[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dla-4{43,09,08}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dla-408.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-408.wml	2016-04-13 12:10:23.291211064 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>GOsa is a combination of system-administrator and end-user web interface,
- -designed to handle LDAP based setups.</p>
+<p>GOsa пÑ?едÑ?Ñ?авлÑ?еÑ? Ñ?обой комбинаÑ?иÑ? веб-инÑ?еÑ?Ñ?ейÑ?а Ñ?иÑ?Ñ?емного админиÑ?Ñ?Ñ?аÑ?оÑ?а и конеÑ?ного полÑ?зоваÑ?елÑ?,
+коÑ?оÑ?аÑ? Ñ?азÑ?абоÑ?ана длÑ? обÑ?лÑ?живаниÑ? Ñ?иÑ?Ñ?ем на оÑ?нове LDAP.</p>
 
- -<p>GOsa upstream reported a code injection vulnerability in the Samba plugin
- -code of GOsa. During Samba password changes it has been possible to
- -inject malicious Perl code.</p>
+<p>РазÑ?абоÑ?Ñ?ики оÑ?новной веÑ?ки GOsa Ñ?ообÑ?или о возможноÑ?Ñ?и инÑ?екÑ?ии кода в коде дополнениÑ? Samba
+длÑ? GOsa. Ð?о вÑ?емÑ? изменениÑ? паÑ?олÑ? в Samba можно
+ввеÑ?Ñ?и код на Ñ?зÑ?ке Perl.</p>
 
- -<p>This upload to Debian Squeeze LTS fixes this issues. However, if you
- -upgrade to this fixed package revision, please note that Samba password
- -changes will stop working until the sambaHashHook parameter in gosa.conf
- -has been updated to accept base64 encoded password strings from the PHP
- -code of GOsa.</p>
+<p>Ð?анное обновление Debian Squeeze LTS иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?Ñ? пÑ?облемÑ?. Тем не менее, еÑ?ли вÑ?
+вÑ?полнили обновление до Ñ?Ñ?ого Ñ?едакÑ?ии пакеÑ?а, обÑ?аÑ?иÑ?е внимание на Ñ?о, Ñ?Ñ?о возможноÑ?Ñ?Ñ? изменениÑ?
+паÑ?олÑ? Samba пеÑ?еÑ?Ñ?анеÑ? Ñ?абоÑ?аÑ?Ñ? до Ñ?еÑ? поÑ?, пока паÑ?амеÑ?Ñ? sambaHashHook в gosa.conf
+не бÑ?деÑ? обновлÑ?н Ñ?ак, Ñ?Ñ?обÑ? оÑ? PHP-кода GOsa можно бÑ?ло пÑ?инимаÑ?Ñ? закодиÑ?ованнÑ?е в base64
+паÑ?олÑ?нÑ?е Ñ?Ñ?Ñ?оки.</p>
 
- -<p>Please read /usr/share/doc/gosa/NEWS.gz and the gosa.conf (5) man page
- -after you have upgraded to this package revision and adapt gosa.conf as
- -described there.</p>
+<p>Ð?оÑ?ле обновлениÑ? пакеÑ?а обÑ?аÑ?иÑ?еÑ?Ñ? к /usr/share/doc/gosa/NEWS.gz и Ñ?Ñ?Ñ?аниÑ?е
+Ñ?Ñ?ководÑ?Ñ?ва gosa.conf (5), а Ñ?акже измениÑ?е gosa.conf Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?им
+обÑ?азом.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-409.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-409.wml	2016-04-13 12:04:46.043157536 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several issues have been found in the MySQL database server. These
- -issues have been addressed by upgrading to the most recent upstream
- -release of MySQL, 5.5.47. Please, look at the MySQL 5.5 Release Notes
- -and Oracle's Critical Patch Update advisory for further details:</p>
+<p>Ð? Ñ?еÑ?веÑ?е баз даннÑ?Ñ? MySQL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. ЭÑ?и
+пÑ?облемÑ? бÑ?ли Ñ?еÑ?енÑ? пÑ?Ñ?Ñ?м обновлениÑ? пакеÑ?а до наиболее Ñ?вежего вÑ?пÑ?Ñ?ка из
+оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки MySQL, 5.5.47. Ð?а подÑ?обноÑ?Ñ?Ñ?ми обÑ?аÑ?айÑ?еÑ?Ñ? к инÑ?оÑ?маÑ?ии о вÑ?пÑ?Ñ?ке MySQL 5.5
+и Ñ?екомендаÑ?ии Oracle's Critical Patch Update:</p>
 
 <ul>
   <li><a href="http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html";>http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html</a></li>
   <li><a href="http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html";>http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html</a></li>
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in mysql-5.5
- -version 5.5.47-0+deb6u1. We recommend you to upgrade your mysql-5.5
- -packages.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в mysql-5.5
+веÑ?Ñ?ии 5.5.47-0+deb6u1. РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ?
+mysql-5.5.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-443.wml	2016-04-08 01:54:45.000000000 +0500
+++ russian/security/2016/dla-443.wml	2016-04-13 12:02:32.297033197 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A remote code execution vulnerability was found in BeanShell, an
- -embeddable Java source interpreter with object scripting language
- -features.</p>
+<p>Ð? BeanShell, вÑ?Ñ?Ñ?аиваемом инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е иÑ?Ñ?одного кода на Ñ?зÑ?ке Java
+Ñ? возможноÑ?Ñ?Ñ?ми обÑ?екÑ?ного Ñ?зÑ?ка Ñ?Ñ?енаÑ?иев, бÑ?ла обнаÑ?Ñ?жена возможноÑ?Ñ?Ñ? Ñ?далÑ?нного
+вÑ?полнениÑ? кода.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2510";>CVE-2016-2510</a>:
 
- -        <p>An application that includes BeanShell on the classpath may be
- -        vulnerable if another part of the application uses Java
- -        serialization or XStream to deserialize data from an untrusted
- -        source. A vulnerable application could be exploited for remote
- -        code execution, including executing arbitrary shell commands.</p></li>
+        <p>Ð?Ñ?иложение, вклÑ?Ñ?аÑ?Ñ?ее BeanShell в classpath, можеÑ? оказаÑ?Ñ?Ñ?Ñ?
+        Ñ?Ñ?звимÑ?м в Ñ?лÑ?Ñ?ае, еÑ?ли дÑ?Ñ?гаÑ? Ñ?аÑ?Ñ?Ñ? Ñ?Ñ?ого пÑ?иложениÑ? иÑ?полÑ?зÑ?еÑ? Ñ?еÑ?иализаÑ?иÑ? Java
+        или XStream длÑ? деÑ?еÑ?иализаÑ?ии даннÑ?Ñ? из недовеÑ?енного
+        иÑ?Ñ?оÑ?ника. УÑ?звимое пÑ?иложение можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? Ñ?далÑ?нного
+        вÑ?полнениÑ? кода, вклÑ?Ñ?аÑ? вÑ?полнение пÑ?оизволÑ?нÑ?Ñ? команд командной оболоÑ?ки.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 2.0b4-12+deb6u1.</p>
 
- -<p>We recommend that you upgrade your bsh packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? bsh.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Fd/9
-----END PGP SIGNATURE-----


Reply to: