[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{254,326,128,135}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-128.wml	2016-04-09 01:32:23.000000000 +0500
+++ russian/security/2015/dla-128.wml	2016-04-21 23:41:07.594282509 +0500
@@ -1,11 +1,12 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Michele Spagnuolo of the Google Security Team dicovered two heap-based
- -buffer overflows in SoX, the Swiss Army knife of sound processing
- -programs. A specially crafted wav file could cause an application using
- -SoX to crash or, possibly, execute arbitrary code.</p>
+<p>Ð?иÑ?елÑ? ШпагнÑ?ло из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил два пеÑ?еполнениÑ?
+динамиÑ?еÑ?кой памÑ?Ñ?и в SoX, Ñ?нивеÑ?Ñ?алÑ?ном набоÑ?е пÑ?огÑ?амм длÑ? обÑ?абоÑ?ки
+звÑ?ка. СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл в Ñ?оÑ?маÑ?е wav можеÑ? пÑ?иводиÑ?Ñ? к аваÑ?ийной
+оÑ?Ñ?ановке пÑ?иложениÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?его SoX, или поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in sox version 14.3.1-1+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в sox веÑ?Ñ?ии 14.3.1-1+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-135.wml	2016-04-09 01:32:23.000000000 +0500
+++ russian/security/2015/dla-135.wml	2016-04-21 23:43:01.899453638 +0500
@@ -1,11 +1,12 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The ia32-libs and ia32-libs-gtk packages contain 32 bit versions of various
- -libraries for use on 64 bit systems. This update rolls in all security
- -fixes made to these libraries since the previous update of ia32-libs and
- -ia32-libs-gtk in Squeeze LTS.</p>
+<p>Ð?акеÑ?Ñ? ia32-libs и ia32-libs-gtk Ñ?одеÑ?жаÑ? 32-биÑ?нÑ?е веÑ?Ñ?ии Ñ?азлиÑ?нÑ?Ñ?
+библиоÑ?ек длÑ? иÑ?полÑ?зованиÑ? на 64-биÑ?нÑ?Ñ? Ñ?иÑ?Ñ?емаÑ?. Ð?анное обновление вклÑ?Ñ?аеÑ? в Ñ?ебÑ? вÑ?е иÑ?пÑ?авлениÑ?
+безопаÑ?ноÑ?Ñ?и длÑ? Ñ?Ñ?иÑ? библиоÑ?ек Ñ? моменÑ?а пÑ?едÑ?дÑ?Ñ?его обновлениÑ? ia32-libs и
+ia32-libs-gtk в Squeeze LTS.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ia32-libs, ia32-libs-gtk version 20150116</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в ia32-libs, ia32-libs-gtk веÑ?Ñ?ий 20150116</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-254.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-254.wml	2016-04-21 23:35:18.205868765 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>There is a potential denial of service vulnerability in Rack, a modular
- -Ruby webserver interface.</p>
+<p>Ð? Rack, модÑ?лÑ?ном инÑ?еÑ?Ñ?ейÑ?е веб-Ñ?еÑ?веÑ?а на Ruby, имееÑ?Ñ?Ñ? поÑ?енÑ?иалÑ?наÑ?
+пÑ?облема, пÑ?иводÑ?Ñ?аÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
- -<p>Carefully crafted requests can cause a `SystemStackError` and cause a
- -denial of service attack by exploiting the lack of a sensible depth
- -check when doing parameter normalization.</p>
+<p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е запÑ?оÑ?Ñ? могÑ?Ñ? вÑ?зваÑ?Ñ? оÑ?ибкÑ? `SystemStackError`,
+а оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ки глÑ?бинÑ? пÑ?и ноÑ?мализаÑ?ии паÑ?амеÑ?Ñ?ов можеÑ? пÑ?иводиÑ?Ñ?
+к оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
- -<p>We recommend that you update your librack-ruby packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? librack-ruby.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-326.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-326.wml	2016-04-21 23:38:31.664280084 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The PDO adapters of Zend Framework 1 did not filter null bytes values in
- -SQL statements. A PDO adapter can treat null bytes in a query as a
- -string terminator, allowing an attacker to add arbitrary SQL following a
- -null byte, and thus create a SQL injection.</p>
+<p>Ð?дапÑ?еÑ?Ñ? PDO из Zend Framework 1 не вÑ?полнÑ?Ñ?Ñ? Ñ?илÑ?Ñ?Ñ?аÑ?иÑ? null-байÑ?овÑ?Ñ? знаÑ?ений в
+Ñ?Ñ?веÑ?ждениÑ?Ñ? SQL. Ð?дапÑ?еÑ? PDO можеÑ? Ñ?аÑ?Ñ?маÑ?Ñ?иваÑ?Ñ? null-байÑ?Ñ? в запÑ?оÑ?е как
+Ñ?имволÑ? огÑ?аниÑ?ениÑ? Ñ?Ñ?Ñ?оки, Ñ?Ñ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? добавлÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код SQL за
+null-байÑ?ом, Ñ?Ñ?о пÑ?иводиÑ? к SQL-инÑ?екÑ?ии.</p>
 
- -<p>For Debian 6 Squeeze, this issue has been fixed in zendframework
- -version 1.10.6-1squeeze6.</p>
+<p>Ð? Debian 6 Squeeze Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в zendframework
+веÑ?Ñ?ии 1.10.6-1squeeze6.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=4Hv1
-----END PGP SIGNATURE-----


Reply to: