[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{437,322,425}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1322.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1322.wml	2016-08-23 15:05:18.355132614 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Wireshark
- -network traffic analyzer, which may lead to denial of service. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? Wireshark, анализаÑ?оÑ?е Ñ?еÑ?евого Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3390";>CVE-2007-3390</a>
 
- -    <p>Off-by-one overflows were discovered in the iSeries dissector.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено пеÑ?еполнение на единиÑ?Ñ? в диÑ?Ñ?екÑ?оÑ?е iSeries.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3392";>CVE-2007-3392</a>
 
- -    <p>The MMS and SSL dissectors could be forced into an infinite loop.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ?Ñ? MMS и SSL можно ввеÑ?Ñ?и в беÑ?конеÑ?нÑ?й Ñ?икл.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3393";>CVE-2007-3393</a>
 
- -    <p>An off-by-one overflow was discovered in the DHCP/BOOTP dissector.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено пеÑ?еполнение на единиÑ?Ñ? в диÑ?Ñ?екÑ?оÑ?е DHCP/BOOTP.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (sarge) is not affected by these problems.
- -(In Sarge Wireshark used to be called Ethereal).</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sarge) не подвеÑ?жен Ñ?казаннÑ?м пÑ?облемам.
+(Ð? Sarge Wireshark назÑ?ваеÑ?Ñ?Ñ? Ethereal).</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 0.99.4-5.etch.0. Packages for the big endian MIPS architecture
- -are not yet available. They will be provided later.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.99.4-5.etch.0. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? MIPS Ñ? поÑ?Ñ?дком байÑ?ов оÑ? Ñ?Ñ?аÑ?Ñ?его
+к младÑ?емÑ? пока оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?. Ð?ни бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.99.6pre1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.99.6pre1-1.</p>
 
- -<p>We recommend that you upgrade your Wireshark packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Wireshark.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1425.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1425.wml	2016-08-23 15:09:22.302961580 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Xulrunner, a
- -runtime environment for XUL applications. The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? Xulrunner, окÑ?Ñ?жении вÑ?емени иÑ?полнениÑ? длÑ? XUL-пÑ?иложений, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5947";>CVE-2007-5947</a>
 
- -    <p>Jesse Ruderman and Petko D. Petkov discovered that the URI handler
- -    for JAR archives allows cross-site scripting.</p></li>
+    <p>Ð?жеÑ?Ñ? РадеÑ?ман и Ð?еÑ?ко Ð?еÑ?ков обнаÑ?Ñ?жили, Ñ?Ñ?о обÑ?абоÑ?Ñ?ик URI
+    длÑ? JAR-аÑ?Ñ?ивов позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5959";>CVE-2007-5959</a>
 
- -    <p>Several crashes in the layout engine were discovered, which might
- -    allow the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок в движке вÑ?Ñ?Ñ?Ñ?ки, коÑ?оÑ?Ñ?е могÑ?Ñ?
+    позволÑ?иÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5960";>CVE-2007-5960</a>
 
- -    <p>Gregory Fleischer discovered a race condition in the handling of
- -    the <q>window.location</q> property, which might lead to cross-site
- -    request forgery.</p></li>
+    <p>Ð?Ñ?егоÑ?и ФлÑ?йÑ?еÑ? обнаÑ?Ñ?жил Ñ?оÑ?Ñ?оÑ?ние гонки в коде обÑ?абоÑ?ки
+    Ñ?войÑ?Ñ?ва <q>window.location</q>, коÑ?оÑ?ое можеÑ? пÑ?ивеÑ?Ñ?и к подделке
+    межÑ?айÑ?ового запÑ?оÑ?а.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (sarge) doesn't contain xulrunner.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ? xulrunner оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in
- -version 1.8.0.14~pre071019c-0etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.0.14~pre071019c-0etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.8.1.11-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.1.11-1.</p>
 
- -<p>We recommend that you upgrade your xulrunner packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xulrunner.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1437.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1437.wml	2016-08-23 14:13:21.362825720 +0500
@@ -1,9 +1,10 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 <p>
- -Several local vulnerabilities have been discovered in the Common UNIX Printing
- -System. The Common Vulnerabilities and Exposures project identifies the
- -following problems:
+Ð? cups, обÑ?ей Ñ?иÑ?Ñ?еме пеÑ?аÑ?и UNIX, бÑ?ли обнаÑ?Ñ?женÑ? локалÑ?нÑ?е
+Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:
 </p>
 
 <ul>
@@ -11,39 +12,39 @@
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5849";>CVE-2007-5849</a>
 
     <p>
- -    Wei Wang discovered that an buffer overflow in the SNMP backend may lead to
- -    the execution of arbitrary code.
+    Ð?Ñ?й Ð?ан обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в движке SNMP можеÑ? пÑ?иводиÑ?Ñ?
+    к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6358";>CVE-2007-6358</a>
 
     <p>
- -    Elias Pipping discovered that insecure handling of a temporary file in the
- -    pdftops.pl script may lead to local denial of service.  This vulnerability
- -    is not exploitable in the default configuration.
+    ЭлиаÑ? Ð?иппинг обнаÑ?Ñ?жил, Ñ?Ñ?о небезопаÑ?наÑ? Ñ?абоÑ?а Ñ? вÑ?еменнÑ?ми Ñ?айлами в
+    Ñ?Ñ?енаÑ?ии pdftops.pl можеÑ? пÑ?иводиÑ?Ñ? к локалÑ?номÑ? оÑ?казÑ? в обÑ?лÑ?живании.  ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+    не можеÑ? иÑ?полÑ?зоваÑ?Ñ? пÑ?и наÑ?Ñ?Ñ?ойкаÑ? по Ñ?молÑ?аниÑ?.
     </p></li>
 
 </ul>
 
 <p>
- -The old stable distribution (sarge) is not affected by <a
+Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sarge) не подвеÑ?жен <a
 href="https://security-tracker.debian.org/tracker/CVE-2007-5849";>CVE-2007-5849</a>.
- -The other issue doesn't warrant an update on it's own and has been
- -postponed.
+Ð?Ñ?Ñ?гаÑ? пÑ?облема не наÑ?Ñ?олÑ?ко важна, Ñ?Ñ?обÑ? Ñ?пеÑ?иалÑ?но вÑ?пÑ?Ñ?каÑ?Ñ? обновление, поÑ?Ñ?омÑ?
+вÑ?пÑ?Ñ?к обновлениÑ? бÑ?л оÑ?ложен.
 </p>
 
 <p>
- -For the stable distribution (etch), these problems have been fixed in version
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.2.7-4etch2.
 </p>
 
 <p>
- -For the unstable distribution (sid), these problems have been fixed in version
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.3.5-1.
 </p>
 
 <p>
- -We recommend that you upgrade your cupsys packages.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? cupsys.
 </p>
 
 </define-tag>
-----BEGIN PGP SIGNATURE-----
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=Bfxr
-----END PGP SIGNATURE-----


Reply to: