[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-399{0,1}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3990.wml	2017-10-04 02:44:47.000000000 +0500
+++ russian/security/2017/dsa-3990.wml	2017-10-04 11:05:48.813235424 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Klaus-Peter Junghann discovered that insufficient validation of RTCP
- -packets in Asterisk may result in an information leak. Please see the
- -upstream advisory at
- -<a href="http://downloads.asterisk.org/pub/security/AST-2017-008.html";>http://downloads.asterisk.org/pub/security/AST-2017-008.html</a> for
- -additional details.</p>
+<p>Ð?лаÑ?Ñ?-Ð?еÑ?еÑ? Юнган обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка RTCP-пакеÑ?ов
+в Asterisk можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии. Ð?а дополниÑ?елÑ?нÑ?ми Ñ?ведениÑ?ми
+обÑ?аÑ?айÑ?еÑ?Ñ? к Ñ?екомендаÑ?ии из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки по адÑ?еÑ?Ñ?
+<a href="http://downloads.asterisk.org/pub/security/AST-2017-008.html";>
+http://downloads.asterisk.org/pub/security/AST-2017-008.html</a>.</p>
 
- -<p>For the oldstable distribution (jessie), this problem has been fixed
- -in version 1:11.13.1~dfsg-2+deb8u4.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 1:11.13.1~dfsg-2+deb8u4.</p>
 
- -<p>For the stable distribution (stretch), this problem has been fixed in
- -version 1:13.14.1~dfsg-2+deb9u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:13.14.1~dfsg-2+deb9u2.</p>
 
- -<p>We recommend that you upgrade your asterisk packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? asterisk.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3991.wml	2017-10-04 11:05:59.710284340 +0500
+++ russian/security/2017/dsa-3991.wml	2017-10-04 11:08:45.717942529 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities were found in qemu, a fast processor emulator:</p>
+<p>Ð? qemu, бÑ?Ñ?Ñ?Ñ?ом Ñ?мÑ?лÑ?Ñ?оÑ?е ЦÐ?, бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9375";>CVE-2017-9375</a>
 
- -    <p>Denial of service via memory leak in USB XHCI emulation.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за Ñ?Ñ?еÑ?ки памÑ?Ñ?и в коде Ñ?мÑ?лÑ?Ñ?ии USB XHCI.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12809";>CVE-2017-12809</a>
 
- -    <p>Denial of service in the CDROM device drive emulation.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в коде Ñ?мÑ?лÑ?Ñ?ии пÑ?ивода CDROM.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13672";>CVE-2017-13672</a>
 
- -    <p>Denial of service in VGA display emulation.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в коде Ñ?мÑ?лÑ?Ñ?ии VGA.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-13711";>CVE-2017-13711</a>
 
- -    <p>Denial of service in SLIRP networking support.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в коде поддеÑ?жки Ñ?еÑ?и SLIRP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14167";>CVE-2017-14167</a>
 
- -    <p>Incorrect validation of multiboot headers could result in the
- -    execution of arbitrary code.</p></li>
+    <p>Ð?екоÑ?Ñ?екÑ?наÑ? пÑ?овеÑ?ка заголовков множеÑ?Ñ?венной загÑ?Ñ?зки можеÑ? пÑ?иводиÑ?Ñ? к
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 1:2.8+dfsg-6+deb9u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:2.8+dfsg-6+deb9u3.</p>
 
- -<p>We recommend that you upgrade your qemu packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? qemu.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=dNaR
-----END PGP SIGNATURE-----


Reply to: