[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3790.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3790.wml	2017-02-17 10:34:02.000000000 +0500
+++ russian/security/2017/dsa-3790.wml	2017-02-17 10:39:32.906641617 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in spice, a SPICE protocol
- -client and server library. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? spice, клиенÑ?Ñ?кой и Ñ?еÑ?веÑ?ной библиоÑ?еке поддеÑ?жки пÑ?оÑ?окола SPICE,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9577";>CVE-2016-9577</a>
 
- -    <p>Frediano Ziglio of Red Hat discovered a buffer overflow
- -    vulnerability in the main_channel_alloc_msg_rcv_buf function. An
- -    authenticated attacker can take advantage of this flaw to cause a
- -    denial of service (spice server crash), or possibly, execute
- -    arbitrary code.</p></li>
+    <p>ФÑ?едиано Ð?иглио из Red Hat обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а
+    в Ñ?Ñ?нкÑ?ии main_channel_alloc_msg_rcv_buf. Ð?Ñ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?й
+    злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова
+    оÑ?каза в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?еÑ?веÑ?а spice) или поÑ?енÑ?иалÑ?но
+    вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9578";>CVE-2016-9578</a>
 
- -    <p>Frediano Ziglio of Red Hat discovered that spice does not properly
- -    validate incoming messages. An attacker able to connect to the
- -    spice server could send crafted messages which would cause the
- -    process to crash.</p></li>
+    <p>ФÑ?едиано Ð?иглио из Red Hat обнаÑ?Ñ?жил, Ñ?Ñ?о spice непÑ?авилÑ?но вÑ?полнÑ?еÑ?
+    пÑ?овеÑ?кÑ? вÑ?одÑ?Ñ?иÑ? Ñ?ообÑ?ений. Ð?лоÑ?мÑ?Ñ?ленник, Ñ?поÑ?обнÑ?й подклÑ?Ñ?иÑ?Ñ?Ñ?Ñ? к
+    Ñ?еÑ?веÑ?Ñ? spice, можеÑ? оÑ?пÑ?авиÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е Ñ?ообÑ?ениÑ?, коÑ?оÑ?Ñ?е
+    пÑ?иведÑ?Ñ? к аваÑ?ийномÑ? завеÑ?Ñ?ениÑ? Ñ?еÑ?веÑ?ного пÑ?оÑ?еÑ?Ñ?а.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 0.12.5-1+deb8u4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.12.5-1+deb8u4.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 0.12.8-2.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.12.8-2.1.</p>
 
- -<p>We recommend that you upgrade your spice packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? spice.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=6J/Q
-----END PGP SIGNATURE-----


Reply to: