[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-2028.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- ../../english/security/2010/dsa-2028.wml	2017-11-01 10:11:10.155833259 +0500
+++ 2010/dsa-2028.wml	2018-03-26 23:19:21.341920712 +0500
@@ -1,54 +1,54 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" mindelta="1"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been identified in xpdf, a suite of tools for
- -viewing and converting Portable Document Format (PDF) files.</p>
+<p>Ð? xpdf, набоÑ?е инÑ?Ñ?Ñ?Ñ?менÑ?ов длÑ? пÑ?оÑ?моÑ?Ñ?а и пÑ?еобÑ?азованиÑ? Ñ?айлов в Ñ?оÑ?маÑ?е
+PDF, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
- -<p>The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1188";>CVE-2009-1188</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2009-3603";>CVE-2009-3603</a>
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1188";>CVE-2009-1188</a> и <a href="https://security-tracker.debian.org/tracker/CVE-2009-3603";>CVE-2009-3603</a>
 
- -    <p>Integer overflow in SplashBitmap::SplashBitmap which might allow remote
- -    attackers to execute arbitrary code or an application crash via a crafted
- -    PDF document.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в SplashBitmap::SplashBitmap можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код или вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? пÑ?иложениÑ?
+    Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а в Ñ?оÑ?маÑ?е PDF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3604";>CVE-2009-3604</a>
 
- -    <p>NULL pointer dereference or heap-based buffer overflow in
- -    Splash::drawImage which might allow remote attackers to cause a denial
- -    of service (application crash) or possibly execute arbitrary code via
- -    a crafted PDF document.</p></li>
+    <p>РазÑ?менование NULL-Ñ?казаÑ?елÑ? или пеÑ?еполнение бÑ?Ñ?еÑ?а в
+    Splash::drawImage можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз
+    в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) или поÑ?енÑ?иалÑ?но вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код
+    Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а в Ñ?оÑ?маÑ?е PDF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3606";>CVE-2009-3606</a>
 
- -    <p>Integer overflow in the PSOutputDev::doImageL1Sep which might allow
- -    remote attackers to execute arbitrary code via a crafted PDF document.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в PSOutputDev::doImageL1Sep можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а в Ñ?оÑ?маÑ?е PDF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3608";>CVE-2009-3608</a>
 
- -    <p>Integer overflow in the ObjectStream::ObjectStream which might allow 
- -    remote attackers to execute arbitrary code via a crafted PDF document.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в ObjectStream::ObjectStream можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а в Ñ?оÑ?маÑ?е PDF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3609";>CVE-2009-3609</a>
 
- -    <p>Integer overflow in the ImageStream::ImageStream which might allow 
- -    remote attackers to cause a denial of service via a crafted PDF
- -    document.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в ImageStream::ImageStream можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+    докÑ?менÑ?а в Ñ?оÑ?маÑ?е PDF.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 3.02-1.4+lenny2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.02-1.4+lenny2.</p>
 
- -<p>For the testing distribution (squeeze), this problem will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 3.02-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.02-2.</p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2010/dsa-2028.data"
- -# $Id: dsa-2028.wml,v 1.3 2014/04/30 07:16:22 pabs Exp $
-----BEGIN PGP SIGNATURE-----
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=Jc1l
-----END PGP SIGNATURE-----


Reply to: