[DONE] wml://{security/2016/dsa-3597.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3597.wml 2016-06-07 21:56:46.000000000 +0500
+++ russian/security/2016/dsa-3597.wml 2016-06-07 22:04:24.809420909 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Two related issues have been discovered in Expat, a C library for parsing
- -XML.</p>
+<p>Ð? Expat, библиоÑ?еке Ñ?зÑ?ка C длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а XML, бÑ?ли
+обнаÑ?Ñ?женÑ? две Ñ?вÑ?заннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?и.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6702">CVE-2012-6702</a>
- - <p>It was introduced when
- - <a href="https://security-tracker.debian.org/tracker/CVE-2012-0876">CVE-2012-0876</a>
- - was addressed. Stefan Sørensen discovered that the use of the function
- - XML_Parse() seeds the random number generator generating repeated outputs
- - for rand() calls.</p></li>
+ <p>ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? поÑ?вилаÑ?Ñ? поÑ?ле Ñ?еÑ?ениÑ? пÑ?облемÑ?
+ <a href="https://security-tracker.debian.org/tracker/CVE-2012-0876">CVE-2012-0876</a>.
+ ШÑ?еÑ?ан СÑ?Ñ?енÑ?ен обнаÑ?Ñ?жил, Ñ?Ñ?о иÑ?полÑ?зование Ñ?Ñ?нкÑ?ии
+ XML_Parse() иниÑ?иализиÑ?Ñ?еÑ? генеÑ?аÑ?оÑ? Ñ?лÑ?Ñ?айнÑ?Ñ? Ñ?иÑ?ел, коÑ?оÑ?Ñ?й поÑ?ождаеÑ? повÑ?оÑ?Ñ?Ñ?Ñ?иеÑ?Ñ? знаÑ?ениÑ?
+ длÑ? вÑ?зовов rand().</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5300">CVE-2016-5300</a>
- - <p>It is the product of an incomplete solution for
- - <a href="https://security-tracker.debian.org/tracker/CVE-2012-0876">CVE-2012-0876</a>.
- - The parser poorly seeds the random number generator allowing an attacker to
- - cause a denial of service (CPU consumption) via an XML file with crafted
- - identifiers.</p></li>
+ <p>ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? поÑ?вилаÑ?Ñ? из-за неполного Ñ?еÑ?ениÑ? пÑ?облемÑ?
+ <a href="https://security-tracker.debian.org/tracker/CVE-2012-0876">CVE-2012-0876</a>.
+ Ð?од гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а плоÑ?о иниÑ?иализиÑ?Ñ?еÑ? генеÑ?аÑ?оÑ? Ñ?лÑ?Ñ?айнÑ?Ñ? Ñ?иÑ?ел, Ñ?Ñ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ?
+ вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?) Ñ? помоÑ?Ñ?Ñ? Ñ?айла в Ñ?оÑ?маÑ?е XML,
+ Ñ?одеÑ?жаÑ?его Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е иденÑ?иÑ?икаÑ?оÑ?Ñ?.</p></li>
</ul>
- -<p>You might need to manually restart programs and services using expat
- -libraries.</p>
+<p>Ð?ам Ñ?ледÑ?еÑ? вÑ?Ñ?Ñ?нÑ?Ñ? пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ? пÑ?огÑ?аммÑ? и Ñ?лÑ?жбÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?ие библиоÑ?екÑ?
+expat.</p>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 2.1.0-6+deb8u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1.0-6+deb8u3.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.1.1-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.1.1-3.</p>
- -<p>We recommend that you upgrade your expat packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? expat.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=Grap
-----END PGP SIGNATURE-----
Reply to: