[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-2{77,83,23}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-223.wml	2016-04-07 03:47:55.000000000 +0500
+++ russian/security/2015/dla-223.wml	2016-04-27 14:09:57.324411695 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability has been discovered in nbd-server, the server for the
- -Linux Network Block Device.</p>
+<p>Ð? nbd-server, Ñ?еÑ?веÑ?е длÑ? Ñ?еÑ?евÑ?Ñ? блоÑ?нÑ?Ñ? Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?в Linux, бÑ?ла
+обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0847";>CVE-2015-0847</a>
 
- -    <p>Tuomas Räsänen discovered that unsafe signal handling is present in
- -    nbd-server. This vulnerability could be exploited by a remote client
- -    to cause a denial of service.</p></li>
+    <p>ТÑ?омаÑ? РÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил, Ñ?Ñ?о в nbd-server имееÑ?Ñ?Ñ? небезопаÑ?наÑ? обÑ?абоÑ?ка
+    Ñ?игналов. Ð?аннаÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?далÑ?ннÑ?м клиенÑ?ом
+    длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the oldoldstable distribution (squeeze), these problems have been
- -fixed in version 1:2.9.16-8+squeeze2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1:2.9.16-8+squeeze2.</p>
 
- -<p>For the oldstable, stable, and testing distributions, these problems
- -will be fixed soon.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном, Ñ?Ñ?абилÑ?ном и Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и пÑ?облемÑ?
+бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your nbd-server packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? nbd-server.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-277.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-277.wml	2016-04-27 14:04:11.738250152 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Thijs Alkemade discovered that the Jabber server may pass an invalid
- -UTF-8 string to libidn, the GNU library for Internationalized Domain
- -Names (IDNs).  In the case of the Jabber server, this results in
- -information disclosure, and it is likely that some other applications
- -using libidn have similar vulnerabilities.  This update changes libidn
- -to check for invalid strings rather than assuming that the application
- -has done so.</p>
+<p>ТийÑ? Ð?лкемад обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еÑ?веÑ? Jabber можеÑ? пеÑ?едаваÑ?Ñ? libidn, библиоÑ?еке
+GNU длÑ? поддеÑ?жки инÑ?еÑ?наÑ?ионализиÑ?ованнÑ?Ñ? доменнÑ?Ñ? имÑ?н (IDN), некоÑ?Ñ?екÑ?нÑ?Ñ?
+Ñ?Ñ?Ñ?окÑ? в кодиÑ?овке UTF-8.  Ð? Ñ?лÑ?Ñ?ае Ñ?еÑ?веÑ?а Jabber Ñ?Ñ?о пÑ?иводиÑ? к
+Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии, Ñ?коÑ?ее вÑ?его дÑ?Ñ?гие пÑ?иложениÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?ие libidn, имеÑ?Ñ?
+Ñ?е же Ñ?Ñ?звимоÑ?Ñ?и.  Ð?анное обновление изменÑ?еÑ? libidn Ñ?ак, Ñ?Ñ?обÑ?
+вÑ?полнÑ?лаÑ?Ñ? пÑ?овеÑ?ка длÑ? иÑ?клÑ?Ñ?ениÑ? некоÑ?Ñ?екÑ?нÑ?Ñ? Ñ?Ñ?Ñ?ок вмеÑ?Ñ?о Ñ?ого, Ñ?Ñ?обÑ?
+Ñ?Ñ?о делало Ñ?амо пÑ?иложение.</p>
 
- -<p>For the oldoldstable distribution (squeeze), this problem has been
- -fixed in version 1.15-2+deb6u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в веÑ?Ñ?ии 1.15-2+deb6u1.</p>
 
- -<p>For the oldstable distribution (wheezy) and stable distribution
- -(jessie), this problem will be fixed soon.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном (wheezy) и Ñ?Ñ?абилÑ?ном (jessie) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-283.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-283.wml	2016-04-27 14:07:35.117442311 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability has been found in the International Components
- -for Unicode (ICU) library:</p>
+<p>Ð? библиоÑ?еке междÑ?наÑ?однÑ?Ñ? компоненÑ?ов длÑ? Ñ?никода (ICU) бÑ?ла обнаÑ?Ñ?жена
+Ñ?Ñ?звимоÑ?Ñ?Ñ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4760";>CVE-2015-4760</a>
 
- -    <p>It was discovered that ICU Layout Engine was missing multiple
- -    boundary checks. These could lead to buffer overflows and memory
- -    corruption. A specially crafted file could cause an application
- -    using ICU to parse untrusted font files to crash and, possibly,
- -    execute arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о в движке вÑ?Ñ?Ñ?Ñ?ки ICU оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? многоÑ?иÑ?леннÑ?е
+    пÑ?овеÑ?ки гÑ?аниÑ? маÑ?Ñ?ивов. ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ?м бÑ?Ñ?еÑ?а и повÑ?еждениÑ? Ñ?одеÑ?жимого
+    памÑ?Ñ?и. СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл можеÑ? пÑ?иводиÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о пÑ?иложение,
+    иÑ?полÑ?зÑ?Ñ?Ñ?ее ICU длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а недовеÑ?еннÑ?Ñ? Ñ?айлов Ñ?Ñ?иÑ?Ñ?ов, аваÑ?ийное завеÑ?Ñ?иÑ?Ñ? Ñ?воÑ? Ñ?абоÑ?Ñ? или
+    поÑ?енÑ?иалÑ?но вÑ?полниÑ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 </ul>
 
- -<p>For the squeeze distribution, these issues have been fixed in version
- -4.4.1-8+squeeze4 of icu.</p>
+<p>Ð? вÑ?пÑ?Ñ?ке squeeze Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
+4.4.1-8+squeeze4 пакеÑ? icu.</p>
 
- -<p>We recommend to upgrade your icu packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icu.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=rGXd
-----END PGP SIGNATURE-----


Reply to: