[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2011/dsa-2295.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1270.wml	2017-11-01 10:11:09.699803530 +0500
+++ russian/security/2007/dsa-1270.wml	2018-02-06 10:45:05.000000000 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been discovered in
- -OpenOffice.org, the free office suite.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? OpenOffice.org, Ñ?вободном набоÑ?е пÑ?огÑ?амм длÑ? оÑ?иÑ?ной Ñ?абоÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко пÑ?облем, Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ?. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0002";>CVE-2007-0002</a>
 
- -    <p>iDefense reported several integer overflow bugs in libwpd, a
- -    library for handling WordPerfect documents that is included in
- -    OpenOffice.org.  Attackers are able to exploit these with
- -    carefully crafted WordPerfect files that could cause an
- -    application linked with libwpd to crash or possibly execute
- -    arbitrary code.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники iDefense Ñ?ообÑ?или о неÑ?колÑ?киÑ? пеÑ?еполнениÑ?Ñ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в libwpd,
+    библиоÑ?еке длÑ? обÑ?абоÑ?ки докÑ?менÑ?ов в Ñ?оÑ?маÑ?е WordPerfect, коÑ?оÑ?аÑ? вÑ?одиÑ? в Ñ?оÑ?Ñ?ав
+    OpenOffice.org. Ð?лоÑ?мÑ?Ñ?ленники могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и пÑ?и помоÑ?и
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов WordPerfect, Ñ?Ñ?о вÑ?зÑ?ваеÑ?
+    аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? пÑ?иложениÑ?, Ñ?компанованого Ñ? libwpd, или возможное вÑ?полнение
+    пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0238";>CVE-2007-0238</a>
 
- -    <p>Next Generation Security discovered that the StarCalc parser in
- -    OpenOffice.org contains an easily exploitable stack overflow that
- -    could be used by a specially crafted document to execute
- -    arbitrary code.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники Next Generation Security обнаÑ?Ñ?жили, Ñ?Ñ?о код длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а из
+    StarCalc в OpenOffice.org Ñ?одеÑ?жиÑ? пеÑ?еполнение Ñ?Ñ?ека, коÑ?оÑ?ое можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м докÑ?менÑ?ом длÑ? вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0239";>CVE-2007-0239</a>
 
- -    <p>It has been reported that OpenOffice.org does not escape shell
- -    meta characters and is hence vulnerable to execute arbitrary shell
- -    commands via a specially crafted document after the user clicked
- -    to a prepared link.</p></li>
+    <p>Ð?Ñ?ло Ñ?ообÑ?ено, Ñ?Ñ?о OpenOffice.org не вÑ?полнÑ?еÑ? Ñ?кÑ?аниÑ?ование меÑ?аÑ?имволов командной
+    оболоÑ?ки, а поÑ?омÑ? Ñ?Ñ?звим к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ? команд командной оболоÑ?ки
+    Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а, в коÑ?оÑ?ом полÑ?зоваÑ?елÑ? нажимаеÑ?
+    на подгоÑ?овленнÑ?Ñ? Ñ?Ñ?Ñ?лкÑ?.</p></li>
 
 </ul>
 
- -<p>This updated advisory only provides packages for the upcoming etch
- -release alias Debian GNU/Linux 4.0.</p>
+<p>Ð?анное обновление Ñ?екомендаÑ?ии пÑ?едоÑ?Ñ?авлÑ?еÑ? лиÑ?Ñ? пакеÑ?Ñ? длÑ? гоÑ?овÑ?Ñ?егоÑ?Ñ?
+вÑ?пÑ?Ñ?ка etch, Debian GNU/Linux 4.0.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.1.3-9sarge6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.3-9sarge6.</p>
 
- -<p>For the testing distribution (etch) these problems have been fixed in
- -version 2.0.4.dfsg.2-5etch1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4.dfsg.2-5etch1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 2.0.4.dfsg.2-6.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4.dfsg.2-6.</p>
 
- -<p>We recommend that you upgrade your OpenOffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? OpenOffice.org.</p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2007/dsa-1270.data"
- -# $Id: dsa-1270.wml,v 1.6 2014/04/30 07:16:12 pabs Exp $
+# $Id: dsa-1270.wml,v 1.1 2018/02/06 05:45:05 dogsleg Exp $
- --- english/security/2011/dsa-2295.wml	2017-11-01 10:11:10.275841084 +0500
+++ russian/security/2011/dsa-2295.wml	2018-02-07 11:18:06.012274735 +0500
@@ -1,53 +1,54 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been found in the Iceape internet suite, an
- -unbranded version of Seamonkey:</p>
+<p>Ð? Iceape, набоÑ?е пÑ?огÑ?амм длÑ? Ñ?абоÑ?Ñ? в Ð?нÑ?еÑ?неÑ?, безбÑ?ендовой веÑ?Ñ?ии
+Seamonkey, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0084";>CVE-2011-0084</a>
 
- -   <p><q>regenrecht</q> discovered that incorrect pointer handling in the SVG
- -   processing code could lead to the execution of arbitrary code.</p></li>
+   <p><q>regenrecht</q> обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? Ñ?абоÑ?а Ñ? Ñ?казаÑ?елÑ?ми в коде длÑ? обÑ?абоÑ?ки
+   SVG можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2378";>CVE-2011-2378</a>
 
- -   <p><q>regenrecht</q> discovered that incorrect memory management in DOM
- -   processing could lead to the execution of arbitrary code.</p></li>
+   <p><q>regenrecht</q> обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? Ñ?абоÑ?а Ñ? памÑ?Ñ?иÑ? в коде обÑ?абоÑ?ки
+   DOM можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2981";>CVE-2011-2981</a>
 
- -   <p><q>moz_bug_r_a_4</q> discovered a Chrome privilege escalation
- -   vulnerability in the event handler code.</p></li>
+   <p><q>moz_bug_r_a_4</q> обнаÑ?Ñ?жил повÑ?Ñ?ение пÑ?ивилегий Chrome в коде
+   обÑ?абоÑ?Ñ?ика Ñ?обÑ?Ñ?ий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2982";>CVE-2011-2982</a>
 
- -   <p>Gary Kwong, Igor Bukanov, Nils and Bob Clary discovered memory
- -   corruption bugs, which may lead to the execution of arbitrary code.</p></li>
+   <p>Ð?Ñ?Ñ?и Ð?вон, Ð?гоÑ?Ñ? Ð?Ñ?канов, Ð?илÑ?Ñ? и Ð?об Ð?лÑ?Ñ?и обнаÑ?Ñ?жили оÑ?ибки Ñ? повÑ?еждением Ñ?одеÑ?жимого
+   памÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2983";>CVE-2011-2983</a>
 
- -   <p><q>shutdown</q> discovered an information leak in the handling of
+   <p><q>shutdown</q> обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии в коде обÑ?абоÑ?ки
    RegExp.input.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2984";>CVE-2011-2984</a>
 
- -   <p><q>moz_bug_r_a4</q> discovered a Chrome privilege escalation
- -   vulnerability.</p></li>
+   <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил повÑ?Ñ?ение пÑ?ивилегий
+   Chrome.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (lenny) is not affected. The iceape
- -package only provides the XPCOM code.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (lenny) не подвеÑ?жен Ñ?казаннÑ?м Ñ?Ñ?звимоÑ?Ñ?Ñ?м. Ð?акеÑ? iceape
+пÑ?едоÑ?Ñ?авлÑ?еÑ? Ñ?олÑ?ко XPCOM-код.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.0.11-7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.11-7.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.0.14-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.14-5.</p>
 
- -<p>We recommend that you upgrade your iceape packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceape.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Jpee
-----END PGP SIGNATURE-----


Reply to: