[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{305,137,230,166}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-137.wml	2016-04-09 01:32:23.000000000 +0500
+++ russian/security/2015/dla-137.wml	2016-04-21 22:38:23.213239068 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The libevent library was vulnerable to a potential heap overflow in
- -the buffer/bufferevent APIs.</p>
+<p>Ð?иблиоÑ?ека libevent Ñ?Ñ?звима к поÑ?енÑ?иалÑ?номÑ? пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и в
+Ñ?Ñ?нкÑ?иÑ?Ñ? API длÑ? Ñ?абоÑ?Ñ? Ñ? бÑ?Ñ?еÑ?ом/бÑ?Ñ?еÑ?нÑ?ми Ñ?обÑ?Ñ?иÑ?ми.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libevent version 1.4.13-stable-1+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в libevent веÑ?Ñ?ии 1.4.13-stable-1+deb6u1</p>
 
- -<p>This update was prepared by Nguyen Cong who used the upstream-provided
- -patch. Thanks to them!</p>
+<p>Ð?анное обновление бÑ?ло подгоÑ?овлено Ð?гÑ?еном Ð?онгом, коÑ?оÑ?Ñ?й иÑ?полÑ?зовал заплаÑ?Ñ?, пÑ?едоÑ?Ñ?авленнÑ?Ñ?
+Ñ?азÑ?абоÑ?Ñ?иками оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки. Ð?Ñ?Ñ?ажаем емÑ? благодаÑ?ноÑ?Ñ?Ñ?!</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-166.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-166.wml	2016-04-21 22:42:04.582271438 +0500
@@ -1,10 +1,11 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Alexander Cherepanov discovered that bsdcpio, an implementation of the
- -<q>cpio</q> program part of the libarchive project, is susceptible to a
- -directory traversal vulnerability via absolute paths.</p>
+<p>Ð?лекÑ?андÑ? ЧеÑ?епанов обнаÑ?Ñ?жил, Ñ?Ñ?о bsdcpio, Ñ?еализаÑ?иÑ?
+пÑ?огÑ?аммÑ? <q>cpio</q> из пÑ?оекÑ?а libarchive, можеÑ? Ñ?одеÑ?жаÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?,
+пÑ?иводÑ?Ñ?Ñ?Ñ? к обÑ?одÑ? каÑ?алога Ñ?еÑ?ез абÑ?олÑ?Ñ?нÑ?е пÑ?Ñ?и.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libarchive version 2.8.4.forreal-1+squeeze3</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в libarchive веÑ?Ñ?ии 2.8.4.forreal-1+squeeze3</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-230.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-230.wml	2016-04-21 22:40:31.783778222 +0500
@@ -1,11 +1,12 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Arjun Shankar of Red Hat discovered that gethostbyname_r and related
- -functions compute the size of an input buffer incorrectly if the passed-in
- -buffer is misaligned. This results in a buffer overflow.</p>
+<p>Ð?Ñ?джÑ?н ШанкаÑ? из Red Hat обнаÑ?Ñ?жил, Ñ?Ñ?о gethostbyname_r и Ñ?вÑ?заннÑ?е
+Ñ? ней Ñ?Ñ?нкÑ?ии непÑ?авилÑ?но вÑ?Ñ?иÑ?лÑ?Ñ?Ñ? Ñ?азмеÑ? вÑ?одного бÑ?Ñ?еÑ?а в Ñ?лÑ?Ñ?ае, еÑ?ли пеÑ?едаваемÑ?й
+бÑ?Ñ?еÑ? вÑ?Ñ?овнен непÑ?авилÑ?но. ЭÑ?о пÑ?иводиÑ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а.</p>
 
- -<p>For the oldoldstable distribution (squeeze), this problem has been
- -fixed in version 2.11.3-4+deb6u6.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в веÑ?Ñ?ии 2.11.3-4+deb6u6.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-305.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-305.wml	2016-04-21 22:34:50.773212286 +0500
@@ -1,11 +1,12 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -    <p>A vulnerability was found in screen causing a stack overflow which results
- -in crashing the screen server process, resulting in denial of service.</p>
+    <p>Ð? screen бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?, пÑ?иводÑ?Ñ?аÑ? к пеÑ?еполнениÑ? Ñ?Ñ?ека, Ñ?Ñ?о пÑ?иводиÑ?
+к аваÑ?ийной оÑ?Ñ?ановке Ñ?еÑ?веÑ?ного пÑ?оÑ?еÑ?Ñ?а screen и оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
- -    <p>See <a href="./dsa-3352">DSA-3352-1</a> for information on other Debian releases.</p>
+    <p>См. <a href="./dsa-3352">DSA-3352-1</a> длÑ? полÑ?Ñ?ениÑ? дополниÑ?елÑ?ной инÑ?оÑ?маÑ?ии о дÑ?Ñ?гиÑ? вÑ?пÑ?Ñ?каÑ? Debian.</p>
 
- -    <p>We recommend that you upgrade your screen packages.</p>
+    <p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? screen.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Lc86
-----END PGP SIGNATURE-----


Reply to: