[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2012/dsa-2388.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2388.wml	2017-11-01 10:11:10.315843693 +0500
+++ russian/security/2012/dsa-2388.wml	2018-03-17 11:13:54.840234737 +0500
@@ -1,57 +1,58 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities were discovered in t1lib, a Postscript Type 1
- -font rasterizer library, some of which might lead to code execution
- -through the opening of files embedding bad fonts.</p>
+<p>Ð? t1lib, библиоÑ?еке Ñ?аÑ?Ñ?еÑ?изаÑ?ии Ñ?Ñ?иÑ?Ñ?ов Postscript Type 1, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, некоÑ?оÑ?Ñ?е из коÑ?оÑ?Ñ?Ñ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+кода пÑ?и оÑ?кÑ?Ñ?Ñ?ии Ñ?айлов, Ñ?одеÑ?жаÑ?иÑ? плоÑ?ие Ñ?Ñ?иÑ?Ñ?Ñ?.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-2642";>CVE-2010-2642</a>
 
- -	<p>A heap-based buffer overflow in the AFM font metrics parser
- -	potentially leads to the execution of arbitrary code.</p></li>
+	<p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а меÑ?Ñ?ик
+        Ñ?Ñ?иÑ?Ñ?ов AFM поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0433";>CVE-2011-0433</a>
 
- -	<p>Another heap-based buffer overflow in the AFM font metrics
- -	parser potentially leads to the execution of arbitrary code.</p></li>
+	<p>Ð?Ñ?Ñ? одно пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а
+        меÑ?Ñ?ик Ñ?Ñ?иÑ?Ñ?ов AFM поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0764";>CVE-2011-0764</a>
 
- -	<p>An invalid pointer dereference allows execution of arbitrary
- -	code using crafted Type 1 fonts.</p></li>
+	<p>Ð?епÑ?авилÑ?ное Ñ?азÑ?менование Ñ?казаÑ?елÑ? пÑ?иводиÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+	кода пÑ?и иÑ?полÑ?зовании Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ов Type 1.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1552";>CVE-2011-1552</a>
 
- -	<p>Another invalid pointer dereference results in an application
- -	crash, triggered by crafted Type 1 fonts.</p></li>
+	<p>Ð?Ñ?Ñ? одно непÑ?авилÑ?но Ñ?азÑ?менование Ñ?казаÑ?елей пÑ?иводиÑ? к аваÑ?ийной оÑ?Ñ?ановке
+	пÑ?иложениÑ? пÑ?и иÑ?полÑ?зовании Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ов Type 1.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1553";>CVE-2011-1553</a>
 
- -	<p>A use-after-free vulnerability results in an application
- -	crash, triggered by crafted Type 1 fonts.</p></li>
+	<p>Ð?Ñ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и пÑ?иводиÑ? к аваÑ?ийной оÑ?Ñ?ановке
+	пÑ?иложениÑ? пÑ?и иÑ?полÑ?зовании Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ов Type 1.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1554";>CVE-2011-1554</a>
 
- -	<p>An off-by-one error results in an invalid memory read and
- -	application crash, triggered by crafted Type 1 fonts.</p></li>
+	<p>Ð?Ñ?ибка на единиÑ?Ñ? пÑ?иводиÑ? к Ñ?Ñ?ениÑ? непÑ?авилÑ?ной облаÑ?Ñ?и памÑ?Ñ?и и аваÑ?ийной
+	оÑ?Ñ?ановке пÑ?иложениÑ? пÑ?и иÑ?полÑ?зовании Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ов Type 1.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 5.1.2-3+lenny1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.1.2-3+lenny1.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 5.1.2-3+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.1.2-3+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 5.1.2-3.4.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.1.2-3.4.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 5.1.2-3.4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.1.2-3.4.</p>
 
- -<p>We recommend that you upgrade your t1lib packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? t1lib.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=gnWU
-----END PGP SIGNATURE-----


Reply to: