-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- --- english/security/2007/dsa-1276.wml2014-04-30 13:16:12.0
+0600
+++ russian/security/2007/dsa-1276.wml 2016-09-15 00:42:31.168233126 +0500
@@ -1,40 +1,41 @@
- -several vulnerabilities
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+неÑколÑко ÑÑзвимоÑÑей
- -Several remote vulnerabilities have been discovered in the MIT reference
- -implementation of the Kerberos network authentication protocol suite,
- -which may lead to the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:
+Ð ÑÑалонной ÑеализаÑии набоÑа
пÑоÑоколов ÑеÑевой аÑÑенÑиÑикаÑии Kerberos оÑ
MIT,
+бÑло обнаÑÑжено неÑколÑко ÑдалÑннÑÑ
ÑÑзвимоÑÑей,
+коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ Ðº вÑполнениÑ
пÑоизволÑного кода. ÐÑÐ¾ÐµÐºÑ Common
+Vulnerabilities and Exposures опÑеделÑÐµÑ ÑледÑÑÑие
пÑоблемÑ:
https://security-tracker.debian.org/tracker/CVE-2007-0956;>CVE-2007-0956
- -It was discovered that the krb5 telnet daemon performs insufficient
- -validation of usernames, which might allow unauthorized logins or
- -privilege escalation.
+ÐÑло обнаÑÑжено, ÑÑо telnet-ÑлÑжба krb5
вÑполнÑÐµÑ Ð½ÐµÐ´Ð¾ÑÑаÑоÑнÑе пÑовеÑки
+имÑн полÑзоваÑелей, ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸ÑÑ
вÑполнÑÑÑ Ð½ÐµÐ°Ð²ÑоÑизованнÑй вÑ
од или
+повÑÑаÑÑ Ð¿Ñивилегии.
https://security-tracker.debian.org/tracker/CVE-2007-0957;>CVE-2007-0957
- -iDefense discovered that a buffer overflow in the logging code of the
- -KDC and the administration daemon might lead to arbitrary code
- -execution.
+СоÑÑÑдники iDefense обнаÑÑжили, ÑÑо
пеÑеполнение бÑÑеÑа в коде жÑÑналиÑованиÑ
+KDC и ÑлÑжбе админиÑÑÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¼Ð¾Ð¶ÐµÑ
пÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного
+кода.
https://security-tracker.debian.org/tracker/CVE-2007-1216;>CVE-2007-1216
- -It was discovered that a double free in the RPCSEC_GSS part of the
- -GSS library code might lead to arbitrary code execution.
+ÐÑло обнаÑÑжено, ÑÑо двойное
оÑвобождение в ÑаÑÑи RPCSEC_GSS кода библиоÑеки
+GSS Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº вÑполнениÑ
пÑоизволÑного кода.
- -For the stable distribution (sarge) these problems have been fixed in
- -version 1.3.6-2sarge4.
+Ð ÑÑабилÑном вÑпÑÑке (sarge) ÑÑи пÑоблемÑ
бÑли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð²
+веÑÑии 1.3.6-2sarge4.
- -For the upcoming stable distribution (etch) these problems have been fixed
- -in version 1.4.4-7etch1.
+РгоÑовÑÑемÑÑ ÑÑабилÑном вÑпÑÑке (etch) ÑÑи
пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑавленÑ
+в веÑÑии 1.4.4-7etch1.
- -For the unstable distribution (sid) these problems will be fixed soon.
+РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑоблемÑ
бÑдÑÑ Ð¸ÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð¿Ð¾Ð·Ð¶Ðµ.
- -We recommend that you upgrade your Kerberos packages.
+РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ Kerberos.
# do not modify the following line
- --- english/security/2007/dsa-1335.wml2014-04-30 13:16:12.0
+0600
+++ russian/security/2007/dsa-1335.wml 2016-09-15 00:19:45.534179981 +0500
@@ -1,38 +1,39 @@
- -several vulnerabilities
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+неÑколÑко ÑÑзвимоÑÑей
- -Several remote vulnerabilities have been discovered in Gimp, the GNU Image
- -Manipulation Program, which might lead to the execution of arbitrary code.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:
+Ð Gimp, GNU Image Manipulation Program, бÑло обнаÑÑжено
неÑколÑко ÑдалÑннÑÑ
+ÑÑзвимоÑÑей, коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ Ðº
вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода.
+ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures опÑеделÑеÑ
ÑледÑÑÑие
+пÑоблемÑ:
https://security-tracker.debian.org/tracker/CVE-2006-4519;>CVE-2006-4519
- -Sean Larsson discovered several integer overflows in the processing
- -code for DICOM, PNM, PSD, RAS, XBM and XWD images, which might lead
- -to the execution of arbitrary code if a user is tricked into opening
- -such a malformed media file.
+Шон ÐаÑÑон обнаÑÑжил неÑколÑко
пеÑеполнений ÑелÑÑ
ÑиÑел в коде обÑабоÑки
+