[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3898.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3898.wml	2017-06-25 18:35:10.000000000 +0500
+++ russian/security/2017/dsa-3898.wml	2017-06-25 21:51:44.117351299 +0500
@@ -1,8 +1,9 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in Expat, an XML parsing C
- -library. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? Expat, библиоÑ?еке Ñ?зÑ?ка C длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а XML, бÑ?ли
+обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <p></p>
 
@@ -10,34 +11,35 @@
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9063";>CVE-2016-9063</a>
 
- -    <p>Gustavo Grieco discovered an integer overflow flaw during parsing of
- -    XML. An attacker can take advantage of this flaw to cause a denial
- -    of service against an application using the Expat library.</p></li>
+    <p>Ð?Ñ?Ñ?Ñ?аво Ð?Ñ?ико обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел, возникаÑ?Ñ?ее пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого
+    Ñ?азбоÑ?а XML. Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в
+    обÑ?лÑ?живании в пÑ?иложении, иÑ?полÑ?зÑ?Ñ?Ñ?ем библиоÑ?екÑ? Expat.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9233";>CVE-2017-9233</a>
 
- -    <p>Rhodri James discovered an infinite loop vulnerability within the
- -    entityValueInitProcessor() function while parsing malformed XML
- -    in an external entity. An attacker can take advantage of this
- -    flaw to cause a denial of service against an application using
- -    the Expat library.</p></li>
+    <p>РодÑ?и Ð?жеймÑ? обнаÑ?Ñ?жил беÑ?конеÑ?нÑ?й Ñ?икл в Ñ?Ñ?нкÑ?ии entityValueInitProcessor(),
+    возникаÑ?Ñ?ий пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а XML во внеÑ?ней Ñ?Ñ?Ñ?ноÑ?Ñ?и.
+    Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?и длÑ? вÑ?зова оÑ?каза
+    в обÑ?лÑ?живании в пÑ?иложении, иÑ?полÑ?зÑ?Ñ?Ñ?ем библиоÑ?екÑ?
+    Expat.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 2.1.0-6+deb8u4.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.1.0-6+deb8u4.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 2.2.0-2+deb9u1. For the stable distribution (stretch),
- -<a href="https://security-tracker.debian.org/tracker/CVE-2016-9063";>CVE-2016-9063</a> was already fixed before the initial release.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.0-2+deb9u1. Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?звимоÑ?Ñ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/CVE-2016-9063";>CVE-2016-9063</a> бÑ?ла
+иÑ?пÑ?авлена еÑ?Ñ? до вÑ?пÑ?Ñ?ка.</p>
 
- -<p>For the testing distribution (buster), these problems have been fixed
- -in version 2.2.1-1 or earlier version.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (buster) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.2.1-1 или более Ñ?анниÑ?.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.2.1-1 or earlier version.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.2.1-1 или более Ñ?анниÑ?.</p>
 
- -<p>We recommend that you upgrade your expat packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? expat.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=6+h0
-----END PGP SIGNATURE-----


Reply to: