[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3957.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3957.wml	2017-08-29 09:42:53.000000000 +0500
+++ russian/security/2017/dsa-3957.wml	2017-08-29 17:24:53.767785874 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in FFmpeg, a multimedia
- -player, server and encoder. These issues could lead to Denial-of-Service
- -and, in some situation, the execution of arbitrary code.</p>
+<p>Ð? FFmpeg, пÑ?оигÑ?Ñ?ваÑ?еле, Ñ?еÑ?веÑ?е и кодиÑ?овÑ?ике мÑ?лÑ?Ñ?имедиа, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. ЭÑ?о пÑ?облемÑ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании,
+а в некоÑ?оÑ?Ñ?Ñ? Ñ?иÑ?Ñ?аÑ?иÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9608";>CVE-2017-9608</a>
 
- -    <p>Yihan Lian of Qihoo 360 GearTeam discovered a NULL pointer access when
- -    parsing a crafted MOV file.</p></li>
+    <p>Ð?Ñ?анÑ? Ð?Ñ?нÑ? из Qihoo 360 GearTeam обнаÑ?Ñ?жил доÑ?Ñ?Ñ?п к NULL-Ñ?казаÑ?елÑ? во вÑ?емÑ?
+    вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е MOV.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9993";>CVE-2017-9993</a>
 
- -    <p>Thierry Foucu discovered that it was possible to leak information from
- -    files and symlinks ending in common multimedia extensions, using the
- -    HTTP Live Streaming.</p></li>
+    <p>ТÑ?еÑ?и ФÑ?кÑ? обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? вÑ?зваÑ?Ñ? Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии из Ñ?айлов и
+    Ñ?имволÑ?нÑ?Ñ? Ñ?Ñ?Ñ?лок, имеÑ?Ñ?иÑ? Ñ?иповÑ?е Ñ?аÑ?Ñ?иÑ?ениÑ? мÑ?лÑ?Ñ?имедиа-Ñ?айлов, пÑ?и иÑ?полÑ?зовании
+    живого веÑ?аниÑ? Ñ?еÑ?ез HTTP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11399";>CVE-2017-11399</a>
 
- -    <p>Liu Bingchang of IIE discovered an integer overflow in the APE decoder
- -    that can be triggered by a crafted APE file.</p></li>
+    <p>Ð?Ñ? Ð?инÑ?ан из IIE обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде декодиÑ?ованиÑ? APE,
+    коÑ?оÑ?ое можеÑ? бÑ?Ñ?Ñ? вÑ?звано Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м Ñ?айлом в Ñ?оÑ?маÑ?е APE.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11665";>CVE-2017-11665</a>
 
- -    <p>JunDong Xie of Ant-financial Light-Year Security Lab discovered that
- -    an attacker able to craft a RTMP stream can crash FFmpeg.</p></li>
+    <p>ЦзÑ?нÑ?дÑ?н Се из Ant-financial Light-Year Security Lab обнаÑ?Ñ?жил, Ñ?Ñ?о злоÑ?мÑ?Ñ?ленник,
+    Ñ?поÑ?обнÑ?й подделаÑ?Ñ? RTMP-поÑ?ок, можеÑ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? FFmpeg.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11719";>CVE-2017-11719</a>
 
- -    <p>Liu Bingchang of IIE discovered an out-of-bound access that can be
- -    triggered by a crafted DNxHD file.</p></li>
+    <p>Ð?Ñ? Ð?инÑ?ан из IIE обнаÑ?Ñ?жил доÑ?Ñ?Ñ?п за пÑ?еделÑ? вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и, коÑ?оÑ?Ñ?й
+    можеÑ? бÑ?Ñ?Ñ? вÑ?зван Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м Ñ?айлом в Ñ?оÑ?маÑ?е DNxHD.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 7:3.2.7-1~deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7:3.2.7-1~deb9u1.</p>
 
- -<p>We recommend that you upgrade your ffmpeg packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ffmpeg.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=oInE
-----END PGP SIGNATURE-----


Reply to: