[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1{239,085,033}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1033.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1033.wml	2016-09-03 12:26:33.998750080 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Horde web
- -application framework, which may lead to the execution of arbitrary 
- -web script code. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Horde, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е веб-пÑ?иложений, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+веб-Ñ?Ñ?енаÑ?иÑ?. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4190";>CVE-2005-4190</a>
 
- -    <p>Several Cross-Site-Scripting vulnerabilities have been discovered in
- -    the "share edit window".</p></li>
+    <p>Ð? "share edit window" бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?лÑ?Ñ?ае межÑ?айÑ?ового
+    Ñ?кÑ?ипÑ?инга .</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1260";>CVE-2006-1260</a>
 
- -    <p>Null characters in the URL parameter bypass a sanity check, which
- -    allowed remote attackers to read arbitrary files, which allowed
- -    information disclosure.</p></li>
+    <p>Null-Ñ?имволÑ? в паÑ?амеÑ?Ñ?е URL обÑ?одÑ?Ñ? пÑ?овеÑ?кÑ? Ñ?иÑ?Ñ?оÑ?Ñ?, Ñ?Ñ?о
+    позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ?, позволÑ?Ñ? им
+    Ñ?аÑ?кÑ?Ñ?ваÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1491";>CVE-2006-1491</a>
 
- -    <p>User input in the help viewer was passed unsanitised to the eval()
- -    function, which allowed injection of arbitrary web code.</p></li>
+    <p>Ð?олÑ?зоваÑ?елÑ?Ñ?кие вÑ?однÑ?е даннÑ?е в пÑ?оÑ?моÑ?Ñ?Ñ?ике Ñ?пÑ?авки пеÑ?едаÑ?Ñ?Ñ?Ñ? Ñ?Ñ?нкÑ?ии eval()
+    без пÑ?едваÑ?иÑ?елÑ?ной оÑ?иÑ?Ñ?ки, Ñ?Ñ?о позволÑ?еÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) doesn't contain horde3 packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? horde3 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 3.0.4-4sarge3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.4-4sarge3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 3.1.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.1.1-1.</p>
 
- -<p>We recommend that you upgrade your horde3 package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? horde3.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1085.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1085.wml	2016-09-03 12:22:27.543843842 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been discovered in lynx, the popular
- -text-mode WWW browser.  The Common Vulnerabilities and Exposures
- -Project identifies the following vulnerabilities:</p>
+<p>Ð? lynx, попÑ?лÑ?Ñ?ном Ñ?екÑ?Ñ?овом веб-бÑ?аÑ?зеÑ?е, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+Project опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2004-1617";>CVE-2004-1617</a>
 
- -    <p>Michal Zalewski discovered that lynx is not able to grok invalid
- -    HTML including a TEXTAREA tag with a large COLS value and a large
- -    tag name in an element that is not terminated, and loops forever
- -    trying to render the broken HTML.</p></li>
+    <p>Ð?иÑ?ал Ð?алевÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о lynx не Ñ?поÑ?обен Ñ?азобÑ?аÑ?Ñ? непÑ?авилÑ?нÑ?й код
+    HTML, вклÑ?Ñ?аÑ?Ñ?ий Ñ?ег TEXTAREA Ñ? болÑ?Ñ?им знаÑ?ением COLS и болÑ?Ñ?им именем
+    Ñ?ега в незакÑ?Ñ?ваÑ?Ñ?емÑ?Ñ? Ñ?леменÑ?е, и вÑ?одиÑ? в беÑ?конеÑ?нÑ?й Ñ?икл,
+    пÑ?Ñ?аÑ?Ñ?Ñ? оÑ?обÑ?азиÑ?Ñ? Ñ?ломанÑ?й код HTML.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3120";>CVE-2005-3120</a>
 
- -    <p>Ulf Härnhammar discovered a buffer overflow that can be remotely
- -    exploited. During the handling of Asian characters when connecting
- -    to an NNTP server lynx can be tricked to write past the boundary
- -    of a buffer which can lead to the execution of arbitrary code.</p></li>
+    <p>УлÑ?Ñ? Ð¥Ñ?Ñ?нÑ?аммаÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а, коÑ?оÑ?ое можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+    Ñ?далÑ?нно. Ð?о вÑ?емÑ? обÑ?абоÑ?ки азиаÑ?Ñ?киÑ? Ñ?имволов пÑ?и подклÑ?Ñ?ении
+    к NNTP-Ñ?еÑ?веÑ?Ñ? lynx можеÑ? вÑ?полниÑ?Ñ? запиÑ?Ñ? за пÑ?еделÑ? вÑ?деленного
+    бÑ?Ñ?еÑ?а памÑ?Ñ?и, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (woody) these problems have been fixed in
- -version 2.8.5-2.5woody1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.8.5-2.5woody1.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.8.6-9sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.8.6-9sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your lynx-cur package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? lynx-cur.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1239.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1239.wml	2016-09-03 12:17:54.097387037 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in SQL Ledger, a web
- -based double-entry accounting program, which may lead to the execution
- -of arbitrary code. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? SQL Ledger, пÑ?огÑ?аммÑ? длÑ? ведениÑ? двойной бÑ?Ñ?галÑ?еÑ?ии на оÑ?нове веб, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4244";>CVE-2006-4244</a>
 
- -    <p>Chris Travers discovered that the session management can be tricked
- -    into hijacking existing sessions.</p></li>
+    <p>Ð?Ñ?иÑ? ТÑ?Ñ?веÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пÑ?авление Ñ?еÑ?Ñ?иÑ?ми можно иÑ?полÑ?зоваÑ?Ñ?
+    длÑ? пеÑ?еÑ?ваÑ?а Ñ?Ñ?Ñ?еÑ?Ñ?вÑ?Ñ?Ñ?иÑ? Ñ?еÑ?Ñ?ий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4731";>CVE-2006-4731</a>
 
- -    <p>Chris Travers discovered that directory traversal vulnerabilities
- -    can be exploited to execute arbitrary Perl code.</p></li>
+    <p>Ð?Ñ?иÑ? ТÑ?Ñ?веÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о обÑ?од каÑ?алога можно иÑ?полÑ?зоваÑ?Ñ?
+    длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода на Ñ?зÑ?ке Perl.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5872";>CVE-2006-5872</a>
 
- -    <p>It was discovered that missing input sanitising allows execution of
- -    arbitrary Perl code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ?
+    пÑ?оизволÑ?нÑ?й код на Ñ?зÑ?ке Perl.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 2.4.7-2sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.7-2sarge1.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been
- -fixed in version 2.6.21-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.6.21-1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.6.21-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.21-1.</p>
 
- -<p>We recommend that you upgrade your sql-ledger packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? sql-ledger.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=8xCQ
-----END PGP SIGNATURE-----


Reply to: