[DONE] wml://security/2007/dsa-1{335,371,276}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2007/dsa-1276.wml 2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1276.wml 2016-09-15 00:42:31.168233126 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the MIT reference
- -implementation of the Kerberos network authentication protocol suite,
- -which may lead to the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? Ñ?Ñ?алонной Ñ?еализаÑ?ии набоÑ?а пÑ?оÑ?околов Ñ?еÑ?евой аÑ?Ñ?енÑ?иÑ?икаÑ?ии Kerberos оÑ? MIT,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0956">CVE-2007-0956</a>
- - <p>It was discovered that the krb5 telnet daemon performs insufficient
- - validation of usernames, which might allow unauthorized logins or
- - privilege escalation.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о telnet-Ñ?лÑ?жба krb5 вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки
+ имÑ?н полÑ?зоваÑ?елей, Ñ?Ñ?о можеÑ? позволиÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? неавÑ?оÑ?изованнÑ?й вÑ?од или
+ повÑ?Ñ?аÑ?Ñ? пÑ?ивилегии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0957">CVE-2007-0957</a>
- - <p>iDefense discovered that a buffer overflow in the logging code of the
- - KDC and the administration daemon might lead to arbitrary code
- - execution.</p></li>
+ <p>СоÑ?Ñ?Ñ?дники iDefense обнаÑ?Ñ?жили, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в коде жÑ?Ñ?налиÑ?ованиÑ?
+ KDC и Ñ?лÑ?жбе админиÑ?Ñ?Ñ?иÑ?ованиÑ? можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+ кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1216">CVE-2007-1216</a>
- - <p>It was discovered that a double free in the RPCSEC_GSS part of the
- - GSS library code might lead to arbitrary code execution.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о двойное оÑ?вобождение в Ñ?аÑ?Ñ?и RPCSEC_GSS кода библиоÑ?еки
+ GSS можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
</ul>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.3.6-2sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.6-2sarge4.</p>
- -<p>For the upcoming stable distribution (etch) these problems have been fixed
- -in version 1.4.4-7etch1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.4.4-7etch1.</p>
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
- -<p>We recommend that you upgrade your Kerberos packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Kerberos.</p>
</define-tag>
# do not modify the following line
- --- english/security/2007/dsa-1335.wml 2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1335.wml 2016-09-15 00:19:45.534179981 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Gimp, the GNU Image
- -Manipulation Program, which might lead to the execution of arbitrary code.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? Gimp, GNU Image Manipulation Program, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4519">CVE-2006-4519</a>
- - <p>Sean Larsson discovered several integer overflows in the processing
- - code for DICOM, PNM, PSD, RAS, XBM and XWD images, which might lead
- - to the execution of arbitrary code if a user is tricked into opening
- - such a malformed media file.</p></li>
+ <p>Шон Ð?аÑ?Ñ?он обнаÑ?Ñ?жил неÑ?колÑ?ко пеÑ?еполнений Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде обÑ?абоÑ?ки
+ изобÑ?ажений DICOM, PNM, PSD, RAS, XBM и XWD, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ?
+ к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ? оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но
+ Ñ?Ñ?оÑ?миÑ?ованнÑ?е Ñ?айлÑ? в Ñ?казаннÑ?Ñ? Ñ?оÑ?маÑ?аÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2949">CVE-2007-2949</a>
- - <p>Stefan Cornelius discovered an integer overflow in the processing
- - code for PSD images, which might lead to the execution of arbitrary
- - code if a user is tricked into opening such a malformed media file.</p></li>
+ <p>ШÑ?еÑ?ан Ð?оÑ?нелиÑ?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде обÑ?абоÑ?ки
+ изобÑ?ажений PSD, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в
+ Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ? оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл в Ñ?казанном Ñ?оÑ?маÑ?е.</p></li>
</ul>
- -<p>For the oldstable distribution (sarge) these problems have been fixed in
- -version 2.2.6-1sarge4. Packages for mips and mipsel are not yet
- -available.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.6-1sarge4. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? mips и mipsel пока
+не доÑ?Ñ?Ñ?пнÑ?.</p>
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 2.2.13-1etch4. Packages for mips are not yet available.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.2.13-1etch4. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? mips пока не доÑ?Ñ?Ñ?пнÑ?.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.2.17-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.17-1.</p>
- -<p>We recommend that you upgrade your gimp packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gimp.</p>
</define-tag>
# do not modify the following line
- --- english/security/2007/dsa-1371.wml 2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1371.wml 2016-09-15 00:32:33.226182208 +0500
@@ -1,9 +1,10 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
<p>
- -Several vulnerabilities have been discovered in phpWiki, a wiki engine
- -written in PHP. The Common Vulnerabilities and Exposures project
- -identifies the following problems:
+Ð? phpWiki, вики-движке, напиÑ?анном на Ñ?зÑ?ке PHP, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:
</p>
<ul>
@@ -11,44 +12,44 @@
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2024">CVE-2007-2024</a>
<p>
- - It was discovered that phpWiki performs insufficient file name
- - validation, which allows unrestricted file uploads.
+ Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о phpWiki вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки имÑ?н
+ Ñ?айлов, Ñ?Ñ?о позволÑ?еÑ? загÑ?Ñ?жаÑ?Ñ? Ñ?айлÑ? без огÑ?аниÑ?ений.
</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2025">CVE-2007-2025</a>
<p>
- - It was discovered that phpWiki performs insufficient file name
- - validation, which allows unrestricted file uploads.
+ Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о phpWiki вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки имÑ?н
+ Ñ?айлов, Ñ?Ñ?о позволÑ?еÑ? загÑ?Ñ?жаÑ?Ñ? Ñ?айлÑ? без огÑ?аниÑ?ений.
</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3193">CVE-2007-3193</a>
<p>
- - If the configuration lacks a nonzero PASSWORD_LENGTH_MINIMUM,
- - phpWiki might allow remote attackers to bypass authentication via
- - an empty password, which causes ldap_bind to return true when used
- - with certain LDAP implementations.
+ Ð?Ñ?ли в наÑ?Ñ?Ñ?ойкаÑ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? ненÑ?левое знаÑ?ение PASSWORD_LENGTH_MINIMUM,
+ Ñ?о phpWiki можеÑ? позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам обÑ?одиÑ?Ñ? аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ? Ñ? помоÑ?Ñ?Ñ?
+ пÑ?Ñ?Ñ?ого паÑ?олÑ?, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о ldap_bind возвÑ?аÑ?аеÑ? знаÑ?ение true пÑ?и иÑ?полÑ?зовании
+ опÑ?еделÑ?ннÑ?Ñ? Ñ?еализаÑ?ий LDAP.
</p></li>
</ul>
<p>
- -The old stable distribution (sarge) does not contain phpwiki packages.
+Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ?Ñ? phpwiki оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.
</p>
<p>
- -For the stable distribution (etch) these problems have been fixed in
- -version 1.3.12p3-5etch1.
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.12p3-5etch1.
</p>
<p>
- -For the unstable distribution (sid) these problems have been fixed in
- -version 1.3.12p3-6.1.
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.12p3-6.1.
</p>
<p>
- -We recommend that you upgrade your phpwiki package.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpwiki.
</p>
</define-tag>
-----BEGIN PGP SIGNATURE-----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=Zgey
-----END PGP SIGNATURE-----
Reply to: