[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{270,355}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-270.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-270.wml	2016-04-29 22:42:30.390852800 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability has been found in the Internet Domain Name Server bind9:</p>
+<p>Ð? DNS-Ñ?еÑ?веÑ?е bind9 бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-4620";>CVE-2015-4620</a>
 
- -    <p>Breno Silveira Soares of Servico Federal de Processamento de Dados (SERPRO)
- -    discovered that the BIND DNS server is prone to a denial of service
- -    vulnerability. A remote attacker who can cause a validating resolver
- -    to query a zone containing specifically constructed contents can
- -    cause the resolver to terminate with an assertion failure, resulting
- -    in a denial of service to clients relying on the resolver.</p></li>
+    <p>Ð?Ñ?ено СилÑ?вейÑ?а из Servico Federal de Processamento de Dados (SERPRO)
+    обнаÑ?Ñ?жил, Ñ?Ñ?о DNS-Ñ?еÑ?веÑ? BIND Ñ?одеÑ?жиÑ? оÑ?каз в
+    обÑ?лÑ?живании. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник, коÑ?оÑ?Ñ?й можеÑ? заÑ?Ñ?авиÑ?Ñ? Ñ?лÑ?жбÑ? пÑ?овеÑ?Ñ?Ñ?Ñ?его Ñ?азÑ?еÑ?ениÑ?
+    имÑ?н вÑ?полниÑ?Ñ? запÑ?оÑ? зонÑ?, Ñ?одеÑ?жаÑ?ей Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное Ñ?одеÑ?жимое, можеÑ?
+    вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? Ñ?лÑ?жбÑ? Ñ?азÑ?еÑ?ениÑ? имÑ?н из-за оÑ?ибки Ñ?Ñ?веÑ?ждениÑ?, Ñ?Ñ?о пÑ?иводиÑ?
+    к оÑ?казÑ? в обÑ?лÑ?живании по оÑ?ноÑ?ениÑ? к клиенÑ?ам, обÑ?аÑ?аÑ?Ñ?имÑ?Ñ? к Ñ?Ñ?ой Ñ?лÑ?жбе.</p></li>
 
 </ul>
 
- -<p>For the squeeze distribution, these issues have been fixed in version
- -9.7.3.dfsg-1~squeeze15 of bind9.</p>
+<p>Ð? вÑ?пÑ?Ñ?ке squeeze Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
+9.7.3.dfsg-1~squeeze15 пакеÑ?а bind9.</p>
 
- -<p>We recommend that you upgrade your bind9 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? bind9.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-355.wml	2016-04-08 00:21:20.000000000 +0500
+++ russian/security/2015/dla-355.wml	2016-04-29 22:46:39.783036977 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8241";>CVE-2015-8241</a>
 
- -    <p>Buffer overread with XML parser in xmlNextChar</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в коде гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а XML в xmlNextChar</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8317";>CVE-2015-8317</a>
 
   <ul>
- -  <li>issues in the xmlParseXMLDecl function:
- -    If we fail conversing the current input stream while
- -    processing the encoding declaration of the XMLDecl
- -    then it's safer to just abort there and not try to
- -    report further errors.</li>
- -  <li>If the string is not properly terminated do not try to convert
- -    to the given encoding.
+  <li>Ð?Ñ?облемÑ? в Ñ?Ñ?нкÑ?ии xmlParseXMLDecl:
+    Ð?Ñ?ли мÑ? не можем пÑ?еобÑ?азоваÑ?Ñ? Ñ?екÑ?Ñ?ий вÑ?одной поÑ?ок во
+    вÑ?емÑ? обÑ?абоÑ?ки кодиÑ?Ñ?Ñ?Ñ?ей деклаÑ?аÑ?ии XMLDecl,
+    Ñ?о безопаÑ?нее пÑ?оÑ?Ñ?о пÑ?еÑ?ваÑ?Ñ? Ñ?абоÑ?Ñ? и более не пÑ?Ñ?аÑ?Ñ?Ñ?Ñ?
+    Ñ?ообÑ?аÑ?Ñ? о дÑ?Ñ?гиÑ? оÑ?ибкаÑ?..</li>
+  <li>Ð?Ñ?ли Ñ?Ñ?Ñ?ока завеÑ?Ñ?аеÑ?Ñ?Ñ? непÑ?авилÑ?но, не пÑ?Ñ?аÑ?Ñ?Ñ?Ñ? пÑ?еобÑ?азоваÑ?Ñ?
+    еÑ? в даннÑ?Ñ? кодиÑ?овкÑ?.
   </ul></li>
 
 </ul>
 
- -<p>Additional fix for off by one error in previous patch for <a href="https://security-tracker.debian.org/tracker/CVE-2015-7942";>CVE-2015-7942</a>
- -(thanks to Salvatore for spotting this)</p>
+<p>Ð?ополниÑ?елÑ?ное иÑ?пÑ?авление оÑ?ибки на единиÑ?Ñ? в пÑ?едÑ?дÑ?Ñ?ей заплаÑ?е длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2015-7942";>CVE-2015-7942</a>
+(благодаÑ?им СалÑ?ваÑ?оÑ?е за обнаÑ?Ñ?жение Ñ?Ñ?ой пÑ?облемÑ?)</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXI54HAAoJEF7nbuICFtKlVk4P/j2AtOz9NTfUfPyz/Wz/RJN1
7cvlHHbcMigv2MqrewBhQvhjx5GU86wHJm29uywTZRAw3G+LGRo0kkCd4ytD76WU
DAhBLTQUQnndWagNTUKMhygrlgiBjGOkguwqGHx+fV+z2Vxk8KWfC7mfiBDO2kTy
6QDj11lRHsaB8/sljPsA/xmVs66cEgXBs6F/WwnZD20oWr6o3UUUxO8C5uVjLNvj
UKUkgzvTSTd/zkn8Dx4dPuqGSXXRj6GEk2zf/dybwq6COlcyh/d4jzxNLzD9DU8B
C46t4KJbojW8/iSetJUKRIXWZwQ6/XjBVYjKJsQzVz23JVnkOQyqPnlbr2BDiOLF
5kwo9KS7KnozVT2reedaZeYczecJbK8/M2lwnl0b5Tz45/U9nEu+JxXPlI9sr9ZL
G/7aY1OFqyNhlLavUqoY/aO9hljcfmMdH0zMcsmiQwiPZnNFB8pYC5Kg16seFlKE
ue4FY2HqZ6jBN1DhKrwWXmo0q1QtOmTTEvUpwp6ANbS9kAkEUQkU8taXfE63lqit
5db+GIabrcMd7n8fAR2k40ImIteinrObVd6YgqX245rYnG8vsl1kTSspm7VEeIA9
ZASgIUPdcznjQAG7DrS/p0uTQGcyBHI5001O4+c9jY/S6gbcalwqmKWWNNHdEybs
xWsKMNd6QV4Iad/8WZaO
=K+xS
-----END PGP SIGNATURE-----


Reply to: