[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{346,182,370,141}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-141.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-141.wml	2016-04-26 14:06:08.446764356 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability has been fixed in the libksba X.509 and CMS support library:</p>
+<p>Ð? libksba, библиоÑ?еке поддеÑ?жки X.509 и CMS, бÑ?ла обнаÑ?Ñ?жена и иÑ?пÑ?авлена Ñ?Ñ?звимоÑ?Ñ?Ñ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9087";>CVE-2014-9087</a>
 
- -    <p>Fix buffer overflow in ksba_oid_to_str reported by Hanno Böck.</p></li>
+    <p>Ð?Ñ?пÑ?авлено пеÑ?еполнение бÑ?Ñ?еÑ?а в ksba_oid_to_str, о коÑ?оÑ?ом Ñ?ообÑ?ил Ханно Ð?Ñ?к.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in libksba version 1.0.7-2+deb6u1</p>
- -<p>We recommend that you upgrade your libksba packages.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в libksba веÑ?Ñ?ии 1.0.7-2+deb6u1</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libksba.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-182.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-182.wml	2016-04-26 13:37:37.810116275 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Nicolas Gregoire and Kevin Schaller discovered that Batik, a toolkit
- -for processing SVG images, would load XML external entities by
- -default. If a user or automated system were tricked into opening a
- -specially crafted SVG file, an attacker could possibly obtain access
- -to arbitrary files or cause resource consumption.</p>
+<p>Ð?иколаÑ? Ð?Ñ?егоÑ?и и Ð?евин ШаллеÑ? обнаÑ?Ñ?жили, Ñ?Ñ?о Batik, набоÑ? инÑ?Ñ?Ñ?Ñ?менÑ?ов
+длÑ? обÑ?абоÑ?ки изобÑ?ажений в Ñ?оÑ?маÑ?е SVG, по Ñ?молÑ?аниÑ? загÑ?Ñ?жаеÑ? внеÑ?ние
+Ñ?Ñ?Ñ?ноÑ?Ñ?и XML. Ð?Ñ?ли полÑ?зоваÑ?елÑ? или авÑ?омаÑ?изиÑ?ованнаÑ? Ñ?иÑ?Ñ?ема оÑ?кÑ?Ñ?ваÑ?Ñ?
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл SVG, злоÑ?мÑ?Ñ?ленник можеÑ? полÑ?Ñ?иÑ?Ñ? доÑ?Ñ?Ñ?п
+к пÑ?оизволÑ?нÑ?м Ñ?айлам или вÑ?зваÑ?Ñ? Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in batik version 1.7-6+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в batik веÑ?Ñ?ии 1.7-6+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-346.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-346.wml	2016-04-26 13:33:27.013759708 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in OpenJDK, an implementation of
- -the Oracle Java platform. These vulnerabilities relate to execution of
- -arbitrary code, breakouts of the Java sandbox, information disclosure and
- -denial of service.</p>
+<p>Ð? OpenJDK, Ñ?еализаÑ?ии плаÑ?Ñ?оÑ?мÑ? Oracle Java, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. ЭÑ?и Ñ?Ñ?звимоÑ?Ñ?и Ñ?вÑ?занÑ? Ñ? вÑ?полнением
+пÑ?оизволÑ?ного кода, вÑ?Ñ?одами за пÑ?еделÑ? пеÑ?оÑ?ниÑ?Ñ? Java, Ñ?аÑ?кÑ?Ñ?Ñ?ием инÑ?оÑ?маÑ?ии и
+оÑ?казами в обÑ?лÑ?живании.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in openjdk-6
- -version 6b37-1.13.9-1~deb6u1.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в openjdk-6
+веÑ?Ñ?ии 6b37-1.13.9-1~deb6u1.</p>
 
- -<p>We recommend you to upgrade your openjdk-6 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openjdk-6.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-370.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-370.wml	2016-04-26 14:04:36.464557092 +0500
@@ -1,11 +1,12 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that the BIND DNS server does not properly handle the
- -parsing of incoming responses, allowing some records with an incorrect
- -class to be accepted by BIND instead of being rejected as malformed.
- -This can trigger a REQUIRE assertion failure when those records are
- -subsequently cached. A remote attacker can exploit this flaw to cause a
- -denial of service against servers performing recursive queries.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о DNS-Ñ?еÑ?веÑ? BIND непÑ?авилÑ?но вÑ?полнÑ?еÑ? гÑ?аммаÑ?иÑ?еÑ?кий
+Ñ?азбоÑ? вÑ?одÑ?Ñ?иÑ? Ñ?ообÑ?ений, из-за Ñ?его BIND пÑ?инимаеÑ? некоÑ?оÑ?Ñ?Ñ? запиÑ?и Ñ?
+некоÑ?Ñ?екÑ?нÑ?м клаÑ?Ñ?ом вмеÑ?Ñ?о Ñ?ого, Ñ?Ñ?обÑ? оÑ?клониÑ?Ñ? из как непÑ?авилÑ?нÑ?е.
+ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к оÑ?ибке Ñ?Ñ?веÑ?ждениÑ? REQUIRE в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?акие запиÑ?и
+поÑ?ледоваÑ?елÑ?но кеÑ?иÑ?Ñ?Ñ?Ñ?Ñ?Ñ?. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ?
+вÑ?зова оÑ?каза в обÑ?лÑ?живании на Ñ?еÑ?веÑ?аÑ?, вÑ?полнÑ?Ñ?Ñ?иÑ? Ñ?екÑ?Ñ?Ñ?ивнÑ?е запÑ?оÑ?Ñ?.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=2gnZ
-----END PGP SIGNATURE-----


Reply to: