[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2005/dsa-91{3,1}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2005/dsa-911.wml	2006-02-27 22:22:01.000000000 +0500
+++ russian/security/2005/dsa-911.wml	2016-10-13 18:33:40.467830494 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in gtk+2.0, the Gtk+ GdkPixBuf
- -XPM image rendering library.  The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? gtk+2.0,  библиоÑ?еке длÑ? оÑ?Ñ?иÑ?овки XPM-изобÑ?ажений длÑ? Gtk+ GdkPixBuf,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975";>CVE-2005-2975</a>
 
- -    <p>Ludwig Nussel discovered an infinite loop when processing XPM
- -    images that allows an attacker to cause a denial of service via a
- -    specially crafted XPM file.</p></li>
+    <p>Ð?Ñ?двиг Ð?Ñ?Ñ?Ñ?елÑ? обнаÑ?Ñ?жил беÑ?конеÑ?нÑ?й Ñ?икл пÑ?и обÑ?абоÑ?ке XPM-изобÑ?ажений,
+    позволÑ?Ñ?Ñ?ий злоÑ?мÑ?Ñ?ленникÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ?
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е XPM.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976";>CVE-2005-2976</a>
 
- -    <p>Ludwig Nussel discovered an integer overflow in the way XPM images
- -    are processed that could lead to the execution of arbitrary code
- -    or crash the application via a specially crafted XPM file.</p></li>
+    <p>Ð?Ñ?двиг Ð?Ñ?Ñ?Ñ?елÑ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?поÑ?обе, иÑ?полÑ?зÑ?емом длÑ? обÑ?абоÑ?ки
+    XPM-изобÑ?ажений, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода
+    или аваÑ?ийной оÑ?Ñ?ановке пÑ?иложениÑ? Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е XPM.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186";>CVE-2005-3186</a>
 
- -    <p>"infamous41md" discovered an integer overflow in the XPM processing
- -    routine that can be used to execute arbitrary code via a traditional heap
- -    overflow.</p></li>
+    <p>"infamous41md" обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?Ñ?нкÑ?ии обÑ?абоÑ?ки XPM,
+    коÑ?оÑ?ое можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода Ñ? помоÑ?Ñ?Ñ? Ñ?Ñ?адиÑ?ионного пеÑ?еполнениÑ?
+    динамиÑ?еÑ?кой памÑ?Ñ?и.</p></li>
 
 </ul>
 
- -<p>The following matrix explains which versions fix these problems:</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а показÑ?ваеÑ?, в какиÑ? веÑ?Ñ?иÑ?Ñ? бÑ?ли иÑ?пÑ?авленÑ? Ñ?Ñ?и пÑ?облемÑ?:</p>
 
 <div class="centerdiv">
 <table class="ridgetable" summary="">
   <tr>
     <th>&nbsp;</th>
- -    <th>old stable (woody)</th>
- -    <th>stable (sarge)</th>
- -    <th>unstable (sid)</th>
+    <th>пÑ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (woody)</th>
+    <th>Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sarge)</th>
+    <th>неÑ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sid)</th>
   </tr>
   <tr>
     <td>gdk-pixbuf</td>
@@ -51,7 +52,7 @@
 </table>
 </div>
 
- -<p>We recommend that you upgrade your gtk+2.0 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gtk+2.0.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2005/dsa-913.wml	2005-12-05 02:31:21.000000000 +0500
+++ russian/security/2005/dsa-913.wml	2016-10-13 18:31:24.309978455 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in gdk-pixbuf, the Gtk+
- -GdkPixBuf XPM image rendering library.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? gdk-pixbuf, библиоÑ?еке длÑ? оÑ?Ñ?иÑ?овки XPM-изобÑ?ажений длÑ? Gtk+ GdkPixBuf,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975";>CVE-2005-2975</a>
 
- -    <p>Ludwig Nussel discovered an infinite loop when processing XPM
- -    images that allows an attacker to cause a denial of service via a
- -    specially crafted XPM file.</p></li>
+    <p>Ð?Ñ?двиг Ð?Ñ?Ñ?Ñ?елÑ? обнаÑ?Ñ?жил беÑ?конеÑ?нÑ?й Ñ?икл пÑ?и обÑ?абоÑ?ке XPM-изобÑ?ажений,
+    позволÑ?Ñ?Ñ?ий злоÑ?мÑ?Ñ?ленникÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ?
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е XPM.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976";>CVE-2005-2976</a>
 
- -    <p>Ludwig Nussel discovered an integer overflow in the way XPM images
- -    are processed that could lead to the execution of arbitrary code
- -    or crash the application via a specially crafted XPM file.</p></li>
+    <p>Ð?Ñ?двиг Ð?Ñ?Ñ?Ñ?елÑ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?поÑ?обе, иÑ?полÑ?зÑ?емом длÑ? обÑ?абоÑ?ки
+    XPM-изобÑ?ажений, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода
+    или аваÑ?ийной оÑ?Ñ?ановке пÑ?иложениÑ? Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е XPM.</p></li>
 
 <li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186";>CVE-2005-3186</a>
 
- -    <p>"infamous41md" discovered an integer in the XPM processing routine
- -    that can be used to execute arbitrary code via a traditional heap
- -    overflow.</p></li>
+    <p>"infamous41md" обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?Ñ?нкÑ?ии обÑ?абоÑ?ки XPM,
+    коÑ?оÑ?ое можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода Ñ? помоÑ?Ñ?Ñ? Ñ?Ñ?адиÑ?ионного пеÑ?еполнениÑ?
+    динамиÑ?еÑ?кой памÑ?Ñ?и.</p></li>
 </ul>
 
- -<p>The following matrix explains which versions fix these problems:</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а показÑ?ваеÑ?, в какиÑ? веÑ?Ñ?иÑ?Ñ? бÑ?ли иÑ?пÑ?авленÑ? Ñ?Ñ?и пÑ?облемÑ?:</p>
 
 <div class="centerdiv">
 <table cellspacing=0 cellpadding=2>
   <tr>
     <th>&nbsp;</th>
- -    <th>old stable (woody)</th>
- -    <th>stable (sarge)</th>
- -    <th>unstable (sid)</th>
+    <th>пÑ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (woody)</th>
+    <th>Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sarge)</th>
+    <th>неÑ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (sid)</th>
   </tr>
   <tr>
     <td>gdk-pixbuf</td>
@@ -50,7 +51,7 @@
 </table>
 </div>
 
- -<p>We recommend that you upgrade your gdk-pixbuf packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gdk-pixbuf.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX/405AAoJEF7nbuICFtKl6f4P/096M8h5h4uw71GDTucsbWbA
JGHXTvNKy2xWHngo7ddCE9suwat9r2cGoGh2E7tVf06XHoXMPoaG6AdNtP/6LJdw
Esgm0LLKJlvaUfEzI5vbOet4hobGEWg4ZeZeNyqap8pdtQpKx692RRuh22XSWgP/
AtIg+wHEIzVBRdDDRvVwkVDDejW8a4l//ZUjyYi7NbR1n3LyNGFzqKe3LlDLoD6E
i1dVL6LxbIIfsklkjFcx0u0PYY0rMqVNhYYMbnNkrTGF9mDO44wuEt08kxxNI/9X
reLCuQLMUYeiYnVOhaYHZeYNqt2wyBYC+aZCdqzMf5RbGCkDgr92SecL5jg8y512
X5/5w7UGXjObKydoh/rt3wEvH3eu0zeem+K0pRU1AKYd6NyeLHH2lgj2zQg8UI8v
zhCUhuvdgnWnIqFutEXVHAUP3eWU4HABGQeMX+PGbp7t8XxKTU9cTjtRvCl8oW5/
dYLVRE+7atcbZ2SBzOJfwGsx8jsvoRBtNioCCxEDkcQUHwNG6FfrdluADi+9Rqcv
o7GaG3PWVaP0+U9fT7BXk6gXg6lPTk2S9+jkFLv/rM1JOIORkBGgxZtO9hA5CoPo
8rVdc2N/fkNa/mdqanIUELJNmNrCpV25LR8Av5+JHp3haP+CiCJhNsJc8GGXby/R
0r+GJnAMd9kodOKEOIpZ
=0jsp
-----END PGP SIGNATURE-----


Reply to: