[DONE] wml://security/2016/dsa-365{2,3,4}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3652.wml 2016-08-26 09:55:55.000000000 +0500
+++ russian/security/2016/dsa-3652.wml 2016-08-26 10:12:34.802247273 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>This updates fixes many vulnerabilities in imagemagick: Various memory
- -handling problems and cases of missing or incomplete input sanitising
- -may result in denial of service or the execution of arbitrary code if
- -malformed TIFF, WPG, RLE, RAW, PSD, Sun, PICT, VIFF, HDR, Meta, Quantum,
- -PDB, DDS, DCM, EXIF, RGF or BMP files are processed.</p>
+<p>Ð? данном обновлении иÑ?пÑ?авленÑ? многие Ñ?Ñ?звимоÑ?Ñ?и в imagemagick: Ñ?азлиÑ?нÑ?е пÑ?облемÑ?
+Ñ?абоÑ?Ñ? Ñ? памÑ?Ñ?Ñ?Ñ?, Ñ?лÑ?Ñ?аи оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?ей или неполной оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ?
+даннÑ?Ñ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ? пÑ?оизволÑ?ного кода пÑ?и
+обÑ?абоÑ?ке некоÑ?Ñ?екÑ?нÑ?Ñ? Ñ?айлов в Ñ?оÑ?маÑ?аÑ? TIFF, WPG, RLE, RAW, PSD, Sun, PICT, VIFF, HDR, Meta, Quantum,
+PDB, DDS, DCM, EXIF, RGF или BMP.</p>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 8:6.8.9.9-5+deb8u4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8:6.8.9.9-5+deb8u4.</p>
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
- -<p>We recommend that you upgrade your imagemagick packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? imagemagick.</p>
</define-tag>
# do not modify the following line
- --- english/security/2016/dsa-3653.wml 2016-08-26 09:56:14.000000000 +0500
+++ russian/security/2016/dsa-3653.wml 2016-08-26 10:32:04.876919896 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Alexander Sulfrian discovered a buffer overflow in the
- -yy_get_next_buffer() function generated by Flex, which may result in
- -denial of service and potentially the execution of code if operating on
- -data from untrusted sources.</p>
+<p>Ð?лекÑ?андÑ? СÑ?лÑ?Ñ?иан обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии
+yy_get_next_buffer(), поÑ?ождаемой Flex, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к
+оÑ?казÑ? в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? кода в Ñ?лÑ?Ñ?ае Ñ?абоÑ?Ñ?
+Ñ? даннÑ?ми из недовеÑ?еннÑ?Ñ? иÑ?Ñ?оÑ?ников.</p>
- -<p>Affected applications need to be rebuild. bogofilter will be rebuild
- -against the updated flex in a followup update. Further affected
- -applications should be reported at the bug referenced above.</p>
+<p>Ð?Ñ?иложениÑ?, заÑ?Ñ?онÑ?Ñ?Ñ?е данной Ñ?Ñ?звимоÑ?Ñ?Ñ?Ñ?, Ñ?ледÑ?еÑ? Ñ?обÑ?аÑ?Ñ? заново. Ð?акеÑ? bogofilter бÑ?деÑ?
+заново Ñ?обÑ?ан в Ñ?ооÑ?веÑ?Ñ?Ñ?вии Ñ? обновлÑ?ннÑ?м пакеÑ?ом flex пÑ?и поÑ?ледÑ?Ñ?Ñ?ем обновлении. СледÑ?еÑ?
+Ñ?ообÑ?иÑ?Ñ? о дÑ?Ñ?гиÑ? пÑ?иложениÑ?, заÑ?Ñ?агиваемÑ?Ñ? Ñ?Ñ?ой пÑ?облемой, в Ñ?ообÑ?ение об оÑ?ибке, Ñ?казанное ввеÑ?Ñ?Ñ?.</p>
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 2.5.39-8+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.5.39-8+deb8u1.</p>
- -<p>For the testing distribution (stretch), this problem has been fixed
- -in version 2.6.1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 2.6.1-1.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.6.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.6.1-1.</p>
- -<p>We recommend that you upgrade your flex packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? flex.</p>
</define-tag>
# do not modify the following line
- --- english/security/2016/dsa-3654.wml 2016-08-26 09:56:30.000000000 +0500
+++ russian/security/2016/dsa-3654.wml 2016-08-26 10:35:34.793093405 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in quagga, a BGP/OSPF/RIP routing
- -daemon.</p>
+<p>Ð? quagga, Ñ?лÑ?жбе маÑ?Ñ?Ñ?Ñ?Ñ?изаÑ?ии BGP/OSPF/RIP, бÑ?ли обнаÑ?Ñ?женÑ? две
+Ñ?Ñ?звимоÑ?Ñ?и.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4036">CVE-2016-4036</a>
- - <p>Tamás Németh discovered that sensitive configuration files in
- - /etc/quagga were world-readable despite containing sensitive
- - information.</p></li>
+ <p>ТамаÑ? Ð?емеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?е Ñ?айлÑ? наÑ?Ñ?Ñ?ойки в
+ /etc/quagga оÑ?кÑ?Ñ?Ñ?Ñ? длÑ? Ñ?Ñ?ениÑ? вÑ?ем полÑ?зоваÑ?елÑ?м, Ñ?оÑ?Ñ? и Ñ?одеÑ?жаÑ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ?
+ инÑ?оÑ?маÑ?иÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4049">CVE-2016-4049</a>
- - <p>Evgeny Uskov discovered that a bgpd instance handling many peers
- - could be crashed by a malicious user when requesting a route dump.</p></li>
+ <p>Ð?вгений УÑ?ков обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?лÑ?жба bgpd, обÑ?абаÑ?Ñ?ваÑ?Ñ?аÑ? много одноÑ?анговÑ?Ñ? Ñ?злов
+ можеÑ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ?, еÑ?ли злоÑ?мÑ?Ñ?ленник запÑ?оÑ?иÑ? Ñ?аÑ?пеÑ?аÑ?кÑ? маÑ?Ñ?Ñ?Ñ?Ñ?а.</p></li>
</ul>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 0.99.23.1-1+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.99.23.1-1+deb8u2.</p>
- -<p>We recommend that you upgrade your quagga packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? quagga.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=eFqJ
-----END PGP SIGNATURE-----
Reply to: