[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-107{9,1}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1071.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1071.wml	2016-12-20 11:15:59.087476641 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in MySQL, a popular SQL
- -database.  The Common Vulnerabilities and Exposures Project identifies
- -the following problems:</p>
+<p>Ð? MySQL, попÑ?лÑ?Ñ?ной базе даннÑ?Ñ? SQL, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0903";>CVE-2006-0903</a>
 
- -    <p>Improper handling of SQL queries containing the NULL character
- -    allows local users to bypass logging mechanisms.</p></li>
+    <p>Ð?екоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка SQL-запÑ?оÑ?ов, Ñ?одеÑ?жаÑ?иÑ? NULL-Ñ?имвол,
+    позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м обÑ?одиÑ?Ñ? меÑ?анизмÑ? ведениÑ? жÑ?Ñ?нала.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1516";>CVE-2006-1516</a>
 
- -    <p>Usernames without a trailing null byte allow remote attackers to
- -    read portions of memory.</p></li>
+    <p>Ð?мена полÑ?зоваÑ?елей без null-байÑ?а на конÑ?е позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? Ñ?аÑ?Ñ?и памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1517";>CVE-2006-1517</a>
 
- -    <p>A request with an incorrect packet length allows remote attackers
- -    to obtain sensitive information.</p></li>
+    <p>Ð?апÑ?оÑ? Ñ? некоÑ?Ñ?екÑ?ной длиной пакеÑ?а позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    полÑ?Ñ?аÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1518";>CVE-2006-1518</a>
 
- -    <p>Specially crafted request packets with invalid length values allow
- -    the execution of arbitrary code.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е пакеÑ?Ñ? запÑ?оÑ?ов Ñ? некоÑ?Ñ?екÑ?нÑ?ми знаÑ?ениÑ?м длинÑ? позволÑ?Ñ?Ñ?
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 </ul>
 
- -<p>The following vulnerability matrix shows which version of MySQL in
- -which distribution has this problem fixed:</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а показÑ?ваеÑ?, в какой веÑ?Ñ?ии MySQL и в каком
+вÑ?пÑ?Ñ?ке, бÑ?ли иÑ?пÑ?авленÑ? Ñ?казаннÑ?е пÑ?облемÑ?:</p>
 
 <div class="centerdiv"><table cellspacing=0 cellpadding=2>
   <tr>
@@ -41,30 +42,30 @@
   <tr>
     <td>mysql</td>
     <td>3.23.49-8.15</td>
- -    <td>n/a</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>4.0.24-10sarge2</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg-4.1</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>4.1.11a-4sarge3</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg-5.0</td>
- -    <td>n/a</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>5.0.21-3</td>
   </tr>
 </table></div>
 
- -<p>We recommend that you upgrade your mysql packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1079.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1079.wml	2016-12-20 11:14:24.850079180 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in MySQL, a popular SQL
- -database.  The Common Vulnerabilities and Exposures Project identifies
- -the following problems:</p>
+<p>Ð? MySQL, попÑ?лÑ?Ñ?ной базе даннÑ?Ñ? SQL, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0903";>CVE-2006-0903</a>
 
- -    <p>Improper handling of SQL queries containing the NULL character
- -    allows local users to bypass logging mechanisms.</p></li>
+    <p>Ð?екоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка SQL-запÑ?оÑ?ов, Ñ?одеÑ?жаÑ?иÑ? NULL-Ñ?имвол,
+    позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м обÑ?одиÑ?Ñ? меÑ?анизмÑ? ведениÑ? жÑ?Ñ?нала.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1516";>CVE-2006-1516</a>
 
- -    <p>Usernames without a trailing null byte allow remote attackers to
- -    read portions of memory.</p></li>
+    <p>Ð?мена полÑ?зоваÑ?елей без null-байÑ?а на конÑ?е позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? Ñ?аÑ?Ñ?и памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1517";>CVE-2006-1517</a>
 
- -    <p>A request with an incorrect packet length allows remote attackers
- -    to obtain sensitive information.</p></li>
+    <p>Ð?апÑ?оÑ? Ñ? некоÑ?Ñ?екÑ?ной длиной пакеÑ?а позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    полÑ?Ñ?аÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1518";>CVE-2006-1518</a>
 
- -    <p>Specially crafted request packets with invalid length values allow
- -    the execution of arbitrary code.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е пакеÑ?Ñ? запÑ?оÑ?ов Ñ? некоÑ?Ñ?екÑ?нÑ?ми знаÑ?ениÑ?м длинÑ? позволÑ?Ñ?Ñ?
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 </ul>
 
- -<p>The following vulnerability matrix shows which version of MySQL in
- -which distribution has this problem fixed:</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а показÑ?ваеÑ?, в какой веÑ?Ñ?ии MySQL и в каком
+вÑ?пÑ?Ñ?ке, бÑ?ли иÑ?пÑ?авленÑ? Ñ?казаннÑ?е пÑ?облемÑ?:</p>
 
 <div class="centerdiv"><table cellspacing=0 cellpadding=2>
   <tr>
@@ -41,30 +42,30 @@
   <tr>
     <td>mysql</td>
     <td>3.23.49-8.15</td>
- -    <td>n/a</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>4.0.24-10sarge2</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg-4.1</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>4.1.11a-4sarge3</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
   </tr>
   <tr>
     <td>mysql-dfsg-5.0</td>
- -    <td>n/a</td>
- -    <td>n/a</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
+    <td>недоÑ?Ñ?Ñ?пно</td>
     <td>5.0.21-3</td>
   </tr>
 </table></div>
 
- -<p>We recommend that you upgrade your mysql packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=F6jI
-----END PGP SIGNATURE-----


Reply to: