[DONE] wml://security/2007/dsa-1{435,295,332}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2007/dsa-1295.wml 2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1295.wml 2016-08-23 14:03:33.719287411 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in PHP, a
- -server-side, HTML-embedded scripting language, which may lead to the
- -execution of arbitrary code. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? PHP, Ñ?еÑ?веÑ?ном Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев Ñ?о вÑ?Ñ?Ñ?оенной поддеÑ?жкой HTML, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2509">CVE-2007-2509</a>
- - <p>It was discovered that missing input sanitising inside the ftp
- - extension permits an attacker to execute arbitrary FTP commands.
- - This requires the attacker to already have access to the FTP
- - server.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в Ñ?аÑ?Ñ?иÑ?ении ftp
+ позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? FTP.
+ Ð?лÑ? Ñ?Ñ?ого Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ?, Ñ?Ñ?об Ñ? злоÑ?мÑ?Ñ?ленника Ñ?же бÑ?л доÑ?Ñ?Ñ?п к
+ FTP-Ñ?еÑ?веÑ?Ñ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2510">CVE-2007-2510</a>
- - <p>It was discovered that a buffer overflow in the SOAP extension permits
- - the execution of arbitrary code.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?аÑ?Ñ?иÑ?ении SOAP позволÑ?еÑ?
+ вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
</ul>
- -<p>The oldstable distribution (sarge) doesn't include php5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ?Ñ? php5 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 5.2.0-8+etch4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 5.2.0-8+etch4.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 5.2.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.2.2-1.</p>
- -<p>We recommend that you upgrade your PHP packages. Packages for the Sparc
- -architectures are not yet available, due to problems on the build host. They
- -will be provided later.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? PHP. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? Sparc
+пока оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? из-за пÑ?облем Ñ?о Ñ?боÑ?оÑ?нÑ?м Ñ?злом. Ð?ни
+бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
</define-tag>
# do not modify the following line
- --- english/security/2007/dsa-1332.wml 2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1332.wml 2016-08-23 14:08:05.639880273 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the VideoLan
- -multimedia player and streamer, which may lead to the execution of
- -arbitrary code. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? VideoLan, пÑ?оигÑ?Ñ?ваÑ?еле мÑ?лÑ?Ñ?имедиа и Ð?Ð? длÑ? поÑ?окового веÑ?аниÑ?, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3316">CVE-2007-3316</a>
- - <p>David Thiel discovered that several format string vulnerabilities may
- - lead to the execution of arbitrary code.</p></li>
+ <p>Ð?авид ТилÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки могÑ?Ñ?
+ пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3467">CVE-2007-3467</a>
- - <p>David Thiel discovered an integer overflow in the WAV processing code.</p></li>
+ <p>Ð?авид ТилÑ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде обÑ?абоÑ?ки WAV.</p></li>
</ul>
- -<p>This update also fixes several crashes, which can be triggered through
- -malformed media files.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление Ñ?одеÑ?жиÑ? иÑ?пÑ?авлениÑ? неÑ?колÑ?киÑ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок, коÑ?оÑ?Ñ?е
+возникаÑ?Ñ? из-за некоÑ?Ñ?екÑ?нÑ?Ñ? мÑ?лÑ?Ñ?имедиа-Ñ?айлов.</p>
- -<p>For the oldstable distribution (sarge) these problems have been fixed in
- -version 0.8.1.svn20050314-1sarge3. Packages for the powerpc architecture
- -are not yet available. They will be provided later.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.8.1.svn20050314-1sarge3. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? powerpc
+пока оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?. Ð?ни бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 0.8.6-svn20061012.debian-5etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.8.6-svn20061012.debian-5etch1.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.8.6.c-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.8.6.c-1.</p>
- -<p>We recommend that you upgrade your vlc packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? vlc.</p>
</define-tag>
# do not modify the following line
- --- english/security/2007/dsa-1435.wml 2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1435.wml 2016-08-23 13:56:37.588379158 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Clam
- -anti-virus toolkit. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? набоÑ?е анÑ?ивиÑ?Ñ?Ñ?нÑ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?ов Clam бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6335">CVE-2007-6335</a>
- - <p>It was discovered that an integer overflow in the decompression code
- - for MEW archives may lead to the execution of arbitrary code.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде Ñ?аÑ?паковки
+ длÑ? аÑ?Ñ?ивов MEW можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6336">CVE-2007-6336</a>
- - <p>It was discovered that on off-by-one in the MS-ZIP decompression
- - code may lead to the execution of arbitrary code.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?ибка на единиÑ?Ñ? в коде Ñ?аÑ?паковки MS-ZIP
+ можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
</ul>
- -<p>The old stable distribution (sarge) is not affected by these problems.
- -However, since the clamav version from Sarge cannot process all current
- -Clam malware signatures any longer, support for the ClamAV in Sarge is
- -now discontinued. We recommend to upgrade to the stable distribution
- -or run a backport of the stable version.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sarge) не подвеÑ?жен Ñ?казаннÑ?м пÑ?облемам.
+Тем не менее, поÑ?колÑ?кÑ? веÑ?Ñ?иÑ? clamav в Sarge болÑ?Ñ?е не можеÑ? обÑ?абоÑ?аÑ?Ñ? вÑ?е Ñ?екÑ?Ñ?ие
+Ñ?игнаÑ?Ñ?Ñ?Ñ? вÑ?едоноÑ?ного Ð?Ð?, поддеÑ?жка ClamAV в Sarge
+пÑ?екÑ?аÑ?аеÑ?Ñ?Ñ?. РекомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? обновление до Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка
+или иÑ?полÑ?зоваÑ?Ñ? обÑ?аÑ?нÑ?й пеÑ?еноÑ? пакеÑ?а Ñ?Ñ?абилÑ?ной веÑ?Ñ?ии.</p>
- -<p>For the stable distribution (etch) these problems have been fixed in
- -version 0.90.1-3etch8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.90.1-3etch8.</p>
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
- -<p>We recommend that you upgrade your clamav packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? clamav.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=RyMi
-----END PGP SIGNATURE-----
Reply to: