[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-22{10,98}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2210.wml	2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2210.wml	2016-09-18 16:49:19.578625568 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in the TIFF manipulation and
- -conversion library:</p>
+<p>Ð? библиоÑ?еке длÑ? обÑ?абоÑ?ки и пÑ?еобÑ?азованиÑ? Ñ?айлов в Ñ?оÑ?маÑ?е TIFF, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0191";>CVE-2011-0191</a>
 
- -  <p>A buffer overflow allows to execute arbitrary code or cause
- -  a denial of service via a crafted TIFF image with JPEG encoding.
- -  This issue affects the Debian 5.0 Lenny package only.</p></li>
+  <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код или вÑ?зÑ?ваÑ?Ñ?
+  оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного изобÑ?ажениÑ? в Ñ?оÑ?маÑ?е TIFF Ñ? JPEG-кодиÑ?ованием.
+  ЭÑ?а пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко пакеÑ?а из Debian 5.0 Lenny.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0192";>CVE-2011-0192</a>
 
- -  <p>A buffer overflow allows to execute arbitrary code or cause
- -  a denial of service via a crafted TIFF Internet Fax image
- -  file that has been compressed using CCITT Group 4 encoding.</p></li>
+  <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код или вÑ?зÑ?ваÑ?Ñ?
+  оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е TIFF Internet Fax,
+  Ñ?жаÑ?ого Ñ? иÑ?полÑ?зованием кодиÑ?ованиÑ? CCITT Group 4.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1167";>CVE-2011-1167</a>
 
- -  <p>Heap-based buffer overflow in the thunder (aka ThunderScan)
- -  decoder allows to execute arbitrary code via a TIFF file that
- -  has an unexpected BitsPerSample value.</p></li>
+  <p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в декодеÑ?е thunder (извеÑ?Ñ?ном как ThunderScan)
+  позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? TIFF-Ñ?айла, имеÑ?Ñ?его
+  неожиданное знаÑ?ение BitsPerSample.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), these problems have been
- -fixed in version 3.8.2-11.4.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.8.2-11.4.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been
- -fixed in version 3.9.4-5+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.9.4-5+squeeze1.</p>
 
- -<p>For the testing distribution, the first two problems have been fixed
- -in version 3.9.4-8, the last problem will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке пеÑ?вÑ?е две пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.9.4-8, а поÑ?леднÑ?Ñ? пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed
- -in version 3.9.4-9.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.9.4-9.</p>
 
- -<p>We recommend that you upgrade your tiff packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tiff.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2298.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2298.wml	2016-09-18 17:04:55.518973457 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>Two issues have been found in the Apache HTTPD web server:</p>
+<p>Ð? Apache, HTTPD веб-Ñ?еÑ?веÑ?е, бÑ?ли обнаÑ?Ñ?женÑ? две пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3192";>CVE-2011-3192</a>
 
- -<p>A vulnerability has been found in the way the multiple overlapping
- -ranges are handled by the Apache HTTPD server. This vulnerability
- -allows an attacker to cause Apache HTTPD to use an excessive amount of
- -memory, causing a denial of service.</p></li>
+<p>Ð? Ñ?поÑ?обе обÑ?абоÑ?ки HTTPD-Ñ?еÑ?веÑ?ом Apache множеÑ?Ñ?веннÑ?Ñ? пеÑ?екÑ?Ñ?ваÑ?Ñ?иÑ?Ñ?Ñ?
+облаÑ?Ñ?ей знаÑ?ений бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?зÑ?ваÑ?Ñ? Ñ?иÑ?Ñ?аÑ?иÑ?, в коÑ?оÑ?ой Apache HTTPD иÑ?полÑ?зÑ?еÑ? Ñ?Ñ?езмеÑ?нÑ?й обÑ?Ñ?м
+памÑ?Ñ?и, вÑ?зÑ?ваÑ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1452";>CVE-2010-1452</a>
 
- -<p>A vulnerability has been found in mod_dav that allows an attacker to
- -cause a daemon crash, causing a denial of service. This issue only
- -affects the Debian 5.0 oldstable/lenny distribution.</p></li>
+<p>Ð? mod_dav бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?, позволÑ?Ñ?Ñ?аÑ? злоÑ?мÑ?Ñ?ленникÑ?
+вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? Ñ?лÑ?жбÑ?, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании. ЭÑ?а пÑ?облема
+каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка, Debian 5.0 lenny.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), these problems have been fixed
- -in version 2.2.9-10+lenny11.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.2.9-10+lenny11.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.2.16-6+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.16-6+squeeze3.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 2.2.19-3.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.19-3.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.2.19-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.19-3.</p>
 
- -<p>We recommend that you upgrade your apache2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? apache2.</p>
 
- -<p>This update also contains updated apache2-mpm-itk packages which have
- -been recompiled against the updated apache2 packages. The new version
- -number for the oldstable distribution is 2.2.6-02-1+lenny6. In the
- -stable distribution, apache2-mpm-itk has the same version number as
+<p>Ð?Ñ?оме Ñ?ого, данное обновление Ñ?одеÑ?жиÑ? обновлÑ?ннÑ?е пакеÑ?Ñ? apache2-mpm-itk, коÑ?оÑ?Ñ?е
+бÑ?ли заново Ñ?компилиÑ?ованÑ? Ñ? поддеÑ?жкой обновлÑ?ннÑ?Ñ? пакеÑ?ов apache2. Ð?омеÑ? новой
+веÑ?Ñ?ии длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка &mdash; 2.2.6-02-1+lenny6. Ð? Ñ?Ñ?абилÑ?ном
+вÑ?пÑ?Ñ?ке пакеÑ? apache2-mpm-itk имееÑ? Ñ?оÑ? же номеÑ? веÑ?Ñ?ии как Ñ? пакеÑ?а
 apache2.</p>
 </define-tag>
 
-----BEGIN PGP SIGNATURE-----
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=we/X
-----END PGP SIGNATURE-----


Reply to: