[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-357{2,3,4}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3572.wml	2016-05-10 00:01:00.000000000 +0500
+++ russian/security/2016/dsa-3572.wml	2016-05-11 21:19:06.733030795 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Nitin Venkatesh discovered that websvn, a web viewer for Subversion
- -repositories, is susceptible to cross-site scripting attacks via
- -specially crafted file and directory names in repositories.</p>
+<p>Ð?иÑ?ин Ð?енкаÑ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о websvn, Ñ?лÑ?жба длÑ? пÑ?оÑ?моÑ?Ñ?а Ñ?епозиÑ?оÑ?иев Subversion
+в веб, возможно Ñ?Ñ?звима к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ? пÑ?и помоÑ?и
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? имÑ?н Ñ?айлов и каÑ?алогов в Ñ?епозиÑ?оÑ?иÑ?Ñ?.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 2.3.3-1.2+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.3.3-1.2+deb8u2.</p>
 
- -<p>We recommend that you upgrade your websvn packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? websvn.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3573.wml	2016-05-10 01:30:39.000000000 +0500
+++ russian/security/2016/dsa-3573.wml	2016-05-11 22:11:01.057014621 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in qemu, a fast processor
- -emulator.</p>
+<p>Ð? qemu, бÑ?Ñ?Ñ?Ñ?ом Ñ?мÑ?лÑ?Ñ?оÑ?е пÑ?оÑ?еÑ?Ñ?оÑ?а, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3710";>CVE-2016-3710</a>
 
- -    <p>Wei Xiao and Qinghao Tang of 360.cn Inc discovered an out-of-bounds
- -    read and write flaw in the QEMU VGA module. A privileged guest user
- -    could use this flaw to execute arbitrary code on the host with the
- -    privileges of the hosting QEMU process.</p></li>
+    <p>Ð?Ñ?й СÑ?о и ЦинÑ?ао Тан из 360.cn Inc обнаÑ?Ñ?жили Ñ?Ñ?ение и запиÑ?Ñ? за пÑ?еделами
+    вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в модÑ?ле QEMU длÑ? Ñ?мÑ?лÑ?Ñ?ии VGA. Ð?Ñ?ивилегиÑ?ованнÑ?й полÑ?зоваÑ?елÑ?
+    гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода на оÑ?новной Ñ?иÑ?Ñ?еме Ñ?
+    пÑ?авами пÑ?оÑ?еÑ?Ñ?а QEMU.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3712";>CVE-2016-3712</a>
 
- -    <p>Zuozhi Fzz of Alibaba Inc discovered potential integer overflow
- -    or out-of-bounds read access issues in the QEMU VGA module. A
- -    privileged guest user could use this flaw to mount a denial of
- -    service (QEMU process crash).</p></li>
+    <p>ЦзоÑ?жи Fzz из Alibaba Inc обнаÑ?Ñ?жил поÑ?енÑ?иалÑ?ное пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел
+    или Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в модÑ?ле QEMU длÑ? Ñ?мÑ?лÑ?Ñ?ии VGA.
+    Ð?Ñ?ивилегиÑ?ованнÑ?й полÑ?зоваÑ?елÑ? гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова
+    оÑ?каза в обÑ?лÑ?живании (аваÑ?ийное завеÑ?Ñ?ение пÑ?оÑ?еÑ?Ñ?а QEMU).</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1:2.1+dfsg-12+deb8u6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:2.1+dfsg-12+deb8u6.</p>
 
- -<p>We recommend that you upgrade your qemu packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? qemu.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3574.wml	2016-05-10 22:58:09.000000000 +0500
+++ russian/security/2016/dsa-3574.wml	2016-05-11 22:14:34.360607046 +0500
@@ -1,15 +1,16 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Rock Stevens, Andrew Ruef and Marcin <q>Icewall</q> Noga discovered a
- -heap-based buffer overflow vulnerability in the zip_read_mac_metadata
- -function in libarchive, a multi-format archive and compression library,
- -which may lead to the execution of arbitrary code if a user or automated
- -system is tricked into processing a specially crafted ZIP file.</p>
+<p>Рок СÑ?ивенÑ?, ЭндÑ?Ñ? РаÑ? и Ð?аÑ?Ñ?ин <q>Icewall</q> Ð?ога обнаÑ?Ñ?жили
+пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии zip_read_mac_metadata
+в libarchive, библиоÑ?еке, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ей возможноÑ?Ñ?и длÑ? Ñ?абоÑ?Ñ? Ñ?о Ñ?жаÑ?ием и
+Ñ?азлиÑ?нÑ?ми аÑ?Ñ?ивами, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ?
+или авÑ?омаÑ?изиÑ?ованнаÑ? Ñ?иÑ?Ñ?ема запÑ?Ñ?каÑ?Ñ? обÑ?абоÑ?кÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла ZIP.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 3.1.2-11+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.1.2-11+deb8u1.</p>
 
- -<p>We recommend that you upgrade your libarchive packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libarchive.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXM2h+AAoJEF7nbuICFtKl0twP/0o148zn5UvF2fs1bzTOTHtv
068QRJN4ZK+BzbJbl+TeJ5/aBJSW6IYJeCzi737Owbmw1MFR6kYjRWH4rMK8chPT
djG1wmEF9jGPOO7EfNjbLmiOm0S9+dRM2kN/ncprtCv1rPk75mjzLktsBDxNkZWJ
uFkLWwW5nweON1iFbO+H71oGLknDdOEHAmg2HEjhAJSbDbpqRGKl1rGsVhSvu0BC
yjyWOG7zT1os6IggVWaUFJZ2OGDTdIFDAxg9CtZ6l/NsKIRZwfS/+Z88Uo9QVofm
8GoXLiVQFrzAxxFfDU07Mmw27Wpn2oY7ArlAuReHEEUQIHomsZ7oDV1Cnci8iYzK
xIllj5n/2+PLIXh7Fc3QJN3B8MUHfw8G8nwLRtJV61M9H8ODSFvsXYj6hRtJVvSg
b5/Cm0zejlYNcc6G8VtRRre0Dbzh8X/vkYgOK6zgIm1WFjfR5mRfcNa3/8GTpPNq
OuKG9W+8M2xn3xpgdlJ/pRhJ1qECe+NmbcgNT0bwdx1HIUNj75qbZ1jimD1laOVI
z7dn9HQ9oE16QRJoopLYHwv2Un1z1bl6SlfrVmbtmYqJpk+PPTPDyzjdy5qtgjq+
WjjqqT0YH8fUD/6KXhF4V1nqniu1WqVK6XuD+Kh/bAsrHQXKc0Wjj/iqu0jaHiuK
38/3DDQksf+4JpCqXTmm
=KAJF
-----END PGP SIGNATURE-----


Reply to: