[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-2{11,48}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-211.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-211.wml	2016-04-29 23:03:14.246262404 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in cURL, an URL transfer library:</p>
+<p>Ð? cURL, библиоÑ?еке пеÑ?едаÑ?и URL, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3143";>CVE-2015-3143</a>
 
- -    <p>NTLM-authenticated connections could be wrongly reused for requests
- -    without any credentials set, leading to HTTP requests being sent
- -    over the connection authenticated as a different user. This is
- -    similar to the issue fixed in DSA-2849-1.</p></li>
+    <p>СоединениÑ?, аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е Ñ? помоÑ?Ñ?Ñ? NTLM, могÑ?Ñ? оÑ?ибоÑ?но повÑ?оÑ?но иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? запÑ?оÑ?ов
+    без какиÑ?-либо даннÑ?Ñ? Ñ?Ñ?Ñ?Ñ?ной запиÑ?и, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о HTTP-запÑ?оÑ?Ñ? оÑ?пÑ?авлÑ?Ñ?Ñ?Ñ?Ñ?
+    по Ñ?оединениÑ?, аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованномÑ? оÑ? дÑ?Ñ?гого полÑ?зоваÑ?елÑ?. ЭÑ?а пÑ?облема
+    Ñ?Ñ?ожа Ñ? пÑ?облемой, иÑ?пÑ?авленной в DSA-2849-1.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3148";>CVE-2015-3148</a>
 
- -    <p>When doing HTTP requests using the Negotiate authentication method
- -    along with NTLM, the connection used would not be marked as
- -    authenticated, making it possible to reuse it and send requests for
- -    one user over the connection authenticated as a different user.</p></li>
+    <p>Ð?Ñ?и вÑ?полнении HTTP-запÑ?оÑ?ов, иÑ?полÑ?зÑ?Ñ?Ñ?иÑ? меÑ?од аÑ?Ñ?енÑ?иÑ?икаÑ?ии Negotiate
+    наÑ?Ñ?дÑ? Ñ? NTLM, иÑ?полÑ?зÑ?емое Ñ?оединение не оÑ?меÑ?аеÑ?Ñ?Ñ? как
+    аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованное, Ñ?Ñ?о позволÑ?еÑ? его повÑ?оÑ?но иÑ?полÑ?зоваÑ?Ñ? и оÑ?пÑ?авлÑ?Ñ?Ñ? запÑ?оÑ?Ñ?
+    одного полÑ?зоваÑ?елÑ? по Ñ?оединениÑ?, аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованномÑ? оÑ? дÑ?Ñ?гого полÑ?зоваÑ?елÑ?.</p></li>
 
 </ul>
 </define-tag>
- --- english/security/2015/dla-248.wml	2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-248.wml	2016-04-29 23:12:33.097079199 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerability was discovered in the qemu virtualisation solution:</p>
+<p>Ð? qemu, Ñ?еÑ?ении длÑ? виÑ?Ñ?Ñ?ализаÑ?ии, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3456";>CVE-2015-3456</a>
 
- -    <p>Jason Geffner discovered a buffer overflow in the emulated floppy
- -    disk drive, resulting in the potential execution of arbitrary code.</p>
+    <p>Ð?жейÑ?он Ð?еÑ?Ñ?неÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?мÑ?лÑ?Ñ?ии пÑ?ивода гибкиÑ?
+    магниÑ?нÑ?Ñ? диÑ?ков, коÑ?оÑ?ое пÑ?иводиÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>Despite the end-of-life of qemu support in the old-oldstable
- -distribution (squeeze-lts), this problem has been fixed in version
- -0.12.5+dfsg-3squeeze4 of the qemu source package due to its severity
- -(the so-called VENOM vulnerability).</p>
- -
- -<p>Further problems may still be present in the qemu package in the
- -old-oldstable distribution (squeeze-lts) and users who need to rely on
- -qemu are encouraged to upgrade to a newer version of Debian.</p>
+<p>Ð?еÑ?моÑ?Ñ?Ñ? на оконÑ?ание жизненного Ñ?икла qemu в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном
+вÑ?пÑ?Ñ?ке (squeeze-lts), даннаÑ? пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии
+0.12.5+dfsg-3squeeze4 пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом qemu в Ñ?вÑ?зи Ñ? Ñ?еÑ?Ñ?Ñ?зноÑ?Ñ?Ñ?Ñ? Ñ?Ñ?ой пÑ?облемÑ?
+(Ñ?ак назÑ?ваемÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? VENOM).</p>
+
+<p>Ð? пакеÑ?е qemu в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze-lts) могÑ?Ñ?
+пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?воваÑ?Ñ? и дÑ?Ñ?гие пÑ?облемÑ?, полÑ?зоваÑ?елÑ?м, иÑ?полÑ?зÑ?Ñ?Ñ?им
+qemu, наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? обновление до более Ñ?вежей веÑ?Ñ?ии Debian.</p>
 
- -<p>We recommend that you upgrade your qemu packages.</p></li>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? qemu.</p></li>
 
 </ul>
 </define-tag>
-----BEGIN PGP SIGNATURE-----
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=v9kT
-----END PGP SIGNATURE-----


Reply to: