-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2005/dsa-667.wml 2005-02-05 03:14:07.000000000 +0500 +++ russian/security/2005/dsa-667.wml 2016-10-13 18:06:03.108979562 +0500 @@ -1,44 +1,45 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in Squid, the internet - -object cache, the popular WWW proxy cache. The Common Vulnerabilities - -and Exposures project identifies the following vulnerabilities:</p> +<p>Ð Squid, кеÑе ÐнÑеÑнеÑ-обÑекÑов, попÑлÑÑном кеÑиÑÑÑÑем WWW-пÑокÑи, бÑло +обнаÑÑжено неÑколÑко ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities +and Exposures опÑеделÑÐµÑ ÑледÑÑÑие ÑÑзвимоÑÑи:</p> <ul> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173">CAN-2005-0173</a> - - <p>LDAP is very forgiving about spaces in search filters and this - - could be abused to log in using several variants of the login - - name, possibly bypassing explicit access controls or confusing - - accounting.</p> + <p>LDAP забÑÐ²Ð°ÐµÑ Ð¾ пÑÐ¾Ð±ÐµÐ»Ð°Ñ Ð² поиÑковÑÑ ÑилÑÑÑÐ°Ñ , ÑÑо Ð¼Ð¾Ð¶ÐµÑ + пÑиводиÑÑ Ðº Ð²Ñ Ð¾Ð´Ñ Ð² ÑиÑÑемÑ, иÑполÑзÑÑ Ð½ÐµÑколÑко ваÑианÑов имени + полÑзоваÑелÑ, и Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾Ð¼Ñ Ð¾Ð±Ñ Ð¾Ð´Ñ ÑвнÑÑ Ð¾Ð³ÑаниÑений доÑÑÑпа или пÑÑаниÑе + ÑÑÑÑнÑÑ Ð´Ð°Ð½Ð½ÑÑ .</p> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175">CAN-2005-0175</a> - - <p>Cache pollution/poisoning via HTTP response splitting has been - - discovered.</p> + <p>ÐÑло обнаÑÑжено оÑÑавление кеÑа Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑÐ°Ð·Ð´ÐµÐ»ÐµÐ½Ð¸Ñ + HTTP-оÑвеÑа.</p> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0194">CAN-2005-0194</a> - - <p>The meaning of the access controls becomes somewhat confusing if - - any of the referenced ACLs (access control lists) is declared - - empty, without any members.</p> + <p>ÐнаÑение огÑаниÑений доÑÑÑпа ÑÑановиÑÑÑ Ð·Ð°Ð¿ÑÑаннÑм в ÑлÑÑае, еÑли + лÑбой из ÑказаннÑÑ ACL (ÑпиÑок ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑÑпом) обÑÑвлÑеÑÑÑ + пÑÑÑÑм и без Ñленов.</p> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211">CAN-2005-0211</a> - - <p>The length argument of the WCCP recvfrom() call is larger than it - - should be. An attacker may send a larger than normal WCCP packet - - that could overflow a buffer.</p> + <p>Ðлина аÑгÑменÑа WCCP-вÑзова recvfrom() болÑÑе, Ñем она + должна бÑÑÑ. ÐлоÑмÑÑленник Ð¼Ð¾Ð¶ÐµÑ Ð¾ÑпÑавиÑÑ Ð±Ð¾Ð»ÑÑий WCCP-пакеÑ, + коÑоÑÑй вÑÐ·Ð¾Ð²ÐµÑ Ð¿ÐµÑеполнение бÑÑеÑа.</p> </ul> - -<p>For the stable distribution (woody) these problems have been fixed in - -version 2.4.6-2woody6.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (woody) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 2.4.6-2woody6.</p> - -<p>For the unstable distribution (sid) these problems have been fixed in - -version 2.5.7-7.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 2.5.7-7.</p> - -<p>We recommend that you upgrade your squid package.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑ squid.</p> </define-tag> # do not modify the following line - --- english/security/2005/dsa-798.wml 2005-09-02 17:48:47.000000000 +0600 +++ russian/security/2005/dsa-798.wml 2016-10-13 18:12:36.979398189 +0500 @@ -1,43 +1,44 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in phpgroupware, a web - -based groupware system written in PHP. The Common Vulnerabilities and - -Exposures project identifies the following problems:</p> +<p>Ð phpgroupware, веб-ÑиÑÑеме ÑовмеÑÑной ÑабоÑÑ, напиÑанной на PHP, +бÑло обнаÑÑжено неÑколÑко ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and +Exposures опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ:</p> <ul> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2498">CAN-2005-2498</a> - - <p>Stefan Esser discovered another vulnerability in the XML-RPC - - libraries that allows injection of arbitrary PHP code into eval() - - statements. The XMLRPC component has been disabled.</p> + <p>ШÑеÑан ÐÑÑÐµÑ Ð¾Ð±Ð½Ð°ÑÑжил еÑÑ Ð¾Ð´Ð½Ñ ÑÑзвимоÑÑÑ Ð² библиоÑÐµÐºÐ°Ñ XML-RPC, + коÑоÑÐ°Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð²Ð²Ð¾Ð´Ð¸ÑÑ Ð¿ÑоизволÑнÑй код на ÑзÑке PHP в ÑÑвеÑÐ¶Ð´ÐµÐ½Ð¸Ñ + eval(). ÐÐ¾Ð¼Ð¿Ð¾Ð½ÐµÐ½Ñ XMLRPC бÑл оÑклÑÑен.</p> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2600">CAN-2005-2600</a> - - <p>Alexander Heidenreich discovered a cross-site scripting problem - - in the tree view of FUD Forum Bulletin Board Software, which is - - also present in phpgroupware.</p> + <p>ÐлекÑÐ°Ð½Ð´Ñ Ð¥Ð°Ð¹Ð´ÐµÐ½ÑÐ°Ð¹Ñ Ð¾Ð±Ð½Ð°ÑÑжил межÑайÑовÑй ÑкÑипÑинг + в дÑевовидном окне пÑоÑмоÑÑа FUD Forum Bulletin Board Software, коÑоÑое + пÑиÑÑÑÑÑвÑÐµÑ Ð² phpgroupware.</p> <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2761">CAN-2005-2761</a> - - <p>A global cross-site scripting fix has also been included that - - protects against potential malicious scripts embedded in CSS and - - xmlns in various parts of the application and modules.</p> + <p>ÐÑло добавлено иÑпÑавление глобалÑного межÑайÑового ÑкÑипÑинга, коÑоÑое + заÑиÑÐ°ÐµÑ Ð¾Ñ Ð¿Ð¾ÑенÑиалÑнÑÑ Ð²ÑедоноÑнÑÑ ÑÑенаÑиев, внедÑÑемÑÑ Ð² CSS и + xmlns в ÑазлиÑнÑÑ ÑаÑÑÑÑ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸ модÑлей.</p> </ul> - -<p>This update also contains a postinst bugfix that has been approved for - -the next update to the stable release.</p> +<p>Ðанное обновление ÑодеÑÐ¶Ð¸Ñ Ð¸ÑпÑавление ÑÑенаÑиÑÑ , запÑÑкаемого поÑле ÑÑÑановки пакеÑа, коÑоÑое +бÑло запланиÑовано к вклÑÑÐµÐ½Ð¸Ñ Ð² ÑледÑÑÑÑÑ ÑедакÑÐ¸Ñ ÑÑабилÑного вÑпÑÑка.</p> - -<p>For the old stable distribution (woody) these problems don't apply.</p> +<p>ÐÐ»Ñ Ð¿ÑедÑдÑÑего ÑÑабилÑного вÑпÑÑка (woody) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð½Ðµ акÑÑалÑнÑ.</p> - -<p>For the stable distribution (sarge) these problems have been fixed in - -version 0.9.16.005-3.sarge2.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (sarge) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 0.9.16.005-3.sarge2.</p> - -<p>For the unstable distribution (sid) these problems have been fixed in - -version 0.9.16.008.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 0.9.16.008.</p> - -<p>We recommend that you upgrade your phpgroupware packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ phpgroupware.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJX/4hHAAoJEF7nbuICFtKlOUIQAKB1nIGfG9jaKWMPAnbns+LH i38AJiZiciXM0D+CthBvJp3NrHBc//3b0k4hEimLZw3mYSiiY7LQgbUhSi4DqOS9 II/k5w7NY3sgQcn+/taxWJRcKWZZOwPeGWSCLRyti91dO7VGKpJpWiPzFtzwQxaL IO5bQqkMo8U+yLM4A/Q5VCD5ES76Jh570wwwsdvBbxlyYXzApbsa0PXrSaBbEz/M 2PoYxfo8THFbCYHIze55qq1bEgNgPxVb5YYqH4Jmu+qYjJmkY06XiTWaV0Fp7ByB WZh/tUvFt5sUVVrWurfYWKz2rUWCxTtDoSaPQLwzG28E7EJLY932JJthWeLQgb0M t1idzmdBDbw0D1ZRa+idB/5K4MVcT3ndNXYHeK94sA6ndHVJmnZbFxykLxYIMoF/ 7g2zD5DfRuPdVdo1FU6EV6ycNBWCwZ2z5/EX4ZyTAQbZEIMC+eOCYnTeL5Apjak4 rNKU5fy5oLfqH5/Sq/OZS6dz1RS3Th48FKoLyac6VvYRy1pRPt2zLR5m5yDSXdyd GwhA+vjImxgMu1Py0zbGf/y3mLnYnaPVCAkHXZBVCGhTPC69X8YOuwsyT0qnINJU Y+hYXkoavvsvUTY1uZ1ASOiY/lmPpQ5DfnIkLB5/hf81mISBnyxOr8G4QGFcSp1Y xRRqNelEj/5JvjvIszVb =Sy4D -----END PGP SIGNATURE-----