[DONE] wml://security/2008/dsa-1{547,620}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2008/dsa-1547.wml 2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1547.wml 2016-10-29 22:53:10.697258570 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several security related problems have been discovered in
- -OpenOffice.org, the free office suite. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? OpenOffice.org, Ñ?вободном набоÑ?е оÑ?иÑ?нÑ?Ñ? пÑ?иложений, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облем. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5745">CVE-2007-5745</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2007-5747">CVE-2007-5747</a>
- - <p>Several bugs have been discovered in the way OpenOffice.org parses
- - Quattro Pro files that may lead to a overflow in the heap
- - potentially leading to the execution of arbitrary code.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко оÑ?ибок пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а
+ Ñ?айлов Quattro Pro, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и
+ и поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5746">CVE-2007-5746</a>
- - <p>Specially crafted EMF files can trigger a buffer overflow in the
- - heap that may lead to the execution of arbitrary code.</p></li>
+ <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е Ñ?айлÑ? EMF могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение бÑ?Ñ?еÑ?а в
+ динамиÑ?еÑ?кой памÑ?Ñ?и, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0320">CVE-2008-0320</a>
- - <p>A bug has been discovered in the processing of OLE files that can
- - cause a buffer overflow in the heap potentially leading to the
- - execution of arbitrary code.</p></li>
+ <p>Ð? коде длÑ? обÑ?абоÑ?ки Ñ?айлов OLE бÑ?ла обнаÑ?Ñ?жена оÑ?ибка,
+ коÑ?оÑ?аÑ? можеÑ? вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение бÑ?Ñ?еÑ?а в динамиÑ?еÑ?кой памÑ?Ñ?и и поÑ?енÑ?иалÑ?но пÑ?иводиÑ?Ñ?
+ к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
</ul>
- -<p>Recently reported problems in the ICU library are fixed in separate
- -libicu packages with <a href="dsa-1511">DSA 1511</a> against which OpenOffice.org is linked.</p>
+<p>Ð?едавно обнаÑ?Ñ?женнÑ?е пÑ?облемÑ? в библиоÑ?еке ICU бÑ?ли иÑ?пÑ?авленÑ? в оÑ?делÑ?ном
+пакÑ?е libicu в <a href="dsa-1511">DSA 1511</a>. OpenOffice.org компонÑ?еÑ?Ñ?Ñ? Ñ? Ñ?Ñ?ой библиоÑ?екой.</p>
- -<p>For the old stable distribution (sarge) these problems have been fixed in
- -version 1.1.3-9sarge9.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.3-9sarge9.</p>
- -<p>For the stable distribution (etch) these problems have been fixed in
- -version 2.0.4.dfsg.2-7etch5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4.dfsg.2-7etch5.</p>
- -<p>For the testing (lenny) and unstable (sid) distributions these
- -problems have been fixed in version 2.4.0~ooh680m5-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (lenny) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.4.0~ooh680m5-1.</p>
- -<p>We recommend that you upgrade your openoffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openoffice.org.</p>
</define-tag>
# do not modify the following line
- --- english/security/2008/dsa-1620.wml 2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1620.wml 2016-10-29 22:58:51.512050422 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the interpreter for the
- -Python language. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е Ñ?зÑ?ка Python бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2052">CVE-2007-2052</a>
- - <p>Piotr Engelking discovered that the strxfrm() function of the locale
- - module miscalculates the length of an internal buffer, which may
- - result in a minor information disclosure.</p></li>
+ <p>Ð?иоÑ?Ñ? ÐнгелÑ?кин обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? strxfrm() из модÑ?лÑ?
+ locale непÑ?авилÑ?но вÑ?Ñ?иÑ?лÑ?еÑ? длинÑ? внÑ?Ñ?Ñ?еннего бÑ?Ñ?еÑ?а, Ñ?Ñ?о можеÑ?
+ пÑ?иводиÑ?Ñ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? вÑ?оÑ?оÑ?Ñ?епенной инÑ?оÑ?маÑ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4965">CVE-2007-4965</a>
- - <p>It was discovered that several integer overflows in the imageop
- - module may lead to the execution of arbitrary code, if a user is
- - tricked into processing malformed images. This issue is also
- - tracked as <a href="https://security-tracker.debian.org/tracker/CVE-2008-1679">CVE-2008-1679</a> due to an initially incomplete patch.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о неÑ?колÑ?ко пеÑ?еполнений Ñ?елÑ?Ñ? Ñ?иÑ?ел в модÑ?ле imageop
+ могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ?
+ запÑ?Ñ?каеÑ? обÑ?абоÑ?кÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? изобÑ?ажений. Также Ñ?Ñ?а пÑ?облема
+ имееÑ? иденÑ?иÑ?икаÑ?оÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2008-1679">CVE-2008-1679</a> в Ñ?вÑ?зи Ñ? неполнÑ?м иÑ?пÑ?авлением, пÑ?едÑ?Ñ?авленнÑ?м Ñ?анее.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1721">CVE-2008-1721</a>
- -
- - <p>Justin Ferguson discovered that a buffer overflow in the zlib
- - module may lead to the execution of arbitrary code.</p></li>
+
+ <p>Ð?жаÑ?Ñ?ин ФеÑ?гÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в модÑ?ле zlib
+ можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1887">CVE-2008-1887</a>
- - <p>Justin Ferguson discovered that insufficient input validation in
- - PyString_FromStringAndSize() may lead to the execution of arbitrary
- - code.</p></li>
+ <p>Ð?жаÑ?Ñ?ин ФеÑ?гÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка вÑ?однÑ?Ñ? даннÑ?Ñ? в
+ PyString_FromStringAndSize() можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+ кода.</p></li>
</ul>
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.5-5+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5-5+etch1.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.5.2-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5.2-3.</p>
- -<p>We recommend that you upgrade your python2.5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? python2.5.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=piMN
-----END PGP SIGNATURE-----
Reply to: