[DONE] wml://security/2014/dla-{99,72,87}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2014/dla-72.wml 2016-05-22 10:07:41.950930470 +0500
+++ russian/security/2014/dla-72.wml 2016-06-24 22:49:51.865670909 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>The Wheezy patch left an unresolved symbol in the imklog module of
- -the Squeeze version. rsyslog worked fine except that messages from the
- -kernel couldn't be submitted any longer. This update fixes this issue.</p>
+<p>Ð?аплаÑ?а длÑ? вÑ?пÑ?Ñ?ка Wheezy оÑ?Ñ?авила неÑ?азÑ?еÑ?Ñ?ннÑ?й Ñ?имвол в модÑ?ле imklog
+из веÑ?Ñ?ии длÑ? Squeeze. rsyslog Ñ?абоÑ?аеÑ? ноÑ?малÑ?но за иÑ?клÑ?Ñ?ением Ñ?ого, Ñ?Ñ?о более
+нелÑ?зÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? Ñ?ообÑ?ениÑ? Ñ?дÑ?а. Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?Ñ? пÑ?облемÑ?.</p>
- -<p>For reference, the original advisory text follows.</p>
+<p>Ð?иже пÑ?иводиÑ?Ñ?Ñ? Ñ?екÑ?Ñ? оÑ?игиналÑ?ной Ñ?екомендаÑ?ии.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3634">CVE-2014-3634</a>
- - <p>Fix remote syslog vulnerability due to improper handling
- - of invalid PRI values.</p></li>
+ <p>Ð?Ñ?пÑ?авление Ñ?далÑ?нной Ñ?Ñ?звимоÑ?Ñ?и syslog, возникаÑ?Ñ?ей из-за непÑ?авилÑ?ной обÑ?абоÑ?ки
+ некоÑ?Ñ?екÑ?нÑ?Ñ? знаÑ?ений PRI.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3683">CVE-2014-3683</a>
- - <p>Followup fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-3634">CVE-2014-3634</a>. The initial patch was incomplete.
- - It did not cover cases where PRI values > MAX_INT caused integer
- - overflows resulting in negative values.</p></li>
+ <p>Ð?оÑ?ледÑ?Ñ?Ñ?ее иÑ?пÑ?авление <a href="https://security-tracker.debian.org/tracker/CVE-2014-3634">CVE-2014-3634</a>. Ð?еÑ?вонаÑ?алÑ?наÑ? заплаÑ?а оказалаÑ?Ñ? неполной.
+ Ð?на не покÑ?Ñ?вала Ñ?лÑ?Ñ?аи, когда знаÑ?ениÑ? PRI > MAX_INT, Ñ?Ñ?о вÑ?зÑ?вало пеÑ?еполнение
+ Ñ?елÑ?Ñ? Ñ?иÑ?ел, пÑ?иводÑ?Ñ?ее к оÑ?Ñ?иÑ?аÑ?елÑ?нÑ?м знаÑ?ениÑ?м.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in rsyslog version 4.6.4-2+deb6u2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е rsyslog веÑ?Ñ?ии 4.6.4-2+deb6u2</p>
</define-tag>
# do not modify the following line
- --- english/security/2014/dla-87.wml 2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-87.wml 2016-06-24 22:55:25.480214135 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>This updates fixes multiple (local) denial of services discovered by Alban
- -Crequy and Simon McVittie.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? многоÑ?иÑ?леннÑ?е (локалÑ?нÑ?е) оÑ?казÑ? в обÑ?лÑ?живании, обнаÑ?Ñ?женнÑ?е Ð?лбаном
+Ð?Ñ?еÑ?о и Симоном Ð?аквиÑ?Ñ?и.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3477">CVE-2014-3477</a>
- - <p>Fix a denial of service (failure to obtain bus name) in
- - newly-activated system services that not all users are allowed to
- - access.</p></li>
+ <p>Ð?Ñ?пÑ?авление оÑ?каза в обÑ?лÑ?живании (невозможноÑ?Ñ?Ñ? полÑ?Ñ?иÑ?Ñ? имÑ? Ñ?инÑ?) во
+ впеÑ?вÑ?е акÑ?ивиÑ?ованнÑ?Ñ? Ñ?иÑ?Ñ?емнÑ?Ñ? Ñ?лÑ?жбаÑ?, к коÑ?оÑ?Ñ?м имеÑ?Ñ? доÑ?Ñ?Ñ?п не вÑ?е
+ полÑ?зоваÑ?ели.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3638">CVE-2014-3638</a>
- - <p>Reduce maximum number of pending replies per connection to avoid
- - algorithmic complexity denial of service.</p></li>
+ <p>УменÑ?Ñ?ение макÑ?ималÑ?ного Ñ?иÑ?ла ждÑ?Ñ?иÑ? обÑ?абоÑ?ки оÑ?веÑ?ов на одно Ñ?оединение, Ñ?Ñ?обÑ?
+ избежаÑ?Ñ? оÑ?каза в обÑ?лÑ?живании из-за алгоÑ?иÑ?миÑ?еÑ?кой Ñ?ложноÑ?Ñ?и.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3639">CVE-2014-3639</a>
- - <p>The daemon now limits the number of unauthenticated connection slots
- - so that malicious processes cannot prevent new connections to the
- - system bus.</p></li>
+ <p>ТепеÑ?Ñ? Ñ?лÑ?жба огÑ?аниÑ?иваеÑ? Ñ?иÑ?ло Ñ?лоÑ?ов неаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?Ñ? Ñ?оединений
+ Ñ?ак, Ñ?Ñ?обÑ? вÑ?едоноÑ?нÑ?е пÑ?оÑ?еÑ?Ñ?Ñ? не могли пÑ?едоÑ?вÑ?аÑ?иÑ?Ñ? новÑ?е подклÑ?Ñ?ениÑ? к
+ Ñ?иÑ?Ñ?емной Ñ?ине.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in dbus version 1.2.24-4+squeeze3</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е dbus веÑ?Ñ?ии 1.2.24-4+squeeze3</p>
</define-tag>
# do not modify the following line
- --- english/security/2014/dla-99.wml 2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-99.wml 2016-06-24 22:42:58.662076043 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Michele Spagnuolo, of Google Security Team, and Miroslav Lichvar, of
- -Red Hat, discovered two issues in flac, a library handling Free
- -Lossless Audio Codec media: by providing a specially crafted FLAC
- -file, an attacker could execute arbitrary code.</p>
+<p>Ð?икеле СпанÑ?Ñ?оло из командÑ? безопаÑ?ноÑ?Ñ?и Google и Ð?иÑ?оÑ?лав Ð?иÑ?ваÑ? из
+Red Hat обнаÑ?Ñ?жили две пÑ?облемÑ? в flac, библиоÑ?еке длÑ? обÑ?абоÑ?ки мÑ?лÑ?Ñ?имедиа в Ñ?оÑ?маÑ?е
+Free Lossless Audio Codec: пеÑ?едав Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл FLAC,
+злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8962">CVE-2014-8962</a>
- - <p>heap-based buffer overflow in stream_decoder.c, allowing
- - remote attackers to execute arbitrary code via a specially
- - crafted .flac file.</p> </li>
+ <p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в stream_decoder.c позволÑ?еÑ?
+ Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+ Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла .flac.</p> </li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9028">CVE-2014-9028</a>
- - <p>stack-based buffer overflow in stream_decoder.c, allowing
- - remote attackers to execute arbitrary code via a specially
- - crafted .flac file.</p></li>
+ <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в stream_decoder.c позволÑ?еÑ?
+ Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+ Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла .flac.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in flac version 1.2.1-2+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е flac веÑ?Ñ?ии 1.2.1-2+deb6u1</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=inyQ
-----END PGP SIGNATURE-----
Reply to: