[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-1{73,99,62}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-162.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-162.wml	2016-04-28 01:36:02.123087642 +0500
@@ -1,8 +1,9 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>ose Duart of the Google Security Team discovered a buffer overflow in
- -in e2fsprogs, a set of utilities for the ext2, ext3, and ext4 file
- -systems.  This issue can possibly lead to arbitrary code execution if
- -a malicious device is plugged in, the system is configured to
- -automatically mount it, and the mounting process chooses to run fsck
- -on the device's malicious filesystem.</p>
+<p>Ð?озе Ð?Ñ?аÑ?Ñ? из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в
+e2fsprogs, набоÑ?е Ñ?Ñ?илиÑ? длÑ? Ñ?айловÑ?Ñ? Ñ?иÑ?Ñ?ем ext2, ext3 и
+ext4.  ЭÑ?а пÑ?облема поÑ?енÑ?иалÑ?но можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае, еÑ?ли
+подклÑ?Ñ?ениÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?ва, Ñ?иÑ?Ñ?ема наÑ?Ñ?Ñ?оена
+на его авÑ?омаÑ?иÑ?еÑ?кое монÑ?иÑ?ование, а пÑ?оÑ?еÑ?Ñ? монÑ?иÑ?ованиÑ? Ñ?еÑ?аеÑ? запÑ?Ñ?Ñ?иÑ?Ñ? fsck
+длÑ? пÑ?овеÑ?ки Ñ?айловой Ñ?иÑ?Ñ?емÑ? Ñ?казанного Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?ва.</p>

 <ul>

 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1572";>CVE-2015-1572</a>

- -    <p>Incomplete fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-0247";>CVE-2015-0247</a>.</p></li>
+    <p>Ð?еполное иÑ?пÑ?авление <a href="https://security-tracker.debian.org/tracker/CVE-2015-0247";>CVE-2015-0247</a>.</p></li>

 </ul>

- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in e2fsprogs version 1.41.12-4+deb6u2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в e2fsprogs веÑ?Ñ?ии 1.41.12-4+deb6u2</p>
 </define-tag>

 # do not modify the following line
- --- english/security/2015/dla-173.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-173.wml	2016-04-28 01:29:56.594803615 +0500
@@ -1,20 +1,21 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 <p>MATTA-2015-002</p>
 
- -    <p>Florent Daigniere discovered that PuTTY did not enforce an
- -    acceptable range for the Diffie-Hellman server value, as required by
- -    RFC 4253, potentially allowing an eavesdroppable connection to be
- -    established in the event of a server weakness.</p>
+    <p>ФлоÑ?ен Ð?аигни обнаÑ?Ñ?жил, Ñ?Ñ?о PuTTY не Ñ?Ñ?Ñ?анавливаеÑ? пÑ?инÑ?диÑ?елÑ?но
+    допÑ?Ñ?Ñ?имÑ?й Ñ?Ñ?д Ñ?еÑ?веÑ?нÑ?Ñ? знаÑ?ений по пÑ?оÑ?околÑ? Ð?иÑ?Ñ?и-Хеллмана, как Ñ?о Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ? по
+    RFC 4253, Ñ?Ñ?о в Ñ?лÑ?Ñ?ае Ñ?лабого Ñ?еÑ?веÑ?а поÑ?енÑ?иалÑ?но позволÑ?еÑ? Ñ?оздаÑ?Ñ?
+    подÑ?лÑ?Ñ?иваемÑ?е Ñ?оединениÑ?.</p>
 
 <p>#779488,
 <a href="https://security-tracker.debian.org/tracker/CVE-2015-2157";>CVE-2015-2157</a></p>
 
- -    <p>Patrick Coleman discovered that PuTTY did not clear SSH-2 private
- -    key information from memory when loading and saving key files, which
- -    could result in disclosure of private key material.</p>
+    <p>Ð?аÑ?Ñ?ик Ð?оÑ?лман обнаÑ?Ñ?жил, Ñ?Ñ?о PuTTY не оÑ?иÑ?аеÑ? инÑ?оÑ?маÑ?иÑ? о закÑ?Ñ?Ñ?ом клÑ?Ñ?е
+    SSH-2 из памÑ?Ñ?и пÑ?и загÑ?Ñ?зке и Ñ?оÑ?Ñ?анении Ñ?айлов клÑ?Ñ?ей, Ñ?Ñ?о
+    можеÑ? пÑ?иводиÑ?Ñ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? закÑ?Ñ?Ñ?ого клÑ?Ñ?а.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in putty version 0.60+2010-02-20-1+squeeze3</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в putty веÑ?Ñ?ии 0.60+2010-02-20-1+squeeze3</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-199.wml	2016-04-07 03:47:55.000000000 +0500
+++ russian/security/2015/dla-199.wml	2016-04-28 01:33:02.571272687 +0500
@@ -1,20 +1,21 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Abhishek Arya discovered a buffer overflow in the MakeBigReq macro
- -provided by libx11, which could result in denial of service or the
- -execution of arbitrary code.</p>
+<p>Ð?бÑ?иÑ?ек Ð?Ñ?Ñ?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в макÑ?оÑ?е MakeBigReq,
+пÑ?едоÑ?Ñ?авлÑ?емом libx11, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>Several other xorg packages (e.g. libxrender) will be recompiled against
- -the fixed package after the release of this update. For detailed
- -information on the status of recompiled packages please refer to the
- -Debian Security Tracker at
+<p>Ð?еÑ?колÑ?ко дÑ?Ñ?гиÑ? пакеÑ?ов xorg (напÑ?., libxrender) поÑ?ле данного обновлениÑ?
+должнÑ? бÑ?Ñ?Ñ? Ñ?обÑ?анÑ? заново Ñ? иÑ?полÑ?зованием иÑ?пÑ?авленного пакеÑ?а. Ð?одÑ?обнÑ?Ñ?
+инÑ?оÑ?маÑ?иÑ? о Ñ?Ñ?аÑ?Ñ?Ñ?е Ñ?компилиÑ?ованнÑ?Ñ? заново пакеÑ?ов Ñ?м. в
+Ñ?лÑ?жбе оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и Debian по адÑ?еÑ?Ñ?
 <a href="https://security-tracker.debian.org/tracker/CVE-2013-7439";>CVE-2013-7439</a></p>
 
- -<p>For the oldstable distribution (squeeze), this problem has been fixed
- -in version 2:1.3.3-4+squeeze2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 2:1.3.3-4+squeeze2.</p>
 
- -<p>For the stable distribution (wheezy), this problem has been fixed in
- -version 2:1.5.0-1+deb7u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2:1.5.0-1+deb7u2.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=HuPK
-----END PGP SIGNATURE-----


Reply to: