[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2005/dsa-674.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-674.wml	2017-11-01 10:11:09.371782148 +0500
+++ russian/security/2005/dsa-674.wml	2018-02-19 12:36:55.823198894 +0500
@@ -1,47 +1,48 @@
- -<define-tag description>cross-site scripting, directory traversal</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг, обÑ?од каÑ?алога</define-tag>
 <define-tag moreinfo>
- -<p>Due to an incompatibility between Python 1.5 and 2.1 the last mailman
- -update did not run with Python 1.5 anymore.  This problem is corrected
- -with this update.  This advisory only updates the packages updated
- -with DSA 674-2.  The version in unstable is not affected since it is
- -not supposed to work with Python 1.5 anymore.  For completeness below
- -is the original advisory text:</p>
+<p>Ð?з-за неÑ?овмеÑ?Ñ?имоÑ?Ñ?и междÑ? Python 1.5 и 2.1 поÑ?леднее обновление
+mailman более не Ñ?абоÑ?аеÑ? Ñ? Python 1.5. ЭÑ?а пÑ?облема иÑ?пÑ?авлена
+в данном обновлении. Ð?аннаÑ? Ñ?екомендаÑ?иÑ? лиÑ?Ñ? обновлÑ?еÑ? пакеÑ?Ñ?, обновлÑ?ннÑ?е
+Ñ? DSA 674-2. Ð?еÑ?Ñ?иÑ? в неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке не подвеÑ?жена Ñ?казанной пÑ?облеме,
+поÑ?колÑ?кÑ? она не пÑ?едполагаеÑ? иÑ?полÑ?зованиÑ? Ñ? Python 1.5. Ð?лÑ? полноÑ?Ñ? инÑ?оÑ?маÑ?ии
+ниже пÑ?иводиÑ?Ñ?Ñ? Ñ?екÑ?Ñ? изнаÑ?алÑ?ной Ñ?екомендаÑ?ии:</p>
 
 <blockquote>
- -<p>Two security related problems have been discovered in mailman,
- -web-based GNU mailing list manager.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? mailman, веб-менеждеÑ?е Ñ?пиÑ?ков Ñ?аÑ?Ñ?Ñ?лки оÑ? пÑ?оекÑ?а GNU, бÑ?ли обнаÑ?Ñ?женÑ?
+две Ñ?вÑ?заннÑ?е Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облемÑ?. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1177";>CAN-2004-1177</a>
 
- -    <p>Florian Weimer discovered a cross-site scripting vulnerability in
- -    mailman's automatically generated error messages.  An attacker
- -    could craft a URL containing JavaScript (or other content
- -    embedded into HTML) which triggered a mailman error page that
- -    would include the malicious code verbatim.</p>
+    <p>ФлоÑ?иан Ð?аймеÑ? обнаÑ?Ñ?жил межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в авÑ?омаÑ?иÑ?еÑ?ки Ñ?оздаваемÑ?Ñ?
+    Ñ?ообÑ?ениÑ?Ñ? об оÑ?ибкаÑ? mailman. Ð?лоÑ?мÑ?Ñ?ленник можеÑ?
+    Ñ?Ñ?оÑ?миÑ?оваÑ?Ñ? Ñ?пеÑ?иалÑ?нÑ?й URL, Ñ?одеÑ?жаÑ?ий код на JavaScript (или дÑ?Ñ?гое Ñ?одеÑ?жание,
+    вÑ?Ñ?Ñ?оенное в HTML), обÑ?абоÑ?ка коÑ?оÑ?ого пÑ?иведÑ?Ñ? к оÑ?обÑ?ажениÑ? Ñ?Ñ?Ñ?аниÑ?Ñ? Ñ? оÑ?ибкой mailman,
+    Ñ?одеÑ?жаÑ?ей вÑ?едоноÑ?нÑ?й код.</p>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202";>CAN-2005-0202</a>
 
- -    <p>Several listmasters have noticed unauthorised access to archives
- -    of private lists and the list configuration itself, including the
- -    users passwords.  Administrators are advised to check the
- -    webserver logfiles for requests that contain "/...../" and the
- -    path to the archives or configuration.  This does only seem to
- -    affect installations running on web servers that do not strip
- -    slashes, such as Apache 1.3.</p>
+    <p>Ð?еÑ?колÑ?ко админиÑ?Ñ?Ñ?аÑ?оÑ?ов Ñ?пиÑ?ков Ñ?аÑ?Ñ?Ñ?лки замеÑ?или неавÑ?оÑ?изованнÑ?й доÑ?Ñ?Ñ?п к
+    аÑ?Ñ?ивам закÑ?Ñ?Ñ?Ñ?Ñ? Ñ?пиÑ?ков, а Ñ?акже наÑ?Ñ?Ñ?ойкам Ñ?амиÑ? Ñ?пиÑ?ков, вклÑ?Ñ?аÑ?
+    паÑ?оли полÑ?зоваÑ?елей. Ð?дминиÑ?Ñ?Ñ?аÑ?оÑ?ам Ñ?екомендÑ?еÑ?Ñ?Ñ? пÑ?овеÑ?иÑ?Ñ? Ñ?айлÑ? жÑ?Ñ?нала
+    веб-Ñ?еÑ?веÑ?а на пÑ?едмеÑ? налиÑ?иÑ? запÑ?оÑ?ов, Ñ?одеÑ?жаÑ?иÑ? "/...../" и пÑ?Ñ?Ñ?
+    к аÑ?Ñ?ивам или наÑ?Ñ?Ñ?ойкам. Ð?ак кажеÑ?Ñ?Ñ?, Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко
+    Ñ?Ñ?Ñ?ановок, иÑ?полÑ?зÑ?Ñ?Ñ?иÑ? веб-Ñ?еÑ?веÑ?Ñ?, коÑ?оÑ?Ñ?е не Ñ?далÑ?Ñ?Ñ? коÑ?Ñ?е
+    Ñ?еÑ?Ñ?Ñ? (напÑ?имеÑ?, Apache 1.3).</p>
 
 </ul>
 </blockquote>
 
- -<p>For the stable distribution (woody) these problems have been fixed in
- -version 2.0.11-1woody11.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.11-1woody11.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.1.5-6.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1.5-6.</p>
 
- -<p>We recommend that you upgrade your mailman package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mailman.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=xW5S
-----END PGP SIGNATURE-----


Reply to: