[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-354{4,5}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3544.wml	2016-04-07 21:35:18.000000000 +0500
+++ russian/security/2016/dsa-3544.wml	2016-04-08 00:05:47.005114649 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Django, a high-level Python
- -web development framework. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Django, вÑ?Ñ?окоÑ?Ñ?овневой инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е длÑ? веб-Ñ?азÑ?абоÑ?ки на Python,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2512";>CVE-2016-2512</a>
 
- -    <p>Mark Striemer discovered that some user-supplied redirect URLs
- -    containing basic authentication credentials are incorrectly handled,
- -    potentially allowing a remote attacker to perform a malicious
- -    redirect or a cross-site scripting attack.</p></li>
+    <p>Ð?аÑ?к ШÑ?имеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?оÑ?Ñ?е пеÑ?едаваемÑ?е полÑ?зоваÑ?елем пеÑ?енапÑ?авлениÑ? URL,
+    Ñ?одеÑ?жаÑ?ие даннÑ?е длÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии, обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? некоÑ?Ñ?екÑ?но,
+    Ñ?Ñ?о поÑ?енÑ?иалÑ?но позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?еднамеÑ?еннÑ?е
+    пеÑ?енапÑ?авлениÑ? или оÑ?Ñ?Ñ?еÑ?Ñ?влÑ?Ñ?Ñ? аÑ?аки по пÑ?инÑ?ипÑ? межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2513";>CVE-2016-2513</a>
 
- -    <p>Sjoerd Job Postmus discovered that Django allows user enumeration
- -    through timing difference on password hasher work factor upgrades.</p></li>
+    <p>СÑ?Ñ?Ñ?д Ð?оÑ?Ñ?мÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о Django позволÑ?еÑ? поÑ?ледоваÑ?елÑ?но пеÑ?ебиÑ?аÑ?Ñ? полÑ?зоваÑ?елей Ñ?еÑ?ез
+    Ñ?азлиÑ?иÑ? во вÑ?еменнÑ?Ñ? заÑ?Ñ?аÑ?аÑ? пÑ?и обновлении коÑ?Ñ?Ñ?иÑ?иенÑ?а Ñ?Ñ?Ñ?иÑ?Ñ?Ñ?Ñ?ей паÑ?олÑ? Ñ?Ñ?нкÑ?ии.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 1.4.5-1+deb7u16.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.4.5-1+deb7u16.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.7.7-1+deb8u4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.7.7-1+deb8u4.</p>
 
- -<p>For the testing distribution (stretch), these problems have been fixed
- -in version 1.9.4-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.9.4-1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.9.4-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.4-1.</p>
 
- -<p>We recommend that you upgrade your python-django packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? python-django.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3545.wml	2016-04-07 22:15:35.000000000 +0500
+++ russian/security/2016/dsa-3545.wml	2016-04-08 00:08:53.521820880 +0500
@@ -1,20 +1,21 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in cgit, a fast web frontend for
- -git repositories written in C. A remote attacker can take advantage of
- -these flaws to perform cross-site scripting, header injection or denial
- -of service attacks.</p>
+<p>Ð? cgit, бÑ?Ñ?Ñ?Ñ?ом веб-инÑ?еÑ?Ñ?ейÑ?е длÑ? git-Ñ?епозиÑ?оÑ?иев, напиÑ?анном на
+Ñ?зÑ?ке C, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и длÑ? межÑ?айÑ?ого Ñ?кÑ?ипÑ?инга, инÑ?екÑ?ий заголовков или вÑ?зова оÑ?каза
+в обÑ?лÑ?живании.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 0.10.2.git2.0.1-3+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.10.2.git2.0.1-3+deb8u1.</p>
 
- -<p>For the testing distribution (stretch), these problems have been fixed
- -in version 0.12.0.git2.7.0-1 or earlier.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.12.0.git2.7.0-1 или более Ñ?анней.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 0.12.0.git2.7.0-1 or earlier.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.12.0.git2.7.0-1 или более Ñ?анней.</p>
 
- -<p>We recommend that you upgrade your cgit packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? cgit.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXBrBMAAoJEF7nbuICFtKlLtAP/3qHZ8YafRwgLG1SxzpoL5Rf
HJMBG519eZHWTfdQivbEhndkwCDrDscopSaNcO69ZpyqwInyiV3pPyIiYV2gPAjO
f80/d/ZPgERX4YtesJVkkvWSeEsSJo+GglkmlfsPhwZyvJvEEVv0ilWvdVpkerxW
4rT13YjhqRXT/LpwBHN4OmaM3KjmVvH8GXjryUvfwTbfpJNb539SjZst9yyVkESa
ztkyvGe1r2PQWxlrCG1nTIlf/k+G6iLPk9o6xKz/GZIirBebn3ii8upVG5bVF2Kn
Yq2P+wZoLvaJajDBzynPd3lKx0w502bIVqab3WOObhft1YY4OywDrdHIwfQdqGFE
vAMs8miBKMTdbGXSOdOrv4Zj+ObR7x90xc2PKTwDW274e/S8Jsj9BnhJXSSOMgDB
VhEFzRqnppf7GN+X0toKnhMHIQcmBSNvXOiM6SXBGn6qe42R0FkQFTbYt7+SWwxq
27hM5OoqjLOTITZcTg4KsO6pMM3kWVdUfyG4WyLftUhBk50YUxZ9hNewv4HPxS8H
TONmpXwGYS3+mAhZN7qIidOgFXfwwr236r2f8JSVHZWywlmnfFzj3Tv/ZDluPJgq
juL/p/H137foq6pUmRTQibpY4K505zMcyapup6sWjxs5XIGOuuco1pbrT+GXQRDX
da56Wy1PSCytiHaLdLky
=TZvu
-----END PGP SIGNATURE-----


Reply to: