[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2007/dsa-1{414,305}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1305.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1305.wml	2016-10-24 12:46:16.388331636 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Icedove mail client,
- -an unbranded version of the Thunderbird client. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? поÑ?Ñ?овом клиенÑ?е Icedove, безбÑ?ендовой веÑ?Ñ?ии клиенÑ?а Thunderbird, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1558";>CVE-2007-1558</a>
 
- -    <p>Gatan Leurent discovered a cryptographical weakness in APOP
- -    authentication, which reduces the required efforts for an MITM attack
- -    to intercept a password. The update enforces stricter validation, which
- -    prevents this attack.</p></li>
+    <p>Ð?еÑ?ан Ð?еÑ?он обнаÑ?Ñ?жил Ñ?лабое Ñ?иÑ?Ñ?ование в аÑ?Ñ?енÑ?иÑ?икаÑ?ии APOP,
+    коÑ?оÑ?ое Ñ?нижаÑ?Ñ? заÑ?иÑ?Ñ?нноÑ?Ñ?Ñ? оÑ? MITM-аÑ?ак по
+    пеÑ?еÑ?ваÑ?Ñ? паÑ?олÑ?. Ð?анное обновление вклÑ?Ñ?аеÑ? более Ñ?Ñ?Ñ?огÑ?Ñ? пÑ?овеÑ?кÑ?, Ñ?Ñ?о
+    позволÑ?еÑ? пÑ?едоÑ?вÑ?аÑ?иÑ?Ñ? Ñ?акÑ?Ñ? аÑ?акÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2867";>CVE-2007-2867</a>
- - 
- -    <p>Boris Zbarsky, Eli Friedman, Georgi Guninski, Jesse Ruderman, Martijn
- -    Wargers and Olli Pettay discovered crashes in the layout engine, which
- -    might allow the execution of arbitrary code.</p></li>
+
+    <p>Ð?оÑ?иÑ? Ð?баÑ?Ñ?кий, Эли ФÑ?идман, Ð?еоÑ?гий Ð?Ñ?нинÑ?кий, Ð?жеÑ?Ñ? РадеÑ?ман, Ð?аÑ?Ñ?ийн
+    Ð?аÑ?геÑ?Ñ? и Ð?лли Ð?еÑ?Ñ?ай обнаÑ?Ñ?жили неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок в движке Ñ?азмеÑ?ки, коÑ?оÑ?Ñ?е
+    могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2868";>CVE-2007-2868</a>
 
- -    <p>Brendan Eich, Igor Bukanov, Jesse Ruderman, <q>moz_bug_r_a4</q> and Wladimir Palant
- -    discovered crashes in the Javascript engine, which might allow the execution of
- -    arbitrary code. Generally, enabling Javascript in Icedove is not recommended.</p></li>
+    <p>Ð?Ñ?ендан ЭйÑ?, Ð?гоÑ?Ñ? Ð?Ñ?канов, Ð?жеÑ?Ñ? РадеÑ?ман, <q>moz_bug_r_a4</q> и Ð?ладимиÑ? Ð?аланÑ?
+    обнаÑ?Ñ?жили неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок в движке Javascript, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ?
+    пÑ?оизволÑ?нÑ?й код. Ð?ообÑ?е же не Ñ?екомендÑ?еÑ?Ñ?Ñ? вклÑ?Ñ?аÑ?Ñ? Javascript в Icedove.</p></li>
 
 </ul>
 
- -<p>Fixes for the oldstable distribution (sarge) are not available. While there
- -will be another round of security updates for Mozilla products, Debian doesn't
- -have the resources to backport further security fixes to the old Mozilla
- -products. You're strongly encouraged to upgrade to stable as soon as possible.</p>
+<p>Ð?Ñ?пÑ?авлениÑ? длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (sarge) пока недоÑ?Ñ?Ñ?пнÑ?. ХоÑ?Ñ?
+обновлениÑ? безопаÑ?ноÑ?Ñ?и длÑ? пÑ?одÑ?кÑ?ов Mozilla еÑ?Ñ? бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?каÑ?Ñ?Ñ?Ñ?, Ñ? Debian
+неÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов длÑ? вÑ?полнениÑ? обÑ?аÑ?ного пеÑ?еноÑ?а Ñ?Ñ?иÑ? обновлений в Ñ?Ñ?аÑ?Ñ?е пÑ?одÑ?кÑ?Ñ?
+Mozilla. Ð?аÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? как можно Ñ?коÑ?ее вÑ?полниÑ?Ñ? обновление до Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.5.0.12.dfsg1-0etch1.</p>
 
- -<p>The unstable distribution (sid) will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2007/dsa-1414.wml	2014-04-30 13:16:13.000000000 +0600
+++ russian/security/2007/dsa-1414.wml	2016-10-24 12:37:02.971485342 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Wireshark
- -network traffic analyzer, which may lead to denial of service or 
- -execution of arbitrary code. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Wireshark, пÑ?огÑ?амме длÑ? анализа Ñ?еÑ?евого Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6114";>CVE-2007-6114</a>
 
- -    <p>Stefan Esser discovered a buffer overflow in the SSL dissector.
- -    <q>Fabiodds</q> discovered a buffer overflow in the iSeries trace
- -    dissector.</p></li>
+    <p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в диÑ?Ñ?екÑ?оÑ?е SSL.
+    <q>Fabiodds</q> обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в диÑ?Ñ?екÑ?оÑ?е
+    Ñ?Ñ?аÑ?Ñ?иÑ?овки iSeries.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6117";>CVE-2007-6117</a>
 
- -    <p>A programming error was discovered in the HTTP dissector, which may
- -    lead to denial of service.</p></li>
+    <p>Ð? диÑ?Ñ?екÑ?оÑ?е HTTP бÑ?ла обнаÑ?Ñ?жена оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ?, коÑ?оÑ?аÑ? можеÑ?
+    пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6118";>CVE-2007-6118</a>
 
- -    <p>The MEGACO dissector could be tricked into resource exhaustion.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ? MEGACO можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? иÑ?Ñ?оÑ?ениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6120";>CVE-2007-6120</a>
 
- -    <p>The Bluetooth SDP dissector could be tricked into an endless loop.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ? Bluetooth SDP можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?зова беÑ?конеÑ?ного Ñ?икла.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6121";>CVE-2007-6121</a>
 
- -    <p>The RPC portmap dissector could be tricked into dereferencing
- -    a NULL pointer.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ? RPC portmap можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? Ñ?азÑ?менованиÑ?
+    NULL-Ñ?казаÑ?елÑ?.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (sarge), these problems have been
- -fixed in version 0.10.10-2sarge10. (In Sarge Wireshark used to be
- -called Ethereal). Updated packages for sparc and m68k will be provided
- -later.</p>
- -
- -<p>For the stable distribution (etch), these problems have been fixed
- -in version 0.99.4-5.etch.1. Updated packages for sparc will be provided
- -later.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 0.10.10-2sarge10. (Ð? Sarge Wireshark имееÑ?
+название Ethereal). Ð?бновлÑ?ннÑ?е пакеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? sparc и m68k бÑ?дÑ?Ñ?
+пÑ?едоÑ?Ñ?авленÑ? позже.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.99.4-5.etch.1. Ð?бновлÑ?ннÑ?е пакеÑ?Ñ? длÑ? аÑ?Ñ?Ñ?екÑ?Ñ?Ñ?Ñ? sparc бÑ?дÑ?Ñ?
+пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your wireshark/ethereal packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wireshark/ethereal.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=IpFQ
-----END PGP SIGNATURE-----


Reply to: