[DONE] wml://{security/2007/dsa-1318.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2007/dsa-1318.wml 2017-11-01 10:11:09.731805616 +0500
+++ russian/security/2007/dsa-1318.wml 2018-03-12 12:05:12.080380896 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in ekg, a console
- -Gadu Gadu client. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? ekg, конÑ?олÑ?ном клиенÑ?е Gadu Gadu, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-2370">CVE-2005-2370</a>
- - <p>It was discovered that memory alignment errors may allow remote
- - attackers to cause a denial of service on certain architectures
- - such as sparc. This only affects Debian Sarge.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?ибки вÑ?Ñ?авниваниÑ? даннÑ?Ñ? в памÑ?Ñ?и могÑ?Ñ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м
+ злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании на опÑ?еделÑ?ннÑ?Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?аÑ?, в Ñ?аÑ?Ñ?ноÑ?Ñ?и
+ на sparc. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian Sarge.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-2448">CVE-2005-2448</a>
- - <p>It was discovered that several endianess errors may allow remote
- - attackers to cause a denial of service. This only affects
- - Debian Sarge.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о неÑ?колÑ?ко оÑ?ибок, Ñ?вÑ?заннÑ?Ñ? Ñ? поÑ?Ñ?дком Ñ?ледованиÑ? байÑ?ов, могÑ?Ñ?
+ позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+ каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian Sarge.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1663">CVE-2007-1663</a>
- - <p>It was discovered that a memory leak in handling image messages may
- - lead to denial of service. This only affects Debian Etch.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?Ñ?еÑ?ка памÑ?Ñ?и в коде длÑ? обÑ?абоÑ?ки Ñ?ообÑ?ений Ñ? изобÑ?ажениÑ?ми можеÑ?
+ пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian Etch.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1664">CVE-2007-1664</a>
- - <p>It was discovered that a null pointer deference in the token OCR code
- - may lead to denial of service. This only affects Debian Etch.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?азÑ?менование null-Ñ?казаÑ?елÑ? в коде Ñ?окена OCR
+ можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian Etch.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1665">CVE-2007-1665</a>
- - <p>It was discovered that a memory leak in the token OCR code may lead
- - to denial of service. This only affects Debian Etch.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?Ñ?еÑ?ка памÑ?Ñ?и в коде Ñ?окена OCR можеÑ? пÑ?иводиÑ?Ñ?
+ к оÑ?казÑ? в обÑ?лÑ?живании. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian Etch.</p></li>
</ul>
- -<p>For the oldstable distribution (sarge) these problems have been fixed in
- -version 1.5+20050411-7. This updates lacks updated packages for the m68k
- -architecture. They will be provided later.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5+20050411-7. Ð? данном обновлении оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? пакеÑ?Ñ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ?
+m68k. Ð?акеÑ?Ñ? длÑ? данной аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 1:1.7~rc2-1etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1:1.7~rc2-1etch1.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1:1.7~rc2-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:1.7~rc2-2.</p>
- -<p>We recommend that you upgrade your ekg packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ekg.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=oJ+S
-----END PGP SIGNATURE-----
Reply to: