[DONE] security/2007/dsa-1270.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2007/dsa-1270.wml 2017-11-01 10:11:09.699803530 +0500
+++ russian/security/2007/dsa-1270.wml 2018-02-06 10:45:05.000000000 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several security related problems have been discovered in
- -OpenOffice.org, the free office suite. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? OpenOffice.org, Ñ?вободном набоÑ?е пÑ?огÑ?амм длÑ? оÑ?иÑ?ной Ñ?абоÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко пÑ?облем, Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ?. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0002">CVE-2007-0002</a>
- - <p>iDefense reported several integer overflow bugs in libwpd, a
- - library for handling WordPerfect documents that is included in
- - OpenOffice.org. Attackers are able to exploit these with
- - carefully crafted WordPerfect files that could cause an
- - application linked with libwpd to crash or possibly execute
- - arbitrary code.</p></li>
+ <p>СоÑ?Ñ?Ñ?дники iDefense Ñ?ообÑ?или о неÑ?колÑ?киÑ? пеÑ?еполнениÑ?Ñ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в libwpd,
+ библиоÑ?еке длÑ? обÑ?абоÑ?ки докÑ?менÑ?ов в Ñ?оÑ?маÑ?е WordPerfect, коÑ?оÑ?аÑ? вÑ?одиÑ? в Ñ?оÑ?Ñ?ав
+ OpenOffice.org. Ð?лоÑ?мÑ?Ñ?ленники могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и пÑ?и помоÑ?и
+ Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов WordPerfect, Ñ?Ñ?о вÑ?зÑ?ваеÑ?
+ аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? пÑ?иложениÑ?, Ñ?компанованого Ñ? libwpd, или возможное вÑ?полнение
+ пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0238">CVE-2007-0238</a>
- - <p>Next Generation Security discovered that the StarCalc parser in
- - OpenOffice.org contains an easily exploitable stack overflow that
- - could be used by a specially crafted document to execute
- - arbitrary code.</p></li>
+ <p>СоÑ?Ñ?Ñ?дники Next Generation Security обнаÑ?Ñ?жили, Ñ?Ñ?о код длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а из
+ StarCalc в OpenOffice.org Ñ?одеÑ?жиÑ? пеÑ?еполнение Ñ?Ñ?ека, коÑ?оÑ?ое можеÑ?
+ иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м докÑ?менÑ?ом длÑ? вÑ?полнениÑ?
+ пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0239">CVE-2007-0239</a>
- - <p>It has been reported that OpenOffice.org does not escape shell
- - meta characters and is hence vulnerable to execute arbitrary shell
- - commands via a specially crafted document after the user clicked
- - to a prepared link.</p></li>
+ <p>Ð?Ñ?ло Ñ?ообÑ?ено, Ñ?Ñ?о OpenOffice.org не вÑ?полнÑ?еÑ? Ñ?кÑ?аниÑ?ование меÑ?аÑ?имволов командной
+ оболоÑ?ки, а поÑ?омÑ? Ñ?Ñ?звим к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ? команд командной оболоÑ?ки
+ Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а, в коÑ?оÑ?ом полÑ?зоваÑ?елÑ? нажимаеÑ?
+ на подгоÑ?овленнÑ?Ñ? Ñ?Ñ?Ñ?лкÑ?.</p></li>
</ul>
- -<p>This updated advisory only provides packages for the upcoming etch
- -release alias Debian GNU/Linux 4.0.</p>
+<p>Ð?анное обновление Ñ?екомендаÑ?ии пÑ?едоÑ?Ñ?авлÑ?еÑ? лиÑ?Ñ? пакеÑ?Ñ? длÑ? гоÑ?овÑ?Ñ?егоÑ?Ñ?
+вÑ?пÑ?Ñ?ка etch, Debian GNU/Linux 4.0.</p>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.1.3-9sarge6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.3-9sarge6.</p>
- -<p>For the testing distribution (etch) these problems have been fixed in
- -version 2.0.4.dfsg.2-5etch1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4.dfsg.2-5etch1.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.0.4.dfsg.2-6.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4.dfsg.2-6.</p>
- -<p>We recommend that you upgrade your OpenOffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? OpenOffice.org.</p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2007/dsa-1270.data"
- -# $Id: dsa-1270.wml,v 1.6 2014/04/30 07:16:12 pabs Exp $
+# $Id: dsa-1270.wml,v 1.1 2018/02/06 05:45:05 dogsleg Exp $
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlp5QTMACgkQXudu4gIW
0qUk0g/+PPOGD8qbgFBm/oETgNw1Yu9s/kbM1Kn3P6CgZl7MxhCmmnHKVmbeTeDc
wDEfNKl/cOx0E5j7Wf+l+UQF86PubWsHklPEg25nXVW3rjTmTgLVi/JjlClRhic4
Q79qJ+LH8/K58kl9yxU1tIrmXDWuv0lVd48ap/+ZAf+3N2E2R877GEa3NhXvczWp
M6r/1+e1sV6I/5O6kVu2Il5PjWdJib4L+wr+B+EMq1Axqyh7S38ClWOk+oaSqS5M
tdYWk1bJh8HRzTzjqpyoRULqHGee4J3YI6NqKXGf6j3V/zoRlTyjG022mLqSIkVJ
U6RGXJtiv/lqrwnsA78NX2gWUVSV666RyKYpDCb+bBeGyFUDcDE/oTdjJnYta90h
wbmi8KDasXt+uK0IygV+FZzkdPjuLX/i2nrt1iFHJ8O0cB0CSycgAlrMwAdLn7Kj
U5z21ZHjJLwMx+BqaoeyTTiZnyHART9Jek9PXHaSwoNbmodQ0gFi8WT12MoCh5ak
uaeg4bVxYvYe44m4tlv6c8AkeUE6p5WlHT87R5Y+00ofWF6vuM1W5vAfeqnkQlQ3
5DOWYutvCz2uGJrH3VgJ+9A8+s2ZIrgVb53OG0Fnzl74oSRiKZxehgt4fE+vIWwS
5NPye9/ivptDC3GnLp93gY0736wih923Hr9EgLXDq4EgDsMGH/k=
=GoW7
-----END PGP SIGNATURE-----
Reply to: