[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-18{14,05}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1805.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1805.wml	2016-09-26 22:58:24.153410514 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Pidgin, a graphical
- -multi-protocol instant messaging client. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Pidgin, гÑ?аÑ?иÑ?еÑ?ком клиенÑ?е длÑ? обмена мгновеннÑ?ми Ñ?ообÑ?ениÑ?ми Ñ? поддеÑ?жкой множеÑ?Ñ?ва
+пÑ?оÑ?околов, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1373";>CVE-2009-1373</a>
 
- -    <p>A buffer overflow in the Jabber file transfer code may lead to
- -    denial of service or the execution of arbitrary code.</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в коде пеÑ?едаÑ?и Ñ?айлов пÑ?и иÑ?полÑ?зовании Jabber можеÑ? пÑ?иводиÑ?Ñ? к
+    оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1375";>CVE-2009-1375</a>
 
- -    <p>Memory corruption in an internal library may lead to denial of
- -    service.</p></li>
+    <p>Ð?овÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и во внÑ?Ñ?Ñ?енней библиоÑ?еке можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ?
+    в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1376";>CVE-2009-1376</a>
 
- -    <p>The patch provided for the security issue tracked as <a href="https://security-tracker.debian.org/tracker/CVE-2008-2927";>CVE-2008-2927</a>
- -    - integer overflows in the MSN protocol handler - was found to be
- -    incomplete.</p></li>
+    <p>Ð?казалоÑ?Ñ?, Ñ?Ñ?о заплаÑ?а, пÑ?едоÑ?Ñ?авленнаÑ? длÑ? иÑ?пÑ?авлениÑ? пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и <a href="https://security-tracker.debian.org/tracker/CVE-2008-2927";>CVE-2008-2927</a>
+    &mdash; пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в обÑ?абоÑ?Ñ?ике пÑ?оÑ?окола MSN &mdash;
+    неполна.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (etch) is affected under the source package
- -name gaim. However, due to build problems the updated packages couldn't
- -be released along with the stable version. It will be released once the
- -build problem is resolved.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?и акÑ?Ñ?алÑ?нÑ? длÑ? пакеÑ?а Ñ?
+иÑ?Ñ?однÑ?м кодом gaim. Тем не менее, из-за пÑ?облем Ñ?о Ñ?боÑ?кой обновлÑ?ннÑ?е пакеÑ?Ñ? нелÑ?зÑ?
+вÑ?пÑ?Ñ?Ñ?иÑ?Ñ? одновÑ?еменно Ñ?о Ñ?Ñ?абилÑ?ной веÑ?Ñ?ией. Ð?ни бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ? по
+меÑ?е Ñ?еÑ?ениÑ? пÑ?облем Ñ?о Ñ?боÑ?кой.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.4.3-4lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.3-4lenny2.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.5.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5.6-1.</p>
 
- -<p>We recommend that you upgrade your pidgin packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? pidgin.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2009/dsa-1814.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1814.wml	2016-09-26 22:52:42.734517792 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>heap-based buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
 
- -<p>Two vulnerabilities have been found in libsndfile, a library to read
- -and write sampled audio data.  The Common Vulnerabilities and Exposures
- -project identified the following problems:</p>
+<p>Ð? libsndfile, библиоÑ?еке длÑ? Ñ?Ñ?ениÑ? и запиÑ?и Ñ?Ñ?мплиÑ?ованнÑ?Ñ? аÑ?диоданнÑ?Ñ?, бÑ?ли
+обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1788";>CVE-2009-1788</a>
- -<p>Tobias Klein discovered that the VOC parsing routines suffer of a heap-based
- -buffer overflow which can be triggered by an attacker via a crafted VOC
- -header.</p></li>
+<p>ТобиаÑ? Ð?лÑ?йн обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?нкÑ?ии длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а VOC подвеÑ?женÑ?
+пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и, коÑ?оÑ?ое злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зваÑ?Ñ? Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованного заголовка VOC.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1791";>CVE-2009-1791</a>
- -<p>The vendor discovered that the  AIFF parsing routines suffer of a heap-based
- -buffer overflow similar to <a href="https://security-tracker.debian.org/tracker/CVE-2009-1788";>CVE-2009-1788</a> which can be triggered by an attacker
- -via a crafted AIFF header.</p></li>
+<p>РазÑ?абоÑ?Ñ?ик обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?нкÑ?ии длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а AIFF подвеÑ?женÑ?
+пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и, Ñ?Ñ?одномÑ? Ñ? <a href="https://security-tracker.debian.org/tracker/CVE-2009-1788";>CVE-2009-1788</a>, коÑ?оÑ?ое злоÑ?мÑ?Ñ?ленник
+можеÑ? вÑ?зваÑ?Ñ? Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного заголовка AIFF.</p></li>
 
 </ul>
 
- -<p>In both cases the overflowing data is not completely attacker controlled but
- -still leads to application crashes or under some circumstances might still
- -lead to arbitrary code execution.</p>
+<p>Ð? обоиÑ? Ñ?лÑ?Ñ?аÑ?Ñ? даннÑ?е, иÑ?полÑ?зÑ?емÑ?е длÑ? пеÑ?еполнениÑ?, не полноÑ?Ñ?Ñ?Ñ? конÑ?Ñ?олиÑ?Ñ?Ñ?Ñ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленником, но
+Ñ?Ñ?о вÑ?Ñ? Ñ?авно пÑ?иводиÑ? к аваÑ?ийной оÑ?Ñ?ановке пÑ?иложениÑ?, а пÑ?и некоÑ?оÑ?Ñ?Ñ? обÑ?Ñ?оÑ?Ñ?елÑ?Ñ?Ñ?ваÑ? можеÑ?
+пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>For the oldstable distribution (etch), this problem has been fixed in
- -version 1.0.16-2+etch2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.16-2+etch2.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 1.0.17-4+lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.17-4+lenny2.</p>
 
- -<p>For the testing distribution (squeeze), this problem will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?дÑ?Ñ? иÑ?пÑ?авлена позже.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.0.20-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.20-1.</p>
 
 
- -<p>We recommend that you upgrade your libsndfile packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libsndfile.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=fAtC
-----END PGP SIGNATURE-----


Reply to: