Skip to content

Commit 546e0c6

Browse files
committed
Import missing headers in news posts
These headers are named anchors on the original site and have previously been ignored at import.
1 parent e22ab4a commit 546e0c6

File tree

174 files changed

+1307
-1227
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

174 files changed

+1307
-1227
lines changed

bg/news/_posts/2010-11-15-ruby-1-9-2-released-.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: "Излезе Ruby 1.9.2"
44
lang: bg
55
---
66

7-
Излезе Ruby 1.9.2. Това е последната стабилна версия от серията 1.9. ###
7+
Излезе Ruby 1.9.2. Това е последната стабилна версия от серията 1.9. ### За Ruby 1.9.2
88

99
Новата версия 1.9.2 e почти изцяло съвместима с 1.9.1, изключение правят
1010
следните промени:
@@ -24,23 +24,23 @@ lang: bg
2424

2525
Ruby 1.9.2 покрива повече от 99% от [RubySpec][3].
2626

27-
###
27+
### Поддържани платформи
2828

2929
Ruby 1.9 има четири нива на поддръжка.
3030

31-
31+
Поддържани
3232
: Поверили сме, че Ruby 1.9.2 работи добре на тези платформи.
3333
* Debian GNU/Linux 5.0 на IA32.
3434

35-
35+
Основни усилия са положени за
3636
: Поверили сме, че Ruby 1.9.2 работи добре на повечето от тях.
3737
* mswin32, x64-mswin64, mingw32
3838
* MacOS X 10.5 (Intel) и 10.6
3939
* FreeBSD 6 и следващи amd64, IA32)
4040
* Solaris 10
4141
* Symbian OS
4242

43-
43+
Вероятно поддържани
4444
: Мислим, че Ruby 1.9.2 ще работи добре на тези платформи с леки
4545
модификации.
4646
* Други Linux дистрибуции
@@ -50,47 +50,47 @@ Ruby 1.9 има четири нива на поддръжка.
5050
* Други POSIX-съвместими операционни системи
5151
* BeOS (Haiku)
5252

53-
###
54-
53+
### Често задавани въпроси
5554

55+
Стандартната библиотека се инсталира в /usr/local/lib/ruby/1.9.1
5656
: Тази версия е съвместима на ниво библиотеки. Ruby 1.9.2 е почти
5757
напълно съвместима с 1.9.1, за това библиотеките се инсталират в
5858
директорията на 1.9.1.
5959

60-
60+
It causes a LoadError
6161
: `$:` не включва вече текущата директория. По тази причина някои
6262
скриптове трябва да бъдат модифицирани за да работят коректно.
6363

64-
###
64+
### За сваляне
6565

6666
* [<URL:http://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.2-p0.tar.bz2>][4]
67-
67+
РАЗМЕР:
6868
: 8495472 bytes
6969

70-
70+
MD5:
7171
: d8a02cadf57d2571cd4250e248ea7e4b
7272

73-
73+
SHA256:
7474
: e9710990ed8c2e794123aba509010471915fb13c27dae0118831d2001a9c8d3b
7575

7676
* [<URL:http://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.2-p0.tar.gz>][5]
77-
77+
РАЗМЕР:
7878
: 10787899 bytes
7979

80-
80+
MD5:
8181
: 755aba44607c580fddc25e7c89260460
8282

83-
83+
SHA256:
8484
: 8c0c4e261a921b5c406bf9e76ac23bf3c915651534e9d1b9e8c5d0bee4a7285c
8585

8686
* [<URL:http://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.2-p0.zip>][6]
87-
87+
РАЗМЕР:
8888
: 12159728 bytes
8989

90-
90+
MD5:
9191
: e57a393ccd62ddece4c63bd549d8cf7f
9292

93-
93+
SHA256:
9494
: e61521af06da71fde9f0c7c08baaf7415614d00c86ec5a7ab08b60a4f3185b2a
9595

9696

de/news/_posts/2006-12-04-another-dos-vulnerability-in-cgi-library.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,23 +14,23 @@ Die Schwachstelle wurde als [JVN#84798830][1] veröffentlicht.
1414

1515
Bitte beachtet, dass [der letzte Patch][2] dieses Problem nicht behebt.
1616

17-
####
17+
#### Auswirkungen
1818

1919
Eine bestimmte HTTP-Anfrage belastet die CPU übermäßig, wenn die
2020
Web-Anwendung die cgi.rb benutzt. Viele solcher Anfragen führen zur
2121
einer Überlastung (DoS).
2222

23-
####
24-
23+
#### Betroffene Versionen
2524

25+
1.8 Reihe
2626
: 1\.8.5 und alle vorherigen
2727

28-
28+
Entwicklerversion (1.9 Reihe)
2929
: Alle Versionen vor dem 04.12.2006
3030

31-
####
32-
31+
#### Lösung
3332

33+
1.8 Reihe
3434

3535
: Bitte benutzt [die Version 1.8.5-p2][3].
3636

@@ -39,10 +39,10 @@ einer Überlastung (DoS).
3939
Bitte bedenkt, dass Euer Paketmanager eventuell bereits einen
4040
dementsprechenden Patch eingespielt hat.
4141

42-
42+
Entwicklerversion (1.9 Reihe)
4343
: Bitte benutze eine Version ab dem 4 Dezember 2006.
4444

45-
####
45+
#### Weitere Informationen
4646

4747
* [Beschreibung des Problemes][4]
4848
* [Diskussion][5]

de/news/_posts/2007-10-04-net-https-sicherheitslcke.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Es wurde eine Sicherheitslücke in der net/https Bibliothek entdeckt.
1010
Detailierte Informationen finden Sie in [der ursprünglichen
1111
Veröffentlichung][1].
1212

13-
####
13+
#### Auswirkung
1414

1515
Die Sicherheitslücke liegt in der connect Methode innerhalb von http.rb,
1616
welche fehlerhafter Weise den post\_connection\_check, nach einem
@@ -20,19 +20,19 @@ Angreifer kann dadurch einen Zielserver bei einer SSL Verbindung
2020
imitieren. Die Vertrauenswürdigkeit einer so aufgebauten SSL Verbindung
2121
ist damit nicht mehr vorhanden.
2222

23-
####
24-
23+
#### Gefährdete Versionen
2524

25+
1.8 Serie
2626
: * 1\.8.4 und alle vorherigen
2727
* 1\.8.5-p113 und alle vorherigen
2828
* 1\.8.6-p110 und alle vorherigen
2929

30-
30+
Entwicklerversion (1.9 Serien)
3131
: Alle Versionen vor dem 2006-09-23
3232

33-
####
34-
33+
#### Lösung
3534

35+
1.8 Serie
3636

3737
: Bitte aktualisieren Sie auf die Version 1.8.6-p111 oder 1.8.5-p114.
3838

@@ -57,7 +57,7 @@ ist damit nicht mehr vorhanden.
5757
Beachten Sie, dass eine fehlerbereinigte Version eventuell bereits
5858
über Ihren Paketmanager zur Verfügung stehen könnte.
5959

60-
60+
Entwicklerversion (1.9 Serie)
6161
: Bitte aktualsieren Sie Ihr Ruby auf eine Version nach 2006-09-23. Der
6262
Standardwert von Net::HTTP#enable\_post\_connection\_check wurde auf
6363
true in Ruby 1.9 gesetzt.

de/news/_posts/2009-05-21-ruby-1-9-1-p129-verffentlicht.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Es handelt sich hierbei um ein Patchlevel Release der Version 1.9.1. Da
1111
diese Version zwei sicherheitskritische Fehler beseitigt, empfehlen wir
1212
allen 1.9.1 Benutzern auf diese Version umzusteigen.
1313

14-
####
14+
#### Download
1515

1616
* [<URL:http://ftp.ruby-lang.org/pub/ruby/ruby-1.9.1-p129.tar.bz2>][1]
1717

@@ -31,7 +31,7 @@ allen 1.9.1 Benutzern auf diese Version umzusteigen.
3131
MD5: 156305e9633758eb60b419fabc33b6e4
3232
SHA256: 6cbf0eda4ba0afedd8f0bd320e6a14f826149ef517d8bb967149af0558b0743b
3333

34-
####
34+
#### Sicherheitskritische Fehler
3535

3636
* DL::Function#call konnte \"tainted\" Argumente an C Funktionen
3737
weitergeben, obwohl das $SAFE Level größer 0 war

en/news/_posts/2006-12-04-another-dos-vulnerability-in-cgi-library.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,23 +15,23 @@ Please note that the previous patch
1515
([<URL:http://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-cgi-dos-1.patch>][2])
1616
does not fix this problem.
1717

18-
####
18+
#### Impact
1919

2020
A specific HTTP request for any web application using cgi.rb causes CPU
2121
consumption on the machine on which the web application is running. Many
2222
such requests result in a denial of service.
2323

24-
####
25-
24+
#### Vulnerable versions
2625

26+
1.8 series
2727
: 1\.8.5 and all prior versions
2828

29-
29+
Development version (1.9 series)
3030
: All versions before 2006-12-04
3131

32-
####
33-
32+
#### Solution
3433

34+
1.8 series
3535

3636
: Please upgrade to 1.8.5-p2.
3737

@@ -41,7 +41,7 @@ such requests result in a denial of service.
4141
Please note that a package that corrects this weakness may already be
4242
available through your package management software.
4343

44-
44+
Development version (1.9 series)
4545
: Please update your Ruby to a version after 2006-12-04.
4646

4747

en/news/_posts/2007-10-04-net-https-vulnerability.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ A vulnerability on the net/https library was reported.
1010
Detailed information should be found at the original advisory:
1111
[<URL:http://www.isecpartners.com/advisories/2007-006-rubyssl.txt>][1]
1212

13-
####
13+
#### Impact
1414

1515
The vulnerability exists in the connect method within http.rb file which
1616
fails to call post\_connection\_check after the SSL connection has been
@@ -19,19 +19,19 @@ the requested DNS name, the attacker can impersonate the target server
1919
in a SSL connection. The integrity and confidentiality benefits of SSL
2020
are thereby eliminated.
2121

22-
####
23-
22+
#### Vulnerable versions
2423

24+
1.8 series
2525
: * 1\.8.4 and all prior versions
2626
* 1\.8.5-p113 and all prior versions
2727
* 1\.8.6-p110 and all prior versions
2828

29-
29+
Development version (1.9 series)
3030
: All versions before 2006-09-23
3131

32-
####
33-
32+
#### Solution
3433

34+
1.8 series
3535

3636
: Please upgrade to 1.8.6-p111 or 1.8.5-p114.
3737

@@ -55,12 +55,12 @@ are thereby eliminated.
5555
Please note that a package that corrects this weakness may already be
5656
available through your package management software.
5757

58-
58+
Development version (1.9 series)
5959
: Please update your Ruby to a version after 2006-09-23. The default
6060
value of Net::HTTP#enable\_post\_connection\_check is true on Ruby
6161
1.9.
6262

63-
####
63+
#### Changes
6464

6565
* 2007-10-04 16:30 +09:00 added description for
6666
enable\_post\_connection\_check to \`Solution\'.

en/news/_posts/2008-03-03-webrick-file-access-vulnerability.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ lang: en
88
WEBrick, a standard library of Ruby to implement HTTP servers, has file
99
access vulnerability.
1010

11-
##
11+
## Impact
1212

1313
The following programs are vulnerable.
1414

@@ -39,26 +39,26 @@ This vulnerability has the following impacts.
3939
"*~"]`). This exploit works only on systems that use case
4040
insensitive filesystems.
4141

42-
##
43-
42+
## Vulnerable versions
4443

44+
1.8 series
4545
: * 1\.8.4 and all prior versions
4646
* 1\.8.5-p114 and all prior versions
4747
* 1\.8.6-p113 and all prior versions
4848

49-
49+
1.9 series
5050
: * 1\.9.0-1 and all prior versions
5151

52-
##
53-
52+
## Solution
5453

54+
1.8 series
5555
: Please upgrade to 1.8.5-p115 or 1.8.6-p114.
5656
* [<URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-p115.tar.gz>][1]
5757
(md5sum: 20ca6cc87eb077296806412feaac0356)
5858
* [<URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.6-p114.tar.gz>][2]
5959
(md5sum: 500a9f11613d6c8ab6dcf12bec1b3ed3)
6060

61-
61+
1.9 series
6262
: Please apply the following patch to
6363
lib/webrick/httpservlet/filehandler.rb.
6464
* [<URL:ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.0-1-webrick-vulnerability-fix.diff>][3]
@@ -67,7 +67,7 @@ This vulnerability has the following impacts.
6767
Please note that a package that corrects this weakness may already be
6868
available through your package management software.
6969

70-
##
70+
## Credit
7171

7272
Credit to Digital Security Research Group
7373
([<URL:http://dsec.ru/>][4]) for disclosing the problem to Ruby

en/news/_posts/2008-06-20-arbitrary-code-execution-vulnerabilities.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ lang: en
88
Multiple vulnerabilities in Ruby may lead to a denial of service (DoS)
99
condition or allow execution of arbitrary code.
1010

11-
##
11+
## Impact
1212

1313
With the following vulnerabilities, an attacker can lead to denial of
1414
service condition or execute arbitrary code.
@@ -19,20 +19,20 @@ service condition or execute arbitrary code.
1919
* [CVE-2008-2726][4]
2020
* [CVE-2008-2664][5]
2121

22-
##
23-
22+
## Vulnerable versions
2423

24+
1.8 series
2525
: * 1\.8.4 and all prior versions
2626
* 1\.8.5-p230 and all prior versions
2727
* 1\.8.6-p229 and all prior versions
2828
* 1\.8.7-p21 and all prior versions
2929

30-
30+
1.9 series
3131
: * 1\.9.0-1 and all prior versions
3232

33-
##
34-
33+
## Solution
3534

35+
1.8 series
3636
: Please upgrade to 1.8.5-p231, or 1.8.6-p230, or 1.8.7-p22.
3737
* [<URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-p231.tar.gz>][6]
3838
(md5sum: e900cf225d55414bffe878f00a85807c)
@@ -41,7 +41,7 @@ service condition or execute arbitrary code.
4141
* [<URL:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.7-p22.tar.gz>][8]
4242
(md5sum: fc3ede83a98f48d8cb6de2145f680ef2)
4343

44-
44+
1.9 series
4545
: Please upgrade to 1.9.0-2.
4646
* [<URL:ftp://ftp.ruby-lang.org/pub/ruby/1.9/ruby-1.9.0-2.tar.gz>][9]
4747
(md5sum: 2a848b81ed1d6393b88eec8aa6173b75)
@@ -52,12 +52,12 @@ These versions also fix the vulnerability of WEBrick
5252
Please note that a package that corrects this weakness may already be
5353
available through your package management software.
5454

55-
##
55+
## Credit
5656

5757
Credit to Drew Yao of Apple Product Security for disclosing the problem
5858
to Ruby Security Team.
5959

60-
##
60+
## Changes
6161

6262
* 2008-06-21 00:29 +09:00 removed wrong CVE IDs (CVE-2008-2727,
6363
CVE-2008-2728).

0 commit comments

Comments
 (0)