[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-12{2,4}2.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1222.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1222.wml	2016-11-07 16:48:24.505051879 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Due to technical problems yesterday's proftpd update lacked a build for
- -the amd64 architecture, which is now available. For reference please find
- -below the original advisory text:</p>
+<p>Ð?з-за Ñ?еÑ?ниÑ?еÑ?киÑ? пÑ?облем во вÑ?еÑ?аÑ?нем обновлении proftpd оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вовала
+Ñ?боÑ?ка длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? amd64, коÑ?оÑ?аÑ? Ñ?епеÑ?Ñ? доÑ?Ñ?Ñ?пна длÑ? загÑ?Ñ?зки. Ð?иже длÑ?
+Ñ?ведений пÑ?иводиÑ?Ñ?Ñ? оÑ?игиналÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Several remote vulnerabilities have been discovered in the proftpd FTP
- -daemon, which may lead to the execution of arbitrary code or denial
- -of service. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? proftpd, Ñ?лÑ?жбе FTP, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода или оÑ?казÑ?
+в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5815";>CVE-2006-5815</a>
 
- -    <p>It was discovered that a buffer overflow in the <code>sreplace()</code> function
- -    may lead to denial of service and possibly the execution of arbitrary
- -    code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии <code>sreplace()</code>
+    можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании и возможномÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6170";>CVE-2006-6170</a>
 
- -    <p>It was discovered that a buffer overflow in the mod_tls addon module
- -    may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в дополниÑ?елÑ?ном модÑ?ле mod_tls
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6171";>CVE-2006-6171</a>
 
- -    <p>It was discovered that insufficient validation of FTP command buffer
- -    size limits may lead to denial of service. Due to unclear information
- -    this issue was already fixed in <a href="dsa-1218">DSA-1218</a> as <a href="https://security-tracker.debian.org/tracker/CVE-2006-5815";>CVE-2006-5815</a>.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка команд FTP по огÑ?аниÑ?ениÑ?м
+    Ñ?азмеÑ?а бÑ?Ñ?еÑ?а можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании. Ð?з-за неÑ?Ñ?ной инÑ?оÑ?маÑ?ии
+    Ñ?Ñ?а пÑ?облема Ñ?же бÑ?ла иÑ?пÑ?авлена в <a href="dsa-1218">DSA-1218</a> as <a href="https://security-tracker.debian.org/tracker/CVE-2006-5815";>CVE-2006-5815</a>.</p></li>
 
 </ul>
 </blockquote>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.2.10-15sarge3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.3.0-16 of the proftpd-dfsg package.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.0-16 пакеÑ?а the proftpd-dfsg.</p>
 
- -<p>We recommend that you upgrade your proftpd package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? proftpd.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1242.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1242.wml	2016-11-07 16:55:37.965195553 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in elog, a web-based
- -electronic logbook, which may lead to the execution of arbitrary code.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? elog, Ñ?лекÑ?Ñ?онной жÑ?Ñ?нале Ñ?Ñ?Ñ?Ñ?а на оÑ?нове веб, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5063";>CVE-2006-5063</a>
 
- -    <p>Tilman Koschnick discovered that log entry editing in HTML is vulnerable
- -    to cross-site scripting. This update disables the vulnerable code.</p></li>
+    <p>ТилÑ?ман Ð?оÑ?ник обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? Ñ?едакÑ?иÑ?ованиÑ? запиÑ?и жÑ?Ñ?нала в Ñ?оÑ?маÑ?е HTML
+    Ñ?Ñ?звима к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?. Ð?анное обновление оÑ?клÑ?Ñ?аеÑ? Ñ?Ñ?звимÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5790";>CVE-2006-5790</a>
 
- -    <p>Ulf Härnhammar of the Debian Security Audit Project discovered several
- -    format string vulnerabilities in elog, which may lead to execution of
- -    arbitrary code.</p></li>
+    <p>УлÑ?Ñ? Ð¥Ñ?Ñ?нÑ?аммаÑ? из пÑ?оекÑ?а по аÑ?диÑ?Ñ? безопаÑ?ноÑ?Ñ?и Debian обнаÑ?Ñ?жил неÑ?колÑ?ко
+    Ñ?Ñ?звимоÑ?Ñ?ей Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки в elog, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5791";>CVE-2006-5791</a>
 
- -    <p>Ulf Härnhammar of the Debian Security Audit Project discovered 
- -    cross-site scripting vulnerabilities in the creation of new logbook
- -    entries.</p></li>
+    <p>УлÑ?Ñ? Ð¥Ñ?Ñ?нÑ?аммаÑ? из пÑ?оекÑ?а по аÑ?диÑ?Ñ? безопаÑ?ноÑ?Ñ?и Debian обнаÑ?Ñ?жил неÑ?колÑ?ко
+    Ñ?лÑ?Ñ?аев межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга на Ñ?Ñ?Ñ?аниÑ?аÑ? Ñ?озданиÑ? новÑ?Ñ? запиÑ?ей
+    жÑ?Ñ?нала.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6318";>CVE-2006-6318</a>
 
- -    <p>Jayesh KS and Arun Kethipelly of OS2A discovered that elog performs
- -    insufficient error handling in config file parsing, which may lead to
- -    denial of service through a NULL pointer dereference.</p></li>
+    <p>Ð?жеÑ? Ð?Ñ?йÑ?и и Ð?Ñ?Ñ?н Ð?еÑ?ипелли из OS2A обнаÑ?Ñ?жили, Ñ?Ñ?о elog вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?Ñ?
+    обÑ?абоÑ?кÑ? оÑ?ибок в Ñ?оде гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а Ñ?айла наÑ?Ñ?Ñ?оек, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ?
+    к оÑ?казÑ? в обÑ?лÑ?живании из-за Ñ?азÑ?менованиÑ? NULL-Ñ?казаÑ?елÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.5.7+r1558-4+sarge3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5.7+r1558-4+sarge3.</p>
 
- -<p>The upcoming stable distribution (etch) will no longer include elog.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) пакеÑ? elog оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.6.2+r1754-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.2+r1754-1.</p>
 
- -<p>We recommend that you upgrade your elog package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? elog.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Fa7f
-----END PGP SIGNATURE-----


Reply to: