[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2014/dla-{99,72,87}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2014/dla-72.wml	2016-05-22 10:07:41.950930470 +0500
+++ russian/security/2014/dla-72.wml	2016-06-24 22:49:51.865670909 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The Wheezy patch left an unresolved symbol in the imklog module of 
- -the Squeeze version. rsyslog worked fine except that messages from the 
- -kernel couldn't be submitted any longer. This update fixes this issue.</p>
+<p>Ð?аплаÑ?а длÑ? вÑ?пÑ?Ñ?ка Wheezy оÑ?Ñ?авила неÑ?азÑ?еÑ?Ñ?ннÑ?й Ñ?имвол в модÑ?ле imklog
+из веÑ?Ñ?ии длÑ? Squeeze. rsyslog Ñ?абоÑ?аеÑ? ноÑ?малÑ?но за иÑ?клÑ?Ñ?ением Ñ?ого, Ñ?Ñ?о более
+нелÑ?зÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? Ñ?ообÑ?ениÑ? Ñ?дÑ?а. Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?Ñ? пÑ?облемÑ?.</p>
 
- -<p>For reference, the original advisory text follows.</p>
+<p>Ð?иже пÑ?иводиÑ?Ñ?Ñ? Ñ?екÑ?Ñ? оÑ?игиналÑ?ной Ñ?екомендаÑ?ии.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3634";>CVE-2014-3634</a>
 
- - <p>Fix remote syslog vulnerability due to improper handling
- - of invalid PRI values.</p></li>
+ <p>Ð?Ñ?пÑ?авление Ñ?далÑ?нной Ñ?Ñ?звимоÑ?Ñ?и syslog, возникаÑ?Ñ?ей из-за непÑ?авилÑ?ной обÑ?абоÑ?ки
+ некоÑ?Ñ?екÑ?нÑ?Ñ? знаÑ?ений PRI.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3683";>CVE-2014-3683</a>
 
- - <p>Followup fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-3634";>CVE-2014-3634</a>. The initial patch was incomplete.
- - It did not cover cases where PRI values &gt; MAX_INT caused integer
- - overflows resulting in negative values.</p></li>
+ <p>Ð?оÑ?ледÑ?Ñ?Ñ?ее иÑ?пÑ?авление <a href="https://security-tracker.debian.org/tracker/CVE-2014-3634";>CVE-2014-3634</a>. Ð?еÑ?вонаÑ?алÑ?наÑ? заплаÑ?а оказалаÑ?Ñ? неполной.
+ Ð?на не покÑ?Ñ?вала Ñ?лÑ?Ñ?аи, когда знаÑ?ениÑ? PRI &gt; MAX_INT, Ñ?Ñ?о вÑ?зÑ?вало пеÑ?еполнение
+ Ñ?елÑ?Ñ? Ñ?иÑ?ел, пÑ?иводÑ?Ñ?ее к оÑ?Ñ?иÑ?аÑ?елÑ?нÑ?м знаÑ?ениÑ?м.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in rsyslog version 4.6.4-2+deb6u2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е rsyslog веÑ?Ñ?ии 4.6.4-2+deb6u2</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-87.wml	2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-87.wml	2016-06-24 22:55:25.480214135 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>This updates fixes multiple (local) denial of services discovered by Alban
- -Crequy and Simon McVittie.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? многоÑ?иÑ?леннÑ?е (локалÑ?нÑ?е) оÑ?казÑ? в обÑ?лÑ?живании, обнаÑ?Ñ?женнÑ?е Ð?лбаном
+Ð?Ñ?еÑ?о и Симоном Ð?аквиÑ?Ñ?и.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3477";>CVE-2014-3477</a>
 
- -    <p>Fix a denial of service (failure to obtain bus name) in
- -    newly-activated system services that not all users are allowed to
- -    access.</p></li>
+    <p>Ð?Ñ?пÑ?авление оÑ?каза в обÑ?лÑ?живании (невозможноÑ?Ñ?Ñ? полÑ?Ñ?иÑ?Ñ? имÑ? Ñ?инÑ?) во
+    впеÑ?вÑ?е акÑ?ивиÑ?ованнÑ?Ñ? Ñ?иÑ?Ñ?емнÑ?Ñ? Ñ?лÑ?жбаÑ?, к коÑ?оÑ?Ñ?м имеÑ?Ñ? доÑ?Ñ?Ñ?п не вÑ?е
+    полÑ?зоваÑ?ели.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3638";>CVE-2014-3638</a>
 
- -    <p>Reduce maximum number of pending replies per connection to avoid
- -    algorithmic complexity denial of service.</p></li>
+    <p>УменÑ?Ñ?ение макÑ?ималÑ?ного Ñ?иÑ?ла ждÑ?Ñ?иÑ? обÑ?абоÑ?ки оÑ?веÑ?ов на одно Ñ?оединение, Ñ?Ñ?обÑ?
+    избежаÑ?Ñ? оÑ?каза в обÑ?лÑ?живании из-за алгоÑ?иÑ?миÑ?еÑ?кой Ñ?ложноÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3639";>CVE-2014-3639</a>
 
- -    <p>The daemon now limits the number of unauthenticated connection slots
- -    so that malicious processes cannot prevent new connections to the
- -    system bus.</p></li>
+    <p>ТепеÑ?Ñ? Ñ?лÑ?жба огÑ?аниÑ?иваеÑ? Ñ?иÑ?ло Ñ?лоÑ?ов неаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?Ñ? Ñ?оединений
+    Ñ?ак, Ñ?Ñ?обÑ? вÑ?едоноÑ?нÑ?е пÑ?оÑ?еÑ?Ñ?Ñ? не могли пÑ?едоÑ?вÑ?аÑ?иÑ?Ñ? новÑ?е подклÑ?Ñ?ениÑ? к
+    Ñ?иÑ?Ñ?емной Ñ?ине.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in dbus version 1.2.24-4+squeeze3</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е dbus веÑ?Ñ?ии 1.2.24-4+squeeze3</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-99.wml	2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-99.wml	2016-06-24 22:42:58.662076043 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Michele Spagnuolo, of Google Security Team, and Miroslav Lichvar, of
- -Red Hat, discovered two issues in flac, a library handling Free
- -Lossless Audio Codec media: by providing a specially crafted FLAC
- -file, an attacker could execute arbitrary code.</p>
+<p>Ð?икеле СпанÑ?Ñ?оло из командÑ? безопаÑ?ноÑ?Ñ?и Google и Ð?иÑ?оÑ?лав Ð?иÑ?ваÑ? из
+Red Hat обнаÑ?Ñ?жили две пÑ?облемÑ? в flac, библиоÑ?еке длÑ? обÑ?абоÑ?ки мÑ?лÑ?Ñ?имедиа в Ñ?оÑ?маÑ?е
+Free Lossless Audio Codec: пеÑ?едав Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл FLAC,
+злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8962";>CVE-2014-8962</a>
 
- -     <p>heap-based buffer overflow in stream_decoder.c, allowing
- -     remote attackers to execute arbitrary code via a specially
- -     crafted .flac file.</p> </li>
+     <p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в stream_decoder.c позволÑ?еÑ?
+     Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+     Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла .flac.</p> </li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9028";>CVE-2014-9028</a>
 
- -     <p>stack-based buffer overflow in stream_decoder.c, allowing
- -     remote attackers to execute arbitrary code via a specially
- -     crafted .flac file.</p></li>
+     <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в stream_decoder.c позволÑ?еÑ?
+     Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+     Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла .flac.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in flac version 1.2.1-2+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е flac веÑ?Ñ?ии 1.2.1-2+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=inyQ
-----END PGP SIGNATURE-----


Reply to: