[DONE] wml://security/2015/dla-{200,190,336}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-190.wml 2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-190.wml 2016-04-28 01:59:22.909808461 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in libgcrypt:</p>
+<p>Ð? libgcrypt бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3591">CVE-2014-3591</a>
- - <p>The Elgamal decryption routine was susceptible to a side-channel
- - attack discovered by researchers of Tel Aviv University. Ciphertext
- - blinding was enabled to counteract it. Note that this may have a
- - quite noticeable impact on Elgamal decryption performance.</p></li>
+ <p>ФÑ?нкÑ?иÑ? Ñ?аÑ?Ñ?иÑ?Ñ?овки Elgamal пÑ?едположиÑ?елÑ?но подвеÑ?жена аÑ?аке Ñ?еÑ?ез
+ Ñ?Ñ?оÑ?онние каналÑ?, коÑ?оÑ?аÑ? бÑ?ла обнаÑ?Ñ?жена иÑ?Ñ?ледоваÑ?елÑ?ми ТелÑ?-Ð?вивÑ?кого Ñ?нивеÑ?Ñ?иÑ?еÑ?а. Ð?лÑ? Ñ?ого, Ñ?Ñ?обÑ?
+ пÑ?оÑ?ивоÑ?Ñ?оÑ?Ñ?Ñ? Ñ?Ñ?ой аÑ?аке бÑ?ло вклÑ?Ñ?ено Ñ?кÑ?Ñ?Ñ?ие Ñ?иÑ?Ñ?оÑ?екÑ?Ñ?а. Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?о можеÑ?
+ Ñ?еÑ?Ñ?Ñ?зно повлиÑ?Ñ?Ñ? на пÑ?оизводиÑ?елÑ?ноÑ?Ñ?Ñ? Elgamal пÑ?и Ñ?аÑ?Ñ?иÑ?Ñ?овке.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0837">CVE-2015-0837</a>
- - <p>The modular exponentiation routine mpi_powm() was susceptible to a
- - side-channel attack caused by data-dependent timing variations when
- - accessing its internal pre-computed table.</p></li>
+ <p>ФÑ?нкÑ?иÑ? модÑ?лÑ?ного поÑ?енÑ?иÑ?ованиÑ? mpi_powm() пÑ?едположиÑ?елÑ?но Ñ?Ñ?звима
+ к аÑ?аке Ñ?еÑ?ез Ñ?Ñ?оÑ?онние каналÑ? пÑ?Ñ?Ñ?м ваÑ?иаÑ?ии завиÑ?Ñ?Ñ?иÑ? оÑ? даннÑ?Ñ? Ñ?аймингов пÑ?и
+ обÑ?аÑ?ении к внÑ?Ñ?Ñ?енней пÑ?едваÑ?иÑ?елÑ?но вÑ?Ñ?иÑ?ленной Ñ?аблиÑ?е.</p></li>
</ul>
</define-tag>
- --- english/security/2015/dla-200.wml 2016-04-08 00:21:20.000000000 +0500
+++ russian/security/2015/dla-200.wml 2016-04-28 01:54:54.217526414 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4975">CVE-2014-4975</a>
- - <p>The encodes() function in pack.c had an off-by-one error that could
- - lead to a stack-based buffer overflow. This could allow remote
- - attackers to cause a denial of service (crash) or arbitrary code
- - execution.</p></li>
+ <p>ФÑ?нкÑ?иÑ? encodes() в pack.c Ñ?одеÑ?жиÑ? оÑ?ибкÑ? на единиÑ?Ñ?, коÑ?оÑ?аÑ? можеÑ?
+ пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а. ÐÑ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+ злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) или вÑ?полнение
+ пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8080">CVE-2014-8080</a>,
<a href="https://security-tracker.debian.org/tracker/CVE-2014-8090">CVE-2014-8090</a>
- - <p>The REXML parser could be coerced into allocating large string
- - objects that could consume all available memory on the system. This
- - could allow remote attackers to cause a denial of service (crash).</p></li>
+ <p>Ð?од длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а REXML можеÑ? вÑ?делиÑ?Ñ? Ñ?Ñ?Ñ?оковÑ?е обÑ?екÑ?Ñ?
+ болÑ?Ñ?ого Ñ?азмеÑ?а, Ñ?Ñ?о пÑ?иводиÑ? к поÑ?Ñ?еблениÑ? вÑ?ей доÑ?Ñ?Ñ?пной памÑ?Ñ?и Ñ?иÑ?Ñ?емÑ?. ÐÑ?о
+ можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка).</p></li>
</ul>
</define-tag>
- --- english/security/2015/dla-336.wml 2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-336.wml 2016-04-28 02:01:41.910332832 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Several issues have been fixed in phpMyAdmin, the web administration
- -tool for MySQL.</p>
+<p>Ð? phpMyAdmin, веб-инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8958">CVE-2014-8958</a>
- - <p>Multiple cross-site scripting (XSS) vulnerabilities.</p></li>
+ <p>Ð?ногоÑ?иÑ?леннÑ?й Ñ?Ñ?звимоÑ?Ñ?и, пÑ?иводÑ?Ñ?ие к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ? (XSS).</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9218">CVE-2014-9218</a>
- - <p>Denial of service (resource consumption) via a long password.</p></li>
+ <p>Ð?Ñ?каз в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов) Ñ? помоÑ?Ñ?Ñ? длинного паÑ?олÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2206">CVE-2015-2206</a>
- - <p>Risk of BREACH attack due to reflected parameter.</p></li>
+ <p>РиÑ?к аÑ?аки по пÑ?инÑ?ипÑ? BREACH из-за оÑ?Ñ?ажÑ?нного паÑ?амеÑ?Ñ?а.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3902">CVE-2015-3902</a>
- - <p>XSRF/CSRF vulnerability in phpMyAdmin setup.</p></li>
+ <p>УÑ?звимоÑ?Ñ?Ñ? XSRF/CSRF в наÑ?Ñ?Ñ?ойке phpMyAdmin.</p></li>
</ul>
</define-tag>
-----BEGIN PGP SIGNATURE-----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=HIPI
-----END PGP SIGNATURE-----
Reply to: