[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{931,828,924}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1828.wml	2009-07-07 23:15:24.000000000 +0600
+++ russian/security/2009/dsa-1828.wml	2016-07-10 16:25:09.474032824 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>insecure module search path</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>небезопаÑ?нÑ?й пÑ?Ñ?Ñ? поиÑ?ка модÑ?лÑ?</define-tag>
 <define-tag moreinfo>
 
- -<p>It was discovered that the ocsinventory-agent which is part of the
- -ocsinventory suite, a hardware and software configuration indexing service,
- -is prone to an insecure perl module search path.  As the agent is started
- -via cron and the current directory (/ in this case) is included in the
- -default perl module path the agent scans every directory on the system
- -for its perl modules.  This enables an attacker to execute arbitrary code
- -via a crafted ocsinventory-agent perl module placed on the system.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о ocsinventory-agent, Ñ?влÑ?Ñ?Ñ?ийÑ?Ñ? Ñ?аÑ?Ñ?Ñ?Ñ?
+пакеÑ?а ocsinventory, Ñ?лÑ?жбÑ? индекÑ?аÑ?ии наÑ?Ñ?Ñ?оек обоÑ?Ñ?дованиÑ? и пÑ?огÑ?аммного обеÑ?пеÑ?ениÑ?,
+Ñ?одеÑ?жиÑ? небезопаÑ?нÑ?й пÑ?Ñ?Ñ? поиÑ?ка моделей Perl.  Ð?оÑ?колÑ?кÑ? агенÑ? запÑ?Ñ?каеÑ?Ñ?Ñ?
+Ñ?еÑ?ез cron, а Ñ?екÑ?Ñ?ий каÑ?алог (в Ñ?Ñ?ом Ñ?лÑ?Ñ?ае /) вклÑ?Ñ?аеÑ?Ñ?Ñ? в
+пÑ?Ñ?Ñ? модÑ?лей Perl по Ñ?молÑ?аниÑ?, поÑ?Ñ?олÑ?кÑ? агенÑ? Ñ?каниÑ?Ñ?еÑ? каждÑ?й каÑ?алог Ñ?иÑ?Ñ?емÑ?
+на пÑ?едмеÑ? модÑ?лей Perl.  ЭÑ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код
+Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного модÑ?лÑ? Perl длÑ? ocsinventory-agent в Ñ?иÑ?Ñ?еме.</p>
 
 
- -<p>The oldstable distribution (etch) does not contain ocsinventory-agent.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) пакеÑ? ocsinventory-agent оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 1:0.0.9.2repack1-4lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:0.0.9.2repack1-4lenny1.</p>
 
- -<p>For the testing distribution (squeeze), this problem has been fixed in
- -version 1:0.0.9.2repack1-5</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:0.0.9.2repack1-5</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:0.0.9.2repack1-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:0.0.9.2repack1-5.</p>
 
 
- -<p>We recommend that you upgrade your ocsinventory-agent packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ocsinventory-agent.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1924.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1924.wml	2016-07-10 16:32:13.939548677 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities have been discovered in mahara, an electronic portfolio,
- -weblog, and resume builder.  The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? mahara, Ñ?лекÑ?Ñ?онном поÑ?Ñ?Ñ?олио, блоге и пÑ?огÑ?амме поÑ?Ñ?Ñ?оениÑ? Ñ?езÑ?ме, бÑ?ло
+обнаÑ?Ñ?жено две Ñ?Ñ?звимоÑ?Ñ?и.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3298";>CVE-2009-3298</a>
 
- -<p>Ruslan Kabalin discovered a issue with resetting passwords, which could
- -lead to a privilege escalation of an institutional administrator
- -account.</p></li>
+<p>РÑ?Ñ?лан Ð?абалин обнаÑ?Ñ?жил пÑ?облемÑ? Ñ?о Ñ?бÑ?оÑ?ом паÑ?олей, коÑ?оÑ?аÑ? можеÑ?
+пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий до Ñ?Ñ?овнÑ? админиÑ?Ñ?Ñ?аÑ?оÑ?а
+оÑ?ганизаÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3299";>CVE-2009-3299</a>
 
- -<p>Sven Vetsch discovered a cross-site scripting vulnerability via the
- -resume fields.</p></li>
+<p>Свен ФеÑ?Ñ? обнаÑ?Ñ?жил межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг, коÑ?оÑ?Ñ?й можно вÑ?зваÑ?Ñ? Ñ?еÑ?ез
+полÑ? Ñ?езÑ?ме.</p></li>
 
 </ul>
 
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.0.4-4+lenny4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.4-4+lenny4.</p>
 
- -<p>The oldstable distribution (etch) does not contain mahara.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) пакеÑ? mahara оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), this problem will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
 
- -<p>We recommend that you upgrade your mahara packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mahara.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1931.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1931.wml	2016-07-10 16:20:05.983347126 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the NetScape Portable
- -Runtime Library, which may lead to the execution of arbitrary code. The 
- -Common Vulnerabilities and Exposures project identifies the following 
- -problems:</p>
+<p>Ð? библиоÑ?еке NetScape Portable Runtime Library бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1563";>CVE-2009-1563</a>
 
- -    <p>A programming error in the string handling code may lead to the
- -    execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ибка пÑ?огÑ?аммиÑ?ованиÑ? в коде обÑ?абоÑ?ки Ñ?Ñ?Ñ?ок можеÑ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2463";>CVE-2009-2463</a>
 
- -    <p>An integer overflow in the Base64 decoding functions may lead to
- -    the execution of arbitrary code.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?Ñ?нкÑ?иÑ?Ñ? декодиÑ?ованиÑ? Base64 могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (etch) doesn't contain nspr.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) пакеÑ? nspr оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 4.7.1-5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.7.1-5.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.8.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.8.2-1.</p>
 
- -<p>We recommend that you upgrade your NSPR packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? NSPR.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=fSfb
-----END PGP SIGNATURE-----


Reply to: