[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{185,167,292,225}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-167.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-167.wml	2016-04-21 23:47:04.703379662 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Kousuke Ebihara discovered that redcloth, a Ruby module used to
- -convert Textile markup to HTML, did not properly sanitize its
- -input. This allowed a remote attacker to perform a cross-site
- -scripting attack by injecting arbitrary JavaScript code into the
- -generated HTML.</p>
+<p>Ð?оÑ?Ñ?Ñ?ке ЭбиÑ?аÑ?а обнаÑ?Ñ?жил, Ñ?Ñ?о redcloth, модÑ?лÑ? Ruby длÑ?
+пÑ?еобÑ?азованиÑ? Ñ?азмеÑ?ки Textile в HTML, непÑ?авилÑ?но вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ?
+вÑ?однÑ?Ñ? даннÑ?Ñ?. ЭÑ?о позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? аÑ?аки по пÑ?инÑ?ипÑ?
+межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга пÑ?Ñ?Ñ?м инÑ?екÑ?ии пÑ?оизволÑ?ного кода на Ñ?зÑ?ке JavaScript в
+Ñ?оздаваемÑ?й HTML-код.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in redcloth version 4.2.2-1.1+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в redcloth веÑ?Ñ?ии 4.2.2-1.1+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-185.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-185.wml	2016-04-21 23:45:04.453556654 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Mateusz Jurczyk discovered multiple vulnerabilities in Freetype. Opening
- -malformed fonts may result in denial of service or the execution of
- -arbitrary code.</p>
+<p>Ð?аÑ?еÑ?Ñ? ЮÑ?жик обнаÑ?Ñ?жил многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и в Freetype. Ð?Ñ?кÑ?Ñ?Ñ?ие
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ов можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода.</p>
 
- -<p>For the oldstable distribution (squeeze), these problems have been fixed
- -in version 2.4.2-2.1+squeeze5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.4.2-2.1+squeeze5.</p>
 
- -<p>For the stable distribution (wheezy), these problems were fixed in
- -version 2.4.9-1.1+deb7u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.9-1.1+deb7u1.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-225.wml	2016-04-08 01:27:56.000000000 +0500
+++ russian/security/2015/dla-225.wml	2016-04-21 23:51:43.967441039 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The following vulnerability vulnerability was found in dnsmasq:</p>
+<p>Ð? dnsmasq бÑ?ла обнаÑ?Ñ?жена Ñ?ледÑ?Ñ?Ñ?аÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3294";>CVE-2015-3294</a>
 
- -   <p>Remote attackers could read process memory and cause DoS via
- -   malformed DNS requests.</p></li>
+   <p>УдалÑ?ннÑ?е злоÑ?мÑ?Ñ?ленники могÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? памÑ?Ñ?Ñ? пÑ?оÑ?еÑ?Ñ?а и вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+   Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? запÑ?оÑ?ов DNS.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in dnsmasq version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в dnsmasq веÑ?Ñ?ии
 2.55-2+deb6u1.</p>
 </define-tag>
 
- --- english/security/2015/dla-292.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-292.wml	2016-04-21 23:49:55.442987261 +0500
@@ -1,11 +1,12 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The Validator in Apache Struts 1.1 and later contains a function to
- -efficiently define rules for input validation across multiple pages during
- -screen transitions. This function contains a vulnerability where input
- -validation may be bypassed. When the Apache Struts 1 Validator is used,
- -the web application may be vulnerable even when this function is not used
- -explicitly.</p>
+<p>Validator в Apache Struts 1.1 и более поздниÑ? веÑ?Ñ?иÑ?Ñ? Ñ?одеÑ?жиÑ? Ñ?Ñ?нкÑ?иÑ? длÑ?
+Ñ?Ñ?Ñ?екÑ?ивного опÑ?еделениÑ? пÑ?авил пÑ?овеÑ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? на неÑ?колÑ?киÑ? Ñ?Ñ?Ñ?аниÑ?аÑ? во
+вÑ?емÑ? Ñ?менÑ? Ñ?кÑ?ана. ЭÑ?а Ñ?Ñ?нкÑ?иÑ? Ñ?одеÑ?жиÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ?, благодаÑ?Ñ? коÑ?оÑ?ой пÑ?овеÑ?кÑ?
+вÑ?однÑ?Ñ? даннÑ?Ñ? можно обойÑ?и. Ð?Ñ?и иÑ?полÑ?зовании Apache Struts 1 Validator
+веб-пÑ?иложение можеÑ? оказаÑ?Ñ?Ñ?Ñ? Ñ?Ñ?звимÑ?м даже в Ñ?ом Ñ?лÑ?Ñ?ае, когда Ñ?казаннаÑ? Ñ?Ñ?нкÑ?иÑ?
+не иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? Ñ?внÑ?м обÑ?азом.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=jhuM
-----END PGP SIGNATURE-----


Reply to: