[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1613.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1613.wml	2017-11-01 10:11:09.895816307 +0500
+++ russian/security/2008/dsa-1613.wml	2018-03-06 22:04:30.519197680 +0500
@@ -1,48 +1,47 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been identified in libgd2, a library
- -for programmatic graphics creation and manipulation.  The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? libgd2, библиоÑ?еке длÑ? Ñ?озданиÑ? и обÑ?абоÑ?ки пÑ?огÑ?аммиÑ?Ñ?емой гÑ?аÑ?ики,
+бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2445";>CVE-2007-2445</a>
 
- -    <p>Grayscale PNG files containing invalid tRNS chunk CRC values
- -    could cause a denial of service (crash), if a maliciously
- -    crafted image is loaded into an application using libgd.</p></li>
+    <p>ФайлÑ? Ñ? полÑ?Ñ?оновÑ?ми изобÑ?ажениÑ?ми в Ñ?оÑ?маÑ?е PNG, Ñ?одеÑ?жаÑ?ие непÑ?авилÑ?нÑ?е конÑ?Ñ?олÑ?нÑ?е
+    Ñ?Ñ?ммÑ? tRNS-блоков, могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) в Ñ?лÑ?Ñ?ае
+    загÑ?Ñ?зки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? изобÑ?ажений в пÑ?иложении, иÑ?полÑ?зÑ?Ñ?Ñ?ем libgd.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3476";>CVE-2007-3476</a>
 
- -    <p>An array indexing error in libgd's GIF handling could induce a
- -    denial of service (crash with heap corruption) if exceptionally
- -    large color index values are supplied in a maliciously crafted
- -    GIF image file.</p></li>
+    <p>Ð?Ñ?ибка индекÑ?аÑ?ии маÑ?Ñ?ива в коде Ñ?абоÑ?Ñ? Ñ? GIF из libgd можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в
+    обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ? повÑ?еждением Ñ?одеÑ?жимого динамиÑ?еÑ?кой памÑ?Ñ?и) в Ñ?лÑ?Ñ?ае
+    пеÑ?едаÑ?и болÑ?Ñ?иÑ? знаÑ?ений индекÑ?а Ñ?веÑ?ов в Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованном изобÑ?ажении GIF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3477";>CVE-2007-3477</a>
 
- -    <p>The imagearc() and imagefilledarc() routines in libgd allow
- -    an attacker in control of the parameters used to specify
- -    the degrees of arc for those drawing functions to perform
- -    a denial of service attack (excessive CPU consumption).</p></li>
+    <p>ФÑ?нкÑ?ии imagearc() и imagefilledarc() в libgd позволÑ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?,
+    конÑ?Ñ?олиÑ?Ñ?Ñ?Ñ?емÑ? паÑ?амеÑ?Ñ?Ñ?, иÑ?полÑ?зÑ?емÑ?е длÑ? опÑ?еделениÑ? гÑ?адÑ?Ñ?ов Ñ?Ñ?беÑ? в Ñ?казаннÑ?Ñ?
+    Ñ?Ñ?нкÑ?иÑ?Ñ? Ñ?иÑ?ованиÑ?, вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3996";>CVE-2007-3996</a>
 
- -    <p>Multiple integer overflows exist in libgd's image resizing and
- -    creation routines; these weaknesses allow an attacker in control
- -    of the parameters passed to those routines to induce a crash or
- -    execute arbitrary code with the privileges of the user running
- -    an application or interpreter linked against libgd2.</p></li>
+    <p>Ð? Ñ?Ñ?нкÑ?иÑ?Ñ? изменениÑ? Ñ?азмеÑ?а и Ñ?озданиÑ? изобÑ?ажений имеÑ?Ñ?Ñ?Ñ? многоÑ?иÑ?леннÑ?е
+    пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел; Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и позволÑ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?, конÑ?Ñ?олиÑ?Ñ?Ñ?Ñ?емÑ?
+    паÑ?амеÑ?Ñ?Ñ?, пеÑ?едаваемÑ?е Ñ?казаннÑ?м Ñ?Ñ?нкÑ?иÑ?м, вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? или вÑ?полнÑ?Ñ?Ñ?
+    пÑ?оизволÑ?нÑ?й код Ñ? пÑ?авами полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?его пÑ?иложение
+    или инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?, Ñ?компанованнÑ?е Ñ? libgd2.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.0.33-5.2etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.33-5.2etch1.</p>
 
- -<p>For the unstable distribution (sid), these
- -problems have been fixed in version 2.0.35.dfsg-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.35.dfsg-1.</p>
 
- -<p>We recommend that you upgrade your libgd2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libgd2.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=+N9Y
-----END PGP SIGNATURE-----


Reply to: