[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{335,371,276}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1276.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1276.wml	2016-09-15 00:42:31.168233126 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the MIT reference
- -implementation of the Kerberos network authentication protocol suite,
- -which may lead to the execution of arbitrary code. The Common 
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? Ñ?Ñ?алонной Ñ?еализаÑ?ии набоÑ?а пÑ?оÑ?околов Ñ?еÑ?евой аÑ?Ñ?енÑ?иÑ?икаÑ?ии Kerberos оÑ? MIT,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0956";>CVE-2007-0956</a>
 
- -    <p>It was discovered that the krb5 telnet daemon performs insufficient
- -    validation of usernames, which might allow unauthorized logins or
- -    privilege escalation.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о telnet-Ñ?лÑ?жба krb5 вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки
+    имÑ?н полÑ?зоваÑ?елей, Ñ?Ñ?о можеÑ? позволиÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? неавÑ?оÑ?изованнÑ?й вÑ?од или
+    повÑ?Ñ?аÑ?Ñ? пÑ?ивилегии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0957";>CVE-2007-0957</a>
 
- -    <p>iDefense discovered that a buffer overflow in the logging code of the
- -    KDC and the administration daemon might lead to arbitrary code
- -    execution.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники iDefense обнаÑ?Ñ?жили, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в коде жÑ?Ñ?налиÑ?ованиÑ?
+    KDC и Ñ?лÑ?жбе админиÑ?Ñ?Ñ?иÑ?ованиÑ? можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1216";>CVE-2007-1216</a>
 
- -    <p>It was discovered that a double free in the RPCSEC_GSS part of the 
- -    GSS library code might lead to arbitrary code execution.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о двойное оÑ?вобождение в Ñ?аÑ?Ñ?и RPCSEC_GSS кода библиоÑ?еки
+    GSS можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.3.6-2sarge4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.6-2sarge4.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been fixed
- -in version 1.4.4-7etch1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.4.4-7etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your Kerberos packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Kerberos.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1335.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1335.wml	2016-09-15 00:19:45.534179981 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Gimp, the GNU Image
- -Manipulation Program, which might lead to the execution of arbitrary code.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? Gimp, GNU Image Manipulation Program, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4519";>CVE-2006-4519</a>
 
- -    <p>Sean Larsson discovered several integer overflows in the processing
- -    code for DICOM, PNM, PSD, RAS, XBM and XWD images, which might lead
- -    to the execution of arbitrary code if a user is tricked into opening
- -    such a malformed media file.</p></li>
+    <p>Шон Ð?аÑ?Ñ?он обнаÑ?Ñ?жил неÑ?колÑ?ко пеÑ?еполнений Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде обÑ?абоÑ?ки
+    изобÑ?ажений DICOM, PNM, PSD, RAS, XBM и XWD, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ?
+    к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ? оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но
+    Ñ?Ñ?оÑ?миÑ?ованнÑ?е Ñ?айлÑ? в Ñ?казаннÑ?Ñ? Ñ?оÑ?маÑ?аÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2949";>CVE-2007-2949</a>
 
- -    <p>Stefan Cornelius discovered an integer overflow in the processing
- -    code for PSD images, which might lead to the execution of arbitrary
- -    code if a user is tricked into opening such a malformed media file.</p></li>
+    <p>ШÑ?еÑ?ан Ð?оÑ?нелиÑ?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде обÑ?абоÑ?ки
+    изобÑ?ажений PSD, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в
+    Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ? оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл в Ñ?казанном Ñ?оÑ?маÑ?е.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (sarge) these problems have been fixed in
- -version 2.2.6-1sarge4. Packages for mips and mipsel are not yet
- -available.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.6-1sarge4. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? mips и mipsel пока
+не доÑ?Ñ?Ñ?пнÑ?.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 2.2.13-1etch4. Packages for mips are not yet available.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.2.13-1etch4. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? mips пока не доÑ?Ñ?Ñ?пнÑ?.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.2.17-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.17-1.</p>
 
- -<p>We recommend that you upgrade your gimp packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gimp.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1371.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1371.wml	2016-09-15 00:32:33.226182208 +0500
@@ -1,9 +1,10 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 <p>
- -Several vulnerabilities have been discovered in phpWiki, a wiki engine
- -written in PHP. The Common Vulnerabilities and Exposures project
- -identifies the following problems:
+Ð? phpWiki, вики-движке, напиÑ?анном на Ñ?зÑ?ке PHP, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:
 </p>
 
 <ul>
@@ -11,44 +12,44 @@
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2024";>CVE-2007-2024</a>
 
     <p>
- -    It was discovered that phpWiki performs insufficient file name 
- -    validation, which allows unrestricted file uploads.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о phpWiki вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки имÑ?н
+    Ñ?айлов, Ñ?Ñ?о позволÑ?еÑ? загÑ?Ñ?жаÑ?Ñ? Ñ?айлÑ? без огÑ?аниÑ?ений.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2025";>CVE-2007-2025</a>
 
     <p>
- -    It was discovered that phpWiki performs insufficient file name 
- -    validation, which allows unrestricted file uploads.
+    Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о phpWiki вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки имÑ?н
+    Ñ?айлов, Ñ?Ñ?о позволÑ?еÑ? загÑ?Ñ?жаÑ?Ñ? Ñ?айлÑ? без огÑ?аниÑ?ений.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3193";>CVE-2007-3193</a>
 
     <p>
- -    If the configuration lacks a nonzero PASSWORD_LENGTH_MINIMUM,
- -    phpWiki might allow remote attackers to bypass authentication via
- -    an empty password, which causes ldap_bind to return true when used
- -    with certain LDAP implementations.
+    Ð?Ñ?ли в наÑ?Ñ?Ñ?ойкаÑ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? ненÑ?левое знаÑ?ение PASSWORD_LENGTH_MINIMUM,
+    Ñ?о phpWiki можеÑ? позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам обÑ?одиÑ?Ñ? аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ? Ñ? помоÑ?Ñ?Ñ?
+    пÑ?Ñ?Ñ?ого паÑ?олÑ?, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о ldap_bind возвÑ?аÑ?аеÑ? знаÑ?ение true пÑ?и иÑ?полÑ?зовании
+    опÑ?еделÑ?ннÑ?Ñ? Ñ?еализаÑ?ий LDAP.
     </p></li>
 
 </ul>
 
 <p>
- -The old stable distribution (sarge) does not contain phpwiki packages.
+Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ?Ñ? phpwiki оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.
 </p>
 
 <p>
- -For the stable distribution (etch) these problems have been fixed in
- -version 1.3.12p3-5etch1.
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.12p3-5etch1.
 </p>
 
 <p>
- -For the unstable distribution (sid) these problems have been fixed in
- -version 1.3.12p3-6.1.
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.12p3-6.1.
 </p>
 
 <p>
- -We recommend that you upgrade your phpwiki package.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? phpwiki.
 </p>
 
 </define-tag>
-----BEGIN PGP SIGNATURE-----
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=Zgey
-----END PGP SIGNATURE-----


Reply to: