[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{447,651}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1447.wml	2014-04-30 13:16:14.000000000 +0600
+++ russian/security/2008/dsa-1447.wml	2016-12-15 12:29:07.292786894 +0500
@@ -1,9 +1,10 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 <p>
- -Several remote vulnerabilities have been discovered in the Tomcat
- -servlet and JSP engine. The Common Vulnerabilities and Exposures project
- -identifies the following problems:
+Ð? Ñ?еÑ?влеÑ?е Tomcat и движке JSP бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:
 </p>
 
 <ul>
@@ -11,57 +12,57 @@
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3382";>CVE-2007-3382</a>
 
     <p>
- -    It was discovered that single quotes (') in cookies were treated
- -    as a delimiter, which could lead to an information leak.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о одинаÑ?нÑ?е кавÑ?Ñ?ки (') в кÑ?ки Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ?
+    Ñ?азделиÑ?елем, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?кам инÑ?оÑ?маÑ?ии.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3385";>CVE-2007-3385</a>
 
     <p>
- -    It was discovered that the character sequence \" in cookies was
- -    handled incorrectly, which could lead to an information leak.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о поÑ?ледоваÑ?елÑ?ноÑ?Ñ?Ñ? Ñ?имволов \" в кÑ?ки
+    обÑ?абаÑ?Ñ?ваеÑ?Ñ?Ñ? некоÑ?Ñ?екÑ?но, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?кам инÑ?оÑ?маÑ?ии.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3386";>CVE-2007-3386</a>
- - 
+
     <p>
- -    It was discovered that the host manager servlet performed
- -    insufficient input validation, which could lead to a cross-site
- -    scripting attack.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?еÑ?влеÑ? Ñ?пÑ?авлениÑ? Ñ?злом вÑ?полнÑ?еÑ?
+    недоÑ?Ñ?аÑ?оÑ?нÑ?Ñ? пÑ?овеÑ?кÑ? вÑ?однÑ?Ñ? даннÑ?Ñ?, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ?
+    Ñ?кÑ?ипÑ?ингÑ?.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5342";>CVE-2007-5342</a>
 
     <p>
- -    It was discovered that the JULI logging component did not restrict
- -    its target path, resulting in potential denial of service through
- -    file overwrites.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о компоненÑ? ведениÑ? жÑ?Ñ?нала JULI не огÑ?аниÑ?иваеÑ?
+    Ñ?елевой пÑ?Ñ?Ñ?, Ñ?Ñ?о пÑ?иводиÑ? к поÑ?енÑ?иалÑ?номÑ? оÑ?казÑ? в обÑ?лÑ?живании из-за
+    пеÑ?езапиÑ?и Ñ?айлов.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5461";>CVE-2007-5461</a>
 
     <p>
- -    It was discovered that the WebDAV servlet is vulnerable to absolute
- -    path traversal.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?еÑ?влеÑ? WebDAV Ñ?Ñ?звим к обÑ?одÑ? абÑ?олÑ?Ñ?ного
+    пÑ?Ñ?и.
     </p></li>
 
 </ul>
 
 <p>
- -The old stable distribution (sarge) doesn't contain tomcat5.5.
+Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ? tomcat5.5 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.
 </p>
 
 <p>
- -For the stable distribution (etch), these problems have been fixed in
- -version 5.5.20-2etch1.
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.5.20-2etch1.
 </p>
 
 <p>
- -For the unstable distribution (sid) these problems will be fixed soon.
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.
 </p>
 
 <p>
- -We recommend that you upgrade your tomcat5.5 packages.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tomcat5.5.
 </p>
 
 </define-tag>
- --- english/security/2008/dsa-1651.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1651.wml	2016-12-15 12:37:39.365364372 +0500
@@ -1,49 +1,50 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the interpreter for
- -the Ruby language, which may lead to denial of service and other
- -security problems. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е Ñ?зÑ?ка Ruby бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании и дÑ?Ñ?гим
+пÑ?облемам безопаÑ?ноÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3655";>CVE-2008-3655</a>
 
- -    <p>Keita Yamaguchi discovered that several safe level restrictions
- -    are insufficiently enforced.</p></li>
- - 
+    <p>Ð?еиÑ?а ЯмагÑ?Ñ?и обнаÑ?Ñ?жил, Ñ?Ñ?о неÑ?колÑ?ко огÑ?аниÑ?ений Ñ?Ñ?овнÑ? безопаÑ?ноÑ?Ñ?и
+    Ñ?еализÑ?Ñ?Ñ?Ñ?Ñ? недоÑ?Ñ?аÑ?оÑ?нÑ?м обÑ?азом.</p></li>
+
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3656";>CVE-2008-3656</a>
 
- -    <p>Christian Neukirchen discovered that the WebRick module uses
- -    inefficient algorithms for HTTP header splitting, resulting in
- -    denial of service through resource exhaustion.</p></li>
+    <p>Ð?Ñ?иÑ?Ñ?иан Ð?ойкиÑ?Ñ?ен обнаÑ?Ñ?жил, Ñ?Ñ?о модÑ?лÑ? WebRick иÑ?полÑ?зÑ?еÑ?
+    недоÑ?Ñ?аÑ?оÑ?нÑ?е алгоÑ?иÑ?мÑ? длÑ? Ñ?азделениÑ? заголовка HTTP, Ñ?Ñ?о пÑ?иводиÑ? к
+    оÑ?казÑ? в обÑ?лÑ?живании из-за иÑ?Ñ?оÑ?ениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3657";>CVE-2008-3657</a>
 
- -    <p>It was discovered that the dl module doesn't perform taintness
- -    checks.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о модÑ?лÑ? dl не вÑ?полнÑ?еÑ? пÑ?овеÑ?ки
+    иÑ?поÑ?Ñ?енноÑ?Ñ?и даннÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3790";>CVE-2008-3790</a>
 
- -    <p>Luka Treiber and Mitja Kolsek discovered that recursively nested
- -    XML entities can lead to denial of service through resource
- -    exhaustion in rexml.</p></li>
+    <p>Ð?Ñ?ка ТÑ?айбеÑ? и Ð?иÑ?Ñ? Ð?олÑ?ек обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?екÑ?Ñ?Ñ?ивно вложеннÑ?е
+    Ñ?Ñ?Ñ?ноÑ?Ñ?и XML могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании из-за иÑ?Ñ?оÑ?ениÑ?
+    Ñ?еÑ?Ñ?Ñ?Ñ?ов в rexml.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3905";>CVE-2008-3905</a>
 
- -    <p>Tanaka Akira discovered that the resolv module uses sequential
- -    transaction IDs and a fixed source port for DNS queries, which
- -    makes it more vulnerable to DNS spoofing attacks.</p></li>
+    <p>Танака Ð?киÑ?а обнаÑ?Ñ?жил, Ñ?Ñ?о модÑ?лÑ? resolv иÑ?полÑ?зÑ?еÑ? иденÑ?иÑ?икаÑ?оÑ?Ñ?
+    поÑ?ледоваÑ?елÑ?нÑ?Ñ? опеÑ?аÑ?ий и Ñ?икÑ?иÑ?ованнÑ?й иÑ?Ñ?однÑ?й поÑ?Ñ? длÑ? запÑ?оÑ?ов DNS, Ñ?Ñ?о
+    делаеÑ? его Ñ?Ñ?звимÑ?м к аÑ?акам по подделке DNS.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.8.5-4etch3. Packages for arm will be provided later.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.5-4etch3. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? arm бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.8.7.72-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.7.72-1.</p>
 
- -<p>We recommend that you upgrade your ruby1.8 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ruby1.8.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=0vqF
-----END PGP SIGNATURE-----


Reply to: