[DONE] wml://security/2015/dla-2{11,48}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-211.wml 2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-211.wml 2016-04-29 23:03:14.246262404 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in cURL, an URL transfer library:</p>
+<p>Ð? cURL, библиоÑ?еке пеÑ?едаÑ?и URL, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3143">CVE-2015-3143</a>
- - <p>NTLM-authenticated connections could be wrongly reused for requests
- - without any credentials set, leading to HTTP requests being sent
- - over the connection authenticated as a different user. This is
- - similar to the issue fixed in DSA-2849-1.</p></li>
+ <p>СоединениÑ?, аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е Ñ? помоÑ?Ñ?Ñ? NTLM, могÑ?Ñ? оÑ?ибоÑ?но повÑ?оÑ?но иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? запÑ?оÑ?ов
+ без какиÑ?-либо даннÑ?Ñ? Ñ?Ñ?Ñ?Ñ?ной запиÑ?и, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о HTTP-запÑ?оÑ?Ñ? оÑ?пÑ?авлÑ?Ñ?Ñ?Ñ?Ñ?
+ по Ñ?оединениÑ?, аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованномÑ? оÑ? дÑ?Ñ?гого полÑ?зоваÑ?елÑ?. ÐÑ?а пÑ?облема
+ Ñ?Ñ?ожа Ñ? пÑ?облемой, иÑ?пÑ?авленной в DSA-2849-1.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3148">CVE-2015-3148</a>
- - <p>When doing HTTP requests using the Negotiate authentication method
- - along with NTLM, the connection used would not be marked as
- - authenticated, making it possible to reuse it and send requests for
- - one user over the connection authenticated as a different user.</p></li>
+ <p>Ð?Ñ?и вÑ?полнении HTTP-запÑ?оÑ?ов, иÑ?полÑ?зÑ?Ñ?Ñ?иÑ? меÑ?од аÑ?Ñ?енÑ?иÑ?икаÑ?ии Negotiate
+ наÑ?Ñ?дÑ? Ñ? NTLM, иÑ?полÑ?зÑ?емое Ñ?оединение не оÑ?меÑ?аеÑ?Ñ?Ñ? как
+ аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованное, Ñ?Ñ?о позволÑ?еÑ? его повÑ?оÑ?но иÑ?полÑ?зоваÑ?Ñ? и оÑ?пÑ?авлÑ?Ñ?Ñ? запÑ?оÑ?Ñ?
+ одного полÑ?зоваÑ?елÑ? по Ñ?оединениÑ?, аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованномÑ? оÑ? дÑ?Ñ?гого полÑ?зоваÑ?елÑ?.</p></li>
</ul>
</define-tag>
- --- english/security/2015/dla-248.wml 2016-04-07 03:10:35.000000000 +0500
+++ russian/security/2015/dla-248.wml 2016-04-29 23:12:33.097079199 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>A vulnerability was discovered in the qemu virtualisation solution:</p>
+<p>Ð? qemu, Ñ?еÑ?ении длÑ? виÑ?Ñ?Ñ?ализаÑ?ии, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3456">CVE-2015-3456</a>
- - <p>Jason Geffner discovered a buffer overflow in the emulated floppy
- - disk drive, resulting in the potential execution of arbitrary code.</p>
+ <p>Ð?жейÑ?он Ð?еÑ?Ñ?неÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?мÑ?лÑ?Ñ?ии пÑ?ивода гибкиÑ?
+ магниÑ?нÑ?Ñ? диÑ?ков, коÑ?оÑ?ое пÑ?иводиÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
- -<p>Despite the end-of-life of qemu support in the old-oldstable
- -distribution (squeeze-lts), this problem has been fixed in version
- -0.12.5+dfsg-3squeeze4 of the qemu source package due to its severity
- -(the so-called VENOM vulnerability).</p>
- -
- -<p>Further problems may still be present in the qemu package in the
- -old-oldstable distribution (squeeze-lts) and users who need to rely on
- -qemu are encouraged to upgrade to a newer version of Debian.</p>
+<p>Ð?еÑ?моÑ?Ñ?Ñ? на оконÑ?ание жизненного Ñ?икла qemu в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном
+вÑ?пÑ?Ñ?ке (squeeze-lts), даннаÑ? пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии
+0.12.5+dfsg-3squeeze4 пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом qemu в Ñ?вÑ?зи Ñ? Ñ?еÑ?Ñ?Ñ?зноÑ?Ñ?Ñ?Ñ? Ñ?Ñ?ой пÑ?облемÑ?
+(Ñ?ак назÑ?ваемÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? VENOM).</p>
+
+<p>Ð? пакеÑ?е qemu в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze-lts) могÑ?Ñ?
+пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?воваÑ?Ñ? и дÑ?Ñ?гие пÑ?облемÑ?, полÑ?зоваÑ?елÑ?м, иÑ?полÑ?зÑ?Ñ?Ñ?им
+qemu, наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? обновление до более Ñ?вежей веÑ?Ñ?ии Debian.</p>
- -<p>We recommend that you upgrade your qemu packages.</p></li>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? qemu.</p></li>
</ul>
</define-tag>
-----BEGIN PGP SIGNATURE-----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=v9kT
-----END PGP SIGNATURE-----
Reply to: