[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-356{4,5}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3564.wml	2016-05-02 22:19:19.000000000 +0500
+++ russian/security/2016/dsa-3564.wml	2016-05-02 22:26:51.717433745 +0500
@@ -1,50 +1,50 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1660";>CVE-2016-1660</a>
 
- -    <p>Atte Kettunen discovered an out-of-bounds write issue.</p></li>
+    <p>Ð?Ñ?Ñ?е Ð?еÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил пÑ?облемÑ? Ñ? запиÑ?Ñ?Ñ? за пÑ?еделÑ? вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1661";>CVE-2016-1661</a>
 
- -    <p>Wadih Matar discovered a memory corruption issue.</p></li>
+    <p>Ð?ади Ð?аÑ?аÑ? обнаÑ?Ñ?жил пÑ?облемÑ? Ñ? повÑ?еждением Ñ?одеÑ?жимого памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1662";>CVE-2016-1662</a>
 
- -    <p>Rob Wu discovered a use-after-free issue related to extensions.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил пÑ?облемÑ? Ñ? иÑ?полÑ?зованием Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и, Ñ?вÑ?заннÑ?Ñ? Ñ? Ñ?аÑ?Ñ?иÑ?ениÑ?ми.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1663";>CVE-2016-1663</a>
 
- -    <p>A use-after-free issue was discovered in Blink's bindings to V8.</p></li>
+    <p>Ð? пÑ?ивÑ?зкаÑ? Blink к V8 бÑ?ло обнаÑ?Ñ?жено иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1664";>CVE-2016-1664</a>
 
- -    <p>Wadih Matar discovered a way to spoof URLs.</p></li>
+    <p>Ð?ади Ð?аÑ?аÑ? обнаÑ?Ñ?жил Ñ?поÑ?об подделки URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1665";>CVE-2016-1665</a>
 
- -    <p>gksgudtjr456 discovered an information leak in the v8 javascript
- -    library.</p></li>
+    <p>gksgudtjr456 обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии в javascript-библиоÑ?еке v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1666";>CVE-2016-1666</a>
 
- -    <p>The chrome development team found and fixed various issues during
- -    internal auditing.</p></li>
+    <p>Ð?оманда Ñ?азÑ?абоÑ?ки chrome обнаÑ?Ñ?жила и иÑ?пÑ?авила Ñ?азлиÑ?нÑ?е пÑ?облемÑ? в Ñ?оде
+    внÑ?Ñ?Ñ?еннего аÑ?диÑ?а.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 50.0.2661.94-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 50.0.2661.94-1~deb8u1.</p>
 
- -<p>For the testing distribution (stretch), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 50.0.2661.94-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 50.0.2661.94-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3565.wml	2016-05-02 22:21:05.000000000 +0500
+++ russian/security/2016/dsa-3565.wml	2016-05-02 22:44:19.393480480 +0500
@@ -1,57 +1,57 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several security vulnerabilities were found in botan1.10, a C++
- -library which provides support for many common cryptographic
- -operations, including encryption, authentication, X.509v3 certificates
- -and CRLs.</p>
+<p>Ð? botan1.10, библиоÑ?еке C++, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ей поддеÑ?жкÑ? длÑ? многиÑ? опеÑ?аÑ?ий
+Ñ?иÑ?Ñ?ованиÑ? обÑ?его назнаÑ?ениÑ?, вклÑ?Ñ?аÑ? Ñ?иÑ?Ñ?ование, аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ?, Ñ?еÑ?Ñ?иÑ?икаÑ?Ñ? X.509v3 и
+CRL, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5726";>CVE-2015-5726</a>
 
- -    <p>The BER decoder would crash due to reading from offset 0 of an
- -    empty vector if it encountered a BIT STRING which did not contain
- -    any data at all. This can be used to easily crash applications
- -    reading untrusted ASN.1 data, but does not seem exploitable for
- -    code execution.</p></li>
+    <p>Ð?екодеÑ? BER аваÑ?ийно завеÑ?Ñ?аеÑ? Ñ?абоÑ?Ñ? из-за Ñ?Ñ?ениÑ? из наÑ?алÑ?ного номеÑ?а 0
+    пÑ?Ñ?Ñ?ого векÑ?оÑ?а в Ñ?лÑ?Ñ?ае, еÑ?ли вÑ?Ñ?Ñ?еÑ?аеÑ?Ñ?Ñ? BIT STRING, не Ñ?одеÑ?жаÑ?аÑ?
+    какие-либо даннÑ?е. ЭÑ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? аваÑ?ийного завеÑ?Ñ?ениÑ? Ñ?абоÑ?Ñ?
+    пÑ?иложений, вÑ?полнÑ?Ñ?Ñ?иÑ? Ñ?Ñ?ение недовеÑ?еннÑ?Ñ? даннÑ?Ñ? ASN.1, но Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? не можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?полнениÑ? кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5727";>CVE-2015-5727</a>
 
- -    <p>The BER decoder would allocate a fairly arbitrary amount of memory
- -    in a length field, even if there was no chance the read request
- -    would succeed. This might cause the process to run out of memory or
- -    invoke the OOM killer.</p></li>
+    <p>Ð?екодеÑ? BER вÑ?делÑ?еÑ? пÑ?оизволÑ?ное колиÑ?еÑ?Ñ?во памÑ?Ñ?и в поле длинÑ? даже в Ñ?ом
+    Ñ?лÑ?Ñ?ае, еÑ?ли неÑ? никакиÑ? Ñ?анÑ?ов, Ñ?Ñ?о запÑ?оÑ? на Ñ?Ñ?ение бÑ?деÑ?
+    Ñ?Ñ?пеÑ?ен. ЭÑ?о можеÑ? пÑ?ивеÑ?Ñ?и к Ñ?омÑ?, Ñ?Ñ?о пÑ?оÑ?еÑ?Ñ? изÑ?аÑ?Ñ?одÑ?еÑ? вÑ?Ñ? вÑ?деленнÑ?Ñ? памÑ?Ñ?Ñ? или
+    запÑ?Ñ?Ñ?иÑ? Ñ?лÑ?жбÑ? аваÑ?ийной оÑ?иÑ?Ñ?ки памÑ?Ñ?и (OOM).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7827";>CVE-2015-7827</a>
 
- -    <p>Use constant time PKCS #1 unpadding to avoid possible side channel
- -    attack against RSA decryption</p></li>
+    <p>Ð?Ñ?полÑ?зование поÑ?Ñ?оÑ?нного вÑ?емени Ñ?далениÑ? биÑ?ов заполниÑ?елÑ? PKCS #1 длÑ? Ñ?ого, Ñ?Ñ?обÑ?
+    избежаÑ?Ñ? возможной аÑ?аки Ñ?еÑ?ез Ñ?Ñ?оÑ?онний канал на Ñ?аÑ?Ñ?иÑ?Ñ?овкÑ? RSA</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2194";>CVE-2016-2194</a>
 
- -    <p>Infinite loop in modular square root algorithm.
- -    The ressol function implementing the Tonelli-Shanks algorithm for
- -    finding square roots could be sent into a nearly infinite loop due
- -    to a misplaced conditional check. This could occur if a composite
- -    modulus is provided, as this algorithm is only defined for primes.
- -    This function is exposed to attacker controlled input via the
- -    OS2ECP function during ECC point decompression.</p></li>
+    <p>Ð?еÑ?конеÑ?нÑ?й Ñ?икл в алгоÑ?иÑ?ме модÑ?лÑ?ного вÑ?Ñ?иÑ?лениÑ? квадÑ?аÑ?нÑ?Ñ? коÑ?ней.
+    ФÑ?нкÑ?иÑ? ressol, Ñ?еализÑ?Ñ?Ñ?аÑ? алгоÑ?иÑ?м ШенкÑ?а длÑ?
+    наÑ?ождениÑ? квадÑ?аÑ?нÑ?Ñ? коÑ?ней, можеÑ? войÑ?и в поÑ?Ñ?и беÑ?конеÑ?нÑ?й Ñ?икл из-за
+    непÑ?авилÑ?но Ñ?аÑ?положенной пÑ?овеÑ?ки Ñ?Ñ?ловиÑ?. ЭÑ?о можеÑ? возникаÑ?Ñ? в Ñ?лÑ?Ñ?ае
+    пÑ?едоÑ?Ñ?авлениÑ? Ñ?оÑ?Ñ?авного модÑ?лÑ?, поÑ?колÑ?кÑ? Ñ?Ñ?оÑ? алгоÑ?иÑ?м опÑ?еделÑ?н Ñ?олÑ?ко длÑ? пÑ?оÑ?Ñ?Ñ?Ñ?.
+    ЭÑ?а Ñ?Ñ?нкÑ?иÑ? оÑ?кÑ?Ñ?Ñ?а длÑ? вÑ?однÑ?Ñ? даннÑ?Ñ? злоÑ?мÑ?Ñ?ленника Ñ?еÑ?ез
+    Ñ?Ñ?нкÑ?иÑ? OS2ECP в Ñ?оде Ñ?аÑ?паковки Ñ?оÑ?ки ECC.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2195";>CVE-2016-2195</a>
 
- -    <p>Fix Heap overflow on invalid ECC point.</p></li>
+    <p>Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и в непÑ?авилÑ?ной Ñ?оÑ?ке ECC.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2849";>CVE-2016-2849</a>
 
- -    <p>Use constant time modular inverse algorithm to avoid possible
- -    side channel attack against ECDSA.</p></li>
+    <p>Ð?Ñ?полÑ?зование поÑ?Ñ?оÑ?нного вÑ?емени модÑ?лÑ?ного алгоÑ?иÑ?ма обÑ?аÑ?ного пÑ?евÑ?аÑ?ениÑ? длÑ? Ñ?ого,
+    Ñ?Ñ?обÑ? избежаÑ?Ñ? аÑ?аки Ñ?еÑ?ез Ñ?Ñ?оÑ?онний канал на ECDSA.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.10.8-2+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.10.8-2+deb8u1.</p>
 
- -<p>We recommend that you upgrade your botan1.10 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? botan1.10.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=BmXD
-----END PGP SIGNATURE-----


Reply to: