[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2014/dla-{95,63}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2014/dla-63.wml	2016-05-22 10:07:41.942931478 +0500
+++ russian/security/2014/dla-63.wml	2016-06-24 00:21:25.470787257 +0500
@@ -1,17 +1,19 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Tavis Ormandy discovered that the patch applied to fix <a href="https://security-tracker.debian.org/tracker/CVE-2014-6271";>CVE-2014-6271</a>
- -released in <a href="dla-59">DLA-59-1</a> for bash, the GNU Bourne-Again Shell,
- -was incomplete and could still allow some characters to be injected into
- -another environment (<a href="https://security-tracker.debian.org/tracker/CVE-2014-7169";>CVE-2014-7169</a>). With this update prefix and suffix
- -for environment variable names which contain shell functions are added
- -as hardening measure.</p>
+<p>ТÑ?виÑ? Ð?Ñ?манди обнаÑ?Ñ?жил, Ñ?Ñ?о заплаÑ?а, иÑ?полÑ?зованнаÑ? длÑ? иÑ?пÑ?авлениÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2014-6271";>CVE-2014-6271</a>
+и вÑ?пÑ?Ñ?еннаÑ? в <a href="dla-59">DLA-59-1</a>, длÑ? bash, GNU Bourne-Again Shell,
+оказалаÑ?Ñ? неполной, Ñ?Ñ?о позволÑ?еÑ? вводиÑ?Ñ? некоÑ?оÑ?Ñ?е Ñ?имволÑ? в
+дÑ?Ñ?гое окÑ?Ñ?жение (<a href="https://security-tracker.debian.org/tracker/CVE-2014-7169";>CVE-2014-7169</a>). Ð?анное обновление добавлÑ?еÑ? к именам
+пеÑ?еменнÑ?Ñ? окÑ?Ñ?жениÑ?, Ñ?одеÑ?жаÑ?иÑ? Ñ?Ñ?нкÑ?ии командной оболоÑ?ки, пÑ?еÑ?икÑ?Ñ? и Ñ?Ñ?Ñ?Ñ?икÑ?Ñ? Ñ? Ñ?елÑ?Ñ?
+заÑ?иÑ?Ñ? Ñ?Ñ?иÑ? Ñ?Ñ?нкÑ?ий.</p>
 
- -<p>Additionally two out-of-bounds array accesses in the bash parser are
- -fixed which were revealed in Red Hat's internal analysis for these
- -issues and also independently reported by Todd Sabin.</p>
+<p>Ð?Ñ?оме Ñ?ого, бÑ?ло иÑ?пÑ?авлено два Ñ?лÑ?Ñ?аÑ? обÑ?аÑ?ениÑ? за пÑ?еделÑ? вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и
+в коде bash длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а, коÑ?оÑ?Ñ?е бÑ?ли вÑ?Ñ?вленÑ?
+в Ñ?оде внÑ?Ñ?Ñ?еннего анализа в Red Hat на пÑ?едмеÑ? налиÑ?иÑ? Ñ?акиÑ? пÑ?облем, а
+Ñ?акже бÑ?ли незавиÑ?имо обнаÑ?Ñ?женÑ? Тоддом Сабином.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in bash version 4.1-3+deb6u2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е bash веÑ?Ñ?ии 4.1-3+deb6u2</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-95.wml	2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-95.wml	2016-06-24 00:16:13.993656965 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Two bugs were discovered in clamav and are fixed by this release.</p>
+<p>Ð? clamav бÑ?ло обнаÑ?Ñ?жено две оÑ?ибки, они иÑ?пÑ?авленÑ? в данном вÑ?пÑ?Ñ?ке.</p>
 
- -<p>One issue is in clamscan, the command line anti-virus scanner included
- -in the package, which could lead to crashes when scanning certain files
+<p>Ð?дна пÑ?облема каÑ?аеÑ?Ñ?Ñ? clamscan, анÑ?ивиÑ?Ñ?Ñ?ного Ñ?канеÑ?а длÑ? командной Ñ?Ñ?Ñ?оки, коÑ?оÑ?Ñ?й вÑ?одиÑ?
+в пакеÑ?. ЭÑ?а пÑ?облема можеÑ? пÑ?иводиÑ?Ñ? к аваÑ?ийнÑ?м оÑ?Ñ?ановкам пÑ?и Ñ?каниÑ?овании опÑ?еделÑ?ннÑ?Ñ? Ñ?айлов
 (<a href="https://security-tracker.debian.org/tracker/CVE-2013-6497";>CVE-2013-6497</a>).
- -The second issue is in libclamav which caused a heap buffer overflow
- -when scanning a specially crafted y0da Crypter obfuscated PE file
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2014-9050";>CVE-2014-9050</a>). Note that this is remotely exploitable when ClamAV is
- -used as a mail gateway scanner.</p>
+Ð?Ñ?оÑ?аÑ? пÑ?облема каÑ?аеÑ?Ñ?Ñ? libclamav и вÑ?зÑ?ваеÑ? пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и
+пÑ?и Ñ?каниÑ?овании Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? PE-Ñ?айлов y0da Crypter
+(<a href="https://security-tracker.debian.org/tracker/CVE-2014-9050";>CVE-2014-9050</a>). Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?и оÑ?ибки могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленниками
+Ñ?далÑ?нно в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли ClamAV иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? длÑ? Ñ?каниÑ?ованиÑ? Ñ?айлов на Ñ?злаÑ? Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ?.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in clamav version 0.98.1+dfsg-1+deb6u4</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е clamav веÑ?Ñ?ии 0.98.1+dfsg-1+deb6u4</p>
 
- -<p>If you use clamav, we highly recommend that you upgrade to this version.</p>
+<p>Ð?Ñ?ли вÑ? иÑ?полÑ?зÑ?еÑ?е clamav, Ñ?о наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? обновление до данной веÑ?Ñ?ии.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=2mwX
-----END PGP SIGNATURE-----


Reply to: