[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{376,337,261,194}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-194.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-194.wml	2016-04-20 16:29:37.320844825 +0500
@@ -1,10 +1,11 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Adam Sampson discovered a buffer overflow in the handling of the
- -XAUTHORITY environment variable in das-watchdog, a watchdog daemon to
- -ensure a realtime process won't hang the machine. A local user can
- -exploit this flaw to escalate his privileges and execute arbitrary
- -code as root.</p>
+<p>Ð?дам СÑ?мпÑ?он обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде обÑ?абоÑ?ки
+пеÑ?еменной окÑ?Ñ?жениÑ? XAUTHORITY в das-watchdog, Ñ?лÑ?жбе watchdog длÑ?
+пÑ?овеÑ?ки Ñ?ого, Ñ?Ñ?обÑ? пÑ?оÑ?еÑ?Ñ?Ñ? Ñ?еалÑ?ного вÑ?емени не пÑ?иводили к завиÑ?аниÑ? маÑ?инÑ?. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ? можеÑ?
+иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий и вÑ?полнениÑ? пÑ?оизволÑ?ного
+кода оÑ? лиÑ?а Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-261.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-261.wml	2016-04-20 16:27:45.915376474 +0500
@@ -1,9 +1,10 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>It was reported that version 0.31+bzr413-1.1+deb6u1 of aptdaemon (which
- -fixed <a href="https://security-tracker.debian.org/tracker/CVE-2015-1323";>CVE-2015-1323</a>) was not installable if you have Python 2.5 installed.</p>
+<p>СообÑ?ено, Ñ?Ñ?о веÑ?Ñ?и 0.31+bzr413-1.1+deb6u1 пакеÑ?а aptdaemon (в коÑ?оÑ?ой
+иÑ?пÑ?авлена <a href="https://security-tracker.debian.org/tracker/CVE-2015-1323";>CVE-2015-1323</a>) не можеÑ? бÑ?Ñ?Ñ? Ñ?Ñ?Ñ?ановлена в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?Ñ?Ñ?ановлен Python 2.5.</p>
 
- -<p>This has been fixed in version 0.31+bzr413-1.1+deb6u2.</p>
+<p>ЭÑ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 0.31+bzr413-1.1+deb6u2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-337.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-337.wml	2016-04-20 16:26:38.211291893 +0500
@@ -1,10 +1,11 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>busybox, a collection of tiny utilities for small and embedded systems,
- -was vulnerable to crashing when handling a specially crafted zip file.
- -The issue was discovered by Gustavo Grieco.</p>
+<p>busybox, набоÑ? неболÑ?Ñ?иÑ? Ñ?Ñ?илиÑ? длÑ? вÑ?Ñ?Ñ?аиваемÑ?Ñ? Ñ?иÑ?Ñ?ем, Ñ?одеÑ?жиÑ?
+Ñ?Ñ?звимоÑ?Ñ?Ñ?, пÑ?иводÑ?Ñ?Ñ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке пÑ?и обÑ?абоÑ?ке Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла zip.
+ЭÑ?а пÑ?облема бÑ?ла обнаÑ?Ñ?жена Ð?Ñ?Ñ?Ñ?аво Ð?Ñ?ико.</p>
 
- -<p>For Debian 6 Squeeze, this issue has been fixed in busybox version
+<p>Ð? Debian 6 Squeeze Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в busybox веÑ?Ñ?ии
 1.17.1-8+deb6u11.</p>
 </define-tag>
 
- --- english/security/2015/dla-376.wml	2016-04-07 03:10:37.000000000 +0500
+++ russian/security/2015/dla-376.wml	2016-04-20 16:24:55.519238654 +0500
@@ -1,11 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Mono's string-to-double parser may crash, on specially crafted input. This
- -could theoretically lead to arbitrary code execution.</p>
+<p>Ð?од длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а Ñ?Ñ?Ñ?ок пÑ?и пÑ?еобÑ?азовании Ñ?Ñ?Ñ?ок в веÑ?еÑ?Ñ?веннÑ?е Ñ?иÑ?ла двойной Ñ?оÑ?ноÑ?Ñ?и
+из Mono можеÑ? завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? пÑ?и обÑ?абоÑ?ке Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? вÑ?однÑ?Ñ? даннÑ?Ñ?. ТеоÑ?еÑ?иÑ?еÑ?ки Ñ?Ñ?о
+можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>This issue has been fixed in Debian 6 Squeeze with the version
- -2.6.7-5.1+deb6u2 of mono. We recommend that you upgrade your
- -mono packages.</p>
+<p>ЭÑ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в Debian 6 Squeeze в веÑ?Ñ?ии
+2.6.7-5.1+deb6u2 пакеÑ?а mono. РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ?
+пакеÑ?Ñ? mono.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=THfm
-----END PGP SIGNATURE-----


Reply to: