[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-347{5,6}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3475.wml	2016-02-13 20:20:36.000000000 +0500
+++ russian/security/2016/dsa-3475.wml	2016-02-14 10:59:14.487032956 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in PostgreSQL-9.1, a SQL
- -database system.</p>
+<p>Ð? PostgreSQL-9.1, Ñ?иÑ?Ñ?еме баз даннÑ?Ñ? SQL, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5288";>CVE-2015-5288</a>
 
- -    <p>Josh Kupershmidt discovered a vulnerability in the crypt() function
- -    in the pgCrypto extension. Certain invalid salt arguments can cause
- -    the server to crash or to disclose a few bytes of server memory.</p></li>
+    <p>Ð?жоÑ? Ð?апеÑ?Ñ?миÑ? обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в Ñ?Ñ?нкÑ?ии crypt()
+    в Ñ?аÑ?Ñ?иÑ?ении pgCrypto. Ð?екоÑ?оÑ?Ñ?е некоÑ?Ñ?екÑ?нÑ?е аÑ?гÑ?менÑ?Ñ?, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ие Ñ?олÑ?, могÑ?Ñ?
+    пÑ?иводиÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке Ñ?еÑ?веÑ?а или Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? неÑ?колÑ?киÑ? байÑ? Ñ?еÑ?веÑ?ной памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0766";>CVE-2016-0766</a>
 
- -    <p>A privilege escalation vulnerability for users of PL/Java was
- -    discovered. Certain custom configuration settings (GUCs) for PL/Java
- -    will now be modifiable only by the database superuser to mitigate
- -    this issue.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено повÑ?Ñ?ение пÑ?ивилегий длÑ? полÑ?зоваÑ?елей
+    PL/Java. Ð?екоÑ?оÑ?Ñ?е наÑ?Ñ?Ñ?ойки (GUC) длÑ? PL/Java
+    Ñ?епеÑ?Ñ? могÑ?Ñ? бÑ?Ñ?Ñ? измененÑ? Ñ?олÑ?ко Ñ?Ñ?пеÑ?полÑ?зоваÑ?елем базÑ? даннÑ?Ñ?, Ñ?Ñ?о Ñ?делано длÑ?
+    Ñ?менÑ?Ñ?ениÑ? вÑ?еда Ñ?Ñ?о Ñ?казанной пÑ?облемÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0773";>CVE-2016-0773</a>
 
- -    <p>Tom Lane and Greg Stark discovered a flaw in the way PostgreSQL
- -    processes specially crafted regular expressions. Very large
- -    character ranges in bracket expressions could cause infinite
- -    loops or memory overwrites. A remote attacker can exploit this
- -    flaw to cause a denial of service or, potentially, to execute
- -    arbitrary code.</p></li>
+    <p>Том Ð?Ñ?йн и Ð?Ñ?ег СÑ?аÑ?к обнаÑ?Ñ?жили Ñ?Ñ?звимоÑ?Ñ?Ñ? в Ñ?поÑ?обе, иÑ?полÑ?зÑ?емом PostgreSQL
+    длÑ? обÑ?абоÑ?ки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?егÑ?лÑ?Ñ?нÑ?Ñ? вÑ?Ñ?ажений. Ð?Ñ?енÑ? болÑ?Ñ?ие
+    инÑ?еÑ?валÑ? Ñ?имволов в вÑ?Ñ?ажениÑ?Ñ? в Ñ?кобкаÑ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к возникновениÑ? беÑ?конеÑ?нÑ?Ñ?
+    Ñ?иклов или пеÑ?езапиÑ?и Ñ?одеÑ?жимого памÑ?Ñ?и. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+    Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?ного вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 9.1.20-0+deb7u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 9.1.20-0+deb7u1.</p>
 
- -<p>We recommend that you upgrade your postgresql-9.1 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-9.1.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3476.wml	2016-02-13 20:21:12.000000000 +0500
+++ russian/security/2016/dsa-3476.wml	2016-02-14 11:01:17.970062552 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in PostgreSQL-9.4, a SQL
- -database system.</p>
+<p>Ð? PostgreSQL-9.4, Ñ?иÑ?Ñ?еме баз даннÑ?Ñ? SQL, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0766";>CVE-2016-0766</a>
 
- -    <p>A privilege escalation vulnerability for users of PL/Java was
- -    discovered. Certain custom configuration settings (GUCs) for PL/Java
- -    will now be modifiable only by the database superuser to mitigate
- -    this issue.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено повÑ?Ñ?ение пÑ?ивилегий длÑ? полÑ?зоваÑ?елей
+    PL/Java. Ð?екоÑ?оÑ?Ñ?е наÑ?Ñ?Ñ?ойки (GUC) длÑ? PL/Java
+    Ñ?епеÑ?Ñ? могÑ?Ñ? бÑ?Ñ?Ñ? измененÑ? Ñ?олÑ?ко Ñ?Ñ?пеÑ?полÑ?зоваÑ?елем базÑ? даннÑ?Ñ?, Ñ?Ñ?о Ñ?делано длÑ?
+    Ñ?менÑ?Ñ?ениÑ? вÑ?еда Ñ?Ñ?о Ñ?казанной пÑ?облемÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0773";>CVE-2016-0773</a>
 
- -    <p>Tom Lane and Greg Stark discovered a flaw in the way PostgreSQL
- -    processes specially crafted regular expressions. Very large
- -    character ranges in bracket expressions could cause infinite
- -    loops or memory overwrites. A remote attacker can exploit this
- -    flaw to cause a denial of service or, potentially, to execute
- -    arbitrary code.</p></li>
+    <p>Том Ð?Ñ?йн и Ð?Ñ?ег СÑ?аÑ?к обнаÑ?Ñ?жили Ñ?Ñ?звимоÑ?Ñ?Ñ? в Ñ?поÑ?обе, иÑ?полÑ?зÑ?емом PostgreSQL
+    длÑ? обÑ?абоÑ?ки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?егÑ?лÑ?Ñ?нÑ?Ñ? вÑ?Ñ?ажений. Ð?Ñ?енÑ? болÑ?Ñ?ие
+    инÑ?еÑ?валÑ? Ñ?имволов в вÑ?Ñ?ажениÑ?Ñ? в Ñ?кобкаÑ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к возникновениÑ? беÑ?конеÑ?нÑ?Ñ?
+    Ñ?иклов или пеÑ?езапиÑ?и Ñ?одеÑ?жимого памÑ?Ñ?и. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+    Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?ного вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 9.4.6-0+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 9.4.6-0+deb8u1.</p>
 
- -<p>We recommend that you upgrade your postgresql-9.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-9.4.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJWwBhaAAoJEF7nbuICFtKlRtEP/iKQ8U7JIawotct8c1HI2Hbm
9E//OeO6UZGv02acOzZ8xvj7QC1gag8cFpPWPLXKQdfYyakY8UHx/6P80258/Fzp
GhXTLz9OZdZTVR1D+I5TR5QkX6wjC9rIk9jBmLSNP7VTDZrTlX4fsAgYAdFrKDAf
d/e3QgP/X/2GWo1Tn1xYxp1AFWF4V9mFWvQyDXzVtN+h7YDM59hYVjdY+tZ7bflk
bbGd0WmD6EBhxNFPzsUme/T1iprKKZro8NxhJJAL8wk5+yz23Pnx8PvqSDwHkAZ5
kkZItQSxGFz0zi20mE2AC7YAaajTF1ApFuElQt5hO6CWDPOJKMp6vgOAKs1Sgadi
8Qd7XtlRzhoO3rcn3upJqUf5wuq8v5L5T7kY9YSSIOiR2WwirWKiHfMebhsvqWiN
CzYv0oWBO6aPlNP5GajBOaVHYtMfr/3pAc0Zm7VhwpTh5Tso9qg84WQVg3+i2y97
+nD4CFGBkMJAZRY3D3E16I1+zesA31KgOJh5C/0s1TOifi7Lj9nc0PPgOm3p5Kvv
9ISQOCydfyB0SyN83fFPtuDIejk+qCWO7vdsS+sF9BBZHXKK0YSaBFVDhvJ9+Ayo
gCwclTcIjkv5pOhC5JpxDmMXQMc8Oas0SbtLEhtVLsy4WluthFsjbbVRVaRW4Up+
xbppY/VW+w1F2gqk/W2c
=Bg7/
-----END PGP SIGNATURE-----


Reply to: