--- ../../english/security/2018/dsa-4202.wml 2018-05-17 13:05:59.000000000 +0500 +++ 2018/dsa-4202.wml 2018-05-17 13:08:35.878108126 +0500 @@ -1,23 +1,23 @@ -<define-tag description>security update</define-tag> +#use wml::debian::translation-check translation="1.1" mindelta="1" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи</define-tag> <define-tag moreinfo> -<p>OSS-fuzz, assisted by Max Dymond, discovered that cURL, an URL transfer -library, could be tricked into reading data beyond the end of a heap -based buffer when parsing invalid headers in an RTSP response.</p> +<p>УÑаÑÑники пÑоекÑа OSS-fuzz Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÐакÑа Ðаймонда обнаÑÑжили, ÑÑо cURL, библиоÑека +пеÑедаÑи URL, Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑоизводиÑÑ ÑÑение за гÑаниÑами вÑделенного бÑÑеÑа динамиÑеÑкой +памÑÑи пÑи вÑполнении гÑаммаÑиÑеÑкого ÑазбоÑа некоÑÑекÑнÑÑ Ð·Ð°Ð³Ð¾Ð»Ð¾Ð²ÐºÐ¾Ð² в RTSP-оÑвеÑе.</p> -<p>For the oldstable distribution (jessie), this problem has been fixed -in version 7.38.0-4+deb8u11.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (jessie) ÑÑа пÑоблема бÑла иÑпÑавлена +в веÑÑии 7.38.0-4+deb8u11.</p> -<p>For the stable distribution (stretch), this problem has been fixed in +<p>Ð ÑÑабилÑном вÑпÑÑке (stretch) ÑÑа пÑоблема бÑла иÑпÑавлена в version 7.52.1-5+deb9u6.</p> -<p>We recommend that you upgrade your curl packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ curl.</p> -<p>For the detailed security status of curl please refer to -its security tracker page at: +<p>С подÑобнÑм ÑÑаÑÑÑом поддеÑжки безопаÑноÑÑи curl можно ознакомиÑÑÑÑ Ð½Ð° +ÑооÑвеÑÑÑвÑÑÑей ÑÑÑаниÑе оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи по адÑеÑÑ <a href="https://security-tracker.debian.org/tracker/curl">\ https://security-tracker.debian.org/tracker/curl</a></p> </define-tag> # do not modify the following line #include "$(ENGLISHDIR)/security/2018/dsa-4202.data" -# $Id: dsa-4202.wml,v 1.1 2018/05/17 08:05:59 dogsleg Exp $