[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{362,297,220}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-220.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-220.wml	2016-04-28 01:51:44.918384978 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Jann Horn discovered that the source package integrity verification in
- -dpkg-source can be bypassed via a specially crafted Debian source
- -control file (.dsc). Note that this flaw only affects extraction of
- -local Debian source packages via dpkg-source but not the installation of
- -packages from the Debian archive.</p>
+<p>Янн ХоÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?овеÑ?ка Ñ?елоÑ?Ñ?ноÑ?Ñ?и пакеÑ?ов Ñ? иÑ?Ñ?однÑ?м кодом в
+dpkg-source можно обойÑ?и Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?пÑ?авлÑ?Ñ?Ñ?иÑ? Ñ?айлов
+Debian (.dsc). Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о даннаÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Ñ?аÑ?паковки
+локалÑ?нÑ?Ñ? пакеÑ?ов Debian Ñ? иÑ?Ñ?однÑ?м кодом Ñ? помоÑ?Ñ?Ñ? dpkg-source, но не Ñ?Ñ?Ñ?ановки
+пакеÑ?ов из аÑ?Ñ?ива Debian.</p>
 
- -<p>For the oldoldstable distribution (squeeze), this problem has been
- -fixed in version 1.15.12.  This also fixes a similar bug discovered
- -by Ansgar Burchardt and a bug in the same area discovered by Roger
- -Leigh.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в веÑ?Ñ?ии 1.15.12.  Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?ожÑ?Ñ? оÑ?ибкÑ?, обнаÑ?Ñ?женнÑ?Ñ?
+Ð?нÑ?гаÑ?ом Ð?Ñ?Ñ?Ñ?аÑ?дÑ?ом, и оÑ?ибкÑ? в Ñ?ой же облаÑ?Ñ?и, обнаÑ?Ñ?женнÑ?Ñ? РоджеÑ?ом
+Ð?игом.</p>
 
- -<p>For the oldstable distribution (wheezy), this problem was fixed in
- -version 1.16.16.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.16.16.</p>
 
- -<p>The stable distribution (jessie) was not affected by this problem as
- -it was fixed before release.</p>
+<p>СÑ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (jessie) не подвеÑ?жен данной пÑ?облеме, поÑ?колÑ?кÑ?
+она бÑ?ла иÑ?пÑ?авлена до вÑ?Ñ?ода Ñ?Ñ?ого вÑ?пÑ?Ñ?ка.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-297.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-297.wml	2016-04-28 01:47:39.879657951 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- - <p>Wesnoth implements a text preprocessing language that is used in
- - conjunction with its own game scripting language. It also has a
- - built-in Lua interpreter and API.
- - Both the Lua API and the preprocessor make use of the same function
- - (filesystem::get_wml_location()) to resolve file paths so that only
- - content from the user's data directory can be read.</p>
+ <p>Wesnoth Ñ?еализÑ?еÑ? Ñ?зÑ?к пÑ?едваÑ?иÑ?елÑ?ной обÑ?абоÑ?ки Ñ?екÑ?Ñ?а, иÑ?полÑ?зÑ?Ñ?Ñ?ийÑ?Ñ? вмеÑ?Ñ?е
+ Ñ? Ñ?обÑ?Ñ?веннÑ?м Ñ?зÑ?ком игÑ?овÑ?Ñ? Ñ?Ñ?енаÑ?иев. Также в игÑ?е имееÑ?Ñ?Ñ?
+ вÑ?Ñ?Ñ?оеннÑ?й инÑ?еÑ?пÑ?еÑ?аÑ?оÑ? Lua и Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ий API.
+ Ð? Lua API, и пÑ?епÑ?оÑ?еÑ?Ñ?оÑ? иÑ?полÑ?зÑ?Ñ?Ñ? однÑ? и Ñ?Ñ? же Ñ?Ñ?нкÑ?иÑ?
+ (filesystem::get_wml_location()) длÑ? Ñ?азÑ?еÑ?ениÑ? пÑ?Ñ?ей к Ñ?айлам, Ñ?Ñ?обÑ? Ñ?Ñ?иÑ?Ñ?валоÑ?Ñ?
+ Ñ?олÑ?ко Ñ?одеÑ?жимое полÑ?зоваÑ?елÑ?Ñ?кого каÑ?алога Ñ? даннÑ?ми.</p>
 
- - <p>However, the function did not explicitly disallow files with the .pbl
- - extension. The contents of these files could thus be stored in saved
- - game files or even transmitted directly to other users in a networked
- - game. Among the information that's compromised is a user-defined
- - passphrase used to authenticate uploads to the game's content server.</p>
+ <p>Тем не менее, Ñ?Ñ?а Ñ?Ñ?нкÑ?иÑ? Ñ?внÑ?м обÑ?азом не запÑ?еÑ?аеÑ? Ñ?айлÑ? Ñ? Ñ?аÑ?Ñ?иÑ?ением
+ .pbl. Таким обÑ?азом, Ñ?одеÑ?жимое Ñ?Ñ?иÑ? Ñ?айлов можеÑ? Ñ?оÑ?Ñ?анÑ?Ñ?Ñ?Ñ?Ñ? в Ñ?айлаÑ?
+ Ñ?оÑ?Ñ?анений или даже пеÑ?едано напÑ?Ñ?мÑ?Ñ? дÑ?Ñ?гим полÑ?зоваÑ?елÑ?м в Ñ?оде Ñ?еÑ?евой
+ игÑ?Ñ?. Ð?нÑ?оÑ?маÑ?иÑ?, Ñ?одеÑ?жаÑ?аÑ?Ñ?Ñ? в Ñ?Ñ?иÑ? Ñ?айлаÑ?, вклÑ?Ñ?аеÑ? в Ñ?ебÑ? полÑ?зоваÑ?елÑ?Ñ?кий
+ паÑ?олÑ?, иÑ?полÑ?зÑ?емÑ?й длÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии загÑ?Ñ?зок на Ñ?еÑ?веÑ? даннÑ?Ñ? игÑ?Ñ?.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-362.wml	2016-04-08 01:27:56.000000000 +0500
+++ russian/security/2015/dla-362.wml	2016-04-28 01:42:30.946885877 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Guido Vranken discovered several memory-related vulnerabilities
- -while fuzzing DHCP messages sent to dhcpcd.</p>
+<p>Ð?Ñ?идо Ð?Ñ?акен обнаÑ?Ñ?жил неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, Ñ?вÑ?заннÑ?Ñ? Ñ? Ñ?абоÑ?ой Ñ? памÑ?Ñ?Ñ?Ñ?,
+во вÑ?емÑ? неÑ?Ñ?Ñ?кого Ñ?еÑ?Ñ?иÑ?ованиÑ? пÑ?Ñ?Ñ?м оÑ?пÑ?авки DHCP-Ñ?ообÑ?ений Ñ?еÑ?веÑ?Ñ? dhcpcd.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, those issues have been fixed in version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1:3.2.3-5+squeeze2.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6698";>CVE-2012-6698</a>
 
- -    <p>Out-of-bounds write with specially crafted DHCP messages.</p></li>
+    <p>Ð?апиÑ?Ñ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?ообÑ?ений DHCP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6699";>CVE-2012-6699</a>
 
- -    <p>Out-of-bounds read with specially crafted DHCP messages.</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?ообÑ?ений DHCP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6700";>CVE-2012-6700</a>
 
- -    <p>Use after free with specially crafted DHCP messages.</p></li>
+    <p>Ð?Ñ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?ообÑ?ений DHCP.</p></li>
 
 </ul>
 </define-tag>
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXISZlAAoJEF7nbuICFtKliMEP/AtmXjdJNpVtP0Ex/t0BbNkZ
tSKUAsHBnlbAJvnGh8BzoyXQ3VxTbpoubCECYFSa3Xz/jKGFvC3tik9u7YYdEG6l
OTI/fsuzy523xzLY3gl9nszyuyn+q3FmC98WPX/N7q8akI8cqnX9Uj49C24EeqIK
aDwSPEAJay26Z/FE+wcfA+7bcup41nzUO2e/BjD74dBBdxKMq/rBQnOUqevgBNSR
HRwZO6C5/qi7dOwBg+VhS9ld6UITsN2X5ye65UUogxwOmX+l1I6nciPj31UDSloS
poGReqqpPbHQbT75bS+NelgVmOtDss6x9wnL2yFi1VdPKxQ1YgL5uT84WsVHPAgC
4U4Bm+iqBreR89jDEUSvDgAWWZ5rz2jYsVA0oO7M1mqit/2QnSgfHT86pilPtaEJ
H8VM3ZKco2Nl+ZpXrPKb+Kbv/MJCAQG/O7xGBkvkwNM/+uoWY2xAcMegnjIlYenI
/iqaTZWMXL8oDqor1DavvgFplSyNTLRvfOALayiX6bAN4VbUDMKBT61D+SJfNF4e
50TaKe4s+SGvXMvJXkQvhih8yiIB0m5PRnFXQ32TqZDuQAAoD4eoklSZ3wJJFX1s
+vOMCpNXMUja5mVYN8jD6bme/qsKASRtdwAchu5x9Kel/8+5xqV8tKytJwrORmjq
Fx6DuNdGUkWmroobBtxM
=3cCU
-----END PGP SIGNATURE-----


Reply to: