[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1586.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1586.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1586.wml	2016-10-29 12:06:21.410823335 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in xine-lib, a library
- -which supplies most of the application functionality of the xine
- -multimedia player.  The Common Vulnerabilities and Exposures project
- -identifies the following three problems:</p>
+<p>Ð? xine-lib, библиоÑ?еке, поддеÑ?живаÑ?Ñ?ей болÑ?Ñ?Ñ?Ñ? Ñ?аÑ?Ñ?Ñ?
+Ñ?Ñ?нкÑ?ионалÑ?ноÑ?Ñ?и медиапÑ?оигÑ?Ñ?ваÑ?елÑ? xine, бÑ?ли обнаÑ?Ñ?женÑ?
+многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?и пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1482";>CVE-2008-1482</a>
 
- -    <p>Integer overflow vulnerabilities exist in xine's FLV, QuickTime,
- -    RealMedia, MVE and CAK demuxers, as well as the EBML parser used
- -    by the Matroska demuxer.  These weaknesses allow an attacker to
- -    overflow heap buffers and potentially execute arbitrary code by
- -    supplying a maliciously crafted file of those types.</p></li>
+    <p>Ð?еÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в демÑ?лÑ?Ñ?иплекÑ?оÑ?аÑ? FLV, QuickTime,
+    RealMedia, MVE и CAK, а Ñ?акже в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а EBML,
+    иÑ?полÑ?зÑ?емом демÑ?лÑ?Ñ?иплекÑ?оÑ?ом Matroska.  ЭÑ?и Ñ?Ñ?звимоÑ?Ñ?и позволÑ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+    вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и и поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код,
+    пеÑ?едав Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл одного из Ñ?казаннÑ?Ñ? Ñ?ипов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1686";>CVE-2008-1686</a>
 
- -    <p>Insufficient input validation in the Speex implementation used
- -    by this version of xine enables an invalid array access and the
- -    execution of arbitrary code by supplying a maliciously crafted
- -    Speex file.</p></li>
+    <p>Ð?едоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка вÑ?однÑ?Ñ? даннÑ?Ñ? в Ñ?еализаÑ?ии Speex, иÑ?полÑ?зÑ?емой
+    Ñ?Ñ?ой веÑ?Ñ?ией xine, позволÑ?еÑ? непÑ?авилÑ?но обÑ?аÑ?аÑ?Ñ?Ñ?Ñ? к маÑ?Ñ?ивÑ? и вÑ?полнÑ?Ñ?Ñ?
+    пÑ?оизволÑ?нÑ?й код пÑ?Ñ?Ñ?м пеÑ?едаÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла
+    Speex.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1878";>CVE-2008-1878</a>
 
- -    <p>Inadequate bounds checking in the NES Sound Format (NSF) demuxer
- -    enables a stack buffer overflow and the execution of arbitrary
- -    code through a maliciously crafted NSF file.</p></li>
+    <p>Ð?епÑ?авилÑ?наÑ? пÑ?овеÑ?ка гÑ?аниÑ? маÑ?Ñ?ива в демÑ?лÑ?Ñ?иплекÑ?оÑ?е NSF
+    позволÑ?еÑ? вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение бÑ?Ñ?еÑ?а и вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+    код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла NSF.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.1.2+dfsg-7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.2+dfsg-7.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.1.12-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.12-2.</p>
 
- -<p>We recommend that you upgrade your xine-lib packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xine-lib.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=K9ta
-----END PGP SIGNATURE-----


Reply to: