[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-353{6,7,8}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3536.wml	2016-03-31 18:07:33.000000000 +0500
+++ russian/security/2016/dsa-3536.wml	2016-03-31 18:13:04.197497189 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that libstruts1.2-java, a Java framework for MVC
- -applications, contains a bug in its multi-page validation code. This
- -allows input validation to be bypassed, even if MPV is not used
- -directly.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о libstruts1.2-java, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?а Java длÑ?
+MVC-пÑ?иложений, Ñ?одеÑ?жиÑ? оÑ?ибкÑ? в коде пÑ?овеÑ?ки неÑ?колÑ?киÑ? Ñ?Ñ?Ñ?аниÑ?. ЭÑ?а
+оÑ?ибка позволÑ?еÑ? обÑ?одиÑ?Ñ? пÑ?овеÑ?кÑ? вÑ?однÑ?Ñ? даннÑ?Ñ? даже в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли MPV не
+иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? напÑ?Ñ?мÑ?Ñ?.</p>
 
- -<p>For the oldstable distribution (wheezy), this problem has been fixed
- -in version 1.2.9-5+deb7u2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 1.2.9-5+deb7u2.</p>
 
- -<p>We recommend that you upgrade your libstruts1.2-java packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libstruts1.2-java.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3537.wml	2016-03-31 18:09:12.000000000 +0500
+++ russian/security/2016/dsa-3537.wml	2016-03-31 18:18:53.522121793 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in imlib2, an image
- -manipulation library.</p>
+<p>Ð? imlib2, библиоÑ?еке Ñ?абоÑ?Ñ? Ñ? изобÑ?ажениÑ?ми, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9762";>CVE-2014-9762</a>
 
- -    <p>A segmentation fault could occur when opening GIFs without a
- -    colormap.</p></li>
+    <p>Ð?Ñ?и оÑ?кÑ?Ñ?Ñ?ии изобÑ?ажений в Ñ?оÑ?маÑ?е GIF без палиÑ?Ñ?Ñ? можеÑ? возникнÑ?Ñ?Ñ?
+    оÑ?ибка Ñ?егменÑ?иÑ?ованиÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9763";>CVE-2014-9763</a>
 
- -    <p>Several divisions by zero, resulting in a program crash, could
- -    occur when handling PNM files.</p></li>
+    <p>Ð?Ñ?и обÑ?абоÑ?ке Ñ?айлов в Ñ?оÑ?маÑ?е PNM могÑ?Ñ? возникаÑ?Ñ? Ñ?лÑ?Ñ?аи делениÑ? на нолÑ?,
+    коÑ?оÑ?Ñ?е пÑ?иводÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке пÑ?огÑ?аммÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9764";>CVE-2014-9764</a>
 
- -    <p>A segmentation fault could occur when opening GIFs with feh.</p></li>
+    <p>Ð?Ñ?и оÑ?кÑ?Ñ?Ñ?ии Ñ?айлов в Ñ?оÑ?маÑ?е GIF Ñ? помоÑ?Ñ?Ñ? feh могÑ?Ñ? возникаÑ?Ñ? оÑ?ибки Ñ?егменÑ?иÑ?ованиÑ?.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 1.4.5-1+deb7u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.4.5-1+deb7u1.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.4.6-2+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.6-2+deb8u1.</p>
 
- -<p>For the testing (stretch) and unstable (sid) distributions, these
- -problems have been fixed in version 1.4.7-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.4.7-1.</p>
 
- -<p>We recommend that you upgrade your imlib2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? imlib2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3538.wml	2016-03-31 18:10:25.000000000 +0500
+++ russian/security/2016/dsa-3538.wml	2016-03-31 18:24:01.629846009 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in libebml, a library for
- -manipulating Extensible Binary Meta Language files.</p>
+<p>Ð? libebml, библиоÑ?еке длÑ? обÑ?абоÑ?ки Ñ?айлов в Ñ?оÑ?маÑ?е Extensible Binary Meta Language,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8789";>CVE-2015-8789</a>
 
- -    <p>Context-dependent attackers could trigger a use-after-free
- -    vulnerability by providing a maliciously crafted EBML document.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленники в завиÑ?имоÑ?Ñ?и оÑ? конÑ?екÑ?Ñ?а могÑ?Ñ? вÑ?зваÑ?Ñ? иÑ?полÑ?зование Ñ?казаÑ?елей
+    поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и пÑ?Ñ?Ñ?м пÑ?едоÑ?Ñ?авлениÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного докÑ?менÑ?а EBML.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8790";>CVE-2015-8790</a>
 
- -    <p>Context-dependent attackers could obtain sensitive information
- -    from the process' heap memory by using a maliciously crafted UTF-8
- -    string.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленники в завиÑ?имоÑ?Ñ?и оÑ? конÑ?екÑ?Ñ?а могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?
+    из динамиÑ?еÑ?кой памÑ?Ñ?и пÑ?оÑ?еÑ?Ñ?а пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованной
+    Ñ?Ñ?Ñ?оки в кодиÑ?овке UTF-8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8791";>CVE-2015-8791</a>
 
- -    <p>Context-dependent attackers could obtain sensitive information
- -    from the process' heap memory by using a maliciously crafted
- -    length value in an EBML id.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленники в завиÑ?имоÑ?Ñ?и оÑ? конÑ?екÑ?Ñ?а могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?
+    из динамиÑ?еÑ?кой памÑ?Ñ?и пÑ?оÑ?еÑ?Ñ?а пÑ?и помоÑ?и знаÑ?ениÑ? опÑ?еделÑ?нной
+    длинÑ? в иденÑ?иÑ?икаÑ?оÑ?е EBML.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 1.2.2-2+deb7u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.2.2-2+deb7u1.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.3.0-2+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.0-2+deb8u1.</p>
 
- -<p>For the testing (stretch) and unstable (sid) distributions, these
- -problems have been fixed in version 1.3.3-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.3.3-1.</p>
 
- -<p>We recommend that you upgrade your libebml packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libebml.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=4lTx
-----END PGP SIGNATURE-----


Reply to: