[DONE] wml://security/2015/dla-{303,347,322,186}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-186.wml 2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-186.wml 2016-04-26 14:17:54.773947844 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>A path traversal vulnerability was discovered in Mailman, the mailing
- -list manager. Installations using a transport script (such as
- -postfix-to-mailman.py) to interface with their MTA instead of static
- -aliases were vulnerable to a path traversal attack. To successfully
- -exploit this, an attacker needs write access on the local file system.</p>
+<p>Ð? Mailman, менеджеÑ?е Ñ?пиÑ?ков Ñ?аÑ?Ñ?Ñ?лки, бÑ?л обнаÑ?Ñ?жен
+обÑ?од пÑ?Ñ?и. УÑ?Ñ?ановки, иÑ?полÑ?зÑ?Ñ?Ñ?ие Ñ?Ñ?енаÑ?ии пеÑ?едаÑ?и поÑ?Ñ?Ñ? (Ñ?акие как
+postfix-to-mailman.py) длÑ? взаимодейÑ?Ñ?виÑ? Ñ? MTA вмеÑ?Ñ?о Ñ?Ñ?аÑ?иÑ?нÑ?Ñ?
+пÑ?евдонимов, Ñ?Ñ?звимÑ? к обÑ?одÑ? пÑ?Ñ?и. Ð?лÑ? Ñ?Ñ?пеÑ?ного иÑ?полÑ?зованиÑ?
+данной пÑ?облемÑ? злоÑ?мÑ?Ñ?ленникÑ? Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ? доÑ?Ñ?Ñ?п Ñ? пÑ?авами на запиÑ?Ñ? в локалÑ?ной Ñ?айловой Ñ?иÑ?Ñ?еме.</p>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in mailman version 1:2.1.13-6</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в mailman веÑ?Ñ?ии 1:2.1.13-6</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-303.wml 2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-303.wml 2016-04-26 14:08:02.999523213 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in OpenJDK, an
- -implementation of the Oracle Java platform, resulting in the execution
- -of arbitrary code, breakouts of the Java sandbox, information
- -disclosure, denial of service or insecure cryptography.</p>
+<p>Ð? OpenJDK, Ñ?еализаÑ?ии плаÑ?Ñ?оÑ?мÑ? Oracle Java, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей, пÑ?иводÑ?Ñ?иÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+кода, вÑ?Ñ?одÑ? за пÑ?еделÑ? пеÑ?оÑ?ниÑ?Ñ? Java, Ñ?аÑ?кÑ?Ñ?Ñ?иÑ?
+инÑ?оÑ?маÑ?ии, оÑ?казам в обÑ?лÑ?живании или небезопаÑ?номÑ? Ñ?иÑ?Ñ?ованиÑ?.</p>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openjdk-6
- -version 6b36-1.13.8-1~deb6u1.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в openjdk-6
+веÑ?Ñ?ии 6b36-1.13.8-1~deb6u1.</p>
- -<p>We recommend that you upgrade your openjdk-6 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openjdk-6.</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-322.wml 2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-322.wml 2016-04-26 14:15:07.783143231 +0500
@@ -1,12 +1,13 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Trevin Beattie [1] <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1259892">discovered</a> an issue where one could observe hanging
- -threads in a multi-threaded Java application. After debugging the issue,
- -it became evident that the hanging threads were caused by the SSL
- -initialization code in commons-httpclient.</p>
+<p>ТÑ?авин Ð?иÑ?Ñ?и [1] <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1259892">обнаÑ?Ñ?жил</a> пÑ?облемÑ?, пÑ?и коÑ?оÑ?ой можно наблÑ?даÑ?Ñ?
+за завиÑ?Ñ?ими поÑ?оками в многопоÑ?оÑ?нÑ?Ñ? пÑ?иложениÑ?Ñ? на Java. Ð?оÑ?ле оÑ?ладки Ñ?Ñ?ой пÑ?облемÑ? Ñ?Ñ?ало
+оÑ?евидно, Ñ?Ñ?о завиÑ?ание поÑ?оков вÑ?звано кодом иниÑ?иализаÑ?ии SSL
+в commons-httpclient.</p>
- -<p>This upload fixes this issue by respecting the configured SO_TIMEOUT
- -during SSL handshakes with the server.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?казаннÑ?Ñ? пÑ?облемÑ? пÑ?Ñ?Ñ?м Ñ?Ñ?Ñ?Ñ?а наÑ?Ñ?Ñ?оек SO_TIMEOUT
+во вÑ?емÑ? SSL-Ñ?Ñ?копожаÑ?ий Ñ? Ñ?еÑ?веÑ?ом.</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-347.wml 2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-347.wml 2016-04-26 14:10:46.241775993 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>It was discovered that PuTTY's terminal emulator did not properly
- -validate the parameter to the ECH (erase characters) control sequence,
- -allowing a denial of service and possibly remote code execution.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?мÑ?лÑ?Ñ?оÑ? Ñ?еÑ?минала в PuTTY непÑ?авилÑ?но
+вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? паÑ?амеÑ?Ñ?а Ñ?пÑ?авлÑ?Ñ?Ñ?ей поÑ?ледоваÑ?елÑ?ноÑ?Ñ?и ECH (Ñ?имволÑ? Ñ?далениÑ?),
+Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казам в обÑ?лÑ?живании и возможномÑ? Ñ?далÑ?нномÑ? вÑ?полнениÑ? кода.</p>
- -<p>For the oldoldstable distribution (squeeze), this problem has been
- -fixed in version 0.60+2010-02-20-1+squeeze4.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в веÑ?Ñ?ии 0.60+2010-02-20-1+squeeze4.</p>
- -<p>For the oldstable (wheezy) and stable (jessie) distributions, this
- -problem will be fixed soon.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном (wheezy) и Ñ?Ñ?абилÑ?ном (jessie) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а
+пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXHzJGAAoJEF7nbuICFtKluqUP/A9XMIr1ILeUyCX1OHVB+Nqm
+hi2KJL6N4k0TOE4sSvdFaUtlnrv4n+vMTn1wQ4CmWjzQT8eKV6c0LhUW2J5BtE4
dX1pjznRq3ParH7RVxBjiU/eYIe126YFYre8rhFdY7XhTBdTCBrG46dQPP7ituG9
zhQMQ/DRplv1m9zotsFneL5YTWDD38x08JKtKFC2v8EfiFyj6nlgFb6643X6yYrm
zePPYS4s7WjCNZ3458W177GU0yGXaasAQxnso4hlN2HdCDYKZAyfY5H6EhN1seZS
ThslGH1PG4mRALkaYbsYlWBOoTi6syXUafu0wGMmF1Fv5Ql0gQfsuJ8XvEDBGNrt
mVpcz2sWtqLykuFgaKTcmiuihgyXoyvOC5PHxY4J7bM4NmyQGXY/DqAt0f9LrY4Y
OFabpSPazRNrkMXmQxVpj2zeGd9Sj5crzZD4x2eRY94hY/Rl7rWemOK+ZHXqAIv/
3ylW4uVqvfBUokqY+XtqKQA6CNMlUDEYVFaMRuswiMz6thygvOHr75Km598nMRYA
n/DAa8KXIGHVO8gNbMpaW06WmtmRnlfmwiz/xOcqBYgNKRPLPT567fxkGHvEebBg
/cJJr5iV7SrbnHvhy/j5q4bDyB2g1KJLYYnxBDj4K7V7THUOmQG8Hx940jnmm5Sm
TTfWdpcNlc0LJh/qWBQx
=4QbQ
-----END PGP SIGNATURE-----
Reply to:
- Prev by Date:
[DONE] wml://security/2015/dla-{346,182,370,141}.wml
- Next by Date:
[DONE] wml://security/2015/dla-{164,204,231}.wml
- Previous by thread:
[DONE] wml://security/2015/dla-{346,182,370,141}.wml
- Next by thread:
[DONE] wml://security/2015/dla-{164,204,231}.wml
- Index(es):