[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{635,487}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1487.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1487.wml	2016-09-08 19:42:17.142296272 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the EXIF parsing code
- -of the libexif library, which can lead to denial of service or the 
- -execution of arbitrary code if a user is tricked into opening a
- -malformed image.  The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а EXIF в библиоÑ?еке libexif, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае оÑ?кÑ?Ñ?Ñ?иÑ? полÑ?зоваÑ?елем
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного изобÑ?ажениÑ?.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2645";>CVE-2007-2645</a>
 
- -    <p>Victor Stinner discovered an integer overflow, which may result in
- -    denial of service or potentially the execution of arbitrary code.</p></li>
+    <p>Ð?икÑ?оÑ? ШÑ?иннеÑ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к
+    оÑ?казÑ? в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6351";>CVE-2007-6351</a>
 
- -    <p>Meder Kydyraliev discovered an infinite loop, which may result in
- -    denial of service.</p></li>
+    <p>Ð?едеÑ? Ð?Ñ?дÑ?Ñ?алиев обнаÑ?Ñ?жил беÑ?конеÑ?нÑ?й Ñ?икл, коÑ?оÑ?Ñ?е можеÑ? пÑ?иводиÑ?Ñ? к
+    оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6352";>CVE-2007-6352</a>
 
- -    <p>Victor Stinner discovered an integer overflow, which may result
- -    in denial of service or potentially the execution of arbitrary
- -    code.</p></li>
+    <p>Ð?икÑ?оÑ? ШÑ?иннеÑ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ?
+    к оÑ?казÑ? в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 </ul>
 
- -<p>This update also fixes two potential NULL pointer deferences.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? два поÑ?енÑ?иалÑ?нÑ?Ñ? Ñ?азÑ?менованиÑ? NULL-Ñ?казаÑ?елÑ?.</p>
 
- -<p>For the old stable distribution (sarge), these problems have been
- -fixed in 0.6.9-6sarge2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в 0.6.9-6sarge2.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 0.6.13-5etch2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.6.13-5etch2.</p>
 
 
- -<p>We recommend that you upgrade your libexif packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libexif.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1635.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1635.wml	2016-09-08 19:37:33.360226190 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several local vulnerabilities have been discovered in freetype,
- -a FreeType 2 font engine, which could allow the execution of arbitrary
- -code.</p>
+<p>Ð? freetype, движке Ñ?Ñ?иÑ?Ñ?ов FreeType 2, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+локалÑ?нÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й
+код.</p>
 
- -<p>The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1806";>CVE-2008-1806</a>
- -    <p>An integer overflow allows context-dependent attackers to execute
- -    arbitrary code via a crafted set of values within the Private
- -    dictionary table in a Printer Font Binary (PFB) file.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам в завиÑ?имоÑ?Ñ?и оÑ? конÑ?екÑ?Ñ?а вÑ?полнÑ?Ñ?Ñ?
+    пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного набоÑ?а знаÑ?ений в Ñ?ловаÑ?ной Ñ?аблиÑ?е
+    Private в Ñ?айле в Ñ?оÑ?маÑ?е Printer Font Binary (PFB).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1807";>CVE-2008-1807</a>
- -    <p>The handling of an invalid <q>number of axes</q> field in the PFB file could
- -    trigger the freeing of arbitrary memory locations, leading to 
- -    memory corruption.</p></li>
+    <p>Ð?бÑ?абоÑ?ка некоÑ?Ñ?екÑ?ного полÑ? <q>number of axes</q> в Ñ?айле PFB можеÑ?
+    вÑ?зваÑ?Ñ? оÑ?вобождение пÑ?оизволÑ?ного бÑ?Ñ?еÑ?а памÑ?Ñ?и, Ñ?Ñ?о пÑ?иводиÑ? к
+    повÑ?еждениÑ? Ñ?одеÑ?жимого памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1808";>CVE-2008-1808</a>
- -    <p>Multiple off-by-one errors allowed the execution of arbitrary code
- -    via malformed tables in PFB files, or invalid SHC instructions in
- -    TTF files.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е оÑ?ибки на единиÑ?Ñ? позволÑ?Ñ?Ñ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код
+    Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?аблиÑ? в PFB-Ñ?айлаÑ?, либо некоÑ?Ñ?екÑ?нÑ?Ñ? SHC-инÑ?Ñ?Ñ?Ñ?кÑ?ий в
+    TTF-Ñ?айлаÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 2.2.1-5+etch3.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.3.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.3.6-1.</p>
 
- -<p>We recommend that you upgrade your freetype package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? freetype.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=lFCQ
-----END PGP SIGNATURE-----


Reply to: