[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{366,314,438}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1314.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1314.wml	2016-08-23 13:20:27.588934934 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local and remote vulnerabilities have been discovered in
- -open-iscsi, a transport-independent iSCSI implementation. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? open-iscsi, незавиÑ?Ñ?Ñ?ей оÑ? Ñ?Ñ?анÑ?поÑ?Ñ?ного Ñ?Ñ?овнÑ? Ñ?еализаÑ?ии iSCSI, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко локалÑ?нÑ?Ñ? и Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3099";>CVE-2007-3099</a>
 
- -    <p>Olaf Kirch discovered that due to a programming error access to the
- -    management interface socket was insufficiently protected, which allows
- -    denial of service.</p></li>
+    <p>Ð?лаÑ? Ð?Ñ?иÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о из-за оÑ?ибки пÑ?огÑ?аммиÑ?ованиÑ? доÑ?Ñ?Ñ?п к
+    Ñ?океÑ?Ñ? Ñ?пÑ?авлениÑ? инÑ?еÑ?Ñ?ейÑ?ом заÑ?иÑ?Ñ?н недоÑ?Ñ?аÑ?оÑ?но, Ñ?Ñ?о позволÑ?еÑ?
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3100";>CVE-2007-3100</a>
 
- -    <p>Olaf Kirch discovered that access to a semaphore used in the logging
- -    code was insufficiently protected, allowing denial of service.</p></li>
+    <p>Ð?лаÑ? Ð?иÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о доÑ?Ñ?Ñ?п к Ñ?емаÑ?оÑ?Ñ?, иÑ?полÑ?зÑ?емомÑ? в коде
+    жÑ?Ñ?налиÑ?ованиÑ?, заÑ?иÑ?Ñ?н недоÑ?Ñ?аÑ?оÑ?но, Ñ?Ñ?о позволÑ?еÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (sarge) doesn't include open-iscsi.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ? open-iscsi оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 2.0.730-1etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.0.730-1etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.0.865-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.865-1.</p>
 
- -<p>We recommend that you upgrade your open-iscsi packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? open-iscsi.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1366.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1366.wml	2016-08-23 13:15:26.610631228 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Clam anti-virus
- -toolkit. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? набоÑ?е анÑ?ивиÑ?Ñ?Ñ?нÑ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?ов Clam бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4510";>CVE-2007-4510</a>
 
- -    <p>It was discovered that the RTF and RFC2397 parsers can be tricked
- -    into dereferencing a NULL pointer, resulting in denial of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о можно вÑ?зваÑ?Ñ? Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ? в коде длÑ?
+    гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а RTF и RFC2397, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4560";>CVE-2007-4560</a>
 
- -    <p>It was discovered that clamav-milter performs insufficient input
- -    sanitising, resulting in the execution of arbitrary shell commands.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о clamav-milter вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?Ñ? оÑ?иÑ?Ñ?кÑ?
+    вÑ?однÑ?Ñ? даннÑ?Ñ?, Ñ?Ñ?о пÑ?иводиÑ? к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ? команд командной оболоÑ?ки.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (sarge) is only affected by a subset of 
- -the problems. An update will be provided later.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sarge) подвеÑ?жен Ñ?олÑ?ко Ñ?аÑ?Ñ?и
+Ñ?казаннÑ?Ñ? пÑ?облем. Ð?бновление бÑ?деÑ? пÑ?едоÑ?Ñ?авлено позже.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 0.90.1-3etch7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.90.1-3etch7.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.91.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.91.2-1.</p>
 
- -<p>We recommend that you upgrade your clamav packages. </p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? clamav. </p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1438.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1438.wml	2016-08-23 13:23:47.177547668 +0500
@@ -1,8 +1,9 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 <p>
- -Several vulnerabilities have been discovered in GNU Tar. The Common
- -Vulnerabilities and Exposures project identifies the following problems:
+Ð? GNU Tar бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:
 </p>
 
 <ul>
@@ -10,38 +11,38 @@
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4131";>CVE-2007-4131</a>
 
      <p>
- -     A directory traversal vulnerability enables attackers using
- -     specially crafted archives to extract contents outside the
- -     directory tree created by tar.
+     Ð?зменение каÑ?алога позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам, иÑ?полÑ?зÑ?Ñ?Ñ?им
+     Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е аÑ?Ñ?ивÑ?, Ñ?аÑ?паковÑ?ваÑ?Ñ? Ñ?одеÑ?жимое Ñ?Ñ?иÑ? аÑ?Ñ?ивов за пÑ?еделÑ?
+     Ñ?озданного tar деÑ?ева каÑ?алогов.
      </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4476";>CVE-2007-4476</a>
 
      <p>
- -     A stack-based buffer overflow in the file name checking code may
- -     lead to arbitrary code execution when processing maliciously
- -     crafted archives.
+     Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в коде пÑ?овеÑ?ки имÑ?н Ñ?айлов можеÑ?
+     пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода пÑ?и обÑ?абоÑ?ке Ñ?пеÑ?иалÑ?но
+     Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? аÑ?Ñ?ивов.
      </p></li>
 
 </ul>
 
 <p>
- -For the old stable distribution (sarge), these problems have been
- -fixed in version 1.14-2.4.
+Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.14-2.4.
 </p>
 
 <p>
- -For the stable distribution (etch), these problems have been fixed in
- -version 1.16-2etch1.
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.16-2etch1.
 </p>
 
 <p>
- -For the unstable distribution (sid), these problems have been fixed in
- -version 1.18-2.
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.18-2.
 </p>
 
 <p>
- -We recommend that you upgrade your tar package.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? tar.
 </p>
 
 </define-tag>
-----BEGIN PGP SIGNATURE-----
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=XJcG
-----END PGP SIGNATURE-----


Reply to: