[DONE] wml://security/2015/dla-{249,343}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-249.wml 2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-249.wml 2016-04-29 23:15:38.573964689 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>A vulnerability was discovered in the qemu virtualisation solution:</p>
+<p>Ð? qemu, Ñ?еÑ?ении длÑ? виÑ?Ñ?Ñ?ализаÑ?ии, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3456">CVE-2015-3456</a>
- - <p>Jason Geffner discovered a buffer overflow in the emulated floppy
- - disk drive, resulting in the potential execution of arbitrary code.</p>
+ <p>Ð?жейÑ?он Ð?еÑ?Ñ?неÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?мÑ?лÑ?Ñ?ии пÑ?ивода гибкиÑ?
+ магниÑ?нÑ?Ñ? диÑ?ков, коÑ?оÑ?ое пÑ?иводиÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
- -<p>Despite the end-of-life of qemu-kvm support in the old-oldstable
- -distribution (squeeze-lts), this problem has been fixed in version
- -0.12.5+dfsg-5+squeeze11 of the qemu-kvm source package due to its
- -severity (the so-called VENOM vulnerability).</p>
- -
- -<p>Further problems may still be present in the qemu-kvm package in the
- -old-oldstable distribution (squeeze-lts) and users who need to rely on
- -qemu-kvm are encouraged to upgrade to a newer version of Debian.</p>
+<p>Ð?еÑ?моÑ?Ñ?Ñ? на оконÑ?ание жизненного Ñ?икла qemu-kvm в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном
+вÑ?пÑ?Ñ?ке (squeeze-lts), даннаÑ? пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии
+0.12.5+dfsg-5squeeze11 пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом qemu в Ñ?вÑ?зи Ñ? Ñ?еÑ?Ñ?Ñ?зноÑ?Ñ?Ñ?Ñ? Ñ?Ñ?ой пÑ?облемÑ?
+(Ñ?ак назÑ?ваемÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? VENOM).</p>
+
+<p>Ð? пакеÑ?е qemu-kvm в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze-lts) могÑ?Ñ?
+пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?воваÑ?Ñ? и дÑ?Ñ?гие пÑ?облемÑ?, полÑ?зоваÑ?елÑ?м, иÑ?полÑ?зÑ?Ñ?Ñ?им
+qemu-kvm, наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? обновление до более Ñ?вежей веÑ?Ñ?ии Debian.</p>
- -<p>We recommend that you upgrade your qemu-kvm packages.</p></li>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? qemu-kvm.</p></li>
</ul>
</define-tag>
- --- english/security/2015/dla-343.wml 2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-343.wml 2016-04-29 23:30:03.825385510 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7981">CVE-2015-7981</a>
- - <p>Added a safety check in png_set_tIME() (Bug report from Qixue Xiao).</p></li>
+ <p>Ð?обавлена пÑ?овеÑ?ка Ñ?елоÑ?Ñ?ноÑ?Ñ?и в png_set_tIME() (Ñ?ообÑ?ение об оÑ?ибке пÑ?иÑ?лал ЦиÑ?Ñ?Ñ? СÑ?о).</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8126">CVE-2015-8126</a>
- - <p>Multiple buffer overflows in the (1) png_set_PLTE and
- - (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x
- - before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24,
- - and 1.6.x before 1.6.19 allow remote attackers to cause a denial
- - of service (application crash) or possibly have unspecified other
- - impact via a small bit-depth value in an IHDR (aka image header)
- - chunk in a PNG image.</p></li>
+ <p>Ð?ногоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? бÑ?Ñ?еÑ?ов в Ñ?Ñ?нкÑ?иÑ?Ñ? (1) png_set_PLTE и
+ (2) png_get_PLTE в libpng до веÑ?Ñ?ии 1.0.64, 1.1.x и 1.2.x
+ до веÑ?Ñ?ии 1.2.54, 1.3.x и 1.4.x до веÑ?Ñ?ии 1.4.17, 1.5.x до веÑ?Ñ?ии 1.5.24
+ и 1.6.x до веÑ?Ñ?ии 1.6.19 позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+ в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) или оказÑ?ваÑ?Ñ? какое-Ñ?о дÑ?Ñ?гое влиÑ?ние
+ на безопаÑ?ноÑ?Ñ?и Ñ? помоÑ?Ñ?Ñ? неболÑ?Ñ?ого знаÑ?ениÑ? биÑ?овой глÑ?бинÑ? в IHDR-поÑ?Ñ?ии (извеÑ?Ñ?ной как
+ заголовок изобÑ?ажениÑ?) в изобÑ?ажении в Ñ?оÑ?маÑ?е PNG.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3425">CVE-2012-3425</a>
- - <p>vulnerable code is not present here</p></li>
+ <p>УÑ?звимÑ?й код в веÑ?Ñ?ии в вÑ?пÑ?Ñ?ке Ñ? долгоÑ?Ñ?оÑ?ной поддеÑ?жкой оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?</p></li>
</ul>
</define-tag>
-----BEGIN PGP SIGNATURE-----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=TUbZ
-----END PGP SIGNATURE-----
Reply to: