[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2014/dla-1{21,12,24,17}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2014/dla-112.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-112.wml	2016-06-22 16:16:19.529579532 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>This update fixes a denial of service vulnerability in BIND, a DNS server.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? оÑ?каз в обÑ?лÑ?живании в BIND, Ñ?еÑ?веÑ?е DNS.</p>
 
- -<p>By making use of maliciously-constructed zones or a rogue server, an attacker
- -could exploit an oversight in the code BIND 9 used to follow delegations in
- -the Domain Name Service, causing BIND to issue unlimited queries in an attempt
- -to follow the delegation.</p>
+<p>Ð?Ñ?полÑ?зÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е зонÑ? или Ñ?обÑ?Ñ?веннÑ?й Ñ?еÑ?веÑ?, злоÑ?мÑ?Ñ?ленник
+можеÑ? иÑ?полÑ?зоваÑ?Ñ? оÑ?ибкÑ? в коде BIND 9, иÑ?полÑ?зÑ?емом длÑ? Ñ?ледованиÑ? делегаÑ?иÑ?м
+в Ñ?лÑ?жбе доменнÑ?Ñ? имÑ?н, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о BIND оÑ?пÑ?авлÑ?еÑ? неогÑ?аниÑ?енное колиÑ?еÑ?Ñ?во запÑ?оÑ?ов в попÑ?Ñ?ке
+Ñ?ледованиÑ? делегаÑ?иÑ?ми.</p>
 
- -<p>This can lead to resource exhaustion and denial of service (up to and
- -including termination of the named server process).</p>
+<p>ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к иÑ?Ñ?оÑ?ениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов и оÑ?казÑ? в обÑ?лÑ?живании (вплоÑ?Ñ? до
+завеÑ?Ñ?ениÑ? пÑ?оÑ?еÑ?Ñ?а именованного Ñ?еÑ?веÑ?а).</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in bind9 version 9.7.3.dfsg-1~squeeze13</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е bind9 веÑ?Ñ?ии 9.7.3.dfsg-1~squeeze13</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-117.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-117.wml	2016-06-22 16:22:54.764305584 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3193";>CVE-2011-3193</a>
 
- -    <p>Check for buffer overflow in Lookup_MarkMarkPos that may cause crash
- -    in this function with certain fonts.</p></li>
+    <p>Ð?Ñ?овеÑ?ка на возможное возникновение пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в Lookup_MarkMarkPos, коÑ?оÑ?ое можеÑ?
+    вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? в Ñ?Ñ?ой Ñ?Ñ?нкÑ?ии пÑ?и Ñ?абоÑ?е Ñ? опÑ?еделÑ?ннÑ?ми Ñ?Ñ?иÑ?Ñ?ами.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3194";>CVE-2011-3194</a>
 
- -    <p>Fix tiff reader to handle TIFFTAG_SAMPLESPERPIXEL for grayscale
- -    images. The reader uses QImage::Format_Indexed8, but since the samples
- -    per pixel value this should be (non-existent) QImage::Format_Indexed16,
- -    causing memory corruption. The fix falls back to the <q>normal</q> way of
- -    reading tiff images.</p></li>
+    <p>Ð?Ñ?пÑ?авление кода длÑ? Ñ?Ñ?ениÑ? tiff Ñ?ак, Ñ?Ñ?обÑ? он обÑ?абаÑ?Ñ?вал TIFFTAG_SAMPLESPERPIXEL длÑ? изобÑ?ажений,
+    иÑ?полÑ?зÑ?Ñ?Ñ?иÑ? гÑ?адаÑ?ии Ñ?еÑ?ого в каÑ?еÑ?Ñ?ве Ñ?веÑ?овой палиÑ?Ñ?Ñ?. Ð?од длÑ? Ñ?Ñ?ениÑ? иÑ?полÑ?зÑ?еÑ? QImage::Format_Indexed8, но поÑ?колÑ?кÑ? знаÑ?ение
+    обÑ?азÑ?ов на пикÑ?елÑ? должно бÑ?Ñ?Ñ? (неÑ?Ñ?Ñ?еÑ?Ñ?вÑ?Ñ?Ñ?им) QImage::Format_Indexed16,
+    Ñ?о Ñ?Ñ?о пÑ?иводиÑ? к повÑ?еждениÑ? Ñ?одеÑ?жимого памÑ?Ñ?и. Ð?Ñ?пÑ?авление пÑ?едÑ?Ñ?авлÑ?еÑ? Ñ?обой оÑ?каÑ? к <q>ноÑ?малÑ?номÑ?</q> Ñ?поÑ?обÑ?
+    Ñ?Ñ?ениÑ? изобÑ?ажений tiff.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in qt4-x11 version 4:4.6.3-4+squeeze2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е qt4-x11 веÑ?Ñ?ии 4:4.6.3-4+squeeze2</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-121.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-121.wml	2016-06-22 16:12:13.112980481 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Jose Duart of the Google Security Team discovered a double free flaw
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8137";>CVE-2014-8137</a>) and a heap-based buffer overflow flaw (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8138";>CVE-2014-8138</a>)
- -in JasPer, a library for manipulating JPEG-2000 files. A specially
- -crafted file could cause an application using JasPer to crash or,
- -possibly, execute arbitrary code.</p>
+<p>ХоÑ?е Ð?Ñ?аÑ?Ñ? из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил двойное оÑ?вобождение памÑ?Ñ?и
+(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8137";>CVE-2014-8137</a>) и пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8138";>CVE-2014-8138</a>)
+в JasPer, библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? Ñ?айлами в Ñ?оÑ?маÑ?е JPEG-2000. СпеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл можеÑ? вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? пÑ?иложениÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?его JasPer, или
+возможное вÑ?полнение пÑ?оизволÑ?ного кода.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in jasper version 1.900.1-7+squeeze3</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е jasper веÑ?Ñ?ии 1.900.1-7+squeeze3</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-124.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-124.wml	2016-06-22 16:18:27.750239293 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Michele Spagnuolo of the Google Security Team discovered that unzip, an
- -extraction utility for archives compressed in .zip format, is affected
- -by heap-based buffer overflows within the CRC32 verification function
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8139";>CVE-2014-8139</a>), the test_compr_eb() function (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8140";>CVE-2014-8140</a>) and the
- -getZip64Data() function (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8141";>CVE-2014-8141</a>), which may lead to the execution
- -of arbitrary code.</p>
+<p>Ð?иÑ?елÑ? СпагнÑ?оло из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил, Ñ?Ñ?о unzip,
+Ñ?Ñ?илиÑ?а длÑ? Ñ?аÑ?паковки аÑ?Ñ?ивов в Ñ?оÑ?маÑ?е .zip, Ñ?одеÑ?жиÑ?
+пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии пÑ?овеÑ?ки CRC32
+(<a href="https://security-tracker.debian.org/tracker/CVE-2014-8139";>CVE-2014-8139</a>), Ñ?Ñ?нкÑ?ии test_compr_eb() (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8140";>CVE-2014-8140</a>) и Ñ?Ñ?нкÑ?ии
+getZip64Data() (<a href="https://security-tracker.debian.org/tracker/CVE-2014-8141";>CVE-2014-8141</a>), Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in unzip version 6.0-4+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е unzip веÑ?Ñ?ии 6.0-4+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=j4LM
-----END PGP SIGNATURE-----


Reply to: