[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{281,424,374}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1281.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1281.wml	2016-09-07 19:12:36.742385543 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Clam
- -anti-virus toolkit. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Clam, набоÑ?е анÑ?ивиÑ?Ñ?Ñ?нÑ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?ов, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1745";>CVE-2007-1745</a>
 
- -    <p>It was discovered that a file descriptor leak in the CHM handler may
- -    lead to denial of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?Ñ?еÑ?ка Ñ?айлового деÑ?кÑ?ипÑ?оÑ?а в обÑ?абоÑ?Ñ?ике CHM можеÑ?
+    пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1997";>CVE-2007-1997</a>
 
- -    <p>It was discovered that a buffer overflow in the CAB handler may lead
- -    to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в обÑ?абоÑ?Ñ?ике CAB можеÑ? пÑ?иводиÑ?Ñ?
+    к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2029";>CVE-2007-2029</a>
 
- -    <p>It was discovered that a file descriptor leak in the PDF handler may
- -    lead to denial of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?Ñ?еÑ?ка Ñ?айлового деÑ?кÑ?ипÑ?оÑ?а в обÑ?абоÑ?Ñ?ике PDF можеÑ?
+    пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (sarge) these problems have been fixed in
- -version 0.84-2.sarge.16.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.84-2.sarge.16.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in
- -version 0.90.1-3etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.90.1-3etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.90.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.90.2-1.</p>
 
- -<p>We recommend that you upgrade your clamav packages. Packages for
- -the arm, sparc, m68k, mips and mipsel architectures are not yet available.
- -They will be provided later.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? clamav. Ð?акеÑ?Ñ? длÑ?
+аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? arm, sparc, m68k, mips и mipsel пока недоÑ?Ñ?Ñ?пнÑ?.
+Ð?ни бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1374.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1374.wml	2016-09-07 19:21:08.656944312 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in jffnms, a web-based
- -Network Management System for IP networks.  The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? jffnms, веб-Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? Ñ?еÑ?Ñ?Ñ? длÑ? IP-Ñ?еÑ?ей, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3189";>CVE-2007-3189</a>
 
     <p>
- -    Cross-site scripting (XSS) vulnerability in auth.php, which allows
- -    a remote attacker to inject arbitrary web script or HTML via the
- -    <q>user</q> parameter.
+    Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в auth.php позволÑ?еÑ?
+    Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ?
+    паÑ?амеÑ?Ñ?а <q>user</q>.
     </p>
 </li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3190";>CVE-2007-3190</a>
 
     <p>
- -    Multiple SQL injection vulnerabilities in auth.php, which allow 
- -    remote attackers to execute arbitrary SQL commands via the
- -    <q>user</q> and <q>pass</q> parameters.
+    Ð?ногоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи SQL-инÑ?екÑ?ии в auth.php позволÑ?Ñ?Ñ?
+    Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? SQL Ñ? помоÑ?Ñ?Ñ?
+    паÑ?амеÑ?Ñ?ов <q>user</q> и <q>pass</q>.
     </p>
 </li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3192";>CVE-2007-3192</a>
 
     <p>
- -    Direct requests to URLs make it possible for remote attackers to
- -    access configuration information, bypassing login restrictions.
+    Ð?Ñ?Ñ?мÑ?е запÑ?оÑ?, напÑ?авленнÑ?е не даннÑ?й URL, позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    обÑ?аÑ?аÑ?Ñ?Ñ?Ñ? к инÑ?оÑ?маÑ?ии о наÑ?Ñ?Ñ?ойкаÑ?, обÑ?одÑ? огÑ?аниÑ?ениÑ? по вÑ?одÑ?.
     </p>
 </li>
 
 </ul>
 
 <p>
- -For the stable distribution (etch), these problems have been fixed in version
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 0.8.3dfsg.1-2.1etch1.
 </p>
 
 <p>
- -For the unstable distribution (sid), these problems have been fixed in
- -version 0.8.3dfsg.1-4.
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.8.3dfsg.1-4.
 </p>
 
 <p>
- -We recommend that you upgrade your jffnms package.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? jffnms.
 </p>
 </define-tag>
 
- --- english/security/2007/dsa-1424.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1424.wml	2016-09-07 19:16:46.991273667 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Iceweasel web
- -browser, an unbranded version of the Firefox browser. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е Iceweasel, безбÑ?ендовой веÑ?Ñ?ии бÑ?аÑ?зеÑ?а Firefox, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5947";>CVE-2007-5947</a>
 
- -    <p>Jesse Ruderman and Petko D. Petkov discovered that the URI handler
- -    for JAR archives allows cross-site scripting.</p></li>
+    <p>Ð?жеÑ?Ñ? РÑ?деÑ?ман и Ð?еÑ?ко Ð?еÑ?ков обнаÑ?Ñ?жили, Ñ?Ñ?о обÑ?абоÑ?Ñ?ик URI
+    длÑ? JAR-аÑ?Ñ?ивов позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5959";>CVE-2007-5959</a>
 
- -    <p>Several crashes in the layout engine were discovered, which might
- -    allow the execution of arbitrary code.</p></li>
+    <p>Ð? движке Ñ?азмеÑ?ки бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок, коÑ?оÑ?Ñ?е могÑ?Ñ?
+    позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5960";>CVE-2007-5960</a>
 
- -    <p>Gregory Fleischer discovered a race condition in the handling of
- -    the <q>window.location</q> property, which might lead to cross-site
- -    request forgery.</p></li>
+    <p>Ð?Ñ?егоÑ?и ФлÑ?йÑ?еÑ? обнаÑ?Ñ?жил Ñ?оÑ?Ñ?оÑ?ние гонки в коде обÑ?абоÑ?ки
+    Ñ?войÑ?Ñ?ва <q>window.location</q>, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? подделке межÑ?айÑ?овÑ?Ñ?
+    запÑ?оÑ?ов.</p></li>
 
 </ul>
 
- -<p>The Mozilla products in the oldstable distribution (sarge) are no longer
- -supported with security updates.</p>
+<p>Ð?Ñ?одÑ?кÑ?Ñ? Mozilla в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) более не
+поддеÑ?живаÑ?Ñ?Ñ?Ñ? обновлениÑ?ми безопаÑ?ноÑ?Ñ?и.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in
- -version 2.0.0.10-0etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.0.10-0etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.0.0.10-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.0.10-2.</p>
 
- -<p>We recommend that you upgrade your iceweasel packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceweasel.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=JDQx
-----END PGP SIGNATURE-----


Reply to: