[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-2{56,75,60}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-256.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-256.wml	2016-04-26 21:54:45.650092796 +0500
@@ -1,19 +1,20 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Jakub Wilk found a vulnerability in the Type 1 font manipulation
- -programs, t1utils:</p>
+<p>ЯкÑ?б Ð?илк обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в пÑ?огÑ?аммаÑ? Ñ?абоÑ?Ñ? Ñ?о Ñ?Ñ?иÑ?Ñ?ами Type 1,
+t1utils:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3905";>CVE-2015-3905</a>
 
- -    <p>Buffer overflow in the set_cs_start function in t1disasm.c in t1utils
- -    before 1.39 allows remote attackers to cause a denial of service (crash)
- -    and possibly execute arbitrary code via a crafted font file.</p></li>
+    <p>Ð?еÑ?еполнениÑ? бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии set_cs_start в t1disasm.c из t1utils
+    до веÑ?Ñ?ии 1.39 позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка)
+    и поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла Ñ?Ñ?иÑ?Ñ?ов.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in t1utils version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в t1utils веÑ?Ñ?ии
 1.36-1+deb6u1.</p>
 </define-tag>
 
- --- english/security/2015/dla-260.wml	2016-04-08 01:27:56.000000000 +0500
+++ russian/security/2015/dla-260.wml	2016-04-26 22:04:00.633551157 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability was found in WMM Action frame processing in a case where
- -hostapd is used to implement AP mode MLME/SME functionality (i.e., Host AP
- -driver of a mac80211-based driver on Linux).</p>
+<p>Ð? коде обÑ?абоÑ?ки WMM Action в Ñ?лÑ?Ñ?ае иÑ?полÑ?зованиÑ? hostapd длÑ? Ñ?еализаÑ?ии Ñ?Ñ?нкÑ?ионалÑ?ноÑ?Ñ?и MLME/SME
+Ñ?ежима Ñ?оÑ?ки доÑ?Ñ?Ñ?па (напÑ?., в Ñ?лÑ?Ñ?ае дÑ?айвеÑ?а Host AP длÑ? дÑ?айвеÑ?а на оÑ?нове mac80211 на Linux) бÑ?ла
+обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?.</p>
 
- -<p>This vulnerability can be used to perform denial of service attacks by
- -an attacker that is within radio range of the AP that uses hostapd for
- -MLME/SME operations.</p>
+<p>ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленником, наÑ?одÑ?Ñ?имÑ?Ñ? в пÑ?еделаÑ? доÑ?Ñ?Ñ?пноÑ?Ñ?и
+Ñ?адиоÑ?игнала Ñ?оÑ?ки доÑ?Ñ?Ñ?па, иÑ?полÑ?зÑ?Ñ?Ñ?ей hostapd длÑ? опеÑ?аÑ?ий MLME/SME,
+длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, this vulnerability has been fixed in version
- -1:0.6.10-2+squeeze2 of hostapd. We recommend that you upgrade your
- -hostapd package.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии
+1:0.6.10-2+squeeze2 пакеÑ?а hostapd. РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?
+hostapd.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-275.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-275.wml	2016-04-26 21:58:21.353783779 +0500
@@ -1,15 +1,16 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that the uri package in the Ruby standard library
- -uses regular expressions that may result in excessive backtracking.
- -Ruby applications that parse untrusted URIs using this library were
- -susceptible to denial-of-service attacks by passing crafted URIs.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пакеÑ? uri из Ñ?Ñ?андаÑ?Ñ?ной библиоÑ?еки Ruby
+иÑ?полÑ?зÑ?еÑ? Ñ?егÑ?лÑ?Ñ?нÑ?е вÑ?Ñ?ажениÑ?, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?езмеÑ?номÑ? пеÑ?ебоÑ?Ñ? Ñ? возвÑ?аÑ?ом.
+Ð?Ñ?иложениÑ? на Ruby, вÑ?полнÑ?Ñ?Ñ?ие гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? недовеÑ?еннÑ?Ñ? URI и иÑ?полÑ?зÑ?Ñ?Ñ?ие Ñ?Ñ?Ñ? библиоÑ?екÑ?,
+подвеÑ?женÑ? аÑ?акам, вÑ?зÑ?ваÑ?Ñ?им оÑ?каз в обÑ?лÑ?живании, пÑ?Ñ?Ñ?м пеÑ?едаÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? URI.</p>
 
- -<p>For the oldoldstable distribution (squeeze), this problem has been
- -fixed in version 1.9.2.0-2+deb6u6.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в веÑ?Ñ?ии 1.9.2.0-2+deb6u6.</p>
 
- -<p>The oldstable distribution (wheezy) and stable distribution (jessie)
- -were not affected by this problem as it was fixed before release.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й (wheezy) и Ñ?Ñ?абилÑ?нÑ?й (jessie) вÑ?пÑ?Ñ?ки
+не подвеÑ?женÑ? Ñ?Ñ?ой пÑ?облеме, поÑ?колÑ?кÑ? она бÑ?ла иÑ?пÑ?авлена до моменÑ?а вÑ?пÑ?Ñ?ка Ñ?казаннÑ?Ñ? веÑ?Ñ?ий.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=3oJn
-----END PGP SIGNATURE-----


Reply to: