[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-18{59,24,86}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1824.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1824.wml	2016-09-12 17:10:40.243273673 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in phpMyAdmin, a tool
- -to administer MySQL over the web. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? phpMyAdmin, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL Ñ?еÑ?ез веб, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1150";>CVE-2009-1150</a>
 
- -  <p>Cross site scripting vulnerability in the export page allow for an
- -  attacker that can place crafted cookies with the user to inject
- -  arbitrary web script or HTML.</p></li>
+  <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг на Ñ?Ñ?Ñ?аниÑ?е Ñ?кÑ?поÑ?Ñ?а позволÑ?еÑ?
+  злоÑ?мÑ?Ñ?ленникÑ?, коÑ?оÑ?Ñ?й можеÑ? помеÑ?Ñ?иÑ?Ñ? полÑ?зоваÑ?елÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е кÑ?ки,
+  вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1151";>CVE-2009-1151</a>
 
- -  <p>Static code injection allows for a remote attacker to inject arbitrary
- -  code into phpMyAdmin via the setup.php script. This script is in Debian
- -  under normal circumstances protected via Apache authentication.
- -  However, because of a recent worm based on this exploit, we are patching
- -  it regardless, to also protect installations that somehow still expose
- -  the setup.php script.</p></li>
+  <p>Ð?нÑ?екÑ?иÑ? Ñ?Ñ?аÑ?иÑ?ного кода позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й
+  код в phpMyAdmin Ñ? помоÑ?Ñ?Ñ? Ñ?Ñ?енаÑ?иÑ? setup.php. ЭÑ?оÑ? Ñ?Ñ?енаÑ?ий в Debian
+  пÑ?и обÑ?Ñ?нÑ?Ñ? обÑ?Ñ?оÑ?Ñ?елÑ?Ñ?Ñ?ваÑ? заÑ?иÑ?Ñ?н Ñ?еÑ?ез аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ? Apache.
+  Тем не менее, из-за недавнего Ñ?еÑ?вÑ? на оÑ?нове Ñ?Ñ?ой Ñ?Ñ?звимоÑ?Ñ?и мÑ? вÑ?Ñ? Ñ?авно
+  пÑ?едоÑ?Ñ?авлÑ?еÑ? иÑ?пÑ?авление, Ñ?Ñ?обÑ? заÑ?иÑ?иÑ?Ñ? Ñ?Ñ?Ñ?ановки, в коÑ?оÑ?Ñ?Ñ? Ñ?Ñ?енаÑ?ий
+  setup.php каким-Ñ?о обÑ?азом оÑ?кÑ?Ñ?Ñ?.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (etch), these problems have been fixed in
- -version 2.9.1.1-11.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.9.1.1-11.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.11.8.1-5+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.11.8.1-5+lenny1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 3.1.3.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.1.3.1-1.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1859.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1859.wml	2016-09-12 16:55:46.541443983 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Rauli Kaksonen, Tero Rontti and Jukka Taimisto discovered several
- -vulnerabilities in libxml2, a library for parsing and handling XML data
- -files, which can lead to denial of service conditions or possibly arbitrary
- -code execution in the application using the library.  The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>РаÑ?ли Ð?акÑ?онен, ТеÑ?о РонÑ?Ñ?и и Юкка ТаимиÑ?Ñ?о обнаÑ?Ñ?жили неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей в libxml2, библиоÑ?еке длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а и обÑ?абоÑ?ки Ñ?айлов
+в Ñ?оÑ?маÑ?е XML, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или возможномÑ? вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода в пÑ?иложении, иÑ?полÑ?зÑ?Ñ?Ñ?ем Ñ?Ñ?Ñ? библиоÑ?екÑ?.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2416";>CVE-2009-2416</a>
- -<p>An XML document with specially-crafted Notation or Enumeration attribute
- -types in a DTD definition leads to the use of a pointers to memory areas
- -which have already been freed.</p></li>
+<p>XML-докÑ?менÑ? Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?ми Ñ?ипами аÑ?Ñ?ибÑ?Ñ?ов Notation или
+Enumeration в опÑ?еделении DTD пÑ?иводиÑ? к иÑ?полÑ?зовании Ñ?казаÑ?елей на облаÑ?Ñ?и памÑ?Ñ?и,
+коÑ?оÑ?Ñ?е Ñ?же оÑ?вобожденÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2414";>CVE-2009-2414</a>
- -<p>Missing checks for the depth of ELEMENT DTD definitions when parsing
- -child content can lead to extensive stack-growth due to a function
- -recursion which can be triggered via a crafted XML document.</p></li>
+<p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ок глÑ?бинÑ? DTD-опÑ?еделений ELEMENT пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого
+Ñ?азбоÑ?а доÑ?еÑ?него Ñ?одеÑ?жимого можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?Ñ?еÑ?Ñ?венномÑ? Ñ?оÑ?Ñ?Ñ? Ñ?Ñ?ека из-за Ñ?екÑ?Ñ?Ñ?ивного
+вÑ?полнениÑ? Ñ?Ñ?нкÑ?ии, Ñ?Ñ?о можеÑ? бÑ?Ñ?Ñ? вÑ?зваÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м XML-докÑ?менÑ?ом.</p></li>
 
 </ul>
 
 
- -<p>For the oldstable distribution (etch), this problem has been fixed in
- -version 2.6.27.dfsg-6+etch1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.6.27.dfsg-6+etch1.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 2.6.32.dfsg-5+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.6.32.dfsg-5+lenny1.</p>
 
- -<p>For the testing (squeeze) and unstable (sid) distribution, this problem
- -will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а пÑ?облема
+бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
 
- -<p>We recommend that you upgrade your libxml2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libxml2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1886.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1886.wml	2016-09-12 17:15:20.365942460 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Iceweasel web
- -browser, an unbranded version of the Firefox browser. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е Iceweasel, безбÑ?ендовой веÑ?Ñ?ии бÑ?аÑ?зеÑ?а Firefox, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3079";>CVE-2009-3079</a>
 
- -   <p>"moz_bug_r_a4" discovered that a programming error in the FeedWriter
- -   module could lead to the execution of Javascript code with elevated
- -   privileges.</p></li>
+   <p>"moz_bug_r_a4" обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ? в модÑ?ле FeedWriter
+   можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? кода на Ñ?зÑ?ке Javascript Ñ? повÑ?Ñ?еннÑ?ми
+   пÑ?ивилегиÑ?ми.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1310";>CVE-2009-1310</a>
 
- -   <p>Prateek Saxena discovered a cross-site scripting vulnerability in
- -   the MozSearch plugin interface.</p></li>
+   <p>Ð?Ñ?аÑ?ек СÑ?кÑ?ена обнаÑ?Ñ?жил межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в
+   инÑ?еÑ?Ñ?ейÑ?е дополнениÑ? MozSearch.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 3.0.6-3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.6-3.</p>
 
- -<p>As indicated in the Etch release notes, security support for the
- -Mozilla products in the oldstable distribution needed to be stopped
- -before the end of the regular Etch security maintenance life cycle.
- -You are strongly encouraged to upgrade to stable or switch to a still
- -supported browser.</p>
+<p>Ð?ак Ñ?казано в инÑ?оÑ?маÑ?ии о вÑ?пÑ?Ñ?ке Etch, поддеÑ?жка безопаÑ?ноÑ?Ñ?и длÑ?
+пÑ?одÑ?кÑ?ов Mozilla в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке должна бÑ?Ñ?Ñ? оÑ?Ñ?ановлена
+до оконÑ?аниÑ? обÑ?Ñ?ного жизненного Ñ?икла Ñ?опÑ?овождениÑ? безопаÑ?ноÑ?Ñ?и Etch.
+Ð?аÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? обновление до Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка или пеÑ?ейÑ?и на иÑ?полÑ?зование
+поддеÑ?живаемÑ?Ñ? бÑ?аÑ?зеÑ?ов.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 3.0.14-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.14-1.</p>
 
- -<p>For the experimental distribution, these problems have been fixed in
- -version 3.5.3-1.</p>
+<p>Ð? Ñ?кÑ?пеÑ?именÑ?алÑ?ном вÑ?пÑ?Ñ?ке Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.5.3-1.</p>
 
- -<p>We recommend that you upgrade your iceweasel packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceweasel.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=HN5B
-----END PGP SIGNATURE-----


Reply to: