[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3655.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3655.wml	2016-08-27 01:36:09.000000000 +0500
+++ russian/security/2016/dsa-3655.wml	2016-08-27 13:13:35.072062868 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in MuPDF, a lightweight PDF viewer.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? MuPDF, легковеÑ?ном пÑ?оÑ?моÑ?Ñ?Ñ?ике PDF, бÑ?ли обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6265";>CVE-2016-6265</a>
 
- -    <p>Marco Grassi discovered a use-after-free vulnerability in MuPDF. An
- -    attacker can take advantage of this flaw to cause an application
- -    crash (denial-of-service), or potentially to execute arbitrary code
- -    with the privileges of the user running MuPDF, if a specially
- -    crafted PDF file is processed.</p></li>
+    <p>Ð?аÑ?ко Ð?Ñ?аÑ?Ñ?и обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в MuPDF.
+    Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки пÑ?иложениÑ?
+    (оÑ?каз в обÑ?лÑ?живании) или поÑ?енÑ?иалÑ?ного вÑ?полнениÑ? пÑ?оизволÑ?ного кода
+    Ñ? пÑ?авами полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?его MuPDF, в Ñ?лÑ?Ñ?ае обÑ?абоÑ?ки
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е PDF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6525";>CVE-2016-6525</a>
 
- -    <p>Yu Hong and Zheng Jihong discovered a heap overflow vulnerability
- -    within the pdf_load_mesh_params function, allowing an attacker to
- -    cause an application crash (denial-of-service), or potentially to
- -    execute arbitrary code with the privileges of the user running
- -    MuPDF, if a specially crafted PDF file is processed.</p></li>
+    <p>Юй Ð¥Ñ?н и ЧжÑ?н ЦзиÑ?Ñ?н обнаÑ?Ñ?жили пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и
+    в Ñ?Ñ?нкÑ?ии pdf_load_mesh_params, позволÑ?Ñ?Ñ?ее злоÑ?мÑ?Ñ?ленникÑ?
+    аваÑ?ийно завеÑ?Ñ?аÑ?Ñ? Ñ?абоÑ?Ñ? пÑ?иложениÑ? (оÑ?каз в обÑ?лÑ?живании) или поÑ?енÑ?иалÑ?но
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? пÑ?авами полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?его
+    MuPDF, в Ñ?лÑ?Ñ?ае обÑ?абоÑ?ки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е PDF.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.5-1+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5-1+deb8u1.</p>
 
- -<p>We recommend that you upgrade your mupdf packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mupdf.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=ih8q
-----END PGP SIGNATURE-----


Reply to: