[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1{104,073}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1073.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1073.wml	2016-12-20 11:11:34.220979508 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in MySQL, a popular SQL
- -database.  The Common Vulnerabilities and Exposures Project identifies
- -the following problems:</p>
+<p>Ð? MySQL, попÑ?лÑ?Ñ?ной базе даннÑ?Ñ? SQL, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0903";>CVE-2006-0903</a>
 
- -    <p>Improper handling of SQL queries containing the NULL character
- -    allows local users to bypass logging mechanisms.</p></li>
+    <p>Ð?екоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка SQL-запÑ?оÑ?ов, Ñ?одеÑ?жаÑ?иÑ? NULL-Ñ?имвол,
+    позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м обÑ?одиÑ?Ñ? меÑ?анизмÑ? ведениÑ? жÑ?Ñ?нала.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1516";>CVE-2006-1516</a>
 
- -    <p>Usernames without a trailing null byte allow remote attackers to
- -    read portions of memory.</p></li>
+    <p>Ð?мена полÑ?зоваÑ?елей без null-байÑ?а на конÑ?е позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? Ñ?аÑ?Ñ?и памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1517";>CVE-2006-1517</a>
 
- -    <p>A request with an incorrect packet length allows remote attackers
- -    to obtain sensitive information.</p></li>
+    <p>Ð?апÑ?оÑ? Ñ? некоÑ?Ñ?екÑ?ной длиной пакеÑ?а позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    полÑ?Ñ?аÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1518";>CVE-2006-1518</a>
 
- -    <p>Specially crafted request packets with invalid length values allow
- -    the execution of arbitrary code.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е пакеÑ?Ñ? запÑ?оÑ?ов Ñ? некоÑ?Ñ?екÑ?нÑ?ми знаÑ?ениÑ?м длинÑ? позволÑ?Ñ?Ñ?
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 </ul>
 
- -<p>The following vulnerability matrix shows which version of MySQL in
- -which distribution has this problem fixed:</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а показÑ?ваеÑ?, в какой веÑ?Ñ?ии MySQL и в каком
+вÑ?пÑ?Ñ?ке, бÑ?ли иÑ?пÑ?авленÑ? Ñ?казаннÑ?е пÑ?облемÑ?:</p>
 
 <div class="centerdiv"><table cellspacing=0 cellpadding=2>
   <tr>
@@ -41,29 +42,29 @@
   <tr>
     <td>mysql</td>
     <td>3.23.49-8.15</td>
- -    <td>n/a</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>4.0.24-10sarge2</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg-4.1</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>4.1.11a-4sarge3</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg-5.0</td>
- -    <td>n/a</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>5.0.21-3</td>
   </tr>
 </table></div>
- -<p>We recommend that you upgrade your mysql packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1104.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1104.wml	2016-12-20 11:06:56.486960947 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.7" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Loading malformed XML documents can cause buffer overflows in
- -OpenOffice.org, a free office suite, and cause a denial of service or
- -execute arbitrary code.  It turned out that the correction in DSA
- -1104-1 was not sufficient, hence, another update. For completeness
- -please find the original advisory text below:</p>
+<p>Ð?агÑ?Ñ?зка Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? докÑ?менÑ?ов в Ñ?оÑ?маÑ?е XML можеÑ? вÑ?зваÑ?Ñ? пеÑ?еполнение
+бÑ?Ñ?еÑ?а в OpenOffice.org, Ñ?вободном набоÑ?е оÑ?иÑ?нÑ?Ñ? пÑ?иложений, и пÑ?иводиÑ?Ñ? к оÑ?казÑ? в
+обÑ?лÑ?живании или вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?казалоÑ?Ñ?, Ñ?Ñ?о иÑ?пÑ?авление, вÑ?пÑ?Ñ?енное в DSA
+1104-1, бÑ?ло недоÑ?Ñ?аÑ?оÑ?но, поÑ?Ñ?омÑ? Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ? еÑ?Ñ? одно обновление. Ð?лÑ? полноÑ?Ñ?
+ниже пÑ?иводиÑ?Ñ?Ñ? изнаÑ?алÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Several vulnerabilities have been discovered in OpenOffice.org, a free
- -office suite.  The Common Vulnerabilities and Exposures Project
- -identifies the following problems:</p>
+<p>Ð? OpenOffice.org, Ñ?вободном набоÑ?е оÑ?иÑ?нÑ?Ñ? пÑ?иложений, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2198";>CVE-2006-2198</a>
 
- -    <p>It turned out to be possible to embed arbitrary BASIC macros in
- -    documents in a way that OpenOffice.org does not see them but
- -    executes them anyway without any user interaction.</p></li>
+    <p>Ð?казÑ?ваеÑ?Ñ?Ñ? можно вÑ?Ñ?Ñ?оиÑ?Ñ? пÑ?оизволÑ?нÑ?е макÑ?оÑ?Ñ? на Ñ?зÑ?ке BASIC в
+    докÑ?менÑ?Ñ? Ñ?ак, Ñ?Ñ?о OpenOffice.org не видиÑ? иÑ?, но
+    вÑ?полнÑ?еÑ? без какого-либо взаимодейÑ?Ñ?виÑ? Ñ? полÑ?зоваÑ?елем.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2199";>CVE-2006-2199</a>
 
- -    <p>It is possible to evade the Java sandbox with specially crafted
- -    Java applets.</p></li>
+    <p>Ð?ожно вÑ?йÑ?и из пеÑ?оÑ?ниÑ?Ñ? Java пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ?
+    Java-апплеÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3117";>CVE-2006-3117</a>
 
- -    <p>Loading malformed XML documents can cause buffer overflows and
- -    cause a denial of service or execute arbitrary code.</p>
+    <p>Ð?агÑ?Ñ?зка Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? докÑ?менÑ?ов в Ñ?оÑ?маÑ?е XML можеÑ? вÑ?зваÑ?Ñ? пеÑ?еполнение
+    бÑ?Ñ?еÑ?а, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
 </ul>
 
- -<p>This update has the Mozilla component disabled, so that the
- -Mozilla/LDAP addressbook feature won't work anymore.  It didn't work on
- -anything else than i386 on sarge either.</p>
+<p>Ð? данном обновлении оÑ?клÑ?Ñ?ен компоненÑ? Mozilla, поÑ?Ñ?омÑ? адÑ?еÑ?наÑ? книга
+Mozilla/LDAP более не Ñ?абоÑ?аеÑ?. УказаннÑ?й компоненÑ? в вÑ?пÑ?Ñ?ке sarge не
+Ñ?абоÑ?ал на на какой дÑ?Ñ?гой аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?е помимо i386.</p>
 </blockquote>
 
- -<p>The old stable distribution (woody) does not contain OpenOffice.org
- -packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? OpenOffice.org
+оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) this problem has been fixed in
- -version 1.1.3-9sarge3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.1.3-9sarge3.</p>
 
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 2.0.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.3-1.</p>
 
- -<p>We recommend that you upgrade your OpenOffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? OpenOffice.org.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlhYy5oACgkQXudu4gIW
0qWAfRAAlrRigj7XdX7hg3nVZAT2pqPzqxPIB6dhMuPOA5Y2iVa342FOQCItoAty
EtGJtDZ2wWnjjLtBllFgIPgrkZRWqQZhTLmejkrmp4XEjaZZTljSduGgLhcb5CHX
LC+Rx3XCFGkn5qa//IA5SVpvTiX+nxtzdin1JO2sjWLP4tg7yyxuMwqkUznrniTr
SgPXMX6awvYWAy4Fm28V2UpdMQdWHqPR51eLRbdKyllMKd1Em5z/Rp1BKEoPvACb
dZA6DfofVMAczLy9U9UvJOqh9Dq/JtcYsVhR4wwmAfbFTajws0NwwYdpuUkHsG4X
HTVMkCS4931dqCKXJL13gJaOJnozRpPJEST6UIlFfDOUiE86uRIQw94bHL7luXSx
DZFt/c+lZiDnv6UDfgzhMSXDcz7XklKVGLyWETilH8kqAXgsb9ejghxsgF6THcSE
hf7E20OpklXUlJFqSTM2yMptd1n3O0L23B1WaRLKQXXZlB1spBD64dU+htg3+ZDO
/fZD5MgxYo944gTd7AZZ+dnnvoPoMXT8BaCO+bTzFhbp4c5QLk5CGmiakFERc6hG
VS++4aKj2dNgSdg7IfAs6+DsN9jOCkihRzYTfTnBjk3trXz5GD6m80A4fyZC1OGK
9+N3bGwO4ytXgfaQY6oZ13gc/q3xYwP3w83dARboUa6l429RZDY=
=wHW+
-----END PGP SIGNATURE-----


Reply to: