[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dla-4{01,07,20}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dla-401.wml	2016-04-09 11:29:07.501032876 +0500
+++ russian/security/2016/dla-401.wml	2016-04-12 12:37:37.651093318 +0500
@@ -1,19 +1,20 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9762";>CVE-2014-9762</a>
 
- -   <p>GIF loader: Fix segv on images without colormap</p></li>
+   <p>Ð?агÑ?Ñ?зÑ?ик GIF: иÑ?пÑ?авление segv пÑ?и Ñ?абоÑ?е Ñ? изобÑ?ажениÑ?ми, не имеÑ?Ñ?ими палиÑ?Ñ?Ñ?</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9763";>CVE-2014-9763</a>
 
- -   <p>Prevent division-by-zero crashes</p></li>
+   <p>Ð?Ñ?едоÑ?вÑ?аÑ?ение аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок из-за делениÑ? на нолÑ?</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9764";>CVE-2014-9764</a>
 
- -   <p>Fix segfault when opening <tt>input/queue/id:000007,src:000000,op:flip1,pos:51</tt> with feh</p></li>
+   <p>Ð?Ñ?пÑ?авление оÑ?ибки Ñ?егменÑ?иÑ?ованиÑ? пÑ?и оÑ?кÑ?Ñ?Ñ?ии <tt>input/queue/id:000007,src:000000,op:flip1,pos:51</tt> Ñ? помоÑ?Ñ?Ñ? feh</p></li>
 
 </ul>
 </define-tag>
- --- english/security/2016/dla-407.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-407.wml	2016-04-12 12:41:06.143040191 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The flaw allows a malicious server to impersonate the vulnerable domain
- -to any XMPP domain whose domain name includes the attacker's domain as a
- -suffix.</p>
+<p>УÑ?звимоÑ?Ñ?Ñ? позволÑ?еÑ? Ñ?еÑ?веÑ?Ñ? злоÑ?мÑ?Ñ?ленника подделаÑ?Ñ? Ñ?Ñ?звимÑ?й домен
+длÑ? лÑ?бого домена XMPP пÑ?и Ñ?Ñ?ловии, Ñ?Ñ?о Ñ?Ñ?о доменное имÑ? в каÑ?еÑ?Ñ?ве Ñ?Ñ?Ñ?Ñ?икÑ?а Ñ?одеÑ?жиÑ? доменное имÑ?
+Ñ?еÑ?веÑ?а злоÑ?мÑ?Ñ?ленника.</p>
 
- -<p>For example, <q>bber.example</q> would be able to connect to <q>jabber.example</q>
- -and successfully impersonate any vulnerable server on the network.</p>
+<p>Ð?апÑ?имеÑ?, <q>bber.example</q> Ñ?можеÑ? подклÑ?Ñ?иÑ?Ñ?Ñ?Ñ? к <q>jabber.example</q>
+и Ñ?можеÑ? Ñ?Ñ?пеÑ?но вÑ?даÑ?Ñ? Ñ?ебÑ? за лÑ?бой Ñ?Ñ?звимÑ?й Ñ?еÑ?веÑ? Ñ?Ñ?ой Ñ?еÑ?и.</p>
 
- -<p>This release also fixes a regression introduced in the previous
- -<a href="https://security-tracker.debian.org/tracker/CVE-2016-1232";>CVE-2016-1232</a> fix: s2s doesn't work if /dev/urandom is read-only.</p>
+<p>ЭÑ?оÑ? вÑ?пÑ?Ñ?к Ñ?акже Ñ?одеÑ?жиÑ? иÑ?пÑ?авление Ñ?егÑ?еÑ?Ñ?а, введÑ?нное в пÑ?едÑ?дÑ?Ñ?ем иÑ?пÑ?авлении
+<a href="https://security-tracker.debian.org/tracker/CVE-2016-1232";>CVE-2016-1232</a>: s2s не Ñ?абоÑ?аеÑ? в Ñ?лÑ?Ñ?ае, еÑ?ли /dev/urandom оÑ?кÑ?Ñ?Ñ? Ñ?олÑ?ко длÑ? Ñ?Ñ?ениÑ?.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-420.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-420.wml	2016-04-12 12:50:01.726894895 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that there was a invalid memory address issue
- -in libmatroska, an extensible open standard audio/video container
- -format.</p>
+<p>Ð?Ñ?ла обнаÑ?Ñ?жена  оÑ?ибка Ñ? непÑ?авилÑ?нÑ?м адÑ?еÑ?ом памÑ?Ñ?и
+в libmatroska, Ñ?аÑ?Ñ?иÑ?Ñ?емом оÑ?кÑ?Ñ?Ñ?ом Ñ?Ñ?андаÑ?Ñ?ном Ñ?оÑ?маÑ?е аÑ?дио/видео
+конÑ?ейнеÑ?ов.</p>
 
- -<p>When reading a block group or a simple block that uses EBML
- -lacing the frame sizes indicated in the lacing weren't checked
- -against the available number of bytes. If the indicated frame
- -size was bigger than the whole block's size the parser would read
- -beyond the end of the buffer resulting in a heap information
- -leak.</p>
+<p>Ð?Ñ?и вÑ?полнении Ñ?Ñ?ениÑ? гÑ?Ñ?ппÑ? блоков или блока, иÑ?полÑ?зÑ?Ñ?Ñ?его
+EBML-Ñ?вÑ?зÑ?вание Ñ?азмеÑ?ов Ñ?Ñ?еймов, Ñ?казаннÑ?Ñ? в Ñ?вÑ?зÑ?вании, не пÑ?овеÑ?Ñ?Ñ?Ñ?Ñ?Ñ?
+на пÑ?едмеÑ? доÑ?Ñ?Ñ?пного Ñ?иÑ?ла байÑ?ов. Ð?Ñ?ли Ñ?казаннÑ?й Ñ?азмеÑ? Ñ?Ñ?ейма
+болÑ?Ñ?е, Ñ?ем Ñ?азмеÑ? Ñ?елого блока, Ñ?о код, вÑ?полнÑ?Ñ?Ñ?ий гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ?, бÑ?деÑ? вÑ?полнÑ?Ñ?Ñ?
+Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии
+из динамиÑ?еÑ?кой памÑ?Ñ?и.</p>
 
- -<p>For Debian 6 Squeeze, this issue has been fixed in libmatroska
- -version 0.8.1-1.1+deb6u1.</p>
+<p>Ð? Debian 6 Squeeze Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в libmatroska
+веÑ?Ñ?ии 0.8.1-1.1+deb6u1.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=9AoN
-----END PGP SIGNATURE-----


Reply to: