[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{964,802}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1802.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1802.wml	2016-10-22 14:28:30.586418547 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in SquirrelMail,
- -a webmail application. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? SquirrelMail, пÑ?иложении веб-поÑ?Ñ?Ñ?, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1578";>CVE-2009-1578</a>
 
- -    <p>Cross site scripting was possible through a number of pages which
- -    allowed an attacker to steal sensitive session data.</p></li>
+    <p>Ð?а Ñ?Ñ?де Ñ?Ñ?Ñ?аниÑ? возможен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг, коÑ?оÑ?Ñ?й
+    позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? кÑ?аÑ?Ñ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?е даннÑ?е Ñ?еÑ?Ñ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1579";>CVE-2009-1579</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2009-1381";>CVE-2009-1381</a>
 
- -    <p>Code injection was possible when SquirrelMail was configured to
- -    use the map_yp_alias function to authenticate users. This is not
- -    the default.</p></li>
+    <p>Ð?Ñ?ли SquirrelMail наÑ?Ñ?Ñ?оен на иÑ?полÑ?зование Ñ?Ñ?нкÑ?ии map_yp_alias длÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии
+    полÑ?зоваÑ?елей, Ñ?о возможно введение пÑ?оизволÑ?ного кода. Ð?о Ñ?молÑ?аниÑ? Ñ?казаннаÑ?
+    наÑ?Ñ?Ñ?ойка не иÑ?полÑ?зÑ?еÑ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1580";>CVE-2009-1580</a>
 
- -    <p>It was possible to hijack an active user session by planting a
- -    specially crafted cookie into the user's browser.</p></li>
+    <p>Ð?ожно пеÑ?еÑ?ваÑ?иÑ?Ñ? акÑ?ивнÑ?Ñ? Ñ?еÑ?Ñ?иÑ? полÑ?зоваÑ?елÑ? пÑ?Ñ?Ñ?м Ñ?азмеÑ?ениÑ?
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованной кÑ?ки в его бÑ?аÑ?зеÑ?е.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1581";>CVE-2009-1581</a>
 
- -    <p>Specially crafted HTML emails could use the CSS positioning feature
- -    to place email content over the SquirrelMail user interface, allowing
- -    for phishing.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е Ñ?ообÑ?ениÑ? в Ñ?оÑ?маÑ?е HTML могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? позиÑ?иониÑ?ование
+    CSS длÑ? Ñ?азмеÑ?ениÑ? Ñ?одеÑ?жимого Ñ?ообÑ?ениÑ? повеÑ?Ñ? полÑ?зоваÑ?елÑ?Ñ?кого инÑ?еÑ?Ñ?ейÑ?а SquirrelMail,
+    позволÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? Ñ?иÑ?инг.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed in
- -version 1.4.9a-5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.9a-5.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.4.15-4+lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.15-4+lenny2.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.4.19-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.19-1.</p>
 
- -<p>We recommend that you upgrade your squirrelmail package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? squirrelmail.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1964.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1964.wml	2016-10-22 14:22:41.447774679 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in PostgreSQL, a database
- -server.  The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
- -
- -<p>It was discovered that PostgreSQL did not properly verify the Common
- -Name attribute in X.509 certificates, enabling attackers to bypass the
- -(optional) TLS protection on client-server connections, by relying on
- -a certificate from a trusted CA which contains an embedded NUL byte in
- -the Common Name (<a href="https://security-tracker.debian.org/tracker/CVE-2009-4034";>CVE-2009-4034</a>).</p>
+<p>Ð? PostgreSQL, Ñ?еÑ?веÑ? баз даннÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
+
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о PostgreSQL непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? аÑ?Ñ?ибÑ?Ñ?а Common
+Name в Ñ?еÑ?Ñ?иÑ?икаÑ?аÑ? X.509, Ñ?Ñ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам обÑ?одиÑ?Ñ?
+(опÑ?ионалÑ?нÑ?Ñ?) заÑ?иÑ?Ñ? TLS на клиенÑ?-Ñ?еÑ?веÑ?нÑ?Ñ? Ñ?оединениÑ?Ñ?, иÑ?полÑ?зÑ?Ñ?
+Ñ?еÑ?Ñ?иÑ?икаÑ? оÑ? довеÑ?енного авÑ?оÑ?иÑ?еÑ?а, Ñ?одеÑ?жаÑ?ий в аÑ?Ñ?ибÑ?Ñ? Common Name
+вÑ?Ñ?Ñ?оеннÑ?й NUL-байÑ? (<a href="https://security-tracker.debian.org/tracker/CVE-2009-4034";>CVE-2009-4034</a>).</p>
 
- -<p>Authenticated database users could elevate their privileges by
- -creating specially-crafted index functions (<a href="https://security-tracker.debian.org/tracker/CVE-2009-4136";>CVE-2009-4136</a>).</p>
+<p>Ð?вÑ?оÑ?изованнÑ?е полÑ?зоваÑ?ели базÑ? даннÑ?Ñ? могÑ?Ñ? повÑ?Ñ?аÑ?Ñ? Ñ?вои пÑ?ава пÑ?Ñ?Ñ?м
+Ñ?озданиÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? индекÑ?нÑ?Ñ? Ñ?Ñ?нкÑ?ий (<a href="https://security-tracker.debian.org/tracker/CVE-2009-4136";>CVE-2009-4136</a>).</p>
 
- -<p>The following matrix shows fixed source package versions for the
- -respective distributions.</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а Ñ?одеÑ?жиÑ? иÑ?пÑ?авленнÑ?е веÑ?Ñ?ии пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом длÑ?
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?его вÑ?пÑ?Ñ?ка.</p>
 
 <div class="centerdiv"><table cellspacing="0" cellpadding="2">
- -<tr><th>&nbsp;</th>         <th>oldstable/etch</th> <th>stable/lenny</th>   <th>testing/unstable</th></tr>
+<tr><th>&nbsp;</th>         <th>пÑ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й/etch</th> <th>Ñ?Ñ?абилÑ?нÑ?й/lenny</th>   <th>Ñ?еÑ?Ñ?иÑ?Ñ?емÑ?й/неÑ?Ñ?абилÑ?нÑ?й</th></tr>
 <tr><td>postgresql-7.4</td> <td>7.4.27-0etch1</td>  <td>&nbsp;</td>         <td>&nbsp;</td></tr>
 <tr><td>postgresql-8.1</td> <td>8.1.19-0etch1</td>  <td>&nbsp;</td>         <td>&nbsp;</td></tr>
 <tr><td>postgresql-8.3</td> <td>&nbsp;</td>         <td>8.3.9-0lenny1</td>  <td>8.3.9-1</td></tr>
 <tr><td>postgresql-8.4</td> <td>&nbsp;</td>         <td>&nbsp;</td>         <td>8.4.2-1</td></tr>
 </table></div>
 
- -<p>In addition to these security fixes, the updates contain reliability
- -improvements and fix other defects.</p>
+<p>Ð? дополнение к Ñ?Ñ?им иÑ?пÑ?авлениÑ?м безопаÑ?ноÑ?Ñ?и обновление Ñ?одеÑ?жиÑ? Ñ?лÑ?Ñ?Ñ?ениÑ?
+надÑ?жноÑ?Ñ?и и иÑ?пÑ?авлениÑ? дÑ?Ñ?гиÑ? деÑ?екÑ?ов.</p>
 
- -<p>We recommend that you upgrade your PostgreSQL packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? PostgreSQL.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=dWmB
-----END PGP SIGNATURE-----


Reply to: