[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{257,319,345}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1257.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1257.wml	2016-08-23 13:43:03.546778736 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in samba, a free
- -implementation of the SMB/CIFS protocol, which may lead to the execution
- -of arbitrary code or denial of service. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? samba, Ñ?вободной Ñ?еализаÑ?ии пÑ?оÑ?окола SMB/CIFS, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода или оÑ?казÑ? в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0452";>CVE-2007-0452</a>
 
- -    <p>It was discovered that incorrect handling of deferred file open calls
- -    may lead to an infinite loop, which results in denial of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о некоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка задеÑ?жаннÑ?Ñ? вÑ?зовов по оÑ?кÑ?Ñ?Ñ?иÑ? Ñ?айлов
+    могÑ?Ñ? пÑ?иводиÑ?Ñ? к беÑ?конеÑ?номÑ? Ñ?иклÑ?, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0454";>CVE-2007-0454</a>
 
- -    <p>"zybadawg333" discovered that the AFS ACL mapping VFS plugin performs
- -    insecure format string handling, which may lead to the execution of
- -    arbitrary code.</p></li>
+    <p>"zybadawg333" обнаÑ?Ñ?жил, Ñ?Ñ?о VFS-дополнение, оÑ?обÑ?ажаÑ?Ñ?ее AFS ACL, вÑ?полнÑ?еÑ?
+    небезопаÑ?нÑ?Ñ? обÑ?абоÑ?кÑ? Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 3.0.14a-3sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.14a-3sarge4.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been
- -fixed in version 3.0.23d-5.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.0.23d-5.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 3.0.23d-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.23d-5.</p>
 
- -<p>We recommend that you upgrade your samba package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? samba.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1319.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1319.wml	2016-08-23 13:46:48.306465252 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>memory leaks</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>Ñ?Ñ?еÑ?ки памÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in MaraDNS, a simple
- -security-aware Domain Name Service server. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? MaraDNS, пÑ?оÑ?Ñ?ом Ñ?еÑ?веÑ?е DNS Ñ? оÑ?обÑ?м вниманием к безопаÑ?ноÑ?Ñ?и, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3114";>CVE-2007-3114</a>
 
- -    <p>It was discovered that malformed DNS requests can trigger memory
- -    leaks, allowing denial of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о некоÑ?Ñ?екÑ?нÑ?е DNS-запÑ?оÑ?Ñ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?кам
+    памÑ?Ñ?и, коÑ?оÑ?Ñ?е вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3115";>CVE-2007-3115</a>
 
- -    <p>It was discovered that malformed DNS requests can trigger memory
- -    leaks, allowing denial of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о некоÑ?Ñ?екÑ?нÑ?е DNS-запÑ?оÑ?Ñ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?кам
+    памÑ?Ñ?и, коÑ?оÑ?Ñ?е вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3116";>CVE-2007-3116</a>
 
- -    <p>It was discovered that malformed DNS requests can trigger memory
- -    leaks, allowing denial of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о некоÑ?Ñ?екÑ?нÑ?е DNS-запÑ?оÑ?Ñ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?кам
+    памÑ?Ñ?и, коÑ?оÑ?Ñ?е вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (sarge) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sarge) не подвеÑ?жен Ñ?казаннÑ?м пÑ?облемам.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 1.2.12.04-1etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.2.12.04-1etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.2.12.06-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.12.06-1.</p>
 
- -<p>We recommend that you upgrade your maradns packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? maradns.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1345.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1345.wml	2016-08-23 13:52:04.190441622 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Xulrunner, a
- -runtime environment for XUL applications. The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? Xulrunner, окÑ?Ñ?жении вÑ?емени иÑ?полнениÑ? длÑ? XUL-пÑ?иложений, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3844";>CVE-2007-3844</a>
 
- -    <p><q>moz_bug_r_a4</q> discovered that a regression in the handling of
- -    <q>about:blank</q> windows used by addons may lead to an attacker being
- -    able to modify the content of web sites.</p></li>
+    <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?егÑ?еÑ?Ñ?иÑ? в коде обÑ?абоÑ?ки окон
+    <q>about:blank</q>, иÑ?полÑ?зÑ?емÑ?Ñ? дополнениÑ?ми, можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+    измениÑ?Ñ? Ñ?одеÑ?жимое веб-Ñ?айÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3845";>CVE-2007-3845</a>
 
- -    <p>Jesper Johansson discovered that missing sanitising of double-quotes
- -    and spaces in URIs passed to external programs may allow an attacker
- -    to pass arbitrary arguments to the helper program if the user is
- -    tricked into opening a malformed web page.</p></li>
+    <p>Ð?еÑ?пеÑ? Ð?оÑ?анÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки двойнÑ?Ñ? кавÑ?Ñ?ек
+    и пÑ?обелов в URI, пеÑ?едаваемÑ?Ñ? внеÑ?ним пÑ?огÑ?аммам, можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+    пеÑ?едаÑ?Ñ? пÑ?оизволÑ?нÑ?е аÑ?гÑ?менÑ?Ñ? вÑ?помогаÑ?елÑ?нÑ?м пÑ?огÑ?аммам в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ?
+    оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? веб-Ñ?Ñ?Ñ?аниÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (sarge) doesn't include xulrunner.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ? xulrunner оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.8.0.13~pre070720-0etch3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in version
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.8.1.6-1.</p>
 
- -<p>We recommend that you upgrade your xulrunner packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xulrunner.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=1Ssi
-----END PGP SIGNATURE-----


Reply to: