[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dla-4{21,05,37}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dla-405.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-405.wml	2016-04-13 12:20:37.993708902 +0500
@@ -1,16 +1,16 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several security flaws have been found and solved in libtiff, a
- -library that provides support for handling Tag Image File Format
- -(TIFF). These flaws concern out of bounds reads and writes in the
- -LogL16Decode, LogLuvDecode24, LogLuvDecode32, LogLuvDecodeTile,
- -LogL16Encode, LogLuvEncode24, LogLuvEncode32 and NeXTDecode functions.</p>
+<p>Ð? libtiff, библиоÑ?еке, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ей поддеÑ?жкÑ? обÑ?абоÑ?ки Ñ?оÑ?маÑ?а изобÑ?ажений
+TIFF, бÑ?ло обнаÑ?Ñ?жено и иÑ?пÑ?авлено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. ЭÑ?и Ñ?Ñ?звимоÑ?Ñ?и каÑ?аÑ?Ñ?Ñ?Ñ? Ñ?Ñ?ениÑ? и запиÑ?и за пÑ?еделами
+вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?иÑ?Ñ? LogL16Decode, LogLuvDecode24, LogLuvDecode32, LogLuvDecodeTile,
+LogL16Encode, LogLuvEncode24, LogLuvEncode32 и NeXTDecode.</p>
 
- -<p>These IDs were assigned for the problems: <a href="https://security-tracker.debian.org/tracker/CVE-2015-8781";>CVE-2015-8781</a>,
- -<a href="https://security-tracker.debian.org/tracker/CVE-2015-8782";>CVE-2015-8782</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8783";>CVE-2015-8783</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2015-8784";>CVE-2015-8784</a>.</p>
+<p>ЭÑ?им пÑ?облемам бÑ?ли назнаÑ?енÑ? Ñ?ледÑ?Ñ?Ñ?ие иденÑ?иÑ?икаÑ?оÑ?Ñ?: <a href="https://security-tracker.debian.org/tracker/CVE-2015-8781";>CVE-2015-8781</a>,
+<a href="https://security-tracker.debian.org/tracker/CVE-2015-8782";>CVE-2015-8782</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8783";>CVE-2015-8783</a> и <a href="https://security-tracker.debian.org/tracker/CVE-2015-8784";>CVE-2015-8784</a>.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tiff version
- -3.9.4-5+squeeze14. We recommend you to upgrade your tiff packages.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в tiff веÑ?Ñ?ии
+3.9.4-5+squeeze14. РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tiff.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-421.wml	2016-04-09 11:29:07.521036434 +0500
+++ russian/security/2016/dla-421.wml	2016-04-13 12:15:36.486675994 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3197";>CVE-2015-3197</a>:
 
- -<p>A malicious client can negotiate SSLv2 ciphers that have been disabled on the
- -server and complete SSLv2 handshakes even if all SSLv2 ciphers have been
- -disabled, provided that the SSLv2 protocol was not also disabled via
+<p>Ð?лиенÑ?-злоÑ?мÑ?Ñ?ленник можеÑ? Ñ?оглаÑ?оваÑ?Ñ? иÑ?полÑ?зование Ñ?иÑ?Ñ?а SSLv2, коÑ?оÑ?Ñ?е оÑ?клÑ?Ñ?енÑ?
+на Ñ?еÑ?веÑ?е, и завеÑ?Ñ?иÑ?Ñ? Ñ?Ñ?копожаÑ?ие SSLv2 даже в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли вÑ?е Ñ?иÑ?Ñ?Ñ? SSLv2
+оÑ?клÑ?Ñ?енÑ?, Ñ?Ñ?иÑ?Ñ?ваÑ?, Ñ?Ñ?о пÑ?оÑ?окол SSLv2 не оÑ?клÑ?Ñ?ен Ñ? помоÑ?Ñ?Ñ? опÑ?ии
 SSL_OP_NO_SSLv2.</p></li>
 
 </ul>
 
- -<p>Additionally, when using a DHE cipher suite a new DH key will always be
- -generated for each connection.</p>
+<p>Ð?Ñ?оме Ñ?ого, пÑ?и иÑ?полÑ?зовании набоÑ?а Ñ?иÑ?Ñ?ов DHE длÑ? каждого Ñ?оединениÑ?
+вÑ?егда Ñ?оздаÑ?Ñ?Ñ?Ñ? новÑ?й DH-клÑ?Ñ?.</p>
 
- -<p>This will be the last security update for the squeeze version of the package.
- -The 0.9.8 version is no longer supported and the squeeze LTS support will end
- -soon.  If you are using openssl you should upgrade to wheezy or preferably
- -jessie.  The version in those versions contain many security improvements.</p>
+<p>Ð?анное обновление Ñ?влÑ?еÑ?Ñ?Ñ? поÑ?ледним обновление пакеÑ?а веÑ?Ñ?ии в squeeze.
+Ð?еÑ?Ñ?иÑ? 0.9.8 более не поддеÑ?живаеÑ?Ñ?Ñ?, долгоÑ?Ñ?оÑ?наÑ? поддеÑ?жка squeeze вÑ?коÑ?е
+законÑ?иÑ?Ñ?Ñ?.  Ð?Ñ?ли вÑ? иÑ?полÑ?зÑ?еÑ?е openssl, Ñ?о вам Ñ?ледÑ?еÑ? вÑ?полниÑ?Ñ? обновление до wheezy или
+jessie.  Ð?еÑ?Ñ?иÑ? пакеÑ?а в Ñ?казаннÑ?Ñ? вÑ?пÑ?Ñ?каÑ? Ñ?одеÑ?жиÑ? множеÑ?Ñ?во Ñ?лÑ?Ñ?Ñ?ений безопаÑ?ноÑ?Ñ?и.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-437.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-437.wml	2016-04-13 12:26:24.414835954 +0500
@@ -1,23 +1,24 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Upstream published version 0.99.  This update updates sqeeze-lts to the latest
- -upstream release in line with the approach used for other Debian releases.</p>
+<p>РазÑ?абоÑ?Ñ?ики оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки вÑ?пÑ?Ñ?Ñ?или веÑ?Ñ?иÑ? 0.99.  Ð?анное обновление Ñ?лÑ?жиÑ? длÑ? обновлениÑ? sqeeze-lts до
+поÑ?ледней веÑ?Ñ?ии из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки, как Ñ?Ñ?о делаеÑ?Ñ?Ñ? и в дÑ?Ñ?гиÑ? вÑ?пÑ?Ñ?каÑ? Debian.</p>
 
- -<p>The changes are not strictly required for operation, but users of the previous
- -version in Squeeze may not be able to make use of all current virus signatures
- -and might get warnings.</p>
+<p>ЭÑ?и изменениÑ? не Ñ?влÑ?Ñ?Ñ?Ñ?Ñ? Ñ?Ñ?Ñ?ого необÑ?одимÑ?ми длÑ? Ñ?абоÑ?Ñ?, но полÑ?зоваÑ?ели пÑ?едÑ?дÑ?Ñ?ей
+веÑ?Ñ?ии в Squeeze не могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? вÑ?е Ñ?екÑ?Ñ?ие Ñ?игнаÑ?Ñ?Ñ?Ñ? виÑ?Ñ?Ñ?ов
+и полÑ?Ñ?аÑ?Ñ? пÑ?едÑ?пÑ?еждениÑ?.</p>
 
- -<p>Due to a change in soname included with this release, libclamav has been
- -updated to libclamav7.  This requires updates to external users of libclamav.
- -For python-clamav, klamav, and libclamunrar, these changes are, or will be
- -shortly, available.</p>
+<p>Ð?з-за изменениÑ? в веÑ?Ñ?ии so-библиоÑ?еки в Ñ?Ñ?ом вÑ?пÑ?Ñ?ке пакеÑ? libclamav Ñ?оже бÑ?л
+обновлÑ?н до libclamav7.  ТÑ?ебÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? внеÑ?ниÑ? полÑ?зоваÑ?елей libclamav.
+Ð?лÑ? пакеÑ?ов python-clamav, klamav и libclamunrar Ñ?Ñ?и изменениÑ? Ñ?же гоÑ?овÑ?, либо бÑ?дÑ?Ñ?
+гоÑ?овÑ? в Ñ?коÑ?ом вÑ?емени.</p>
 
- -<p>Unfortunately, for dansguardian, it was released for squeeze with latent
- -issues that preclude rebuilding the package.  If you are using dansguardian,
- -do not attempt to upgrade to the new clamav.</p>
+<p>Ð? Ñ?ожалениÑ?, пакеÑ? dansguardian в squeeze имееÑ? некоÑ?оÑ?Ñ?е пÑ?облемÑ?,
+коÑ?оÑ?Ñ?е меÑ?аÑ?Ñ? повÑ?оÑ?ной Ñ?боÑ?ке Ñ?Ñ?ого пакеÑ?а.  Ð?Ñ?ли вÑ? иÑ?полÑ?зÑ?еÑ?е dansguardian,
+Ñ?о не пÑ?Ñ?айÑ?еÑ?Ñ? вÑ?полниÑ?Ñ? обновление до новой веÑ?Ñ?ии clamav.</p>
 
- -<p>Otherwise, if you use clamav, we strongly recommend that you upgrade to this
- -version.</p>
+<p>Ð? пÑ?оÑ?ивном Ñ?лÑ?Ñ?ае, еÑ?ли вÑ? иÑ?полÑ?зÑ?еÑ?е clamav, Ñ?о вам наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ?
+обновление до Ñ?Ñ?ой веÑ?Ñ?ии.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=bD69
-----END PGP SIGNATURE-----


Reply to: