[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{344,281,197,286}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-197.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-197.wml	2016-04-26 13:16:16.597349648 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in libvncserver, a library to
- -implement VNC server functionality. These vulnerabilities might result in
- -the execution of arbitrary code or denial of service in both the client
- -and the server side.</p>
+<p>Ð? libvncserver, библиоÑ?еке, Ñ?еализÑ?Ñ?Ñ?ей Ñ?Ñ?нкÑ?ионалÑ?ноÑ?Ñ?Ñ? Ñ?еÑ?веÑ?а VNC, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. ЭÑ?и Ñ?Ñ?звимоÑ?Ñ?и могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода или оÑ?казÑ? в обÑ?лÑ?живании и на Ñ?Ñ?оÑ?оне клиенÑ?а,
+и на Ñ?Ñ?оÑ?оне Ñ?еÑ?веÑ?а.</p>
 
- -<p>For the oldstable distribution (squeeze), these problems have been fixed in
- -version 0.9.7-2+deb6u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.9.7-2+deb6u1.</p>
 
- -<p>This update has been prepared by Nguyen Cong.</p>
+<p>Ð?анное обновление бÑ?ло подгоÑ?овлено Ð?гÑ?еном Ð?онгом.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-281.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-281.wml	2016-04-26 13:14:34.149687690 +0500
@@ -1,10 +1,11 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- - <p>Multiple integer overflows in the XML_GetBuffer function in Expat
- - through 2.1.0, as used in Google Chrome before 44.0.2403.89 and
- - other products, allow remote attackers to cause a denial of service
- - (heap-based buffer overflow) or possibly have unspecified other
- - impact via crafted XML data, a related issue to <a href="https://security-tracker.debian.org/tracker/CVE-2015-2716";>CVE-2015-2716</a>.</p>
+ <p>Ð?ногоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии XML_GetBuffer в Expat
+ вплоÑ?Ñ? до веÑ?Ñ?ии 2.1.0, иÑ?полÑ?зÑ?емой в Google Chrome до веÑ?Ñ?ии 44.0.2403.89 и
+ дÑ?Ñ?гиÑ? пÑ?одÑ?кÑ?аÑ?, позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+ (пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и) или оказÑ?ваÑ?Ñ? дÑ?Ñ?гое влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ? Ñ?иÑ?Ñ?емÑ?
+ Ñ?еÑ?ез Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? даннÑ?е XML, Ñ?Ñ?о Ñ?вÑ?зано Ñ? <a href="https://security-tracker.debian.org/tracker/CVE-2015-2716";>CVE-2015-2716</a>.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-286.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-286.wml	2016-04-26 13:20:05.051378695 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Alex Rousskov discovered that Squid configured with cache_peer and
- -operating on explicit proxy traffic does not correctly handle CONNECT
- -method peer responses. In some configurations, it allows remote clients to
- -bypass security in an explicit gateway proxy.</p>
+<p>Ð?лекÑ? РÑ?Ñ?Ñ?ков обнаÑ?Ñ?жил, Ñ?Ñ?о Squid, иÑ?полÑ?зÑ?Ñ?Ñ?ий опÑ?иÑ? cache_peer и
+Ñ?абоÑ?аÑ?Ñ?иÑ? в каÑ?еÑ?Ñ?ве Ñ?вного пÑ?окÑ?и, непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? меÑ?од CONNECT
+в оÑ?веÑ?аÑ? одноÑ?анговÑ?Ñ? Ñ?злов. Ð?Ñ?и некоÑ?оÑ?Ñ?Ñ? наÑ?Ñ?Ñ?ойкаÑ? Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м клиенÑ?ам
+обÑ?одиÑ?Ñ? огÑ?аниÑ?ениÑ? безопаÑ?ноÑ?Ñ?и Ñ?вного пÑ?окÑ?и-Ñ?лÑ?за.</p>
 
- -<p>For Debian 6 Squeeze, this problem has been fixed in squid3 version
- -3.1.6-1.2+squeeze5. We recommend that you upgrade your squid3 packages.</p>
+<p>Ð? Debian 6 Squeeze Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в squid3 веÑ?Ñ?ии
+3.1.6-1.2+squeeze5. РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? squid3.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-344.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-344.wml	2016-04-26 13:12:08.325103203 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Google security engineer Ryan Sleevi found a vulnerability in the NetScape
- -Portable Runtime Library (NSPR). NSPR allocated memory without specific checks,
- -making it possible for remote attackers to cause a Denial of Service or execute
- -arbitrary code.</p>
+<p>Ð?нженеÑ? по безопаÑ?ноÑ?Ñ?и из Google Райан Сливи обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в NetScape
+Portable Runtime Library (NSPR). NSPR вÑ?делÑ?еÑ? памÑ?Ñ?Ñ? без какиÑ?-либо Ñ?пеÑ?иалÑ?нÑ?Ñ? пÑ?овеÑ?ок,
+Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании или вÑ?полнÑ?Ñ?Ñ?
+пÑ?оизволÑ?нÑ?й код.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, this issue have been fixed in nspr version
- -4.8.6-1+squeeze3. We recommend that you upgrade your nspr packages.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в nspr веÑ?Ñ?ии
+4.8.6-1+squeeze3. РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? nspr.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXHyS3AAoJEF7nbuICFtKl7TQQAKuZ3fioC6nr7LbAmsXYdcYM
zCArYUdInHxj6GZLgXBAB6WyPpp85fjySjy5GOS1PF0d2XRFoOulBDztraNL8/D7
lWt0+AN1AfR1j0v1C4J4ZgVxtTHnM2TOcc+XN3LsutPCA2I9bFitRhr3L76EPnCv
hfRHA6v8UaQXIHSvUq2q81u2MHLhOsXkT3oz6aYrcp1z23FWWbB1NRXKjWlDtoS4
3lP8sf65aTJNKsU+FCkBZnjPDuc2ckQRYsQm6RHErF5JmMCXGrqOTwWHA7H2qdpl
6EefMqO+ecuLZCCc6DNzJuAFFwt5kSyiWcqyI4++xgZsldONSvGPXnQDxuyU+wBv
UMbE+uaIhvWKHpp4a44mzK15hieSPuZ+nd5kuXEadEzsy+bn8FAnXeBvo0B63ZQ5
9CeK9KJbR1UBwDwtJzkonXWL6gZGHIZd71YSAK7nmmZ3X8y80UeY6rAb8RZv+ALv
TllJxElx9pxa+yaKM4/wp19a/eGJcG5lBGuIW4FNklIdk//aDlEk1EuTRoRW3ba5
zFDAIu0IGPC7OUcXrcmptlTnm4ak+SfMJR40r5GvDsde0D0YyuUux4twiMjX2SGt
j/OeHImFPXnergeGLrN3QMC2gCPviPD8IsLosutEoswOWhFC1AcOrLiNM885RJqa
js70VaaZ64XnRT8RIVo3
=uIJv
-----END PGP SIGNATURE-----


Reply to: