[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1{936,888,745}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1745.wml	2014-04-30 13:16:18.000000000 +0600
+++ russian/security/2009/dsa-1745.wml	2016-09-10 16:32:24.215280800 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several security issues have been discovered in lcms, a color management
- -library. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? Icms, библиоÑ?еке Ñ?пÑ?авлениÑ? Ñ?веÑ?ом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+пÑ?облем безопаÑ?ноÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0581";>CVE-2009-0581</a>
 
- -<p>Chris Evans discovered that lcms is affected by a memory leak, which
- -could result in a denial of service via specially crafted image files.</p></li>
+<p>Ð?Ñ?иÑ? ЭванÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о lcms подвеÑ?жен Ñ?Ñ?еÑ?ке памÑ?Ñ?и, коÑ?оÑ?аÑ?
+можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании из-за обÑ?абоÑ?ки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0723";>CVE-2009-0723</a>
 
- -<p>Chris Evans discovered that lcms is prone to several integer overflows
- -via specially crafted image files, which could lead to the execution of
- -arbitrary code.</p></li>
+<p>Ð?Ñ?иÑ? ЭванÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о lcms Ñ?одеÑ?жиÑ? неÑ?колÑ?ко пеÑ?еполнений Ñ?елÑ?Ñ?
+Ñ?иÑ?ел, коÑ?оÑ?Ñ?е возникаÑ?Ñ? пÑ?и обÑ?абоÑ?ке Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? изобÑ?ажений, Ñ?Ñ?о можеÑ?
+пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-0733";>CVE-2009-0733</a>
 
- -<p>Chris Evans discovered the lack of upper-bounds check on sizes leading
- -to a buffer overflow, which could be used to execute arbitrary code.</p></li>
+<p>Ð?Ñ?иÑ? ЭванÑ? обнаÑ?Ñ?жил оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ки веÑ?Ñ?ней гÑ?аниÑ?Ñ? Ñ?азмеÑ?ов, Ñ?Ñ?о пÑ?иводиÑ?
+к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.17.dfsg-1+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.17.dfsg-1+lenny1.</p>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed
- -in version 1.15-1.1+etch2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.15-1.1+etch2.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
 
- -<p>We recommend that you upgrade your lcms packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? lcms.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1888.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1888.wml	2016-09-10 16:26:16.761776667 +0500
@@ -1,26 +1,27 @@
- -<define-tag description>cryptographic weakness</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>Ñ?лабое Ñ?иÑ?Ñ?ование</define-tag>
 <define-tag moreinfo>
- -<p>Certificates with MD2 hash signatures are no longer accepted by OpenSSL,
- -since they're no longer considered cryptographically secure.</p>
+<p>СеÑ?Ñ?иÑ?икаÑ?Ñ? Ñ? MD2-подпиÑ?Ñ?ми более не пÑ?инимаÑ?Ñ?Ñ?Ñ? OpenSSL,
+поÑ?колÑ?кÑ? они болÑ?Ñ?е не Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ? кÑ?ипÑ?огÑ?аÑ?иÑ?еÑ?ки безопаÑ?нÑ?ми.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 0.9.8g-15+lenny5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.9.8g-15+lenny5.</p>
 
- -<p>For the old stable distribution (etch), this problem has been fixed in
- -version 0.9.8c-4etch9 for openssl and version 0.9.7k-3.1etch5 for
- -openssl097.
- -The OpenSSL 0.9.8 update for oldstable (etch) also provides updated
- -packages for multiple denial of service vulnerabilities in the
- -Datagram Transport Layer Security implementation. These fixes were
- -already provided for Debian stable (Lenny) in a previous point
- -update. The OpenSSL 0.9.7 package from oldstable (Etch) is not
- -affected. (<a href="https://security-tracker.debian.org/tracker/CVE-2009-1377";>CVE-2009-1377</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2009-1378";>CVE-2009-1378</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2009-1379";>CVE-2009-1379</a>,
- -<a href="https://security-tracker.debian.org/tracker/CVE-2009-1386";>CVE-2009-1386</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2009-1387";>CVE-2009-1387</a>)</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.9.8c-4etch9 пакеÑ?а openssl и в веÑ?Ñ?ии 0.9.7k-3.1etch5
+пакеÑ?а openssl097.
+Ð?бновление OpenSSL 0.9.8 длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (etch) пÑ?едоÑ?Ñ?авлÑ?еÑ? обновлÑ?ннÑ?е
+пакеÑ?Ñ?, в коÑ?оÑ?Ñ?Ñ? иÑ?пÑ?авленÑ? многоÑ?иÑ?леннÑ?е оÑ?казÑ? в обÑ?лÑ?живании в
+Ñ?еализаÑ?ии Datagram Transport Layer Security. ЭÑ?и иÑ?пÑ?авлениÑ? Ñ?же
+бÑ?ли пÑ?едоÑ?Ñ?авленÑ? длÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (Lenny) Debian в пÑ?едÑ?дÑ?Ñ?ей
+Ñ?едакÑ?ии. Ð?акеÑ? OpenSSL 0.9.7 из пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (Etch)
+не подвеÑ?жен Ñ?Ñ?ой Ñ?Ñ?звимоÑ?Ñ?и. (<a href="https://security-tracker.debian.org/tracker/CVE-2009-1377";>CVE-2009-1377</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2009-1378";>CVE-2009-1378</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2009-1379";>CVE-2009-1379</a>,
+<a href="https://security-tracker.debian.org/tracker/CVE-2009-1386";>CVE-2009-1386</a> и <a href="https://security-tracker.debian.org/tracker/CVE-2009-1387";>CVE-2009-1387</a>)</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 0.9.8k-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.9.8k-5.</p>
 
- -<p>We recommend that you upgrade your openssl packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openssl.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1936.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1936.wml	2016-09-10 16:20:06.460527612 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in libgd2, a library for
- -programmatic graphics creation and manipulation. The Common 
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? libgd2, библиоÑ?еке длÑ? Ñ?озданиÑ? и обÑ?абоÑ?ки пÑ?огÑ?аммиÑ?Ñ?емой
+гÑ?аÑ?ики, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-0455";>CVE-2007-0455</a>
 
- -  <p>Kees Cook discovered a buffer overflow in libgd2's font renderer. An
- -  attacker could cause denial of service (application crash) and 
- -  possibly execute arbitrary code via a crafted string with a JIS
- -  encoded font. This issue only affects the oldstable distribution
+  <p>Ð?иÑ? Ð?Ñ?к обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде оÑ?Ñ?иÑ?овки Ñ?Ñ?иÑ?Ñ?ов libgd2.
+  Ð?лоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) и
+  поÑ?енÑ?иалÑ?но вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованной Ñ?Ñ?Ñ?оки Ñ?
+  закодиÑ?ованнÑ?м JIS Ñ?Ñ?иÑ?Ñ?ом. Ð?аннаÑ? пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка
   (etch).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3546";>CVE-2009-3546</a>
 
- -  <p>Tomas Hoger discovered a boundary error in the "_gdGetColors()" 
- -  function. An attacker could conduct a buffer overflow or buffer 
- -  over-read attacks via a crafted GD file.</p></li>
+  <p>ТомаÑ? ХоджеÑ? обнаÑ?Ñ?жил оÑ?ибкÑ? гÑ?аниÑ? в Ñ?Ñ?нкÑ?ии "_gdGetColors()".
+  Ð?лоÑ?мÑ?Ñ?ленник можеÑ? взÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании или Ñ?Ñ?ение за пÑ?еделами
+  вÑ?деленного бÑ?Ñ?еÑ?а Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного GD-Ñ?айла.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed in
- -version 2.0.33-5.2etch2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.33-5.2etch2.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.0.36~rc1~dfsg-3+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.36~rc1~dfsg-3+lenny1.</p>
 
- -<p>For the upcoming stable distribution (squeeze) and the unstable
- -distribution (sid), these problems have been fixed in version
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 2.0.36~rc1~dfsg-3.1.</p>
 
- -<p>We recommend that you upgrade your libgd2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libgd2.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=/IA9
-----END PGP SIGNATURE-----


Reply to: