[DONE] wml://security/2007/dsa-1{414,305}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2007/dsa-1305.wml 2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1305.wml 2016-10-24 12:46:16.388331636 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Icedove mail client,
- -an unbranded version of the Thunderbird client. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? поÑ?Ñ?овом клиенÑ?е Icedove, безбÑ?ендовой веÑ?Ñ?ии клиенÑ?а Thunderbird, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1558">CVE-2007-1558</a>
- - <p>Gatan Leurent discovered a cryptographical weakness in APOP
- - authentication, which reduces the required efforts for an MITM attack
- - to intercept a password. The update enforces stricter validation, which
- - prevents this attack.</p></li>
+ <p>Ð?еÑ?ан Ð?еÑ?он обнаÑ?Ñ?жил Ñ?лабое Ñ?иÑ?Ñ?ование в аÑ?Ñ?енÑ?иÑ?икаÑ?ии APOP,
+ коÑ?оÑ?ое Ñ?нижаÑ?Ñ? заÑ?иÑ?Ñ?нноÑ?Ñ?Ñ? оÑ? MITM-аÑ?ак по
+ пеÑ?еÑ?ваÑ?Ñ? паÑ?олÑ?. Ð?анное обновление вклÑ?Ñ?аеÑ? более Ñ?Ñ?Ñ?огÑ?Ñ? пÑ?овеÑ?кÑ?, Ñ?Ñ?о
+ позволÑ?еÑ? пÑ?едоÑ?вÑ?аÑ?иÑ?Ñ? Ñ?акÑ?Ñ? аÑ?акÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2867">CVE-2007-2867</a>
- -
- - <p>Boris Zbarsky, Eli Friedman, Georgi Guninski, Jesse Ruderman, Martijn
- - Wargers and Olli Pettay discovered crashes in the layout engine, which
- - might allow the execution of arbitrary code.</p></li>
+
+ <p>Ð?оÑ?иÑ? Ð?баÑ?Ñ?кий, Ðли ФÑ?идман, Ð?еоÑ?гий Ð?Ñ?нинÑ?кий, Ð?жеÑ?Ñ? РадеÑ?ман, Ð?аÑ?Ñ?ийн
+ Ð?аÑ?геÑ?Ñ? и Ð?лли Ð?еÑ?Ñ?ай обнаÑ?Ñ?жили неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок в движке Ñ?азмеÑ?ки, коÑ?оÑ?Ñ?е
+ могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2868">CVE-2007-2868</a>
- - <p>Brendan Eich, Igor Bukanov, Jesse Ruderman, <q>moz_bug_r_a4</q> and Wladimir Palant
- - discovered crashes in the Javascript engine, which might allow the execution of
- - arbitrary code. Generally, enabling Javascript in Icedove is not recommended.</p></li>
+ <p>Ð?Ñ?ендан ÐйÑ?, Ð?гоÑ?Ñ? Ð?Ñ?канов, Ð?жеÑ?Ñ? РадеÑ?ман, <q>moz_bug_r_a4</q> и Ð?ладимиÑ? Ð?аланÑ?
+ обнаÑ?Ñ?жили неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок в движке Javascript, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ?
+ пÑ?оизволÑ?нÑ?й код. Ð?ообÑ?е же не Ñ?екомендÑ?еÑ?Ñ?Ñ? вклÑ?Ñ?аÑ?Ñ? Javascript в Icedove.</p></li>
</ul>
- -<p>Fixes for the oldstable distribution (sarge) are not available. While there
- -will be another round of security updates for Mozilla products, Debian doesn't
- -have the resources to backport further security fixes to the old Mozilla
- -products. You're strongly encouraged to upgrade to stable as soon as possible.</p>
+<p>Ð?Ñ?пÑ?авлениÑ? длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (sarge) пока недоÑ?Ñ?Ñ?пнÑ?. ХоÑ?Ñ?
+обновлениÑ? безопаÑ?ноÑ?Ñ?и длÑ? пÑ?одÑ?кÑ?ов Mozilla еÑ?Ñ? бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?каÑ?Ñ?Ñ?Ñ?, Ñ? Debian
+неÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов длÑ? вÑ?полнениÑ? обÑ?аÑ?ного пеÑ?еноÑ?а Ñ?Ñ?иÑ? обновлений в Ñ?Ñ?аÑ?Ñ?е пÑ?одÑ?кÑ?Ñ?
+Mozilla. Ð?аÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? как можно Ñ?коÑ?ее вÑ?полниÑ?Ñ? обновление до Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.</p>
- -<p>For the stable distribution (etch) these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
1.5.0.12.dfsg1-0etch1.</p>
- -<p>The unstable distribution (sid) will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
</define-tag>
# do not modify the following line
- --- english/security/2007/dsa-1414.wml 2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1414.wml 2016-10-24 12:37:02.971485342 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Wireshark
- -network traffic analyzer, which may lead to denial of service or
- -execution of arbitrary code. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Wireshark, пÑ?огÑ?амме длÑ? анализа Ñ?еÑ?евого Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6114">CVE-2007-6114</a>
- - <p>Stefan Esser discovered a buffer overflow in the SSL dissector.
- - <q>Fabiodds</q> discovered a buffer overflow in the iSeries trace
- - dissector.</p></li>
+ <p>ШÑ?еÑ?ан ÐÑ?Ñ?еÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в диÑ?Ñ?екÑ?оÑ?е SSL.
+ <q>Fabiodds</q> обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в диÑ?Ñ?екÑ?оÑ?е
+ Ñ?Ñ?аÑ?Ñ?иÑ?овки iSeries.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6117">CVE-2007-6117</a>
- - <p>A programming error was discovered in the HTTP dissector, which may
- - lead to denial of service.</p></li>
+ <p>Ð? диÑ?Ñ?екÑ?оÑ?е HTTP бÑ?ла обнаÑ?Ñ?жена оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ?, коÑ?оÑ?аÑ? можеÑ?
+ пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6118">CVE-2007-6118</a>
- - <p>The MEGACO dissector could be tricked into resource exhaustion.</p></li>
+ <p>Ð?иÑ?Ñ?екÑ?оÑ? MEGACO можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? иÑ?Ñ?оÑ?ениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6120">CVE-2007-6120</a>
- - <p>The Bluetooth SDP dissector could be tricked into an endless loop.</p></li>
+ <p>Ð?иÑ?Ñ?екÑ?оÑ? Bluetooth SDP можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?зова беÑ?конеÑ?ного Ñ?икла.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6121">CVE-2007-6121</a>
- - <p>The RPC portmap dissector could be tricked into dereferencing
- - a NULL pointer.</p></li>
+ <p>Ð?иÑ?Ñ?екÑ?оÑ? RPC portmap можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? Ñ?азÑ?менованиÑ?
+ NULL-Ñ?казаÑ?елÑ?.</p></li>
</ul>
- -<p>For the old stable distribution (sarge), these problems have been
- -fixed in version 0.10.10-2sarge10. (In Sarge Wireshark used to be
- -called Ethereal). Updated packages for sparc and m68k will be provided
- -later.</p>
- -
- -<p>For the stable distribution (etch), these problems have been fixed
- -in version 0.99.4-5.etch.1. Updated packages for sparc will be provided
- -later.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 0.10.10-2sarge10. (Ð? Sarge Wireshark имееÑ?
+название Ethereal). Ð?бновлÑ?ннÑ?е пакеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? sparc и m68k бÑ?дÑ?Ñ?
+пÑ?едоÑ?Ñ?авленÑ? позже.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.99.4-5.etch.1. Ð?бновлÑ?ннÑ?е пакеÑ?Ñ? длÑ? аÑ?Ñ?Ñ?екÑ?Ñ?Ñ?Ñ? sparc бÑ?дÑ?Ñ?
+пÑ?едоÑ?Ñ?авленÑ? позже.</p>
- -<p>We recommend that you upgrade your wireshark/ethereal packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wireshark/ethereal.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=IpFQ
-----END PGP SIGNATURE-----
Reply to: