?екаÑ? из оÑ?иÑ?иалÑ?ного вÑ?пÑ?Ñ?ка KDE, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко пÑ?облем Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ?. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1690";>CVE-2009-1690</a>
 
- -<p>It was discovered that there is a use-after-free flaw in handling
- -certain DOM event handlers. This could lead to the execution of
- -arbitrary code, when visiting a malicious website.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о в коде обÑ?абоÑ?ки опÑ?еделÑ?ннÑ?Ñ? обÑ?абоÑ?Ñ?иков DOM-Ñ?обÑ?Ñ?ий
+имееÑ?Ñ?Ñ? иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и. ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода пÑ?и поÑ?еÑ?ении вÑ?едоноÑ?ного веб-Ñ?айÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1698";>CVE-2009-1698</a>
 
- -<p>It was discovered that there could be an uninitialised pointer when
- -handling a Cascading Style Sheets (CSS) attr function call. This could
- -lead to the execution of arbitrary code, when visiting a malicious
- -website.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пÑ?и обÑ?абоÑ?ке вÑ?зова Ñ?Ñ?нкÑ?ии attr длÑ? CSS можеÑ?
+поÑ?влÑ?Ñ?Ñ?Ñ?Ñ? неиниÑ?иализоÑ?ованнÑ?й Ñ?казаÑ?елÑ?. ЭÑ?о можеÑ?
+пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода пÑ?и поÑ?еÑ?ении вÑ?едоноÑ?ного
+веб-Ñ?айÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1687";>CVE-2009-1687</a>
 
- -<p>It was discovered that the JavaScript garbage collector does not handle
- -allocation failures properly, which could lead to the execution of
- -arbitrary code when visiting a malicious website.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?боÑ?Ñ?ик мÑ?Ñ?оÑ?а JavaScript непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ?
+оÑ?ибки вÑ?делениÑ? памÑ?Ñ?и, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода пÑ?и поÑ?еÑ?ении вÑ?едоноÑ?ного веб-Ñ?айÑ?а.</p></li>
 
 </ul>
 
 
- -<p>For the oldstable distribution (etch), these problems have been fixed
- -in version 4:3.5.5a.dfsg.1-8etch2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4:3.5.5a.dfsg.1-8etch2.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 4:3.5.10.dfsg.1-0lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:3.5.10.dfsg.1-0lenny2.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
 
- -<p>We recommend that you upgrade your kdelibs packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? kdelibs.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJYBSxaAAoJEF7nbuICFtKlOsoP/3ekBLHE+nlHrYcUYEnYoVdP
yfNB4WJ9yDTw7epR3W7SWjPMGDm1VNf5HWr5ChKKlknUdELWqhacocm/GnDjdefX
zxe2uNDLh3cmg+a1R0gD4zoxb86CDB2EI3k3a0uir5vWuYo+Dei8eOem2Afk/+OX
TijvCItX7N2FCOhKpTJDZb+kTcs/Ml5O0YHcC04fQWVmExGMwKAgtMAC6kZFz8Sp
O2RhmgkNLXYdrmRybCU+XmyGXNTs383llpNYP1ewyTUHsdXTYZFotmiyYnE0CNLA
xH0yXWUbe/WyT/mVgEA8fDqEEhd6JaPLwQX4cRUJqAvC6fsxlqrD/3CAUCeAAINf
8HAvDINMY4XgTOQdZ3/dd5Gq8TgSH2aaFviIuzsvQcxv6ZLjXd/68+lABe/2ZjK6
zAo30wxPskMnkAIXV2DQKi9rQK1qw0drPIO5cZ4CqiLek5ooaOXKlz+53aYALng3
zBE64Utt02TqtAS3A7JiQfF3gN172f6380VrzzR+CE8Wg7dHOVMaEL/NS02eZrS1
1+83U+G468EgVrVfrqyyHqfTYeATwsD4FkH3IbN9PF8Wg7qaNnuo5LCoG6zPSC7I
WutCb0FK9gGUi+29077COwoWcwF1q3+oTA/oOVSeXF/yxMT4OQDLp+XzpaUoxZfc
ZOylB2ezyVwn0CliOhTR
=QJ97
-----END PGP SIGNATURE-----


Reply to: