[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] security/2007/dsa-1270.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1270.wml	2017-11-01 10:11:09.699803530 +0500
+++ russian/security/2007/dsa-1270.wml	2018-02-06 10:45:05.000000000 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been discovered in
- -OpenOffice.org, the free office suite.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? OpenOffice.org, Ñ?вободном набоÑ?е пÑ?огÑ?амм длÑ? оÑ?иÑ?ной Ñ?абоÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко пÑ?облем, Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ?. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0002";>CVE-2007-0002</a>
 
- -    <p>iDefense reported several integer overflow bugs in libwpd, a
- -    library for handling WordPerfect documents that is included in
- -    OpenOffice.org.  Attackers are able to exploit these with
- -    carefully crafted WordPerfect files that could cause an
- -    application linked with libwpd to crash or possibly execute
- -    arbitrary code.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники iDefense Ñ?ообÑ?или о неÑ?колÑ?киÑ? пеÑ?еполнениÑ?Ñ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в libwpd,
+    библиоÑ?еке длÑ? обÑ?абоÑ?ки докÑ?менÑ?ов в Ñ?оÑ?маÑ?е WordPerfect, коÑ?оÑ?аÑ? вÑ?одиÑ? в Ñ?оÑ?Ñ?ав
+    OpenOffice.org. Ð?лоÑ?мÑ?Ñ?ленники могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и пÑ?и помоÑ?и
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов WordPerfect, Ñ?Ñ?о вÑ?зÑ?ваеÑ?
+    аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? пÑ?иложениÑ?, Ñ?компанованого Ñ? libwpd, или возможное вÑ?полнение
+    пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0238";>CVE-2007-0238</a>
 
- -    <p>Next Generation Security discovered that the StarCalc parser in
- -    OpenOffice.org contains an easily exploitable stack overflow that
- -    could be used by a specially crafted document to execute
- -    arbitrary code.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники Next Generation Security обнаÑ?Ñ?жили, Ñ?Ñ?о код длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а из
+    StarCalc в OpenOffice.org Ñ?одеÑ?жиÑ? пеÑ?еполнение Ñ?Ñ?ека, коÑ?оÑ?ое можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м докÑ?менÑ?ом длÑ? вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0239";>CVE-2007-0239</a>
 
- -    <p>It has been reported that OpenOffice.org does not escape shell
- -    meta characters and is hence vulnerable to execute arbitrary shell
- -    commands via a specially crafted document after the user clicked
- -    to a prepared link.</p></li>
+    <p>Ð?Ñ?ло Ñ?ообÑ?ено, Ñ?Ñ?о OpenOffice.org не вÑ?полнÑ?еÑ? Ñ?кÑ?аниÑ?ование меÑ?аÑ?имволов командной
+    оболоÑ?ки, а поÑ?омÑ? Ñ?Ñ?звим к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ? команд командной оболоÑ?ки
+    Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а, в коÑ?оÑ?ом полÑ?зоваÑ?елÑ? нажимаеÑ?
+    на подгоÑ?овленнÑ?Ñ? Ñ?Ñ?Ñ?лкÑ?.</p></li>
 
 </ul>
 
- -<p>This updated advisory only provides packages for the upcoming etch
- -release alias Debian GNU/Linux 4.0.</p>
+<p>Ð?анное обновление Ñ?екомендаÑ?ии пÑ?едоÑ?Ñ?авлÑ?еÑ? лиÑ?Ñ? пакеÑ?Ñ? длÑ? гоÑ?овÑ?Ñ?егоÑ?Ñ?
+вÑ?пÑ?Ñ?ка etch, Debian GNU/Linux 4.0.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.1.3-9sarge6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.3-9sarge6.</p>
 
- -<p>For the testing distribution (etch) these problems have been fixed in
- -version 2.0.4.dfsg.2-5etch1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4.dfsg.2-5etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.0.4.dfsg.2-6.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4.dfsg.2-6.</p>
 
- -<p>We recommend that you upgrade your OpenOffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? OpenOffice.org.</p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2007/dsa-1270.data"
- -# $Id: dsa-1270.wml,v 1.6 2014/04/30 07:16:12 pabs Exp $
+# $Id: dsa-1270.wml,v 1.1 2018/02/06 05:45:05 dogsleg Exp $
-----BEGIN PGP SIGNATURE-----
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=GoW7
-----END PGP SIGNATURE-----


Reply to: