[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{249,343}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-249.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-249.wml	2016-04-29 23:15:38.573964689 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability was discovered in the qemu virtualisation solution:</p>
+<p>Ð? qemu, Ñ?еÑ?ении длÑ? виÑ?Ñ?Ñ?ализаÑ?ии, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3456";>CVE-2015-3456</a>
 
- -    <p>Jason Geffner discovered a buffer overflow in the emulated floppy
- -    disk drive, resulting in the potential execution of arbitrary code.</p>
+    <p>Ð?жейÑ?он Ð?еÑ?Ñ?неÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?мÑ?лÑ?Ñ?ии пÑ?ивода гибкиÑ?
+    магниÑ?нÑ?Ñ? диÑ?ков, коÑ?оÑ?ое пÑ?иводиÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>Despite the end-of-life of qemu-kvm support in the old-oldstable
- -distribution (squeeze-lts), this problem has been fixed in version
- -0.12.5+dfsg-5+squeeze11 of the qemu-kvm source package due to its
- -severity (the so-called VENOM vulnerability).</p>
- -
- -<p>Further problems may still be present in the qemu-kvm package in the
- -old-oldstable distribution (squeeze-lts) and users who need to rely on
- -qemu-kvm are encouraged to upgrade to a newer version of Debian.</p>
+<p>Ð?еÑ?моÑ?Ñ?Ñ? на оконÑ?ание жизненного Ñ?икла qemu-kvm в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном
+вÑ?пÑ?Ñ?ке (squeeze-lts), даннаÑ? пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии
+0.12.5+dfsg-5squeeze11 пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом qemu в Ñ?вÑ?зи Ñ? Ñ?еÑ?Ñ?Ñ?зноÑ?Ñ?Ñ?Ñ? Ñ?Ñ?ой пÑ?облемÑ?
+(Ñ?ак назÑ?ваемÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? VENOM).</p>
+
+<p>Ð? пакеÑ?е qemu-kvm в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze-lts) могÑ?Ñ?
+пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?воваÑ?Ñ? и дÑ?Ñ?гие пÑ?облемÑ?, полÑ?зоваÑ?елÑ?м, иÑ?полÑ?зÑ?Ñ?Ñ?им
+qemu-kvm, наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? обновление до более Ñ?вежей веÑ?Ñ?ии Debian.</p>
 
- -<p>We recommend that you upgrade your qemu-kvm packages.</p></li>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? qemu-kvm.</p></li>
 
 </ul>
 </define-tag>
- --- english/security/2015/dla-343.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-343.wml	2016-04-29 23:30:03.825385510 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 <ul>
    <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7981";>CVE-2015-7981</a>
- -     <p>Added a safety check in png_set_tIME() (Bug report from Qixue Xiao).</p></li>
+     <p>Ð?обавлена пÑ?овеÑ?ка Ñ?елоÑ?Ñ?ноÑ?Ñ?и в png_set_tIME() (Ñ?ообÑ?ение об оÑ?ибке пÑ?иÑ?лал ЦиÑ?Ñ?Ñ? СÑ?о).</p></li>
    <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8126";>CVE-2015-8126</a>
- -     <p>Multiple buffer overflows in the (1) png_set_PLTE and
- -     (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x
- -     before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24,
- -     and 1.6.x before 1.6.19 allow remote attackers to cause a denial
- -     of service (application crash) or possibly have unspecified other
- -     impact via a small bit-depth value in an IHDR (aka image header)
- -     chunk in a PNG image.</p></li>
+     <p>Ð?ногоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? бÑ?Ñ?еÑ?ов в Ñ?Ñ?нкÑ?иÑ?Ñ? (1) png_set_PLTE и
+     (2) png_get_PLTE в libpng до веÑ?Ñ?ии 1.0.64, 1.1.x и 1.2.x
+     до веÑ?Ñ?ии 1.2.54, 1.3.x и 1.4.x до веÑ?Ñ?ии 1.4.17, 1.5.x до веÑ?Ñ?ии 1.5.24
+     и 1.6.x до веÑ?Ñ?ии 1.6.19 позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+     в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) или оказÑ?ваÑ?Ñ? какое-Ñ?о дÑ?Ñ?гое влиÑ?ние
+     на безопаÑ?ноÑ?Ñ?и Ñ? помоÑ?Ñ?Ñ? неболÑ?Ñ?ого знаÑ?ениÑ? биÑ?овой глÑ?бинÑ? в IHDR-поÑ?Ñ?ии (извеÑ?Ñ?ной как
+     заголовок изобÑ?ажениÑ?) в изобÑ?ажении в Ñ?оÑ?маÑ?е PNG.</p></li>
    <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3425";>CVE-2012-3425</a>
- -     <p>vulnerable code is not present here</p></li>
+     <p>УÑ?звимÑ?й код в веÑ?Ñ?ии в вÑ?пÑ?Ñ?ке Ñ? долгоÑ?Ñ?оÑ?ной поддеÑ?жкой оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?</p></li>
 </ul>
 </define-tag>
 
-----BEGIN PGP SIGNATURE-----
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=TUbZ
-----END PGP SIGNATURE-----


Reply to: