[DONE] wml://security/2015/dla-{164,204,231}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-164.wml 2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-164.wml 2016-04-26 14:20:33.359832398 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Jakub Wilk discovered that unace, an utility to extract, test and view
- -.ace archives, contained an integer overflow leading to a buffer
- -overflow. If a user or automated system were tricked into processing a
- -specially crafted ace archive, an attacker could cause a denial of
- -service (application crash) or, possibly, execute arbitrary code.</p>
+<p>ЯкÑ?б Ð?илк обнаÑ?Ñ?жил, Ñ?Ñ?о unace, Ñ?Ñ?илиÑ?а длÑ? Ñ?аÑ?паковки, Ñ?еÑ?Ñ?иÑ?ованиÑ? и пÑ?оÑ?моÑ?Ñ?а
+аÑ?Ñ?ивов .ace, Ñ?одеÑ?жиÑ? пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и, пÑ?иводÑ?Ñ?ее к пеÑ?еполнениÑ?
+бÑ?Ñ?еÑ?а. Ð?Ñ?ли полÑ?зоваÑ?елÑ? или авÑ?омаÑ?изиÑ?ованнаÑ? Ñ?иÑ?Ñ?ема запÑ?Ñ?каÑ?Ñ? обÑ?абоÑ?кÑ?
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного аÑ?Ñ?ива ace, злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+(аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) или поÑ?енÑ?иалÑ?но вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in unace version 1.2b-7+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в unace веÑ?Ñ?ии 1.2b-7+deb6u1</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-204.wml 2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-204.wml 2016-04-26 14:23:25.735293170 +0500
@@ -1,15 +1,16 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>This update fixes the following issue in the file package:</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?Ñ?Ñ? пÑ?облемÑ? в пакеÑ?е file:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9653">CVE-2014-9653</a>
- - <p>readelf.c does not consider that pread calls sometimes read only
- - a subset of the available data, which allows remote attackers to
- - cause a denial of service (uninitialized memory access) or
- - possibly have unspecified other impact via a crafted ELF file.</p></li>
+ <p>readelf.c не опÑ?еделÑ?еÑ?, Ñ?Ñ?о pread иногда вÑ?зÑ?ваеÑ? подмножеÑ?Ñ?во доÑ?Ñ?Ñ?пнÑ?Ñ?
+ даннÑ?Ñ? в Ñ?ежиме Ñ?олÑ?ко длÑ? Ñ?Ñ?ениÑ?, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+ вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (обÑ?аÑ?ение к неиниÑ?иализиÑ?ованной облаÑ?Ñ?и памÑ?Ñ?и) или
+ оказÑ?ваÑ?Ñ? како-либо дÑ?Ñ?гое влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ? Ñ?иÑ?Ñ?емÑ? Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла ELF.</p></li>
</ul>
</define-tag>
- --- english/security/2015/dla-231.wml 2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-231.wml 2016-04-26 14:26:01.920939964 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Ivan Fratric of the Google Security Team has found a buffer overflow in
- -the C implementation of the apply_delta() function, used when accessing
- -Git objects in pack files. An attacker could take advantage of this flaw
- -to cause the execution of arbitrary code with the privileges of the user
- -running a Git server or client based on Dulwich.</p>
+<p>Ð?йван ФÑ?аÑ?Ñ?ик из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в
+Ñ?еализаÑ?ии на C Ñ?Ñ?нкÑ?ии apply_delta(), иÑ?полÑ?зÑ?емой пÑ?и обÑ?аÑ?ении
+к обÑ?екÑ?ам Git в Ñ?пакованнÑ?Ñ? Ñ?айлаÑ?. Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?
+длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода Ñ? пÑ?авами полÑ?зоваÑ?елÑ?,
+запÑ?Ñ?Ñ?ивÑ?его Ñ?еÑ?веÑ? или клиенÑ? Git на оÑ?нове Dulwich.</p>
- -<p>For the oldoldstable distribution (squeeze), this problem has been
- -fixed in version 0.6.1-1+deb6u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в веÑ?Ñ?ии 0.6.1-1+deb6u1.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXHzQvAAoJEF7nbuICFtKlJPsP/jK1eT9EIdvp4aON3MDKZjtl
iGev0LvupKhgT0PD569s4iTahDtnGsdPLfec2w7r6HYSGBHUpikcrm/arF2B/18I
XeZl8XxK0F50nKFJ4ntwc6z223arg931B4us+ev5fwU48bwpKfSwEGgksjlA2rJS
35yE2sstiFqsNZE/vZmHk5NGiKqeCifcDc2IIzBU/cthNIp3lB+6P3c+raCjLaU8
SkGxkie4lgWv+b2gtXP37blhjW+DL+fX3c9urAO2LGhj7IS2fON7XKSCyPwvH+ZP
QlVPVyL1JG8g9kB+sRubXvPdNcewcBKSMuXNsP9LGlfuDsaU+XuyuIdvQnrtTas3
1gulANcIqC2WWS9QDLDuAUcHqDJKIoyp+QVPdrY8eOnCUs9BjtM4dMe2QFok9grC
MPBu9yf8EjQuZAUxjtT5V1ZrXXtvcawbEguHMSFbZ/DdPcyi5Hm2Idp1E9MIviGZ
S8PQiFCpaBxZ7MFTEYwLchmI/EWqFVLn99j/ID3gOBeg8u5yRIzVmRbXXMVsmKmU
8Ej2vJNqkzZEC3c+YcaKWd/fS+dZQLtspoac35BVL8nSIFsDvXfwFn4BwTaV2oJ1
6/Vxc9zXlspBrCHeArcppYtF1Gx90WZbC1HW5CRVG3XzW6Or1SbR+vySI2hnnXik
ZGDrH2t6MI0SGS6mFLlx
=7pOr
-----END PGP SIGNATURE-----
Reply to:
- Prev by Date:
[DONE] wml://security/2015/dla-{303,347,322,186}.wml
- Next by Date:
[DONE] wml://security/2015/dla-{170,306,184}.wml
- Previous by thread:
[DONE] wml://security/2015/dla-{303,347,322,186}.wml
- Next by thread:
Re: [DONE] wml://security/2015/dla-{164,204,231}.wml
- Index(es):