[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{156,331,372,345}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-156.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-156.wml	2016-04-26 22:16:20.740149507 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Richard van Eeden of Microsoft Vulnerability Research discovered that
- -Samba, a SMB/CIFS file, print, and login server for Unix, contains a
- -flaw in the netlogon server code which allows remote code execution with
- -root privileges from an unauthenticated connection.</p>
+<p>РиÑ?аÑ?д ван Ð?ден из Microsoft Vulnerability Research обнаÑ?Ñ?жил, Ñ?Ñ?о
+Samba, Ñ?айловÑ?й Ñ?еÑ?веÑ?, Ñ?еÑ?веÑ? пеÑ?аÑ?и и аÑ?Ñ?енÑ?иÑ?икаÑ?ии SMB/CIFS длÑ? Unix, Ñ?одеÑ?жиÑ?
+Ñ?Ñ?звимоÑ?Ñ?Ñ? в Ñ?еÑ?веÑ?ном коде netlogon, коÑ?оÑ?аÑ? позволÑ?еÑ? Ñ?далÑ?нно вÑ?полнÑ?Ñ?Ñ? код Ñ?
+пÑ?авами Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ? из неаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованного подклÑ?Ñ?ениÑ?.</p>
 
- -<p>For the oldstable distribution (squeeze), this problem has been fixed in
- -version 2:3.5.6~dfsg-3squeeze12.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2:3.5.6~dfsg-3squeeze12.</p>
 
- -<p>For the stable distribution (wheezy), this problem has been fixed in
- -version 2:3.6.6-6+deb7u5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2:3.6.6-6+deb7u5.</p>
 
- -<p>We recommend that you upgrade your samba packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? samba.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-331.wml	2016-04-08 00:21:20.000000000 +0500
+++ russian/security/2015/dla-331.wml	2016-04-26 22:21:48.868667462 +0500
@@ -1,15 +1,16 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A flaw was found in PolarSSl and mbed TLS:</p>
+<p>Ð? PolarSSl и mbed TLS бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?:</p>
 
- -<p>When the client creates its ClientHello message, due to insufficient bounds
- -checking it can overflow the heap-based buffer containing the message while
- -writing some extensions. Two extensions in particular could be used by a remote
- -attacker to trigger the overflow: the session ticket extension and the server
- -name indication (SNI) extension.</p>
+<p>Ð?огда клиенÑ? Ñ?оздаÑ?Ñ? Ñ?воÑ? Ñ?ообÑ?ение ClientHello, Ñ?о из-за недоÑ?Ñ?аÑ?оÑ?ной пÑ?овеÑ?ки
+гÑ?аниÑ? маÑ?Ñ?ива, оно можеÑ? пеÑ?еполниÑ?Ñ? бÑ?Ñ?еÑ? динамиÑ?еÑ?кой памÑ?Ñ?и, Ñ?одеÑ?жаÑ?ий Ñ?Ñ?о Ñ?ообÑ?ение, во вÑ?емÑ?
+запиÑ?и некоÑ?оÑ?Ñ?Ñ? Ñ?аÑ?Ñ?иÑ?ений. Ð? Ñ?аÑ?Ñ?ноÑ?Ñ?и, Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленником длÑ? вÑ?зова пеÑ?еполнениÑ? могÑ?Ñ?
+иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? два Ñ?аÑ?Ñ?иÑ?ениÑ?: Ñ?аÑ?Ñ?иÑ?ение билеÑ?а Ñ?еÑ?Ñ?ии и Ñ?аÑ?Ñ?иÑ?ение
+индикаÑ?ии имени Ñ?еÑ?веÑ?а (SNI).</p>
 
- -<p>Although most of the vulnerable code is not present in the Squeeze version,
- -this upload contains at least a length check for incoming data.</p>
+<p>ХоÑ?Ñ? болÑ?Ñ?аÑ? Ñ?аÑ?Ñ?Ñ? Ñ?Ñ?звимого кода в Squeeze оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?,
+даннаÑ? загÑ?Ñ?зка по менÑ?Ñ?ей меÑ?е добавлÑ?еÑ? пÑ?овеÑ?кÑ? длинÑ? вÑ?одÑ?Ñ?иÑ? даннÑ?Ñ?.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-345.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-345.wml	2016-04-26 22:29:20.033353266 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Tobias Brunner found an authentication bypass vulnerability in
- -strongSwan, an IKE/IPsec suite.</p>
+<p>ТобиаÑ? Ð?Ñ?Ñ?ннеÑ? обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? обÑ?ода аÑ?Ñ?енÑ?иÑ?икаÑ?ии в
+strongSwan, набоÑ?е IKE/IPsec.</p>
 
- -<p>Due to insufficient validation of its local state the server
- -implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin
- -can be tricked into successfully concluding the authentication without
- -providing valid credentials.</p>
+<p>Ð?з-за недоÑ?Ñ?аÑ?оÑ?ной пÑ?овеÑ?ки локалÑ?ного Ñ?оÑ?Ñ?оÑ?ниÑ? Ñ?еÑ?веÑ?наÑ? Ñ?еализаÑ?иÑ?
+пÑ?оÑ?окола EAP-MSCHAPv2 в дополнении eap-mschapv2
+можеÑ? Ñ?Ñ?пеÑ?но завеÑ?Ñ?иÑ?Ñ? аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ? без
+пÑ?едоÑ?Ñ?авлениÑ? даннÑ?Ñ? дейÑ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?Ñ?ной запиÑ?и.</p>
 
- -<p>It's possible to recognize such attacks by looking at the server logs.
- -The following log message would be seen during the client
- -authentication:</p>
+<p>Ð?одобнÑ?е аÑ?аки можно Ñ?аÑ?познаÑ?Ñ?, пÑ?оÑ?маÑ?Ñ?иваÑ? жÑ?Ñ?налÑ? на Ñ?еÑ?веÑ?е.
+Ð? моменÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии клиенÑ?а можно видеÑ?Ñ? Ñ?ледÑ?Ñ?Ñ?ее
+Ñ?ообÑ?ение:</p>
 
   <p>EAP method EAP_MSCHAPV2 succeeded, no MSK established</p>
 </define-tag>
- --- english/security/2015/dla-372.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-372.wml	2016-04-26 22:25:33.322636484 +0500
@@ -1,15 +1,16 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Oracle stopped supporting version 3.2 of VirtualBox last June. They also
- -do not disclose enough information about vulnerabilities discovered
- -and fixed in newer versions so that it is impossible for us to
- -verify whether the vulnerability also applies to 3.2 and to backport
- -the fix when needed.</p>
+<p>Oracle пÑ?екÑ?аÑ?ил поддеÑ?жкÑ? веÑ?Ñ?ии 3.2 VirtualBox в пÑ?оÑ?лом иÑ?не. Ð?Ñ?оме Ñ?ого,
+они не Ñ?аÑ?кÑ?Ñ?ваÑ?Ñ? инÑ?оÑ?маÑ?иÑ? об Ñ?Ñ?звимоÑ?Ñ?Ñ?Ñ?, обнаÑ?Ñ?женнÑ?Ñ?
+и иÑ?пÑ?авленнÑ?Ñ? в более Ñ?вежиÑ? веÑ?Ñ?иÑ?Ñ?, поÑ?Ñ?омÑ? мÑ? не можем
+пÑ?овеÑ?иÑ?Ñ?, каÑ?аеÑ?Ñ?Ñ? какаÑ?-Ñ?о даннаÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ? веÑ?Ñ?ии 3.2 или неÑ?, а Ñ?акже пÑ?и
+необÑ?одимоÑ?Ñ?и пеÑ?енеÑ?Ñ?и иÑ?пÑ?авление.</p>
 
- -<p>We are thus no longer supporting virtualbox-ose in Debian 6 Squeeze.
- -If you rely on it, you should either consider using backports of newer
- -versions (version 4.1.42 is available in squeeze-backports) or
- -upgrade to Debian 7 Wheezy (or newer).</p>
+<p>Таким обÑ?азом, мÑ? более не поддеÑ?живаем virtualbox-ose в Debian 6 Squeeze.
+Ð?Ñ?ли вÑ? иÑ?полÑ?зÑ?еÑ?е Ñ?Ñ?оÑ? пакеÑ?, Ñ?о вам Ñ?ледÑ?еÑ? либо иÑ?полÑ?зоваÑ?Ñ? обÑ?аÑ?нÑ?е пеÑ?еноÑ?Ñ? более новÑ?Ñ?
+веÑ?Ñ?ий (веÑ?Ñ?иÑ? 4.1.42 доÑ?Ñ?Ñ?пна в squeeze-backports), либо
+вÑ?полниÑ?Ñ? обновление до Debian 7 Wheezy (или более нового вÑ?пÑ?Ñ?ка).</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXH6VyAAoJEF7nbuICFtKlKtIQAKN6EQSLt0na4xNLyesk+Gnu
DqDdN2CEEW1AIKEI0Dlhvwiwh8l1O1/TjBAeK39Gcivbhv0QXaGTwyuGQnl5esvi
XfETAimkQ61f1Sf6txRcgiuXCOJTlsog8xljHST+8zhn60pYolCiaCcfmdvQRNQs
p88TpaGJpbsrGqB4EbMe6yTnEH8pl83lQN1bz7/8L8OEg12iQLeLJbc1nYEr8UKK
UbrOhwNB92T0BG7lipWYwlrDfF7YOgA6or+7f1XNK1j4jkKfPYY91hOFChvJzxQn
TYlw4h0j6mgHafqeoA3BkhAczJ1i46t2NrfO54l7kIkd6vfGray4j7s/iTkk56p1
8mLmxrl04ru71tBxNvmG+m6o3b6LS7vvjEa4iIx2oPAgNqBQSaGsdMzEI6qDVcJg
vXhiw8Op7/2PgBcsEkOCd9xdLiWAJLP4nbjBiB1jE83YCAMs91JVt5JDT34WyLB1
slSafyO83zBbSOqvHtVnGSd+ntxSw4uCIlKhrLOt4JdGRybFn/zEvX2Y8FzShFn7
vIGVMazNeUvcDfVLkvKaMSOF+3dQfZMNX9tjvjI53gJb/3PU94U7/+cnS/SsgJD1
TP/BXCn+KBCmC4WT1YSx9ZFtz4307dOVPgnYw3eR+wMXgYNJc/XuyfpmgVf1UeC1
i+PQK99L4pjWzBkMxDX8
=X6Ng
-----END PGP SIGNATURE-----


Reply to: