[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{171,159,274}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-159.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-159.wml	2016-04-26 21:47:45.892856163 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Peter De Wachter discovered that CUPS, the Common UNIX Printing
- -System, did not correctly parse compressed raster files. By submitting
- -a specially crafted raster file, a remote attacker could use this
- -vulnerability to trigger a buffer overflow.</p>
+<p>Ð?еÑ?еÑ? Ð?е Ð?аÑ?Ñ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о CUPS, обÑ?аÑ? Ñ?иÑ?Ñ?ема пеÑ?аÑ?и UNIX,
+непÑ?авилÑ?но вÑ?полнÑ?еÑ? гÑ?аммаÑ?иÑ?еÑ?кой Ñ?азбоÑ? Ñ?жаÑ?Ñ?Ñ? Ñ?аÑ?Ñ?еÑ?нÑ?Ñ? Ñ?айлов. Ð?еÑ?едаваÑ?
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?аÑ?Ñ?еÑ?нÑ?й Ñ?айл, Ñ?далÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а.</p>
 
- -<p>For the oldstable distribution (squeeze), this problem has been fixed in
- -version 1.4.4-7+squeeze7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4.4-7+squeeze7.</p>
 
- -<p>For the stable distribution (wheezy), this problem has been fixed in
- -version 1.5.3-5+deb7u5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.5.3-5+deb7u5.</p>
 
- -<p>We recommend that you upgrade your cups packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? cups.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-171.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-171.wml	2016-04-26 21:45:29.507861883 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Mariusz Ziulek reported that libssh2, a SSH2 client-side library, was
- -reading and using the SSH_MSG_KEXINIT packet without doing sufficient
- -range checks when negotiating a new SSH session with a remote server. A
- -malicious attacker could man in the middle a real server and cause a
- -client using the libssh2 library to crash (denial of service) or
- -otherwise read and use unintended memory areas in this process.</p>
+<p>Ð?аÑ?иÑ?Ñ? Ð?илек Ñ?ообÑ?ил, Ñ?Ñ?о libssh2, клиенÑ?Ñ?каÑ? библиоÑ?ека SSH2, Ñ?Ñ?иÑ?Ñ?ваеÑ?
+и иÑ?полÑ?зÑ?еÑ? пакеÑ? SSH_MSG_KEXINIT без вÑ?полнениÑ? необÑ?одимÑ?Ñ? пÑ?овеÑ?ок
+гÑ?аниÑ? маÑ?Ñ?ива пÑ?и Ñ?оглаÑ?овании новой Ñ?еÑ?Ñ?ии SSH Ñ? Ñ?далÑ?ннÑ?м Ñ?еÑ?веÑ?ом. Ð?лоÑ?мÑ?Ñ?ленник
+можеÑ? вÑ?полниÑ?Ñ? аÑ?акÑ? по пÑ?инÑ?ипÑ? Ñ?еловек-в-Ñ?еÑ?едине и вÑ?даÑ?Ñ? Ñ?ебÑ? за Ñ?еÑ?веÑ?, Ñ?Ñ?о
+пÑ?иведÑ?Ñ? к аваÑ?ийномÑ? завеÑ?Ñ?ениÑ? Ñ?абоÑ?Ñ? клиенÑ?а, иÑ?полÑ?зÑ?Ñ?Ñ?его библиоÑ?екÑ? libssh2 (оÑ?каз в обÑ?лÑ?живании) или
+к Ñ?Ñ?ениÑ? и иÑ?полÑ?зованиÑ? непÑ?авилÑ?нÑ?Ñ? облаÑ?Ñ?ей памÑ?Ñ?и Ñ?Ñ?им пÑ?оÑ?еÑ?Ñ?ом.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libssh2 version 1.2.6-1+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в libssh2 веÑ?Ñ?ии 1.2.6-1+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-274.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-274.wml	2016-04-26 21:52:26.524330298 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>cpnrodzc7, working with HP's Zero Day Initiative, discovered that
- -Java applications using standard Java serialization mechanisms to
- -decode untrusted data, and that have Groovy on their classpath, can
- -be passed a serialized object that will cause the application to
- -execute arbitrary code.</p>
+<p>cpnrodzc7, Ñ?абоÑ?аÑ?Ñ?ий в HP Zero Day Initiative, обнаÑ?Ñ?жил, Ñ?Ñ?о
+пÑ?иложениÑ? на Java, иÑ?полÑ?зÑ?Ñ?Ñ?ие Ñ?Ñ?андаÑ?Ñ?нÑ?е меÑ?анизмÑ? Ñ?еÑ?иализаÑ?ии Java длÑ?
+декодиÑ?ованиÑ? недовеÑ?еннÑ?Ñ? даннÑ?Ñ? и имеÑ?Ñ?ие Groovy в classpath, могÑ?Ñ?
+полÑ?Ñ?иÑ?Ñ? Ñ?еÑ?иализованнÑ?й обÑ?екÑ?, коÑ?оÑ?Ñ?й пÑ?иведÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о Ñ?акое пÑ?иложение
+вÑ?полниÑ? пÑ?оизволÑ?нÑ?й код.</p>
 
- -<p>For the oldoldstable distribution (squeeze), this problem has been
- -fixed in version 1.7.0-4+deb6u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в веÑ?Ñ?ии 1.7.0-4+deb6u1.</p>
 
- -<p>For the oldstable distribution (wheezy) and stable distribution
- -(jessie), this problem will be fixed soon.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном (wheezy) и Ñ?Ñ?абилÑ?ном (jessie) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=EzLN
-----END PGP SIGNATURE-----


Reply to: