[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-1{224,193}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1193.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1193.wml	2016-12-20 11:29:34.640304041 +0500
@@ -1,47 +1,48 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the X Window System,
- -which may lead to the execution of arbitrary code or denial of service.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? оконной Ñ?иÑ?Ñ?еме X бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода или оÑ?казÑ? в обÑ?лÑ?живании.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3467";>CVE-2006-3467</a>
 
- -    <p>Chris Evan discovered an integer overflow in the code to handle
- -    PCF fonts, which might lead to denial of service if a malformed
- -    font is opened.</p></li>
+    <p>Ð?Ñ?иÑ? Эван обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде длÑ? обÑ?абоÑ?ки
+    Ñ?Ñ?иÑ?Ñ?ов PCF, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании в Ñ?лÑ?Ñ?ае оÑ?кÑ?Ñ?Ñ?иÑ? Ñ?пеÑ?иалÑ?но
+    Ñ?Ñ?оÑ?миÑ?ованного Ñ?Ñ?иÑ?Ñ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3739";>CVE-2006-3739</a>
 
- -    <p>It was discovered that an integer overflow in the code to handle
- -    Adobe Font Metrics might lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде длÑ? обÑ?абоÑ?ки
+    Adobe Font Metrics можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3740";>CVE-2006-3740</a>
 
- -    <p>It was discovered that an integer overflow in the code to handle
- -    CMap and CIDFont font data might lead to the execution of arbitrary
- -    code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ле в коде длÑ? обÑ?абоÑ?ки
+    даннÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ов CMap и CIDFont можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4447";>CVE-2006-4447</a>
 
- -    <p>The XFree86 initialization code performs insufficient checking of
- -    the return value of setuid() when dropping privileges, which might
- -    lead to local privilege escalation.</p></li>
+    <p>Ð?од иниÑ?иализаÑ?ии XFree86 вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?Ñ? пÑ?овеÑ?кÑ?
+    возвÑ?аÑ?аемого знаÑ?ениÑ? Ñ?Ñ?нкÑ?ии setuid() пÑ?и Ñ?боÑ?Ñ?е пÑ?ивилегий, Ñ?Ñ?о можеÑ?
+    пÑ?иводиÑ?Ñ? к локалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.3.0.dfsg.1-14sarge2. This release lacks builds for the
- -Motorola 680x0 architecture, which failed due to diskspace constraints
- -on the build host. They will be released once this problem has been
- -resolved.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.3.0.dfsg.1-14sarge2. Ð? данном вÑ?пÑ?Ñ?ке оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? Ñ?боÑ?ки длÑ?
+аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? Motorola 680x0, поÑ?колÑ?кÑ? Ñ?боÑ?ка бÑ?ла неÑ?даÑ?на из-за огÑ?аниÑ?ений
+меÑ?Ñ?а на диÑ?ке на Ñ?боÑ?оÑ?ном Ñ?зле. Ð?акеÑ?Ñ? бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ? по меÑ?е Ñ?еÑ?ениÑ?
+Ñ?казанной пÑ?облемÑ?.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed
- -in version 1:1.2.2-1 of libxfont and version 1:1.0.2-9 of xorg-server.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1:1.2.2-1 пакеÑ?а libxfont и в веÑ?Ñ?ии 1:1.0.2-9 пакеÑ?а xorg-server.</p>
 
- -<p>We recommend that you upgrade your XFree86 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? XFree86.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1224.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1224.wml	2016-12-20 11:23:30.861912752 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.7" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security related problems have been discovered in Mozilla and
- -derived products.  The Common Vulnerabilities and Exposures project
- -identifies the following vulnerabilities:</p>
+<p>Ð? Mozilla и пÑ?оизводнÑ?Ñ? пÑ?одÑ?кÑ?аÑ? бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?вÑ?заннÑ?Ñ? Ñ?
+безопаÑ?ноÑ?Ñ?Ñ?Ñ? пÑ?облем. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4310";>CVE-2006-4310</a>
 
- -    <p>Tomas Kempinsky discovered that malformed FTP server responses
- -    could lead to denial of service.</p></li>
+    <p>ТомаÑ? Ð?емпинÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е оÑ?веÑ?Ñ? FTP-Ñ?еÑ?веÑ?а
+    могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5462";>CVE-2006-5462</a>
 
- -    <p>Ulrich Kühn discovered that the correction for a cryptographic
- -    flaw in the handling of PKCS-1 certificates was incomplete, which
- -    allows the forgery of certificates.</p></li>
+    <p>УлÑ?Ñ?иÑ? Ð?Ñ?н обнаÑ?Ñ?жил, Ñ?Ñ?о иÑ?пÑ?авление Ñ?Ñ?звимоÑ?Ñ?и кÑ?ипÑ?огÑ?аÑ?ии
+    в коде обÑ?абоÑ?ки Ñ?еÑ?Ñ?иÑ?икаÑ?ов PKCS-1 оказалоÑ?Ñ? неполнÑ?м, Ñ?Ñ?о
+    позволÑ?еÑ? подделÑ?ваÑ?Ñ? Ñ?еÑ?Ñ?иÑ?икаÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5463";>CVE-2006-5463</a>
 
- -    <p><q>shutdown</q> discovered that modification of JavaScript objects
- -    during execution could lead to the execution of arbitrary
- -    JavaScript bytecode.</p></li>
+    <p><q>shutdown</q> обнаÑ?Ñ?жил, Ñ?Ñ?о изменение обÑ?екÑ?ов JavaScript
+    в Ñ?оде вÑ?полнениÑ? кода можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    байÑ?кода на Ñ?зÑ?ке JavaScript.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5464";>CVE-2006-5464</a>
 
- -    <p>Jesse Ruderman and Martijn Wargers discovered several crashes in
- -    the layout engine, which might also allow execution of arbitrary
- -    code.</p></li>
+    <p>Ð?жеÑ?Ñ? РадеÑ?ман и Ð?аÑ?Ñ?ейн Ð?еÑ?геÑ?Ñ? обнаÑ?Ñ?жили неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок в
+    движке Ñ?азмеÑ?ки, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й
+    код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5748";>CVE-2006-5748</a>
 
- -    <p>Igor Bukanov and Jesse Ruderman discovered several crashes in the
- -    JavaScript engine, which might allow execution of arbitrary code.</p>
+    <p>Ð?гоÑ?Ñ? Ð?Ñ?канов и Ð?жеÑ?Ñ? РадеÑ?ман обнаÑ?Ñ?жили неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок в
+    движке JavaScript, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p>
     </li>
 
 </ul>
 
- -<p>This update also addresses several crashes, which could be triggered by
- -malicious websites and fixes a regression introduced in the previous
- -Mozilla update.</p>
+<p>Ð?Ñ?оме Ñ?ого, в данном обновлении иÑ?пÑ?авлено неÑ?колÑ?ко аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок, коÑ?оÑ?Ñ?е могÑ?Ñ?
+вÑ?зÑ?ваÑ?Ñ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?ми веб-Ñ?айÑ?ами, а Ñ?акже иÑ?пÑ?авление Ñ?егÑ?еÑ?Ñ?ии, поÑ?вивÑ?ейÑ?Ñ?
+в пÑ?едÑ?дÑ?Ñ?ем обновлении Mozilla.</p>
 
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.7.8-1sarge8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.7.8-1sarge8.</p>
 
- -<p>We recommend that you upgrade your mozilla package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mozilla.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=q50L
-----END PGP SIGNATURE-----


Reply to: