[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-13{44,46,25}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1325.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1325.wml	2016-09-03 12:00:03.925926932 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Evolution, a
- -groupware suite with mail client and organizer. The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? Evolution, набоÑ?е длÑ? Ñ?овмеÑ?Ñ?ной Ñ?абоÑ?Ñ?, Ñ?одеÑ?жаÑ?им поÑ?Ñ?овÑ?й клиенÑ? и оÑ?ганайзеÑ?,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1002";>CVE-2007-1002</a>
 
- -    <p>Ulf Härnhammar discovered that a format string vulnerability in
- -    the handling of shared calendars may allow the execution of arbitrary
- -    code.</p></li>
+    <p>УлÑ?Ñ? Ð¥Ñ?Ñ?нÑ?аммаÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?звимоÑ?Ñ?Ñ? Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки в
+    коде длÑ? обÑ?абоÑ?ки Ñ?овмеÑ?Ñ?нÑ?Ñ? календаÑ?ей можеÑ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й
+    код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3257";>CVE-2007-3257</a>
 
- -    <p>It was discovered that the IMAP code in the Evolution Data Server
- -    performs insufficient sanitising of a value later used an array index,
- -    which can lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о код IMAP в Evolution Data Server
+    вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?Ñ? оÑ?иÑ?Ñ?кÑ? знаÑ?ениÑ?, коÑ?оÑ?аÑ? позже иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? в каÑ?еÑ?Ñ?ве Ñ?казаÑ?елÑ? маÑ?Ñ?ива,
+    Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (sarge) these problems have been fixed in
- -version 2.0.4-2sarge2. Packages for hppa, mips and powerpc are not yet
- -available. They will be provided later.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4-2sarge2. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? hppa, mips и powerpc
+пока недоÑ?Ñ?Ñ?пнÑ?. Ð?ни бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 2.6.3-6etch1. Packages for mips are not yet available. They
- -will be provided later.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.6.3-6etch1. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? mips пока недоÑ?Ñ?Ñ?пнÑ?. Ð?ни
+бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авлен позже.</p>
 
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your evolution packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? evolution.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1344.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1344.wml	2016-09-03 11:48:47.260903626 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Iceweasel web
- -browser, an unbranded version of the Firefox browser. The Common 
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е Iceweasel, безбÑ?ендовой веÑ?Ñ?ии бÑ?аÑ?зеÑ?а Firefox, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3844";>CVE-2007-3844</a>
 
- -    <p><q>moz_bug_r_a4</q> discovered that a regression in the handling of
- -    <q>about:blank</q> windows used by addons may lead to an attacker being
- -    able to modify the content of web sites.</p></li>
+    <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?егÑ?еÑ?Ñ?иÑ? в обÑ?абоÑ?ке окон
+    <q>about:blank</q>, иÑ?полÑ?зÑ?емÑ?Ñ? дополнениÑ?ми, можеÑ? пÑ?иводиÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о злоÑ?мÑ?Ñ?ленник
+    Ñ?можеÑ? измениÑ?Ñ? Ñ?одеÑ?жимое веб-Ñ?айÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3845";>CVE-2007-3845</a>
 
- -    <p>Jesper Johansson discovered that missing sanitising of double-quotes
- -    and spaces in URIs passed to external programs may allow an attacker
- -    to pass arbitrary arguments to the helper program if the user is
- -    tricked into opening a malformed web page.</p></li>
+    <p>Ð?Ñ?пеÑ? Ð?оÑ?анÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки двойнÑ?Ñ? кавÑ?Ñ?ек
+    и пÑ?обелов в URI, пеÑ?едаваемÑ?Ñ? внеÑ?ним пÑ?огÑ?аммам, можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+    пеÑ?едаÑ?Ñ? пÑ?оизволÑ?нÑ?е аÑ?гÑ?менÑ?Ñ? вÑ?помогаÑ?елÑ?ной пÑ?огÑ?амме в Ñ?лÑ?Ñ?ае, когда полÑ?зоваÑ?елÑ?
+    оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? веб-Ñ?Ñ?Ñ?аниÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>The Mozilla products in the oldstable distribution (sarge) are no longer
- -supported with security updates.</p>
+<p>Ð?Ñ?одÑ?кÑ?Ñ? Mozilla в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) более не
+поддеÑ?живаÑ?Ñ?Ñ?Ñ? обновлениÑ?ми безопаÑ?ноÑ?Ñ?и.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 2.0.0.6-0etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in version
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 2.0.0.6-1.</p>
 
- -<p>We recommend that you upgrade your iceweasel packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceweasel.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1346.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1346.wml	2016-09-03 11:53:12.458184535 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Iceape internet
- -suite, an unbranded version of the Seamonkey Internet Suite. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? набоÑ?е Ð?нÑ?еÑ?неÑ?-пÑ?огÑ?амм Iceape, безбÑ?ендовой веÑ?Ñ?ии Seamonkey, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3844";>CVE-2007-3844</a>
 
- -    <p><q>moz_bug_r_a4</q> discovered that a regression in the handling of
- -    <q>about:blank</q> windows used by addons may lead to an attacker being
- -    able to modify the content of web sites.</p></li>
+    <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?егÑ?еÑ?Ñ?иÑ? в обÑ?абоÑ?ке окон
+    <q>about:blank</q>, иÑ?полÑ?зÑ?емÑ?Ñ? дополнениÑ?ми, можеÑ? пÑ?иводиÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о злоÑ?мÑ?Ñ?ленник
+    Ñ?можеÑ? измениÑ?Ñ? Ñ?одеÑ?жимое веб-Ñ?айÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3845";>CVE-2007-3845</a>
 
- -    <p>Jesper Johansson discovered that missing sanitising of double-quotes
- -    and spaces in URIs passed to external programs may allow an attacker
- -    to pass arbitrary arguments to the helper program if the user is
- -    tricked into opening a malformed web page.</p></li>
+    <p>Ð?Ñ?пеÑ? Ð?оÑ?анÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки двойнÑ?Ñ? кавÑ?Ñ?ек
+    и пÑ?обелов в URI, пеÑ?едаваемÑ?Ñ? внеÑ?ним пÑ?огÑ?аммам, можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+    пеÑ?едаÑ?Ñ? пÑ?оизволÑ?нÑ?е аÑ?гÑ?менÑ?Ñ? вÑ?помогаÑ?елÑ?ной пÑ?огÑ?амме в Ñ?лÑ?Ñ?ае, когда полÑ?зоваÑ?елÑ?
+    оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? веб-Ñ?Ñ?Ñ?аниÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>The Mozilla products in the oldstable distribution (sarge) are no longer
- -supported with security updates.</p>
+<p>Ð?Ñ?одÑ?кÑ?Ñ? Mozilla в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) более не
+поддеÑ?живаÑ?Ñ?Ñ?Ñ? обновлениÑ?ми безопаÑ?ноÑ?Ñ?и.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.0.10~pre070720-0etch3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in version
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.1.3-2.</p>
 
- -<p>We recommend that you upgrade your iceape packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceape.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=1nsa
-----END PGP SIGNATURE-----


Reply to: