[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{229,364,148,333}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-148.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-148.wml	2016-04-22 00:25:44.611088987 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability has been discovered in the web interface of sympa, a
- -mailing list manager. An attacker could take advantage of this flaw in
- -the newsletter posting area, which allows sending to a list, or to
- -oneself, any file located on the server filesystem and readable by the
- -sympa user.</p>
+<p>Ð? веб-инÑ?еÑ?Ñ?ейÑ?е sympa, менеджеÑ?е Ñ?пиÑ?ков Ñ?аÑ?Ñ?Ñ?лки, бÑ?ла обнаÑ?Ñ?жена
+Ñ?Ñ?звимоÑ?Ñ?Ñ?. Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? в
+зоне оÑ?пÑ?авки пиÑ?ем, Ñ?Ñ?о позволÑ?еÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? в Ñ?пиÑ?ок Ñ?аÑ?Ñ?Ñ?лки или
+Ñ?амомÑ? Ñ?ебе лÑ?бой Ñ?айл, Ñ?аÑ?положеннÑ?й в Ñ?айловой Ñ?иÑ?Ñ?еме Ñ?еÑ?веÑ?а и оÑ?кÑ?Ñ?Ñ?Ñ?й длÑ? Ñ?Ñ?ениÑ?
+полÑ?зоваÑ?елÑ? sympa.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in sympa version 6.0.1+dfsg-4+squeeze3</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в sympa веÑ?Ñ?ии 6.0.1+dfsg-4+squeeze3</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-229.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-229.wml	2016-04-22 00:21:09.323688375 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>An XML eXternal Entity (XXE) flaw was found in Nokogiri, a Ruby gem for
- -parsing HTML, XML, and SAX. Using external XML entities, a remote attacker
- -could specify a URL in a specially crafted XML that, when parsed, would
- -cause a connection to that URL to be opened.</p>
+<p>Ð? Nokogiri, пакеÑ?е Ruby длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а HTML, XML и SAX, бÑ?ла
+обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ? XML eXternal Entity (XXE). Ð?Ñ?полÑ?зÑ?Ñ? внеÑ?ние Ñ?Ñ?Ñ?ноÑ?Ñ?и XML, Ñ?далÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник
+можеÑ? Ñ?казаÑ?Ñ? URL в Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованном докÑ?менÑ?е XML, коÑ?оÑ?Ñ?й пÑ?и его гÑ?аммаÑ?иÑ?еÑ?ком Ñ?азбоÑ?е
+попÑ?Ñ?аеÑ?Ñ?Ñ? оÑ?кÑ?Ñ?Ñ?Ñ? подклÑ?Ñ?ение к Ñ?казанномÑ? URL.</p>
 
- -<p>This update enables the <q>nonet</q> option by default (and provides new
- -methods to disable default options if needed).</p>
+<p>Ð?анное обновление по Ñ?молÑ?аниÑ? вклÑ?Ñ?аеÑ? опÑ?иÑ? <q>nonet</q> (и пÑ?едоÑ?Ñ?авлÑ?еÑ? пÑ?и необÑ?одимоÑ?Ñ?и
+новÑ?е меÑ?одÑ? оÑ?клÑ?Ñ?ениÑ? опÑ?ий по Ñ?молÑ?аниÑ?).</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-333.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-333.wml	2016-04-22 00:28:26.333497113 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>CakePHP, an open-source web application framework for PHP, was
- -vulnerable to SSRF (Server Side
- -Request Forgery) attacks. Remote attacker can utilize it for at least
- -DoS (Denial of Service) attacks, if the target application accepts XML
- -as an input. It is caused by insecure design of Cake's Xml class.</p>
+<p>CakePHP, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?а веб-пÑ?иложений длÑ? PHP Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м иÑ?Ñ?однÑ?м кодом,
+Ñ?Ñ?звима к аÑ?акам по пÑ?инÑ?ипÑ? SSRF (подделка запÑ?оÑ?ов на Ñ?Ñ?оÑ?оне
+Ñ?еÑ?веÑ?а). УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ?
+вÑ?зова оÑ?каза в обÑ?лÑ?живании в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?елевое пÑ?иложениÑ? пÑ?инимаеÑ?
+в каÑ?еÑ?Ñ?ве вÑ?однÑ?Ñ? даннÑ?Ñ? XML. Ð?Ñ?облема вÑ?звана небезопаÑ?ной Ñ?еализаÑ?ией клаÑ?Ñ?а Xml в Cake.</p>
 
- -<p>For Debian 6 Squeeze, this issue has been fixed in cakephp version
+<p>Ð? Debian 6 Squeeze Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в cakephp веÑ?Ñ?ии
 1.3.2-1.1+deb6u11.</p>
 </define-tag>
 
- --- english/security/2015/dla-364.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-364.wml	2016-04-22 00:23:15.758108512 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Hanno Böck discovered that GnuTLS, a library implementing the TLS and SSL
- -protocols, incorrectly validated the first padding byte in CBC modes. A remote
- -attacker can possibly take advantage of this flaw to perform a padding oracle
- -attack.</p>
+<p>Ханно Ð?Ñ?к обнаÑ?Ñ?жил, Ñ?Ñ?о GnuTLS, библиоÑ?ека, Ñ?еализÑ?Ñ?Ñ?аÑ? пÑ?оÑ?околÑ? TLS
+и SSL, непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? пеÑ?вого байÑ?а заполниÑ?елÑ? в Ñ?ежимаÑ? CBC. УдалÑ?ннÑ?й
+злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? пÑ?облемÑ? длÑ? вÑ?полнениÑ? аÑ?аки по пÑ?едÑ?казаниÑ?
+заполниÑ?елÑ?.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, this issue has been fixed in gnutls26 version
- -2.8.6-1+squeeze6. We recommend you to upgrade your gnutls26 packages.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в gnutls26 веÑ?Ñ?ии
+2.8.6-1+squeeze6. РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gnutls26.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=A6A9
-----END PGP SIGNATURE-----


Reply to: