[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{409,364}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1364.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1364.wml	2016-10-24 12:30:51.836970890 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.7" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the vim editor. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? Ñ?едакÑ?оÑ?е vim бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2953";>CVE-2007-2953</a>
 
- -    <p>Ulf Härnhammar discovered that a format string flaw in helptags_one() from
- -    src/ex_cmds.c (triggered through the <q>helptags</q> command) can lead to the
- -    execution of arbitrary code.</p></li>
+    <p>УлÑ?Ñ? Ð¥Ñ?Ñ?нÑ?аммаÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?звимоÑ?Ñ?Ñ? Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки в helptags_one() из
+    src/ex_cmds.c (вÑ?зÑ?ваеÑ?Ñ?Ñ? Ñ?еÑ?ез командÑ? <q>helptags</q>) можеÑ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2438";>CVE-2007-2438</a>
 
- -    <p>Editors often provide a way to embed editor configuration commands (aka
- -    modelines) which are executed once a file is opened. Harmful commands
- -    are filtered by a sandbox mechanism. It was discovered that function
- -    calls to writefile(), feedkeys() and system() were not filtered, allowing
- -    shell command execution with a carefully crafted file opened in vim.</p></li>
+    <p>РедакÑ?оÑ?Ñ? Ñ?аÑ?Ñ?о пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ? возможноÑ?Ñ?Ñ? вÑ?Ñ?Ñ?аиваниÑ? команд наÑ?Ñ?Ñ?оек Ñ?едакÑ?оÑ?а
+    (извеÑ?Ñ?нÑ?Ñ? как modelines), коÑ?оÑ?Ñ?е вÑ?полнÑ?Ñ?Ñ?Ñ?Ñ? пÑ?и оÑ?кÑ?Ñ?Ñ?ии Ñ?айла. Ð?паÑ?нÑ?е командÑ?
+    Ñ?илÑ?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ? меÑ?анизмом пеÑ?оÑ?ниÑ?Ñ?. Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о вÑ?зовÑ? Ñ?Ñ?нкÑ?ий
+    writefile(), feedkeys() и system() не Ñ?илÑ?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?, позволÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? командÑ?
+    командной оболоÑ?ки Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла, оÑ?кÑ?Ñ?ваемого в vim.</p></li>
 
 </ul>
 
- -<p>This updated advisory repairs issues with missing files in the packages
- -for the oldstable distribution (sarge) for the alpha, mips, and mipsel
- -architectures.</p>
+<p>Ð?аннаÑ? обновлÑ?ннаÑ? Ñ?екомендаÑ?иÑ? иÑ?пÑ?авлÑ?еÑ? оÑ?ибки Ñ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?ими Ñ?айлами в пакеÑ?аÑ?
+длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (sarge) длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? alpha, mips
+и mipsel.</p>
 
- -<p>For the oldstable distribution (sarge) these problems have been fixed in
- -version 6.3-071+1sarge2. Sarge is not affected by <a href="https://security-tracker.debian.org/tracker/CVE-2007-2438";>CVE-2007-2438</a>.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 6.3-071+1sarge2. Sarge не подвеÑ?жен <a href="https://security-tracker.debian.org/tracker/CVE-2007-2438";>CVE-2007-2438</a>.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 7.0-122+1etch3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 7.0-122+1etch3.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 7.1-056+1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7.1-056+1.</p>
 
- -<p>We recommend that you upgrade your vim packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? vim.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1409.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1409.wml	2016-10-24 12:25:55.067930058 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.8" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>This update fixes all currently known regressions introduced with
- -the previous two revisions of DSA-1409.
- -The original text is reproduced below:</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? вÑ?е извеÑ?Ñ?нÑ?е в наÑ?Ñ?оÑ?Ñ?ий моменÑ? Ñ?егÑ?еÑ?Ñ?ии, поÑ?вивÑ?иеÑ?Ñ?
+поÑ?ле двÑ?Ñ? пÑ?едÑ?дÑ?Ñ?иÑ? Ñ?евизий DSA-1409.
+Ð?знаÑ?алÑ?нÑ?й Ñ?екÑ?Ñ? Ñ?екомендаÑ?ии пÑ?иводиÑ?Ñ?Ñ? ниже.</p>
 
 <blockquote>
 
- -<p>Several local/remote vulnerabilities have been discovered in samba,
- -a LanManager-like file and printer server for Unix. The Common 
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? samba, LanManager-подобном Ñ?айловом Ñ?еÑ?веÑ?е и Ñ?еÑ?веÑ?е пеÑ?аÑ?и длÑ? Unix, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко локалÑ?нÑ?Ñ?/Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5398";>CVE-2007-5398</a>
 
- -   <p>Alin Rad Pop of Secunia Research discovered that nmbd did not properly
- -   check the length of netbios packets. When samba is configured as a WINS
- -   server, a remote attacker could send multiple crafted requests resulting
- -   in the execution of arbitrary code with root privileges.</p>
+   <p>Ð?лин Рад Ð?оп из Secunia Research обнаÑ?Ñ?жил, Ñ?Ñ?о nmbd непÑ?авилÑ?но
+   вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? длинÑ? пакеÑ?ов netbios. Ð?Ñ?ли samba наÑ?Ñ?Ñ?оена на Ñ?абоÑ?Ñ? в каÑ?еÑ?Ñ?ве
+   WINS-Ñ?еÑ?веÑ?а, Ñ?о Ñ?далÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? множеÑ?Ñ?веннÑ?е Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е
+   запÑ?оÑ?Ñ?, коÑ?оÑ?Ñ?е пÑ?иводÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода Ñ? пÑ?авами Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.</p>
 </li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4572";>CVE-2007-4572</a>
- -   <p>Samba developers discovered that nmbd could be made to overrun a buffer
- -   during the processing of GETDC logon server requests.  When samba is
- -   configured as a Primary or Backup Domain Controller, a remote attacker
- -   could send malicious logon requests and possibly cause a denial of
- -   service.</p>
+   <p>РазÑ?абоÑ?Ñ?ики Samba обнаÑ?Ñ?жили, Ñ?Ñ?о nmbd можеÑ? пеÑ?езапиÑ?аÑ?Ñ? бÑ?Ñ?еÑ?
+   в Ñ?оде обÑ?абоÑ?ки Ñ?еÑ?веÑ?нÑ?Ñ? запÑ?оÑ?ов GETDC длÑ? вÑ?ода в Ñ?иÑ?Ñ?емÑ?.  Ð?Ñ?ли samba
+   наÑ?Ñ?Ñ?оена на иÑ?полÑ?зование в каÑ?еÑ?Ñ?ве пеÑ?виÑ?ного или Ñ?езеÑ?вного конÑ?Ñ?оллеÑ?а домена, Ñ?о Ñ?далÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник
+   можеÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? запÑ?оÑ?Ñ? длÑ? вÑ?ода в Ñ?иÑ?Ñ?емÑ? и вÑ?зÑ?ваÑ?Ñ? оÑ?каз в
+   обÑ?лÑ?живании.</p>
 </li>
 
 </ul>
 
 </blockquote>
 
- -<p>For the old stable distribution (sarge), these problems have been fixed in
- -version 3.0.14a-3sarge10.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.14a-3sarge10.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 3.0.24-6etch8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.24-6etch8.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 3.0.27-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.27-1.</p>
 
- -<p>We recommend that you upgrade your samba packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? samba.</p>
 </define-tag>
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2007/dsa-1409.data"
-----BEGIN PGP SIGNATURE-----
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=CrUI
-----END PGP SIGNATURE-----


Reply to: