[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{249,323}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1249.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1249.wml	2016-10-24 12:14:51.242838158 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the X Window System,
- -which may lead to privilege escalation or denial of service.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? X Window System, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий или оÑ?казÑ? в обÑ?лÑ?живании.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6101";>CVE-2006-6101</a>
 
- -    <p>Sean Larsson discovered an integer overflow in the Render extension,
- -    which might lead to denial of service or local privilege escalation.</p></li>
+    <p>Шон Ð?аÑ?Ñ?он обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?аÑ?Ñ?иÑ?ении Render,
+    коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или локалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6102";>CVE-2006-6102</a>
 
- -    <p>Sean Larsson discovered an integer overflow in the DBE extension,
- -    which might lead to denial of service or local privilege escalation.</p></li>
+    <p>Шон Ð?аÑ?Ñ?он обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?аÑ?Ñ?иÑ?ении DBE,
+    коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или локалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-6103";>CVE-2006-6103</a>
 
- -    <p>Sean Larsson discovered an integer overflow in the DBE extension,
- -    which might lead to denial of service or local privilege escalation.</p></li>
+    <p>Шон Ð?аÑ?Ñ?он обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?аÑ?Ñ?иÑ?ении DBE,
+    коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или локалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.3.0.dfsg.1-14sarge3. This update lacks builds for the
- -Motorola 680x0 architecture, which had build problems. Packages will be
- -released once this problem has been resolved.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.3.0.dfsg.1-14sarge3. Ð? данном обновлении оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? Ñ?боÑ?ки длÑ?
+аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? Motorola 680x0, Ñ? коÑ?оÑ?ой возникли пÑ?облемÑ?. Ð?акеÑ?Ñ? длÑ? неÑ? бÑ?дÑ?Ñ?
+вÑ?пÑ?Ñ?енÑ? по меÑ?е Ñ?еÑ?ениÑ? Ñ?Ñ?ой пÑ?облемÑ?.</p>
 
- -<p>For the upcoming stable distribution (etch) these problems have been fixed
- -in version 2:1.1.1-15 of xorg-server.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2:1.1.1-15 пакеÑ?а xorg-server.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed
- -in version 2:1.1.1-15 of xorg-server.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2:1.1.1-15 пакеÑ?а xorg-server.</p>
 
- -<p>We recommend that you upgrade your XFree86 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? XFree86.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1323.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1323.wml	2016-10-24 12:19:46.351981561 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the MIT reference
- -implementation of the Kerberos network authentication protocol suite,
- -which may lead to the execution of arbitrary code. The Common 
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? Ñ?Ñ?алонной Ñ?еализаÑ?ии набоÑ?а пÑ?оÑ?околов Ñ?еÑ?евой аÑ?Ñ?енÑ?иÑ?икаÑ?ии Kerberos
+оÑ? MIT бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2442";>CVE-2007-2442</a>
 
- -    <p>Wei Wang discovered that the free of an uninitialised pointer in the
- -    Kerberos RPC library may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?й Ð?ан обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?вобождение неиниÑ?иализиÑ?ованного Ñ?казаÑ?елÑ? в
+    RPC-библиоÑ?еке Kerberos можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2443";>CVE-2007-2443</a>
 
- -    <p>Wei Wang discovered that insufficient input sanitising in the
- -    Kerberos RPC library may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?й Ð?ан обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ? в
+    RPC-библиоÑ?еке Kerberos можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2798";>CVE-2007-2798</a>
 
- -    <p>It was discovered that a buffer overflow in the  Kerberos
- -    administration daemon may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?лÑ?жбе админиÑ?Ñ?Ñ?иÑ?ованиÑ?
+    Kerberos можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (sarge) these problems have been fixed in
- -version 1.3.6-2sarge5. Packages for hppa, mips and powerpc are not yet
- -available. They will be provided later.</p>
- -
- -<p>For the stable distribution (etch) these problems have been fixed in
- -version 1.4.4-7etch2. Packages for hppa and mips are not yet available.
- -They will be provided later.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.6-2sarge5. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? hppa, mips и powerpc пока
+недоÑ?Ñ?Ñ?пнÑ?. Ð?ни бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.4-7etch2. Ð?акеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? hppa и mips пока недоÑ?Ñ?Ñ?пнÑ?.
+Ð?ни бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.6.dfsg.1-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.6.dfsg.1-5.</p>
 
- -<p>We recommend that you upgrade your Kerberos packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Kerberos.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=h+sJ
-----END PGP SIGNATURE-----


Reply to: