[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{547,620}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1547.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1547.wml	2016-10-29 22:53:10.697258570 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been discovered in
- -OpenOffice.org, the free office suite.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? OpenOffice.org, Ñ?вободном набоÑ?е оÑ?иÑ?нÑ?Ñ? пÑ?иложений, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?вÑ?заннÑ?Ñ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облем.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5745";>CVE-2007-5745</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2007-5747";>CVE-2007-5747</a>
 
- -    <p>Several bugs have been discovered in the way OpenOffice.org parses
- -    Quattro Pro files that may lead to a overflow in the heap
- -    potentially leading to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко оÑ?ибок пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а
+    Ñ?айлов Quattro Pro, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и
+    и поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5746";>CVE-2007-5746</a>
 
- -    <p>Specially crafted EMF files can trigger a buffer overflow in the
- -    heap that may lead to the execution of arbitrary code.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е Ñ?айлÑ? EMF могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение бÑ?Ñ?еÑ?а в
+    динамиÑ?еÑ?кой памÑ?Ñ?и, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0320";>CVE-2008-0320</a>
 
- -    <p>A bug has been discovered in the processing of OLE files that can
- -    cause a buffer overflow in the heap potentially leading to the
- -    execution of arbitrary code.</p></li>
+    <p>Ð? коде длÑ? обÑ?абоÑ?ки Ñ?айлов OLE бÑ?ла обнаÑ?Ñ?жена оÑ?ибка,
+    коÑ?оÑ?аÑ? можеÑ? вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение бÑ?Ñ?еÑ?а в динамиÑ?еÑ?кой памÑ?Ñ?и и поÑ?енÑ?иалÑ?но пÑ?иводиÑ?Ñ?
+    к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>Recently reported problems in the ICU library are fixed in separate
- -libicu packages with <a href="dsa-1511">DSA 1511</a> against which OpenOffice.org is linked.</p>
+<p>Ð?едавно обнаÑ?Ñ?женнÑ?е пÑ?облемÑ? в библиоÑ?еке ICU бÑ?ли иÑ?пÑ?авленÑ? в оÑ?делÑ?ном
+пакÑ?е libicu в <a href="dsa-1511">DSA 1511</a>. OpenOffice.org компонÑ?еÑ?Ñ?Ñ? Ñ? Ñ?Ñ?ой библиоÑ?екой.</p>
 
- -<p>For the old stable distribution (sarge) these problems have been fixed in
- -version 1.1.3-9sarge9.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.3-9sarge9.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed in
- -version 2.0.4.dfsg.2-7etch5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4.dfsg.2-7etch5.</p>
 
- -<p>For the testing (lenny) and unstable (sid) distributions these
- -problems have been fixed in version 2.4.0~ooh680m5-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (lenny) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.4.0~ooh680m5-1.</p>
 
- -<p>We recommend that you upgrade your openoffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openoffice.org.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1620.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1620.wml	2016-10-29 22:58:51.512050422 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the interpreter for the
- -Python language. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е Ñ?зÑ?ка Python бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2052";>CVE-2007-2052</a>
 
- -    <p>Piotr Engelking discovered that the strxfrm() function of the locale
- -    module miscalculates the length of an internal buffer, which may
- -    result in a minor information disclosure.</p></li>
+    <p>Ð?иоÑ?Ñ? ЭнгелÑ?кин обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? strxfrm() из модÑ?лÑ?
+    locale непÑ?авилÑ?но вÑ?Ñ?иÑ?лÑ?еÑ? длинÑ? внÑ?Ñ?Ñ?еннего бÑ?Ñ?еÑ?а, Ñ?Ñ?о можеÑ?
+    пÑ?иводиÑ?Ñ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? вÑ?оÑ?оÑ?Ñ?епенной инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4965";>CVE-2007-4965</a>
 
- -    <p>It was discovered that several integer overflows in the imageop
- -    module may lead to the execution of arbitrary code, if a user is
- -    tricked into processing malformed images. This issue is also
- -    tracked as <a href="https://security-tracker.debian.org/tracker/CVE-2008-1679";>CVE-2008-1679</a> due to an initially incomplete patch.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о неÑ?колÑ?ко пеÑ?еполнений Ñ?елÑ?Ñ? Ñ?иÑ?ел в модÑ?ле imageop
+    могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ?
+    запÑ?Ñ?каеÑ? обÑ?абоÑ?кÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? изобÑ?ажений. Также Ñ?Ñ?а пÑ?облема
+    имееÑ? иденÑ?иÑ?икаÑ?оÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2008-1679";>CVE-2008-1679</a> в Ñ?вÑ?зи Ñ? неполнÑ?м иÑ?пÑ?авлением, пÑ?едÑ?Ñ?авленнÑ?м Ñ?анее.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1721";>CVE-2008-1721</a>
- - 
- -    <p>Justin Ferguson discovered that a buffer overflow in the zlib
- -    module may lead to the execution of arbitrary code.</p></li>
+
+    <p>Ð?жаÑ?Ñ?ин ФеÑ?гÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в модÑ?ле zlib
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1887";>CVE-2008-1887</a>
 
- -    <p>Justin Ferguson discovered that insufficient input validation in
- -    PyString_FromStringAndSize() may lead to the execution of arbitrary
- -    code.</p></li>
+    <p>Ð?жаÑ?Ñ?ин ФеÑ?гÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка вÑ?однÑ?Ñ? даннÑ?Ñ? в
+    PyString_FromStringAndSize() можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.5-5+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5-5+etch1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.5.2-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.5.2-3.</p>
 
- -<p>We recommend that you upgrade your python2.5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? python2.5.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJYFONhAAoJEF7nbuICFtKlYMUP/j7X049ooY95FbeVrnhEJldR
gLVU9ALxy9Fbl2lzp1vb3BWaiavYKZbsTIHKwCl2B986X4n0uPt6731xSUnT14MK
bL6yB2Z+Ty6UY4dwYAEhWkI8MXjHmQhyRVYmwncsgxAY4ppwIaZa9/GpGsyMZ5bD
MtC/tKvvzD465NNfqEqD8+AirOusypCnvXHVnkzIMvn5qKs09PaU5vWzxIMHytcU
cL42bIztazhwHvYLYOGe2rR8daC9hBXXYPiSOBw+XDKWWsNiB9eAJvlHV1DKmLQO
2AbaPZZZE9IXFeLarFjLF8nKmxOgaUatK3mCtiKPy33XkFfWV04R1KWcs9IOOtqU
wf/VvAAJ03Jp6S6UAcxl3b9b1zWnEIWgu9DzuCthWyuKzjs6Cosz0NiPGrACemfj
TextTV7rrdD9m6BGugIKkO+7c48CV+yo4p9EcjCCMsJqfZaOmgkCqUzsae3aD0b6
0EVIjtRjyk/nDKU9jCUsnjIt8qewj48ESPMj2Et+ND5pZhU0Z4PGPVRR7cnIh4Vj
ZP2vg/jHh/Jyn6DcAt35t66yVQLdxLajikOVG5GtPnl0UWm4gsWOEgd+MOS9VDzn
Ro0gZAxCZsuSHwmMOvqYcG1v5w0TcHVjWBhGq8yCBpXRn7yMJeuzQP3mhKqdO0Pi
0OkxlOaFzxXD23PXcHFd
=piMN
-----END PGP SIGNATURE-----


Reply to: