[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2012/dsa-2394.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2394.wml	2017-11-01 10:11:10.315843693 +0500
+++ russian/security/2012/dsa-2394.wml	2018-03-04 16:55:09.898334347 +0500
@@ -1,52 +1,53 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Many security problems have been fixed in libxml2, a popular library to handle
- -XML data files.</p>
+<p>Ð? libxml2, попÑ?лÑ?Ñ?ной библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? Ñ?айлами даннÑ?Ñ? в Ñ?оÑ?маÑ?е XML,
+бÑ?ло обнаÑ?Ñ?жено много пÑ?облем безопаÑ?ноÑ?Ñ?и.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3919";>CVE-2011-3919</a>:
 
- -<p>Jüri Aedla discovered a heap-based buffer overflow that allows remote attackers
- -to cause a denial of service or possibly have unspecified other impact via
- -unknown vectors.</p></li>
+<p>ЮÑ?и Ядла обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и, позволÑ?Ñ?Ñ?ее Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании или оказÑ?ваÑ?Ñ? неопÑ?еделÑ?нное влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ? Ñ?иÑ?Ñ?емÑ?
+Ñ?еÑ?ез неизвеÑ?Ñ?нÑ?е векÑ?оÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0216";>CVE-2011-0216</a>:
 
- -<p>An Off-by-one error have been discovered that allows remote attackers to
- -execute arbitrary code or cause a denial of service.</p></li>
+<p>Ð?Ñ?ла обнаÑ?Ñ?жена оÑ?ибка на единиÑ?Ñ?, позволÑ?Ñ?Ñ?аÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код или вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2821";>CVE-2011-2821</a>:
 
- -<p>A memory corruption (double free) bug has been identified in libxml2's XPath
- -engine. Through it, it is possible for an attacker to cause a denial of
- -service or possibly have unspecified other impact. This vulnerability does not
- -affect the oldstable distribution (lenny).</p></li>
+<p>Ð? движке XPath из Ñ?оÑ?Ñ?ава libxml2 бÑ?ла обнаÑ?Ñ?жена оÑ?ибка, пÑ?иводÑ?Ñ?аÑ? к повÑ?еждениÑ? Ñ?одеÑ?жимого
+памÑ?Ñ?и (двойное оÑ?вобождение памÑ?Ñ?и). С помоÑ?Ñ?Ñ? Ñ?Ñ?ой оÑ?ибки злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+в обÑ?лÑ?живании или оказÑ?ваÑ?Ñ? неопÑ?еделÑ?нное влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ? Ñ?иÑ?Ñ?емÑ?. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+не каÑ?аеÑ?Ñ?Ñ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (lenny).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2834";>CVE-2011-2834</a>:
 
- -<p>Yang Dingning discovered a double free vulnerability related to XPath handling.</p></li>
+<p>Ян Ð?инин обнаÑ?Ñ?жил двойное оÑ?вобождение памÑ?Ñ?и, Ñ?вÑ?занное Ñ? обÑ?абоÑ?кой XPath.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3905";>CVE-2011-3905</a>:
 
- -<p>An out-of-bounds read vulnerability had been discovered, which allows remote
- -attackers to cause a denial of service.</p></li>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и, позволÑ?Ñ?Ñ?ее Ñ?далÑ?ннÑ?м
+злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 2.6.32.dfsg-5+lenny5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.6.32.dfsg-5+lenny5.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.7.8.dfsg-2+squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.7.8.dfsg-2+squeeze2.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 2.7.8.dfsg-7.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.7.8.dfsg-7.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.7.8.dfsg-7.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.7.8.dfsg-7.</p>
 
- -<p>We recommend that you upgrade your libxml2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libxml2.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=sKLI
-----END PGP SIGNATURE-----


Reply to: