[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dla-4{45,41,22}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dla-422.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-422.wml	2016-04-12 13:01:34.041885545 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
- -<p>Two buffer overflows were discovered in python-imaging, a Python
- -library for loading and manipulating image files, which may lead to
- -the execution of arbitrary code.</p>
+<p>Ð? python-imaging, библиоÑ?еке Ñ?зÑ?ка Python длÑ? загÑ?Ñ?зки и Ñ?абоÑ?Ñ? Ñ?
+Ñ?айлами изобÑ?ажений, бÑ?ло обнаÑ?Ñ?жено два пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ?
+к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0775";>CVE-2016-0775</a>
 
- -        <p>Buffer overflow in FliDecode.c</p></li>
+        <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в FliDecode.c</p></li>
 
 </ul>
 
- -<p>The second buffer overflow was in PcdDecode.c. A CVE identifier has
- -not been assigned yet.</p>
+<p>Ð?Ñ?оÑ?ое пеÑ?еполнение бÑ?Ñ?еÑ?а бÑ?ло в Ñ?айле PcdDecode.c. Ð?мÑ? пока не бÑ?л пÑ?иÑ?воен
+иденÑ?иÑ?икаÑ?оÑ? CVE.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1.1.7-2+deb6u2.</p>
 
- -<p>We recommend that you upgrade your python-imaging packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? python-imaging.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-441.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-441.wml	2016-04-12 12:59:39.857313052 +0500
@@ -1,20 +1,21 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>HP's Zero Day Initiative has identified a vulnerability affecting the
- -pcre3 package. It was assigned ZDI id ZDI-CAN-3542. A CVE identifier has
- -not been assigned yet.</p>
+<p>СоÑ?Ñ?Ñ?дники HP Zero Day Initiative обнаÑ?Ñ?жили Ñ?Ñ?звимоÑ?Ñ?Ñ?, каÑ?аÑ?Ñ?Ñ?Ñ?Ñ?Ñ?
+пакеÑ?а pcre3. Ð?й бÑ?л назнаÑ?ен иденÑ?иÑ?икаÑ?оÑ? ZDI ZDI-CAN-3542. Ð?денÑ?иÑ?икаÑ?оÑ? CVE ей
+пока не бÑ?л назнаÑ?ен.</p>
 
- -<p>PCRE Regular Expression Compilation Stack Buffer Overflow Remote Code
- -Execution Vulnerability.</p>
+<p>УÑ?звимоÑ?Ñ?Ñ? Ñ?далÑ?нного вÑ?полнениÑ? кода из-за пеÑ?еполнениÑ? Ñ?Ñ?ека пÑ?и компилÑ?Ñ?ии
+Ñ?егÑ?лÑ?Ñ?нÑ?Ñ? вÑ?Ñ?ажений PCRE.</p>
 
- -<p>PCRE did not validate that handling the (*ACCEPT) verb will occur within
- -the bounds of the cworkspace stack buffer, leading to a stack buffer
- -overflow.</p>
+<p>PCRE не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? Ñ?ого, Ñ?Ñ?о обÑ?абаÑ?Ñ?ваемÑ?й глагол (*ACCEPT) наÑ?одиÑ?Ñ?Ñ? в
+гÑ?аниÑ?аÑ? бÑ?Ñ?еÑ?а cworkspace, Ñ?Ñ?о пÑ?иводиÑ? к пеÑ?еполнениÑ?
+бÑ?Ñ?еÑ?а.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 8.02-1.1+deb6u1.</p>
 
- -<p>We recommend that you upgrade your pcre3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? pcre3.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-445.wml	2016-04-08 01:54:45.000000000 +0500
+++ russian/security/2016/dla-445.wml	2016-04-12 12:56:11.017760062 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The backported patch to solve <a href="https://security-tracker.debian.org/tracker/CVE-2016-2569";>CVE-2016-2569</a> yielded to failed assertions
- -that made squid3 to crash when closing connections. The fix for this CVE
- -strongly relies on exception handling present in more recent versions of
- -squid3, that I failed to identify in the previous update. I have
- -reverted the patch to take the safest position, taking into account that
- -Squeeze users should migrate to a supported version of Debian. This
- -post-EOL update is intended to keep a functional squid3 package in the
- -archive.</p>
+<p>Ð?еÑ?енеÑ?Ñ?ннаÑ? заплаÑ?а длÑ? Ñ?еÑ?ениÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2016-2569";>CVE-2016-2569</a> Ñ?одеÑ?жиÑ? непÑ?авилÑ?нÑ?е Ñ?Ñ?веÑ?ждениÑ?,
+коÑ?оÑ?Ñ?е пÑ?иводÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке squid3 пÑ?и закÑ?Ñ?Ñ?ии Ñ?оединений. Ð?Ñ?пÑ?авление Ñ?Ñ?ого CVE
+полагаеÑ?Ñ?Ñ? на обÑ?абоÑ?кÑ? иÑ?клÑ?Ñ?ений, коÑ?оÑ?аÑ? имееÑ?Ñ?Ñ? Ñ?олÑ?ко в более Ñ?вежиÑ? веÑ?Ñ?иÑ?Ñ?
+squid3, Ñ?Ñ?о в пÑ?оÑ?лÑ?й Ñ?аз обнаÑ?Ñ?жиÑ?Ñ? не Ñ?далоÑ?Ñ?. УказаннаÑ? заплаÑ?а бÑ?ла Ñ?далена длÑ? Ñ?ого,
+Ñ?Ñ?обÑ? веÑ?нÑ?Ñ?Ñ? пÑ?огÑ?аммÑ? в более безопаÑ?ное Ñ?оÑ?Ñ?оÑ?ние, Ñ?Ñ?иÑ?Ñ?ваÑ? Ñ?о, Ñ?Ñ?о
+полÑ?зоваÑ?елÑ?м Squeeze Ñ?ледÑ?еÑ? пеÑ?ейÑ?и на поддеÑ?живаемÑ?Ñ? веÑ?Ñ?иÑ? Debian. ЭÑ?о
+обновление, вÑ?пÑ?Ñ?енное поÑ?ле оконÑ?аниÑ? жизненного Ñ?икла вÑ?пÑ?Ñ?ка, пÑ?едназнаÑ?ено длÑ? Ñ?ого, Ñ?Ñ?обÑ? пакеÑ? squid3 в аÑ?Ñ?иве
+оÑ?Ñ?авалÑ?Ñ? в Ñ?абоÑ?ем Ñ?оÑ?Ñ?оÑ?нии.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=LgOc
-----END PGP SIGNATURE-----


Reply to: