[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-159{7,1}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1591.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1591.wml	2016-09-08 19:21:44.208780321 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local (remote) vulnerabilities have been discovered in libvorbis,
- -a library for the Vorbis general-purpose compressed audio codec. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? libvorbis, библиоÑ?еке длÑ? поддеÑ?жки аÑ?диокодека обÑ?его назнаÑ?ениÑ? Ñ? возможноÑ?Ñ?Ñ?Ñ? Ñ?жаÑ?иÑ?,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко локалÑ?нÑ?Ñ? (Ñ?далÑ?ннÑ?Ñ?) Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1419";>CVE-2008-1419</a>
 
- -    <p>libvorbis does not properly handle a zero value which allows remote
- -    attackers to cause a denial of service (crash or infinite loop) or
- -    trigger an integer overflow.</p></li>
+    <p>libvorbis непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? нÑ?левое знаÑ?ение, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка или беÑ?конеÑ?нÑ?й Ñ?икл) или
+    пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1420";>CVE-2008-1420</a>
 
- -    <p>Integer overflow in libvorbis allows remote attackers to execute
- -    arbitrary code via a crafted OGG file, which triggers a heap overflow.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в libvorbis позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ?
+    пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е OGG, вÑ?зÑ?ваÑ?Ñ?его пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1423";>CVE-2008-1423</a>
 
- -    <p>Integer overflow in libvorbis allows remote attackers to cause a denial
- -    of service (crash) or execute arbitrary code via a crafted OGG file
- -    which triggers a heap overflow.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в libvorbis позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+    в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) или вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла
+    в Ñ?оÑ?маÑ?е OGG, вÑ?зÑ?ваÑ?Ñ?его пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.1.2.dfsg-1.4.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.2.0.dfsg-3.1. </p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.0.dfsg-3.1. </p>
 
- -<p>We recommend that you upgrade your libvorbis package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? libvorbis.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1597.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1597.wml	2016-09-08 19:16:29.449648391 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Three vulnerabilities have been discovered in the mt-daapd DAAP audio
- -server (also known as the Firefly Media Server).  The Common
- -Vulnerabilities and Exposures project identifies the following three
- -problems:</p>
+<p>Ð? mt-daapd, аÑ?диоÑ?еÑ?веÑ?е DAAP (Ñ?акже извеÑ?Ñ?ном как Firefly Media Server),
+бÑ?ли обнаÑ?Ñ?женÑ? Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и.  Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?и
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5824";>CVE-2007-5824</a>
 
- -    <p>Insufficient validation and bounds checking of the Authorization:
- -    HTTP header enables a heap buffer overflow, potentially enabling
- -    the execution of arbitrary code.</p></li>
+    <p>Ð?едоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка пÑ?авилÑ?ноÑ?Ñ?и и пÑ?овеÑ?ка гÑ?аниÑ? в заголовке Authorization:
+    HTTP позволÑ?еÑ? вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и, поÑ?енÑ?иалÑ?но позволÑ?Ñ?
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5825";>CVE-2007-5825</a>
 
- -    <p>Format string vulnerabilities in debug logging within the
- -    authentication of XML-RPC requests could enable the execution of
- -    arbitrary code.</p></li>
+    <p>УÑ?звимоÑ?Ñ?и Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки в жÑ?Ñ?налиÑ?овании оÑ?ладки в
+    коде аÑ?Ñ?енÑ?иÑ?икаÑ?ии запÑ?оÑ?ов XML-RPC можеÑ? позволиÑ?Ñ? вÑ?полниÑ?Ñ?
+    пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1771";>CVE-2008-1771</a>
 
- -    <p>An integer overflow weakness in the handling of HTTP POST
- -    variables could allow a heap buffer overflow and potentially
- -    arbitrary code execution.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде обÑ?абоÑ?ки пеÑ?еменнÑ?Ñ? HTTP POST
+    можеÑ? позволиÑ?Ñ? вÑ?зваÑ?Ñ? пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и и поÑ?енÑ?иалÑ?ное
+    вÑ?полнение пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 0.2.4+r1376-1.1+etch2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.2.4+r1376-1.1+etch2.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 0.9~r1696-1.4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9~r1696-1.4.</p>
 
- -<p>We recommend that you upgrade your mt-daapd package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mt-daapd.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=ycbK
-----END PGP SIGNATURE-----


Reply to: