[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{138,257,279}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-138.wml	2016-04-09 01:32:23.000000000 +0500
+++ russian/security/2015/dla-138.wml	2016-04-27 13:13:36.209105964 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>An off-by-one flaw, leading to a heap-based buffer overflow
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8157";>CVE-2014-8157</a>), and an unrestricted stack memory use flaw
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8158";>CVE-2014-8158</a>) were found in JasPer, a library for manipulating
- -JPEG-2000 files. A specially crafted file could cause an application
- -using JasPer to crash or, possibly, execute arbitrary code.</p>
+<p>Ð? JasPer, библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? Ñ?айлами в Ñ?оÑ?маÑ?е JPEG-2000, бÑ?ла обнаÑ?Ñ?жена оÑ?ибка на единиÑ?Ñ?, пÑ?иводÑ?Ñ?аÑ? к пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и
+(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8157";>CVE-2014-8157</a>), а Ñ?акже обнаÑ?Ñ?жено неогÑ?аниÑ?енное
+иÑ?полÑ?зование Ñ?Ñ?ековой памÑ?Ñ?и
+(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8158";>CVE-2014-8158</a>). СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл можеÑ? вÑ?зваÑ?Ñ?
+аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? пÑ?иложениÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?его JasPer, или поÑ?енÑ?иалÑ?ное вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in jasper version 1.900.1-7+squeeze4</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в jasper веÑ?Ñ?ии 1.900.1-7+squeeze4</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-257.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-257.wml	2016-04-27 13:15:39.497915098 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>libwmf is vulnerable to two denial of service due to invalid read
- -operations when processing specially crafted WMF files.</p>
+<p>libwmf Ñ?Ñ?звима к двÑ?м оÑ?казам в обÑ?лÑ?живании из-за непÑ?авилÑ?нÑ?Ñ? опеÑ?аÑ?ий
+Ñ?Ñ?ениÑ? в Ñ?оде обÑ?абоÑ?ки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов в Ñ?оÑ?маÑ?е WMF.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4695";>CVE-2015-4695</a>
 
- -    <p>Heap buffer overread in libwmf</p></li>
+    <p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в libwmf</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4696";>CVE-2015-4696</a>
 
- -    <p>Read after free() in wmf2gd/wmf2eps</p></li>
+    <p>ЧÑ?ение поÑ?ле вÑ?полнениÑ? Ñ?Ñ?нкÑ?ии free() в wmf2gd/wmf2eps</p></li>
 
 </ul>
 
- -<p>For the squeeze distribution, those issues have been fixed in libwmf
- -0.2.8.4-6.2+deb6u2. We recommend that you upgrade your libwmf packages.</p>
+<p>Ð? вÑ?пÑ?Ñ?ке squeeze Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в libwmf веÑ?Ñ?ии
+0.2.8.4-6.2+deb6u2. РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libwmf.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-279.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-279.wml	2016-04-27 13:18:10.363800153 +0500
@@ -1,23 +1,24 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability was discovered in python-tornado, a Python scalable, nonblocking web server.</p>
+<p>Ð? python-tornado, маÑ?Ñ?Ñ?абиÑ?Ñ?емом неблокиÑ?Ñ?Ñ?Ñ?ем веб-Ñ?еÑ?веÑ?е на Ñ?зÑ?ке Python, бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9720";>CVE-2014-9720</a>
 
- -<p>CSRF cookie allows side-channel attack against TLS (BREACH)</p>
+<p>CSRF-кÑ?ки позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? аÑ?акÑ? Ñ?еÑ?ез Ñ?Ñ?оÑ?онний канал на TLS (BREACH)</p>
 
- -<p>Security Fix</p>
+<p>Ð?Ñ?пÑ?авление безопаÑ?ноÑ?Ñ?и</p>
 
- -<p>The XSRF token is now encoded with a random mask on each request. This makes
- -it safe to include in compressed pages without being vulnerable to the BREACH
- -attack.</p></li>
+<p>Токен XSRF Ñ?епеÑ?Ñ? кодиÑ?Ñ?еÑ?Ñ?Ñ? Ñ? помоÑ?Ñ?Ñ? Ñ?лÑ?Ñ?айной маÑ?ки пÑ?и каждом запÑ?оÑ?е. ЭÑ?о позволÑ?еÑ?
+безопаÑ?но вклÑ?Ñ?аÑ?Ñ? его в Ñ?жаÑ?Ñ?е Ñ?Ñ?Ñ?аниÑ?Ñ? и делаеÑ? неÑ?Ñ?звимÑ?м к аÑ?аке по пÑ?инÑ?ипÑ?
+BREACH.</p></li>
 
 </ul>
 
- -<p>For the oldoldstable distribution (squeeze), this problem has been fixed in
- -version 1.0.1-1+deb6u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.1-1+deb6u1.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=3yhD
-----END PGP SIGNATURE-----


Reply to: