[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{200,190,336}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-190.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-190.wml	2016-04-28 01:59:22.909808461 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in libgcrypt:</p>
+<p>Ð? libgcrypt бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3591";>CVE-2014-3591</a>
 
- -    <p>The Elgamal decryption routine was susceptible to a side-channel
- -    attack discovered by researchers of Tel Aviv University. Ciphertext
- -    blinding was enabled to counteract it. Note that this may have a
- -    quite noticeable impact on Elgamal decryption performance.</p></li>
+    <p>ФÑ?нкÑ?иÑ? Ñ?аÑ?Ñ?иÑ?Ñ?овки Elgamal пÑ?едположиÑ?елÑ?но подвеÑ?жена аÑ?аке Ñ?еÑ?ез
+    Ñ?Ñ?оÑ?онние каналÑ?, коÑ?оÑ?аÑ? бÑ?ла обнаÑ?Ñ?жена иÑ?Ñ?ледоваÑ?елÑ?ми ТелÑ?-Ð?вивÑ?кого Ñ?нивеÑ?Ñ?иÑ?еÑ?а. Ð?лÑ? Ñ?ого, Ñ?Ñ?обÑ?
+    пÑ?оÑ?ивоÑ?Ñ?оÑ?Ñ?Ñ? Ñ?Ñ?ой аÑ?аке бÑ?ло вклÑ?Ñ?ено Ñ?кÑ?Ñ?Ñ?ие Ñ?иÑ?Ñ?оÑ?екÑ?Ñ?а. Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?о можеÑ?
+    Ñ?еÑ?Ñ?Ñ?зно повлиÑ?Ñ?Ñ? на пÑ?оизводиÑ?елÑ?ноÑ?Ñ?Ñ? Elgamal пÑ?и Ñ?аÑ?Ñ?иÑ?Ñ?овке.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0837";>CVE-2015-0837</a>
 
- -    <p>The modular exponentiation routine mpi_powm() was susceptible to a
- -    side-channel attack caused by data-dependent timing variations when
- -    accessing its internal pre-computed table.</p></li>
+    <p>ФÑ?нкÑ?иÑ? модÑ?лÑ?ного поÑ?енÑ?иÑ?ованиÑ? mpi_powm() пÑ?едположиÑ?елÑ?но Ñ?Ñ?звима
+    к аÑ?аке Ñ?еÑ?ез Ñ?Ñ?оÑ?онние каналÑ? пÑ?Ñ?Ñ?м ваÑ?иаÑ?ии завиÑ?Ñ?Ñ?иÑ? оÑ? даннÑ?Ñ? Ñ?аймингов пÑ?и
+    обÑ?аÑ?ении к внÑ?Ñ?Ñ?енней пÑ?едваÑ?иÑ?елÑ?но вÑ?Ñ?иÑ?ленной Ñ?аблиÑ?е.</p></li>
 
 </ul>
 </define-tag>
- --- english/security/2015/dla-200.wml	2016-04-08 00:21:20.000000000 +0500
+++ russian/security/2015/dla-200.wml	2016-04-28 01:54:54.217526414 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4975";>CVE-2014-4975</a>
 
- -    <p>The encodes() function in pack.c had an off-by-one error that could
- -    lead to a stack-based buffer overflow. This could allow remote
- -    attackers to cause a denial of service (crash) or arbitrary code
- -    execution.</p></li>
+    <p>ФÑ?нкÑ?иÑ? encodes() в pack.c Ñ?одеÑ?жиÑ? оÑ?ибкÑ? на единиÑ?Ñ?, коÑ?оÑ?аÑ? можеÑ?
+    пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а. ЭÑ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) или вÑ?полнение
+    пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8080";>CVE-2014-8080</a>,
     <a href="https://security-tracker.debian.org/tracker/CVE-2014-8090";>CVE-2014-8090</a>
 
- -    <p>The REXML parser could be coerced into allocating large string
- -    objects that could consume all available memory on the system. This
- -    could allow remote attackers to cause a denial of service (crash).</p></li>
+    <p>Ð?од длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а REXML можеÑ? вÑ?делиÑ?Ñ? Ñ?Ñ?Ñ?оковÑ?е обÑ?екÑ?Ñ?
+    болÑ?Ñ?ого Ñ?азмеÑ?а, Ñ?Ñ?о пÑ?иводиÑ? к поÑ?Ñ?еблениÑ? вÑ?ей доÑ?Ñ?Ñ?пной памÑ?Ñ?и Ñ?иÑ?Ñ?емÑ?. ЭÑ?о
+    можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка).</p></li>
 
 </ul>
 </define-tag>
- --- english/security/2015/dla-336.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-336.wml	2016-04-28 02:01:41.910332832 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several issues have been fixed in phpMyAdmin, the web administration
- -tool for MySQL.</p>
+<p>Ð? phpMyAdmin, веб-инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8958";>CVE-2014-8958</a>
 
- -    <p>Multiple cross-site scripting (XSS) vulnerabilities.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?й Ñ?Ñ?звимоÑ?Ñ?и, пÑ?иводÑ?Ñ?ие к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ? (XSS).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9218";>CVE-2014-9218</a>
 
- -    <p>Denial of service (resource consumption) via a long password.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов) Ñ? помоÑ?Ñ?Ñ? длинного паÑ?олÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2206";>CVE-2015-2206</a>
 
- -    <p>Risk of BREACH attack due to reflected parameter.</p></li>
+    <p>РиÑ?к аÑ?аки по пÑ?инÑ?ипÑ? BREACH из-за оÑ?Ñ?ажÑ?нного паÑ?амеÑ?Ñ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3902";>CVE-2015-3902</a>
 
- -    <p>XSRF/CSRF vulnerability in phpMyAdmin setup.</p></li>
+    <p>УÑ?звимоÑ?Ñ?Ñ? XSRF/CSRF в наÑ?Ñ?Ñ?ойке phpMyAdmin.</p></li>
 
 </ul>
 </define-tag>
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXISi4AAoJEF7nbuICFtKlVRcQAIrM77HqkTCg8tuVo7NpgCap
IM9HkLtm+A3S9WL1nmHkmJhXrHRAngkltNm7cMSuxpcmLAvhmc8qghDJDDJeJklH
2tdvE7uCjvaLyK/I2eAXj+rO4XiR+pJ7pBJWiqkM2lOavUkv9+BWt6NMZ0vPWVcB
XV1hbjwYUngLzrfb+uEk+k6Owf/SI91dur2gshkz55NOl+GnKCJ0GVfSVFDhHH7p
0Pq/QF1spKFT/F0JbtRIl7QhAXVtE+qkS7TPxtnZn/ozFxTVrUwnPxIL2DJBMkdg
dHr6DRUjcC8upUeMwOurj771GI3WNGt2H5k0AkqQYqi/rcPKk5xKirzbop7mQpJR
AXYjv4SPsEpr5VdoeZgALbYRw/edTNxhXNdrpWVKh96Ib9u6PUg5bkp4EprF6N9b
l0HXj0hgWKrb+//aIj9hw1Qu/hnvqJmjAa//VCgWIOVafpDdhIjkxcXlULGNzkbW
QUepHHowGWHoZIc9bx6ZE0iCafAmGzc1qRfJN+ppMDmr6db7XXs2By7TNe4tc6Qd
OEN6oepRWZLrQMroHAQjAAdG9O51B6+AxvfAWqmpkHo364AE/f2TUWY3hrNRqWqC
SxEngPGCKL7CjcDTOxXkFqH9mI1d4cf6WLDPQ8Ymf75d86BrlXMcOdTvTQskmbNW
wwO9dqzxyW3Y7J3sbRhn
=HIPI
-----END PGP SIGNATURE-----


Reply to: