[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{357,218,269,309}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-218.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-218.wml	2016-04-21 23:02:42.390838064 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Olivier Fourdan discovered that missing input validation in the Xserver's
- -handling of XkbSetGeometry requests may result in an information leak or
- -denial of service.</p>
+<p>Ð?ливÑ?е ФÑ?Ñ?дан обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в коде Xserver
+длÑ? обÑ?абоÑ?ки запÑ?оÑ?ов XkbSetGeometry можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии или
+оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
- -<p>This upload to Debian squeeze-lts fixes the issue by not swapping
- -XkbSetGeometry data in the input buffer any more and checking strings'
- -length against request size.</p>
+<p>Ð?анное обновление Debian squeeze-lts иÑ?пÑ?авлÑ?еÑ? Ñ?казаннÑ?Ñ? пÑ?облемÑ? пÑ?Ñ?Ñ?м запÑ?еÑ?а пеÑ?емеÑ?ениÑ?
+даннÑ?Ñ? XkbSetGeometry в бÑ?Ñ?еÑ? вÑ?однÑ?Ñ? даннÑ?Ñ? и вÑ?полнениÑ? обÑ?заÑ?елÑ?ной пÑ?овеÑ?ки длинÑ? Ñ?Ñ?Ñ?ок
+и Ñ?ооÑ?веÑ?Ñ?Ñ?виÑ? иÑ? длинÑ? Ñ?азмеÑ?Ñ? запÑ?оÑ?а.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-269.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-269.wml	2016-04-21 23:06:09.590322326 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The issue is due to a case of missing brackets in the
- -patch '500-ssl.diff', which causes the execution of
- -'fclose(NULL)' and thus displays as a segmentation fault.
- -The error appears while transmogrifying 'linux-ftpd' into
+<p>Ð?з-за оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?виÑ? Ñ?кобок в заплаÑ?е '500-ssl.diff'
+возникла пÑ?облема, коÑ?оÑ?аÑ? пÑ?иводиÑ? к вÑ?полнениÑ?
+'fclose(NULL)' и, Ñ?аким обÑ?азом, к оÑ?ибке Ñ?егменÑ?иÑ?ованиÑ?.
+ЭÑ?а оÑ?ибка возникаеÑ? во вÑ?емÑ? пÑ?евÑ?аÑ?ениÑ? 'linux-ftpd' в
 'linux-ftpd-ssl'.</p>
 
- -<p>There is no CVE assigned to this issue.</p>
+<p>ЭÑ?ой пÑ?облеме иденÑ?иÑ?икаÑ?оÑ? CVE не бÑ?л назнаÑ?ен.</p>
 
- -<p>The patch was created by Mats Erik Andersson.</p>
+<p>Ð?аплаÑ?а бÑ?ла подгоÑ?овлена Ð?Ñ?Ñ?Ñ?ом ЭÑ?иком Ð?ндеÑ?Ñ?он.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-309.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-309.wml	2016-04-21 23:10:48.097877194 +0500
@@ -1,11 +1,12 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Denis Andzakovic discovered that OpenLDAP, a free implementation of the
- -Lightweight Directory Access Protocol, does not properly handle BER
- -data. An unauthenticated remote attacker can use this flaw to cause a
- -denial of service (slapd daemon crash) via a specially crafted packet.</p>
+<p>Ð?Ñ?ниÑ? Ð?нджаковиÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о OpenLDAP, Ñ?вободнаÑ? Ñ?еализаÑ?иÑ?
+Lightweight Directory Access Protocol, непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? даннÑ?е
+BER. Ð?еаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?й Ñ?далÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ?
+вÑ?зова оÑ?каза в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?лÑ?жбÑ? slapd) пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного пакеÑ?а.</p>
 
- -<p>The Squeeze-LTS package has been prepared by Ryan Tandy.</p>
+<p>Ð?акеÑ? длÑ? Squeeze-LTS бÑ?л подгоÑ?овлен Райаном Танди.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-357.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-357.wml	2016-04-21 22:57:49.441614014 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that missing input sanitizing in Snoopy, a PHP class that
- -simulates a web browser may result in the execution of arbitrary
- -commands.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в Snoopy, PHP-клаÑ?Ñ?е,
+Ñ?имÑ?лиÑ?Ñ?Ñ?Ñ?ем веб-бÑ?аÑ?зеÑ?, можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ?
+команд.</p>
 
- -<p>For the oldoldstable distribution (squeeze-lts), this problem has been fixed
- -in version 2.0.0-1~deb6u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze-lts) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 2.0.0-1~deb6u1.</p>
 
- -<p>We recommend that you upgrade your libphp-snoopy packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libphp-snoopy.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=WHwL
-----END PGP SIGNATURE-----


Reply to: