[DONE] wml://security/2015/dla-{185,167,292,225}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-167.wml 2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-167.wml 2016-04-21 23:47:04.703379662 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Kousuke Ebihara discovered that redcloth, a Ruby module used to
- -convert Textile markup to HTML, did not properly sanitize its
- -input. This allowed a remote attacker to perform a cross-site
- -scripting attack by injecting arbitrary JavaScript code into the
- -generated HTML.</p>
+<p>Ð?оÑ?Ñ?Ñ?ке ÐбиÑ?аÑ?а обнаÑ?Ñ?жил, Ñ?Ñ?о redcloth, модÑ?лÑ? Ruby длÑ?
+пÑ?еобÑ?азованиÑ? Ñ?азмеÑ?ки Textile в HTML, непÑ?авилÑ?но вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ?
+вÑ?однÑ?Ñ? даннÑ?Ñ?. ÐÑ?о позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? аÑ?аки по пÑ?инÑ?ипÑ?
+межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга пÑ?Ñ?Ñ?м инÑ?екÑ?ии пÑ?оизволÑ?ного кода на Ñ?зÑ?ке JavaScript в
+Ñ?оздаваемÑ?й HTML-код.</p>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in redcloth version 4.2.2-1.1+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в redcloth веÑ?Ñ?ии 4.2.2-1.1+deb6u1</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-185.wml 2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-185.wml 2016-04-21 23:45:04.453556654 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Mateusz Jurczyk discovered multiple vulnerabilities in Freetype. Opening
- -malformed fonts may result in denial of service or the execution of
- -arbitrary code.</p>
+<p>Ð?аÑ?еÑ?Ñ? ЮÑ?жик обнаÑ?Ñ?жил многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и в Freetype. Ð?Ñ?кÑ?Ñ?Ñ?ие
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ов можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода.</p>
- -<p>For the oldstable distribution (squeeze), these problems have been fixed
- -in version 2.4.2-2.1+squeeze5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.4.2-2.1+squeeze5.</p>
- -<p>For the stable distribution (wheezy), these problems were fixed in
- -version 2.4.9-1.1+deb7u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.9-1.1+deb7u1.</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-225.wml 2016-04-08 01:27:56.000000000 +0500
+++ russian/security/2015/dla-225.wml 2016-04-21 23:51:43.967441039 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>The following vulnerability vulnerability was found in dnsmasq:</p>
+<p>Ð? dnsmasq бÑ?ла обнаÑ?Ñ?жена Ñ?ледÑ?Ñ?Ñ?аÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3294">CVE-2015-3294</a>
- - <p>Remote attackers could read process memory and cause DoS via
- - malformed DNS requests.</p></li>
+ <p>УдалÑ?ннÑ?е злоÑ?мÑ?Ñ?ленники могÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? памÑ?Ñ?Ñ? пÑ?оÑ?еÑ?Ñ?а и вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+ Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? запÑ?оÑ?ов DNS.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in dnsmasq version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в dnsmasq веÑ?Ñ?ии
2.55-2+deb6u1.</p>
</define-tag>
- --- english/security/2015/dla-292.wml 2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-292.wml 2016-04-21 23:49:55.442987261 +0500
@@ -1,11 +1,12 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>The Validator in Apache Struts 1.1 and later contains a function to
- -efficiently define rules for input validation across multiple pages during
- -screen transitions. This function contains a vulnerability where input
- -validation may be bypassed. When the Apache Struts 1 Validator is used,
- -the web application may be vulnerable even when this function is not used
- -explicitly.</p>
+<p>Validator в Apache Struts 1.1 и более поздниÑ? веÑ?Ñ?иÑ?Ñ? Ñ?одеÑ?жиÑ? Ñ?Ñ?нкÑ?иÑ? длÑ?
+Ñ?Ñ?Ñ?екÑ?ивного опÑ?еделениÑ? пÑ?авил пÑ?овеÑ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? на неÑ?колÑ?киÑ? Ñ?Ñ?Ñ?аниÑ?аÑ? во
+вÑ?емÑ? Ñ?менÑ? Ñ?кÑ?ана. ÐÑ?а Ñ?Ñ?нкÑ?иÑ? Ñ?одеÑ?жиÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ?, благодаÑ?Ñ? коÑ?оÑ?ой пÑ?овеÑ?кÑ?
+вÑ?однÑ?Ñ? даннÑ?Ñ? можно обойÑ?и. Ð?Ñ?и иÑ?полÑ?зовании Apache Struts 1 Validator
+веб-пÑ?иложение можеÑ? оказаÑ?Ñ?Ñ?Ñ? Ñ?Ñ?звимÑ?м даже в Ñ?ом Ñ?лÑ?Ñ?ае, когда Ñ?казаннаÑ? Ñ?Ñ?нкÑ?иÑ?
+не иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? Ñ?внÑ?м обÑ?азом.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=jhuM
-----END PGP SIGNATURE-----
Reply to:
- Prev by Date:
[DONE] wml://security/2015/dla-{254,326,128,135}.wml
- Next by Date:
[DONE] wml://security/2015/dla-{226,136,161,302}.wml
- Previous by thread:
[DONE] wml://security/2015/dla-{254,326,128,135}.wml
- Next by thread:
[DONE] wml://security/2015/dla-{226,136,161,302}.wml
- Index(es):