[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2014/dla-{45,39,46}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2014/dla-39.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-39.wml	2016-06-19 23:11:11.681732675 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Tomas Trnka discovered a heap-based buffer overflow within the gpgsm
- -status handler of GPGME, a library designed to make access to GnuPG
- -easier for applications. An attacker could use this issue to cause an
- -application using GPGME to crash (denial of service) or possibly to
- -execute arbitrary code.</p>
+<p>ТомаÑ? ТÑ?нки обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в обÑ?абоÑ?Ñ?ике
+Ñ?Ñ?аÑ?Ñ?Ñ?а gpgsm в GPGME, библиоÑ?еке, Ñ?азÑ?абоÑ?анной длÑ? облегÑ?ениÑ? пÑ?иложениÑ?м
+обÑ?аÑ?ений к GnuPG. Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? даннÑ?Ñ? пÑ?облемÑ? длÑ? вÑ?зова
+аваÑ?ийной оÑ?Ñ?ановки пÑ?иложениÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?его GPGME, (оÑ?каз в обÑ?лÑ?живании) или возможного
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gpgme1.0 version 1.2.0-1.2+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е gpgme1.0 веÑ?Ñ?ии 1.2.0-1.2+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-45.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-45.wml	2016-06-19 23:07:34.990981980 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
- -<p><a href="https://security-tracker.debian.org/tracker/CVE-2014-3609";>CVE-2014-3609</a>: Denial of Service in Range header processing.</p>
+<p><a href="https://security-tracker.debian.org/tracker/CVE-2014-3609";>CVE-2014-3609</a>: оÑ?каз в обÑ?лÑ?живании пÑ?и обÑ?абоÑ?ке заголовка Range.</p>
 
- -<p>Ignore Range headers with unidentifiable byte-range values. If squid is
- -unable to determine the byte value for ranges, treat the header as
- -invalid.</p>
+<p>ТепеÑ?Ñ? бÑ?дÑ?Ñ? игноÑ?иÑ?оваÑ?Ñ?Ñ?Ñ? заголовки Range Ñ? неопÑ?еделÑ?ннÑ?ми знаÑ?ениÑ?ми байÑ?ового диапазона. Ð?Ñ?ли squid
+не можеÑ? опÑ?еделиÑ?Ñ? байÑ?овое знаÑ?ение длÑ? диапазонов, Ñ?о Ñ?акой заголовок Ñ?Ñ?иÑ?аеÑ?Ñ?Ñ?
+непÑ?авилÑ?нÑ?м.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in squid3 version 3.1.6-1.2+squeeze4</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е squid3 веÑ?Ñ?ии 3.1.6-1.2+squeeze4</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-46.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-46.wml	2016-06-19 23:13:33.851391790 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Boris <q>pi</q> Piwinger and Tavis Ormandy reported a heap overflow
- -vulnerability in procmail's formail utility when processing
- -specially-crafted email headers. A remote attacker could use this flaw
- -to cause formail to crash, resulting in a denial of service or data
- -loss, or possibly execute arbitrary code.</p>
+<p>Ð?оÑ?иÑ? <q>pi</q> Ð?ивингеÑ? и ТÑ?виÑ? Ð?Ñ?манди Ñ?ообÑ?или о пеÑ?еполнении динамиÑ?еÑ?кой
+памÑ?Ñ?и в Ñ?Ñ?илиÑ?е formail из Ñ?оÑ?Ñ?ава procmail, коÑ?оÑ?ое возникаеÑ? пÑ?и обÑ?абоÑ?ке
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? заголовков Ñ?ообÑ?ений Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ?. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки formail, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании или
+поÑ?еÑ?е даннÑ?Ñ?, либо поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in procmail version 3.22-19+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е procmail веÑ?Ñ?ии 3.22-19+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=2K3V
-----END PGP SIGNATURE-----


Reply to: