[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-396{5,6}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3965.wml	2017-09-06 01:20:23.000000000 +0500
+++ russian/security/2017/dsa-3965.wml	2017-09-06 10:55:57.178398320 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Thomas Jarosch discovered a stack-based buffer overflow flaw in file, a
- -file type classification tool, which may result in denial of service if
- -an ELF binary with a specially crafted .notes section is processed.</p>
+<p>ТомаÑ? ЯÑ?оÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в file, инÑ?Ñ?Ñ?Ñ?менÑ?е
+длÑ? клаÑ?Ñ?иÑ?икаÑ?ии Ñ?айлов по Ñ?ипам, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании
+в Ñ?лÑ?Ñ?ае обÑ?абоÑ?ки двоиÑ?ного Ñ?айла ELF Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м Ñ?азделом .notes.</p>
 
- -<p>For the stable distribution (stretch), this problem has been fixed in
- -version 1:5.30-1+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:5.30-1+deb9u1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:5.32-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:5.32-1.</p>
 
- -<p>We recommend that you upgrade your file packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? file.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3966.wml	2017-09-06 01:50:33.000000000 +0500
+++ russian/security/2017/dsa-3966.wml	2017-09-06 10:59:40.410723503 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in the interpreter for the Ruby
- -language:</p>
+<p>Ð? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е длÑ? Ñ?зÑ?ка пÑ?огÑ?аммиÑ?ованиÑ? Ruby бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е
+Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-9096";>CVE-2015-9096</a>
 
- -    <p>SMTP command injection in Net::SMTP.</p></li>
+    <p>Ð?нÑ?екÑ?иÑ? команд SMTP в Net::SMTP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7798";>CVE-2016-7798</a>
 
- -    <p>Incorrect handling of initialization vector in the GCM mode in the
- -    OpenSSL extension.</p></li>
+    <p>Ð?екоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка векÑ?оÑ?а иниÑ?иализаÑ?ии в Ñ?ежиме GCM в
+    Ñ?аÑ?Ñ?иÑ?ении OpenSSL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0900";>CVE-2017-0900</a>
 
- -    <p>Denial of service in the RubyGems client.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в клиенÑ?е RubyGems.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0901";>CVE-2017-0901</a>
 
- -    <p>Potential file overwrite in the RubyGems client.</p></li>
+    <p>Ð?оÑ?енÑ?иалÑ?наÑ? пеÑ?езапиÑ?Ñ? Ñ?айлов в клиенÑ?е RubyGems.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-0902";>CVE-2017-0902</a>
 
- -    <p>DNS hijacking in the RubyGems client.</p></li>
+    <p>Ð?еÑ?еÑ?ваÑ? DNS в клиенÑ?е RubyGems.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14064";>CVE-2017-14064</a>
 
- -    <p>Heap memory disclosure in the JSON library.</p></li>
+    <p>РаÑ?кÑ?Ñ?Ñ?ие Ñ?одеÑ?жимого динамиÑ?еÑ?кой памÑ?Ñ?и в библиоÑ?еке JSON.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 2.3.3-1+deb9u1. This update also hardens RubyGems against
- -malicious terminal escape sequences (<a href="https://security-tracker.debian.org/tracker/CVE-2017-0899";>CVE-2017-0899</a>).</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.3.3-1+deb9u1. Ð? данном обновлении Ñ?лÑ?Ñ?Ñ?ена безопаÑ?ноÑ?Ñ?Ñ? RubyGems по оÑ?ноÑ?ениÑ?
+к вÑ?едоноÑ?нÑ?м Ñ?кÑ?аниÑ?Ñ?Ñ?Ñ?им поÑ?ледоваÑ?елÑ?ноÑ?Ñ?Ñ?м (<a href="https://security-tracker.debian.org/tracker/CVE-2017-0899";>CVE-2017-0899</a>).</p>
 
- -<p>We recommend that you upgrade your ruby2.3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? ruby2.3.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=dtfi
-----END PGP SIGNATURE-----


Reply to: