[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-12{06,13}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1206.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1206.wml	2016-11-07 16:36:21.984168407 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in PHP, a
- -server-side, HTML-embedded scripting language, which may lead to the
- -execution of arbitrary code. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? PHP, Ñ?еÑ?веÑ?ном Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев Ñ?о вÑ?Ñ?Ñ?оенной поддеÑ?жкой HTML, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3353";>CVE-2005-3353</a>
 
- -    <p>Tim Starling discovered that missing input sanitising in the EXIF
- -    module could lead to denial of service.</p></li>
+    <p>Тим СÑ?аÑ?линг обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в модÑ?ле EXIF
+    можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3017";>CVE-2006-3017</a>
 
- -    <p>Stefan Esser discovered a security-critical programming error in the
- -    hashtable implementation of the internal Zend engine.</p></li>
+    <p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил кÑ?иÑ?иÑ?еÑ?кÑ?Ñ? оÑ?ибкÑ? пÑ?огÑ?аммиÑ?ованиÑ? в
+    Ñ?еализаÑ?ии Ñ?еÑ?-Ñ?аблиÑ? во внÑ?Ñ?Ñ?еннем движке Zend.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4482";>CVE-2006-4482</a>
 
- -    <p>It was discovered that str_repeat() and wordwrap() functions perform
- -    insufficient checks for buffer boundaries on 64 bit systems, which
- -    might lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?Ñ?нкÑ?ии str_repeat() и wordwrap() вÑ?полнÑ?Ñ?Ñ?
+    недоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки гÑ?аниÑ? бÑ?Ñ?еÑ?ов в 64-биÑ?нÑ?Ñ? Ñ?иÑ?Ñ?емаÑ?, Ñ?Ñ?о
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5465";>CVE-2006-5465</a>
 
- -    <p>Stefan Esser discovered a buffer overflow in the htmlspecialchars()
- -    and htmlentities(), which might lead to the execution of arbitrary
- -    code.</p></li>
+    <p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в htmlspecialchars()
+    и htmlentities(), коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4:4.3.10-18. Builds for hppa and m68k will be provided later
- -once they are available.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:4.3.10-18. СбоÑ?ки длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? hppa и m68k бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ?
+позже по меÑ?е доÑ?Ñ?Ñ?пноÑ?Ñ?и.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4:4.4.4-4 of php4 and version 5.1.6-6 of php5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4:4.4.4-4 пакеÑ?а php4 и в веÑ?Ñ?ии 5.1.6-6 пакеÑ?а php5.</p>
 
- -<p>We recommend that you upgrade your php4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php4.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1213.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1213.wml	2016-11-07 16:42:12.022477690 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Imagemagick,
- -a collection of image manipulation programs, which may lead to the
- -execution of arbitrary code. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Imagemagick, набоÑ?е пÑ?огÑ?амм длÑ? Ñ?абоÑ?Ñ? Ñ? изобÑ?ажениÑ?ми, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0082";>CVE-2006-0082</a>
 
- -    <p>Daniel Kobras discovered that Imagemagick is vulnerable to format
- -    string attacks in the filename parsing code.</p></li>
+    <p>Ð?Ñ?ниел Ð?обÑ?аÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Imagemagick Ñ?Ñ?звим к аÑ?акам на Ñ?оÑ?маÑ?нÑ?е
+    Ñ?Ñ?Ñ?оки в коде длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а имÑ?н Ñ?айлов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4144";>CVE-2006-4144</a>
 
- -    <p>Damian Put discovered that Imagemagick is vulnerable to buffer
- -    overflows in the module for SGI images.</p></li>
+    <p>Ð?емиÑ?н Ð?Ñ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о Imagemagick Ñ?Ñ?звим к пеÑ?еполнениÑ?м
+    бÑ?Ñ?еÑ?а в модÑ?ле длÑ? поддеÑ?жки изобÑ?ажений в Ñ?оÑ?маÑ?е SGI.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5456";>CVE-2006-5456</a>
 
- -    <p>M Joonas Pihlaja discovered that Imagemagick is vulnerable to buffer
- -    overflows in the module for DCM and PALM images.</p></li>
+    <p>Ð?Ñ?наÑ? Ð?иÑ?лайа обнаÑ?Ñ?жил, Ñ?Ñ?о Imagemagick Ñ?Ñ?звим к пеÑ?еполнениÑ?
+    бÑ?Ñ?еÑ?а в модÑ?ле длÑ? поддеÑ?жки изобÑ?ажений в Ñ?оÑ?маÑ?е DCM и PALM.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5868";>CVE-2006-5868</a>
 
- -    <p>Daniel Kobras discovered that Imagemagick is vulnerable to buffer
- -    overflows in the module for SGI images.</p></li>
+    <p>Ð?Ñ?ниел Ð?обÑ?аÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Imagemagick Ñ?Ñ?звим к пеÑ?еполнениÑ?
+    бÑ?Ñ?еÑ?а в модÑ?ле длÑ? поддеÑ?жки изобÑ?ажений в Ñ?оÑ?маÑ?е SGI.</p></li>
 </ul>
 
- -<p>This update also addresses regressions in the XCF codec, which were
- -introduced in the previous security update.</p>
+<p>Ð?Ñ?оме Ñ?ого, в данном обновлении иÑ?пÑ?авленÑ? Ñ?егÑ?еÑ?Ñ?ии в кодеке XCF, коÑ?оÑ?Ñ?е
+поÑ?вилиÑ?Ñ? в пÑ?едÑ?дÑ?Ñ?ем обновлении безопаÑ?ноÑ?Ñ?и.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 6:6.0.6.2-2.8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 6:6.0.6.2-2.8.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been
- -fixed in version 7:6.2.4.5.dfsg1-0.11.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 7:6.2.4.5.dfsg1-0.11.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 7:6.2.4.5.dfsg1-0.11.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7:6.2.4.5.dfsg1-0.11.</p>
 
- -<p>We recommend that you upgrade your imagemagick packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? imagemagick.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=kMvS
-----END PGP SIGNATURE-----


Reply to: