[DONE] wml://security/2015/dla-{232,180}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-180.wml 2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-180.wml 2016-05-03 13:31:15.015586341 +0500
@@ -1,29 +1,30 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in GnuTLS, a library
- -implementing the TLS and SSL protocols. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? GnuTLS, библиоÑ?еке, Ñ?еализÑ?Ñ?Ñ?ей пÑ?оÑ?околÑ? TLS и SSL, бÑ?ли обнаÑ?Ñ?женÑ?
+многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8155">CVE-2014-8155</a>
- - <p>Missing date/time checks on CA certificates</p></li>
+ <p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ок даÑ?Ñ?/вÑ?емени длÑ? Ñ?еÑ?Ñ?иÑ?икаÑ?ов CA</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0282">CVE-2015-0282</a>
- - <p>GnuTLS does not verify the RSA PKCS #1 signature algorithm to match
- - the signature algorithm in the certificate, leading to a potential
- - downgrade to a disallowed algorithm without detecting it.</p></li>
+ <p>GnuTLS не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? Ñ?овпадениÑ? алгоÑ?иÑ?ма подпиÑ?и RSA PKCS #1 Ñ?
+ алгоÑ?иÑ?мом подпиÑ?и в Ñ?еÑ?Ñ?иÑ?икаÑ?е, Ñ?Ñ?о пÑ?иводиÑ? к поÑ?енÑ?иалÑ?номÑ?
+ иÑ?полÑ?зованиÑ? запÑ?еÑ?Ñ?нного алгоÑ?иÑ?ма без опÑ?еделениÑ? Ñ?Ñ?ой Ñ?иÑ?Ñ?аÑ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0294">CVE-2015-0294</a>
- - <p>GnuTLS does not check whether the two signature algorithms match on
- - certificate import.</p></li>
+ <p>GnuTLS не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? Ñ?ого, Ñ?Ñ?о два алгоÑ?иÑ?ма подпиÑ?и Ñ?овпадаÑ?Ñ?
+ по импоÑ?Ñ?Ñ? Ñ?еÑ?Ñ?иÑ?икаÑ?ов.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in gnutls26 version 2.8.6-1+squeeze5</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в gnutls26 веÑ?Ñ?ии 2.8.6-1+squeeze5</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-232.wml 2016-04-08 01:24:53.000000000 +0500
+++ russian/security/2015/dla-232.wml 2016-05-03 13:28:08.666093730 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>The following vulnerabilities were found in Apache Tomcat 6:</p>
+<p>Ð? Apache Tomcat 6 бÑ?ли обнаÑ?Ñ?женÑ? Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0227">CVE-2014-0227</a>
- - <p>The Tomcat security team identified that it was possible to conduct HTTP
- - request smuggling attacks or cause a DoS by streaming malformed data.</p></li>
+ <p>Ð?оманда безопаÑ?ноÑ?Ñ?и Tomcat опÑ?еделила, Ñ?Ñ?о можно вÑ?полниÑ?Ñ? аÑ?акÑ? по подделке
+ запÑ?оÑ?а HTTP или вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании пÑ?Ñ?Ñ?м пеÑ?едаÑ?и поÑ?ока Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? даннÑ?Ñ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0230">CVE-2014-0230</a>
- - <p>AntBean@secdig, from the Baidu Security Team, disclosed that it was
- - possible to cause a limited DoS attack by feeding data by aborting an
- - upload.</p></li>
+ <p>AntBean@secdig из командÑ? безопаÑ?ноÑ?Ñ?и Baidu обнаÑ?Ñ?жил, Ñ?Ñ?о имееÑ?Ñ?Ñ? возможноÑ?Ñ?Ñ?
+ вÑ?полнениÑ? огÑ?аниÑ?енной аÑ?аки длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании пÑ?Ñ?Ñ?м пеÑ?едаÑ?и даннÑ?Ñ?
+ Ñ?еÑ?ез оÑ?менÑ? загÑ?Ñ?зки.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7810">CVE-2014-7810</a>
- - <p>The Tomcat security team identified that malicious web applications could
- - bypass the Security Manager by the use of expression language.</p></li>
+ <p>Ð?оманда безопаÑ?ноÑ?Ñ?и Tomcat опÑ?еделила, Ñ?Ñ?о веб-пÑ?иложениÑ? злоÑ?мÑ?Ñ?ленников могÑ?Ñ?
+ обÑ?одиÑ?Ñ? огÑ?аниÑ?ениÑ? менеджеÑ?а безопаÑ?ноÑ?Ñ?и пÑ?Ñ?Ñ?м иÑ?полÑ?зованиÑ? Ñ?зÑ?ка вÑ?Ñ?ажений.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tomcat6 version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в tomcat6 веÑ?Ñ?ии
6.0.41-2+squeeze7.</p>
</define-tag>
-----BEGIN PGP SIGNATURE-----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=nVNq
-----END PGP SIGNATURE-----
Reply to: