[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3736.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3736.wml	2016-12-16 18:29:31.000000000 +0500
+++ russian/security/2016/dsa-3736.wml	2016-12-17 00:42:26.877699881 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in libupnp, a portable SDK for
- -UPnP devices.</p>
+<p>Ð? libupnp, пеÑ?еноÑ?имом комплекÑ?е Ñ?азÑ?абоÑ?Ñ?ика длÑ? UPnP-Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?в,
+бÑ?ли обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6255";>CVE-2016-6255</a>
 
- -  <p>Matthew Garret discovered that libupnp by default allows any user to
- -  write to the filesystem of the host running a libupnp-based server
- -  application.</p></li>
+  <p>Ð?Ñ?Ñ?Ñ?Ñ? Ð?аÑ?Ñ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о libupnp по Ñ?молÑ?аниÑ? позволÑ?еÑ? лÑ?бомÑ? полÑ?зоваÑ?елÑ?
+  вÑ?полнÑ?Ñ?Ñ? запиÑ?Ñ? в Ñ?айловÑ?Ñ? Ñ?иÑ?Ñ?емÑ? Ñ?зла, на коÑ?оÑ?ом запÑ?Ñ?ено Ñ?еÑ?веÑ?ное пÑ?иложение
+  на оÑ?нове libupnp.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-8863";>CVE-2016-8863</a>
 
- -  <p>Scott Tenaglia discovered a heap buffer overflow vulnerability, that
- -  can lead to denial of service or remote code execution.</p></li>
+  <p>СкоÑ?Ñ? Тенаглиа обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и, коÑ?оÑ?ое
+  можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или Ñ?далÑ?нномÑ? вÑ?полнениÑ? кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1:1.6.19+git20141001-1+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:1.6.19+git20141001-1+deb8u1.</p>
 
- -<p>For the testing (stretch) and unstable (sid) distributions, these
- -problems have been fixed in version 1:1.6.19+git20160116-1.2.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1:1.6.19+git20160116-1.2.</p>
 
- -<p>We recommend that you upgrade your libupnp packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libupnp.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=KePF
-----END PGP SIGNATURE-----


Reply to: