[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-39{18,19,20}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3918.wml	2017-07-26 18:51:54.000000000 +0500
+++ russian/security/2017/dsa-3918.wml	2017-07-26 19:01:41.340321501 +0500
@@ -1,19 +1,20 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple security issues have been found in Thunderbird, which may lead
- -to the execution of arbitrary code or denial of service.</p>
+<p>Ð? Thunderbird бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода или оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
- -<p>Debian follows the extended support releases (ESR) of Thunderbird.
- -Support for the 45.x series has ended, so starting with this update
- -we're now following the 52.x releases.</p>
+<p>Debian Ñ?ледÑ?еÑ? вÑ?пÑ?Ñ?кам Thunderbird Ñ? Ñ?аÑ?Ñ?иÑ?енной поддеÑ?жкой (ESR).
+Ð?оддеÑ?жка веÑ?ки 45.x бÑ?ла пÑ?екÑ?аÑ?ена, поÑ?Ñ?омÑ? наÑ?инаÑ? Ñ? данного обновлениÑ?
+мÑ? Ñ?ледÑ?еÑ? вÑ?пÑ?Ñ?кам веÑ?ки 52.x.</p>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 1:52.2.1-4~deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1:52.2.1-4~deb8u1.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 1:52.2.1-4~deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:52.2.1-4~deb9u1.</p>
 
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3919.wml	2017-07-26 18:53:55.000000000 +0500
+++ russian/security/2017/dsa-3919.wml	2017-07-26 19:04:38.597983302 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in OpenJDK, an
- -implementation of the Oracle Java platform, resulting in sandbox bypass,
- -use of insecure cryptography, side channel attacks, information
- -disclosure, the execution of arbitrary code, denial of service or
- -bypassing Jar verification.</p>
+<p>Ð? OpenJDK, Ñ?еализаÑ?ии плаÑ?Ñ?оÑ?мÑ? Oracle Java, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е пÑ?иводÑ?Ñ? в вÑ?Ñ?одÑ? из пеÑ?оÑ?ниÑ?Ñ?, иÑ?полÑ?зованиÑ?
+небезопаÑ?ной кÑ?ипÑ?огÑ?аÑ?ии, аÑ?акам Ñ?еÑ?ез Ñ?Ñ?оÑ?онние каналÑ?, Ñ?аÑ?кÑ?Ñ?Ñ?иÑ?
+инÑ?оÑ?маÑ?ии, вÑ?полнениÑ? пÑ?оизволÑ?ного кода, оÑ?казÑ? в обÑ?лÑ?живании или
+обÑ?одÑ? пÑ?овеÑ?ки Jar.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 8u141-b15-1~deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8u141-b15-1~deb9u1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 8u141-b15-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8u141-b15-1.</p>
 
- -<p>We recommend that you upgrade your openjdk-8 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openjdk-8.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3920.wml	2017-07-26 18:55:06.000000000 +0500
+++ russian/security/2017/dsa-3920.wml	2017-07-26 19:09:30.189873313 +0500
@@ -1,52 +1,53 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities were found in in qemu, a fast processor
- -emulator:</p>
+<p>Ð? qemu, бÑ?Ñ?Ñ?Ñ?ом Ñ?мÑ?лÑ?Ñ?оÑ?е пÑ?оÑ?еÑ?Ñ?оÑ?а, бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е
+Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9310";>CVE-2017-9310</a>
 
- -    <p>Denial of service via infinite loop in e1000e NIC emulation.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за беÑ?конеÑ?ного Ñ?икла в коде Ñ?мÑ?лÑ?Ñ?ии Ñ?еÑ?евой каÑ?Ñ?Ñ? e1000e.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9330";>CVE-2017-9330</a>
 
- -    <p>Denial of service via infinite loop in USB OHCI emulation.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за беÑ?конеÑ?ного Ñ?икла в коде Ñ?мÑ?лÑ?Ñ?ии USB OHCI.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9373";>CVE-2017-9373</a>
 
- -    <p>Denial of service via memory leak in IDE AHCI emulation.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за Ñ?Ñ?еÑ?ки памÑ?Ñ?и в коде Ñ?мÑ?лÑ?Ñ?ии IDE AHCI.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9374";>CVE-2017-9374</a>
 
- -    <p>Denial of service via memory leak in USB EHCI emulation.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за Ñ?Ñ?еÑ?ки памÑ?Ñ?и в коде Ñ?мÑ?лÑ?Ñ?ии USB EHCI.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9375";>CVE-2017-9375</a>
 
- -    <p>Denial of service via memory leak in USB XHCI emulation.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за Ñ?Ñ?еÑ?ки памÑ?Ñ?и в коде Ñ?мÑ?лÑ?Ñ?ии USB XHCI.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9524";>CVE-2017-9524</a>
 
- -    <p>Denial of service in qemu-nbd server.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в Ñ?еÑ?веÑ?е qemu-nbd.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10664";>CVE-2017-10664</a>
 
- -    <p>Denial of service in qemu-nbd server.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в Ñ?еÑ?веÑ?е qemu-nbd.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10911";>CVE-2017-10911</a>
 
- -    <p>Information leak in Xen blkif response handling.</p></li>
+    <p>УÑ?еÑ?ка инÑ?оÑ?маÑ?ии в коде обÑ?абоÑ?ки blkif-оÑ?веÑ?ов Xen.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), a separate DSA will be issued.</p>
+<p>Ð?лÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (jessie) бÑ?деÑ? вÑ?пÑ?Ñ?ена оÑ?делÑ?наÑ? Ñ?екомендаÑ?иÑ?.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 1:2.8+dfsg-6+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:2.8+dfsg-6+deb9u1.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your qemu packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? qemu.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=OPR4
-----END PGP SIGNATURE-----


Reply to: