[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1536.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1536.wml	2017-11-01 10:11:09.855813700 +0500
+++ russian/security/2008/dsa-1536.wml	2018-03-18 17:39:33.355191746 +0500
@@ -1,49 +1,50 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local vulnerabilities have been discovered in Xine, a
- -media player library, allowed for a denial of service or arbitrary code
- -execution, which could be exploited through viewing malicious content.
- -The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? Xine, библиоÑ?еке длÑ? пÑ?оигÑ?Ñ?ваÑ?елей мÑ?лÑ?Ñ?имедиа, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+локалÑ?нÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, позволÑ?Ñ?Ñ?иÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании или вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+код. УÑ?звимоÑ?Ñ?и могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? пÑ?Ñ?Ñ?м пÑ?оÑ?моÑ?Ñ?а Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?одеÑ?жимого.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1246";>CVE-2007-1246</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2007-1387";>CVE-2007-1387</a>
 
- -    <p>The DMO_VideoDecoder_Open function does not set the biSize before use in a
- -    memcpy, which allows user-assisted remote attackers to cause a buffer overflow
- -    and possibly execute arbitrary code (applies to sarge only).</p></li>
+    <p>ФÑ?нкÑ?иÑ? DMO_VideoDecoder_Open не опÑ?еделÑ?еÑ? biSize до иÑ?полÑ?зованиÑ? Ñ?Ñ?ой пеÑ?еменной в
+    вÑ?зове memcpy, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение бÑ?Ñ?еÑ?а
+    и поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код (Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко sarge).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0073";>CVE-2008-0073</a>
 
- -    <p>Array index error in the sdpplin_parse function allows remote RTSP servers
- -    to execute arbitrary code via a large streamid SDP parameter.</p></li>
+    <p>Ð?Ñ?ибка индекÑ?аÑ?ии маÑ?Ñ?ива в Ñ?Ñ?нкÑ?ии sdpplin_parse позволÑ?еÑ? Ñ?далÑ?ннÑ?м RTSP-Ñ?еÑ?веÑ?ам
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? болÑ?Ñ?ого паÑ?амеÑ?Ñ?а streamid SDP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0486";>CVE-2008-0486</a>
 
- -    <p>Array index vulnerability in libmpdemux/demux_audio.c might allow remote
- -    attackers to execute arbitrary code via a crafted FLAC tag, which triggers
- -    a buffer overflow (applies to etch only).</p></li>
+    <p>УÑ?звимоÑ?Ñ?Ñ? индекÑ?аÑ?ии маÑ?Ñ?ива в libmpdemux/demux_audio.c можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного FLAC-Ñ?ега,
+    обÑ?абоÑ?ка коÑ?оÑ?ого пÑ?иводиÑ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а (Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко etch).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1161";>CVE-2008-1161</a>
 
- -    <p>Buffer overflow in the Matroska demuxer allows remote attackers to cause a
- -    denial of service (crash) and possibly execute arbitrary code via a Matroska
- -    file with invalid frame sizes.</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в демÑ?лÑ?Ñ?иплекÑ?оÑ?е Matroska позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) и поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код
+    Ñ? помоÑ?Ñ?Ñ? Ñ?айла в Ñ?оÑ?маÑ?е Matroska Ñ? некоÑ?Ñ?екÑ?нÑ?м Ñ?азмеÑ?ом кадÑ?а.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (sarge), these problems have been fixed in
- -version 1.0.1-1sarge7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.1-1sarge7.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.1.2+dfsg-6.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.1.11-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.11-1.</p>
 
 
- -<p>We recommend that you upgrade your xine-lib package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? xine-lib.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=CQJ5
-----END PGP SIGNATURE-----


Reply to: