-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2007/dsa-1276.wml 2014-04-30 13:16:12.000000000 +0600 +++ russian/security/2007/dsa-1276.wml 2016-09-15 00:42:31.168233126 +0500 @@ -1,40 +1,41 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several remote vulnerabilities have been discovered in the MIT reference - -implementation of the Kerberos network authentication protocol suite, - -which may lead to the execution of arbitrary code. The Common - -Vulnerabilities and Exposures project identifies the following problems:</p> +<p>Ð ÑÑалонной ÑеализаÑии набоÑа пÑоÑоколов ÑеÑевой аÑÑенÑиÑикаÑии Kerberos Ð¾Ñ MIT, +бÑло обнаÑÑжено неÑколÑко ÑдалÑннÑÑ ÑÑзвимоÑÑей, +коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода. ÐÑÐ¾ÐµÐºÑ Common +Vulnerabilities and Exposures опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0956">CVE-2007-0956</a> - - <p>It was discovered that the krb5 telnet daemon performs insufficient - - validation of usernames, which might allow unauthorized logins or - - privilege escalation.</p></li> + <p>ÐÑло обнаÑÑжено, ÑÑо telnet-ÑлÑжба krb5 вÑполнÑÐµÑ Ð½ÐµÐ´Ð¾ÑÑаÑоÑнÑе пÑовеÑки + имÑн полÑзоваÑелей, ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸ÑÑ Ð²ÑполнÑÑÑ Ð½ÐµÐ°Ð²ÑоÑизованнÑй Ð²Ñ Ð¾Ð´ или + повÑÑаÑÑ Ð¿Ñивилегии.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0957">CVE-2007-0957</a> - - <p>iDefense discovered that a buffer overflow in the logging code of the - - KDC and the administration daemon might lead to arbitrary code - - execution.</p></li> + <p>СоÑÑÑдники iDefense обнаÑÑжили, ÑÑо пеÑеполнение бÑÑеÑа в коде жÑÑналиÑÐ¾Ð²Ð°Ð½Ð¸Ñ + KDC и ÑлÑжбе админиÑÑÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного + кода.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1216">CVE-2007-1216</a> - - <p>It was discovered that a double free in the RPCSEC_GSS part of the - - GSS library code might lead to arbitrary code execution.</p></li> + <p>ÐÑло обнаÑÑжено, ÑÑо двойное оÑвобождение в ÑаÑÑи RPCSEC_GSS кода библиоÑеки + GSS Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода.</p></li> </ul> - -<p>For the stable distribution (sarge) these problems have been fixed in - -version 1.3.6-2sarge4.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (sarge) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 1.3.6-2sarge4.</p> - -<p>For the upcoming stable distribution (etch) these problems have been fixed - -in version 1.4.4-7etch1.</p> +<p>РгоÑовÑÑемÑÑ ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ +в веÑÑии 1.4.4-7etch1.</p> - -<p>For the unstable distribution (sid) these problems will be fixed soon.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±ÑдÑÑ Ð¸ÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð¿Ð¾Ð·Ð¶Ðµ.</p> - -<p>We recommend that you upgrade your Kerberos packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ Kerberos.</p> </define-tag> # do not modify the following line - --- english/security/2007/dsa-1335.wml 2014-04-30 13:16:12.000000000 +0600 +++ russian/security/2007/dsa-1335.wml 2016-09-15 00:19:45.534179981 +0500 @@ -1,38 +1,39 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several remote vulnerabilities have been discovered in Gimp, the GNU Image - -Manipulation Program, which might lead to the execution of arbitrary code. - -The Common Vulnerabilities and Exposures project identifies the following - -problems:</p> +<p>Ð Gimp, GNU Image Manipulation Program, бÑло обнаÑÑжено неÑколÑко ÑдалÑннÑÑ +ÑÑзвимоÑÑей, коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода. +ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures опÑеделÑÐµÑ ÑледÑÑÑие +пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4519">CVE-2006-4519</a> - - <p>Sean Larsson discovered several integer overflows in the processing - - code for DICOM, PNM, PSD, RAS, XBM and XWD images, which might lead - - to the execution of arbitrary code if a user is tricked into opening - - such a malformed media file.</p></li> + <p>Шон ÐаÑÑон обнаÑÑжил неÑколÑко пеÑеполнений ÑелÑÑ ÑиÑел в коде обÑабоÑки + изобÑажений DICOM, PNM, PSD, RAS, XBM и XWD, коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ + к вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода в ÑлÑÑае, еÑли полÑзоваÑÐµÐ»Ñ Ð¾ÑкÑÑÐ²Ð°ÐµÑ ÑпеÑиалÑно + ÑÑоÑмиÑованнÑе ÑÐ°Ð¹Ð»Ñ Ð² ÑказаннÑÑ ÑоÑмаÑÐ°Ñ .</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2949">CVE-2007-2949</a> - - <p>Stefan Cornelius discovered an integer overflow in the processing - - code for PSD images, which might lead to the execution of arbitrary - - code if a user is tricked into opening such a malformed media file.</p></li> + <p>ШÑеÑан ÐоÑнелиÑÑ Ð¾Ð±Ð½Ð°ÑÑжил пеÑеполнение ÑелÑÑ ÑиÑел в коде обÑабоÑки + изобÑажений PSD, коÑоÑое Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода в + ÑлÑÑае, еÑли полÑзоваÑÐµÐ»Ñ Ð¾ÑкÑÑÐ²Ð°ÐµÑ ÑпеÑиалÑно ÑÑоÑмиÑованнÑй Ñайл в Ñказанном ÑоÑмаÑе.</p></li> </ul> - -<p>For the oldstable distribution (sarge) these problems have been fixed in - -version 2.2.6-1sarge4. Packages for mips and mipsel are not yet - -available.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (sarge) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 2.2.6-1sarge4. ÐакеÑÑ Ð´Ð»Ñ Ð°ÑÑ Ð¸ÑекÑÑÑ mips и mipsel пока +не доÑÑÑпнÑ.</p> - -<p>For the stable distribution (etch) these problems have been fixed - -in version 2.2.13-1etch4. Packages for mips are not yet available.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ +в веÑÑии 2.2.13-1etch4. ÐакеÑÑ Ð´Ð»Ñ Ð°ÑÑ Ð¸ÑекÑÑÑÑ mips пока не доÑÑÑпнÑ.</p> - -<p>For the unstable distribution (sid) these problems have been fixed in - -version 2.2.17-1.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 2.2.17-1.</p> - -<p>We recommend that you upgrade your gimp packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ gimp.</p> </define-tag> # do not modify the following line - --- english/security/2007/dsa-1371.wml 2014-04-30 13:16:13.000000000 +0600 +++ russian/security/2007/dsa-1371.wml 2016-09-15 00:32:33.226182208 +0500 @@ -1,9 +1,10 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> <p> - -Several vulnerabilities have been discovered in phpWiki, a wiki engine - -written in PHP. The Common Vulnerabilities and Exposures project - -identifies the following problems: +Ð phpWiki, вики-движке, напиÑанном на ÑзÑке PHP, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures +опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ: </p> <ul> @@ -11,44 +12,44 @@ <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2024">CVE-2007-2024</a> <p> - - It was discovered that phpWiki performs insufficient file name - - validation, which allows unrestricted file uploads. + ÐÑло обнаÑÑжено, ÑÑо phpWiki вÑполнÑÐµÑ Ð½ÐµÐ´Ð¾ÑÑаÑоÑнÑе пÑовеÑки имÑн + Ñайлов, ÑÑо позволÑÐµÑ Ð·Ð°Ð³ÑÑжаÑÑ ÑÐ°Ð¹Ð»Ñ Ð±ÐµÐ· огÑаниÑений. </p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2025">CVE-2007-2025</a> <p> - - It was discovered that phpWiki performs insufficient file name - - validation, which allows unrestricted file uploads. + ÐÑло обнаÑÑжено, ÑÑо phpWiki вÑполнÑÐµÑ Ð½ÐµÐ´Ð¾ÑÑаÑоÑнÑе пÑовеÑки имÑн + Ñайлов, ÑÑо позволÑÐµÑ Ð·Ð°Ð³ÑÑжаÑÑ ÑÐ°Ð¹Ð»Ñ Ð±ÐµÐ· огÑаниÑений. </p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3193">CVE-2007-3193</a> <p> - - If the configuration lacks a nonzero PASSWORD_LENGTH_MINIMUM, - - phpWiki might allow remote attackers to bypass authentication via - - an empty password, which causes ldap_bind to return true when used - - with certain LDAP implementations. + ÐÑли в наÑÑÑÐ¾Ð¹ÐºÐ°Ñ Ð¾ÑÑÑÑÑÑвÑÐµÑ Ð½ÐµÐ½Ñлевое знаÑение PASSWORD_LENGTH_MINIMUM, + Ñо phpWiki Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÑÑ ÑдалÑннÑм злоÑмÑÑленникам Ð¾Ð±Ñ Ð¾Ð´Ð¸ÑÑ Ð°ÑÑенÑиÑикаÑÐ¸Ñ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ + пÑÑÑого паÑолÑ, ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº ÑомÑ, ÑÑо ldap_bind возвÑаÑÐ°ÐµÑ Ð·Ð½Ð°Ñение true пÑи иÑполÑзовании + опÑеделÑннÑÑ ÑеализаÑий LDAP. </p></li> </ul> <p> - -The old stable distribution (sarge) does not contain phpwiki packages. +РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (sarge) пакеÑÑ phpwiki оÑÑÑÑÑÑвÑÑÑ. </p> <p> - -For the stable distribution (etch) these problems have been fixed in - -version 1.3.12p3-5etch1. +Ð ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 1.3.12p3-5etch1. </p> <p> - -For the unstable distribution (sid) these problems have been fixed in - -version 1.3.12p3-6.1. +РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 1.3.12p3-6.1. </p> <p> - -We recommend that you upgrade your phpwiki package. +РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑ phpwiki. </p> </define-tag> -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJX2agpAAoJEF7nbuICFtKl7dYP/RSmbtSCCYJGNTWmTiDTAfr8 DxQ3koJf49mpObq0lBmpuEERlfnzXfyKEoqSJ5XxT6Ge/uIx8hs6H2+xUIoZE+Ku NVML8IrNSRkg8g/GBf6go8ZoBUO/4R0v7kPnW2vLJOAS/MZMaikAo+qGAYNXb1na Nwd+d9OV/SJ9MmfQIXTrJ3cYCuBubnVpUTV84FqbOQdIeoYeOMmRXmsm8ZrQxQ+Z 73AX2yeGvOwpg2IqMx7+VLpLl3dRT46Ne0059oB7d2PvWcjyh2yzWxmTCkZRfQtI UbPpCNrmROF1673iHob3tpBrNc62pBmCRiRDiM/2l5wb1BNzKGp9XxwzY89It23Q 7DYvvrkPmwYKYBWAiaGlFF1XbBha9ht15Ea5/ac4oDF/glBZGrURSTk56VElKmgl gzXLhl4E2jSfc+K5rhvOdRQ7pf1C95+gpw6WRmvP9LAclCEw7QCdR6bRlDxVKMAa w6NejseUxk6UduxAggXodT2SUn6ujqfip9vVud4TyNtvoaVJW69iJGjs7JmP4NpX nc3TKrvgZLIWV1khjow/hbeaMCHrlnaGbpyV4siYYvfNVb3wxCbjdzesJ43pbH7O soFnrgLzy4Zc4iH6U/XWBPrNm8PUExuy3cUIIBGO0PkoITjGwAfcANuojVT3LTjl nnnxlW8+XJYLvEwhnhNr =Zgey -----END PGP SIGNATURE-----