On 09 Jul, Lev Lamberov wrote: > - --- english/security/2011/dsa-2281.wml 2014-04-30 13:16:25.000000000 +0600 > +++ russian/security/2011/dsa-2281.wml 2016-07-09 18:04:33.249166301 +0500 > @@ -1,26 +1,27 @@ > - -<p>For the stable distribution (squeeze), these problems have been fixed in > - -version 2.32.dfsg.1-0.2+squeeze1</p> > +<p>В стабильном выпуске (squeeze) эти пробемы были исправлены в пробЛемы > +версии 2.32.dfsg.1-0.2+squeeze1</p> > > - -<p>The testing distribution (wheezy) and the unstable distribution (sid) do > - -not contain opie.</p> > +<p>В тестируемом (wheezy) и нестабильном (sid) выпусках > +пакет opie отсутствует.</p> > > - -<p>We recommend that you upgrade your opie packages.</p> > +<p>Рекомендуется обновить пакеты opie.</p> > </define-tag> > - --- english/security/2011/dsa-2287.wml 2014-04-30 13:16:25.000000000 +0600 > +++ russian/security/2011/dsa-2287.wml 2016-07-09 18:09:29.149194833 +0500 > @@ -1,28 +1,29 @@ > <a href="https://security-tracker.debian.org/tracker/CVE-2011-2690">\ > - -CVE-2011-2690</a>. Using this vulnerability, an attacker is able to overwrite > - -memory with an arbitrary amount of data controlled by her via a crafted PNG > - -image.</p> > - - > - -<p>The other vulnerabilities are less critical and allow an attacker to > - -cause a crash in the program (denial of service) via a crafted PNG > - -image.</p> > - - > - -<p>For the oldstable distribution (lenny), this problem has been fixed in > - -version 1.2.27-2+lenny5. Due to a technical limitation in the Debian > - -archive processing scripts, the updated packages cannot be released > - -in parallel with the packages for Squeeze. They will appear shortly.</p> > +CVE-2011-2690</a>. Используя её, злоумышленник может перезаписать содержимое > +памяти, заменив его на произвольный объём собственных данных, с помощью специально сформированного > +изображения в форматеPNG.</p> формате PNG (забыл пробел) -- Best regards, Andrey Skvortsov
Attachment:
signature.asc
Description: PGP signature