[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-36{08,09,10}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3608.wml	2016-06-30 00:32:29.000000000 +0500
+++ russian/security/2016/dsa-3608.wml	2016-06-30 13:18:23.825320943 +0500
@@ -1,19 +1,20 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Aleksandar Nikolic discovered that missing input sanitising in the RTF
- -parser in Libreoffice may result in the execution of arbitrary code if
- -a malformed documented is opened.</p>
+<p>Ð?лекÑ?андаÑ? Ð?иколиÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в коде длÑ?
+гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а RTF в Libreoffice можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода
+в Ñ?лÑ?Ñ?ае оÑ?кÑ?Ñ?Ñ?иÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 1:4.3.3-2+deb8u5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:4.3.3-2+deb8u5.</p>
 
- -<p>For the testing distribution (stretch), this problem has been fixed
- -in version 1:5.1.4~rc1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 1:5.1.4~rc1-1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:5.1.4~rc1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:5.1.4~rc1-1.</p>
 
- -<p>We recommend that you upgrade your libreoffice packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libreoffice.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3609.wml	2016-06-30 11:07:13.000000000 +0500
+++ russian/security/2016/dsa-3609.wml	2016-06-30 13:20:00.511224128 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple security vulnerabilities have been discovered in the Tomcat
- -servlet and JSP engine, which may result in information disclosure, the
- -bypass of CSRF protections, bypass of the SecurityManager or denial of
- -service.</p>
+<p>Ð? Ñ?еÑ?влеÑ?е Tomcat и движке JSP бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е
+Ñ?Ñ?звимоÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии,
+обÑ?одÑ? заÑ?иÑ? CSRF, обÑ?одÑ? SecurityManager или оÑ?казÑ? в
+обÑ?лÑ?живании.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 8.0.14-1+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8.0.14-1+deb8u2.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 8.0.36-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8.0.36-1.</p>
 
- -<p>We recommend that you upgrade your tomcat8 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tomcat8.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3610.wml	2016-06-30 01:30:12.000000000 +0500
+++ russian/security/2016/dsa-3610.wml	2016-06-30 13:23:58.773625593 +0500
@@ -1,19 +1,20 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Brandon Perry discovered that xerces-c, a validating XML parser library
- -for C++, fails to successfully parse a DTD that is deeply nested,
- -causing a stack overflow. A remote unauthenticated attacker can take
- -advantage of this flaw to cause a denial of service against applications
- -using the xerces-c library.</p>
+<p>Ð?Ñ?Ñ?ндон Ð?еÑ?Ñ?и обнаÑ?Ñ?жил, Ñ?Ñ?о xerces-c, библиоÑ?ека C++ длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а XML
+Ñ? возможноÑ?Ñ?Ñ?Ñ? пÑ?овеÑ?ки, не Ñ?поÑ?обна Ñ?Ñ?пеÑ?но вÑ?полниÑ?Ñ? гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? DTD Ñ? болÑ?Ñ?им
+колиÑ?еÑ?Ñ?вом вложений, Ñ?Ñ?о пÑ?иводиÑ? к пеÑ?еполнениÑ? Ñ?Ñ?ека. УдалÑ?ннÑ?й неаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?й злоÑ?мÑ?Ñ?ленник
+можеÑ? иÑ?полÑ?зоваÑ?Ñ? даннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании в пÑ?иложениÑ?Ñ?,
+иÑ?полÑ?зÑ?Ñ?Ñ?иÑ? библиоÑ?екÑ? xerces-c.</p>
 
- -<p>Additionally this update includes an enhancement to enable applications
- -to fully disable DTD processing through the use of an environment
- -variable (XERCES_DISABLE_DTD).</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление вклÑ?Ñ?аеÑ? в Ñ?ебÑ? возможноÑ?Ñ?Ñ?, позволÑ?Ñ?Ñ?Ñ?Ñ? пÑ?иложениÑ?м
+полноÑ?Ñ?Ñ?Ñ? оÑ?клÑ?Ñ?иÑ?Ñ? обÑ?абоÑ?кÑ? DTD Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но пеÑ?еменной
+окÑ?Ñ?жениÑ? (XERCES_DISABLE_DTD).</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 3.1.1-5.1+deb8u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.1.1-5.1+deb8u3.</p>
 
- -<p>We recommend that you upgrade your xerces-c packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xerces-c.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=2MEV
-----END PGP SIGNATURE-----


Reply to: