[DONE] wml://security/2015/dla-{149,321}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-149.wml 2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-149.wml 2016-05-03 13:35:11.378839073 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in the ntp package, an
- -implementation of the Network Time Protocol. The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? пакеÑ?е ntp, Ñ?еализаÑ?ии пÑ?оÑ?окола Ñ?еÑ?евого вÑ?емени, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9297">CVE-2014-9297</a>
- - <p>Stephen Roettger of the Google Security Team, Sebastian Krahmer of
- - the SUSE Security Team and Harlan Stenn of Network Time Foundation
- - discovered that the length value in extension fields is not properly
- - validated in several code paths in ntp_crypto.c, which could lead to
- - information leakage or denial of service (ntpd crash).</p></li>
+ <p>СÑ?ивен РоÑ?геÑ? из командÑ? безопаÑ?ноÑ?Ñ?и Google, СебаÑ?Ñ?иан Ð?Ñ?амеÑ? из
+ командÑ? безопаÑ?ноÑ?Ñ?и SUSE и ХаÑ?лан ШÑ?енн из Network Time Foundation
+ обнаÑ?Ñ?жили, Ñ?Ñ?о знаÑ?ение длинÑ? в полÑ?Ñ? Ñ?аÑ?Ñ?иÑ?ениÑ? пÑ?овеÑ?Ñ?Ñ?Ñ? в неÑ?колÑ?киÑ?
+ Ñ?Ñ?аÑ?Ñ?каÑ? кода в ntp_crypto.c непÑ?авилÑ?но, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+ Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии или оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка ntpd).</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9298">CVE-2014-9298</a>
- - <p>Stephen Roettger of the Google Security Team reported that ACLs
- - based on IPv6 ::1 addresses can be bypassed.</p></li>
+ <p>СÑ?ивен РоÑ?геÑ? из командÑ? безопаÑ?ноÑ?Ñ?и Google Ñ?ообÑ?ил, Ñ?Ñ?о ACL
+ на оÑ?нове адÑ?еÑ?ов IPv6 ::1 можно обойÑ?и.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ntp version 1:4.2.6.p2+dfsg-1+deb6u2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в ntp веÑ?Ñ?ии 1:4.2.6.p2+dfsg-1+deb6u2</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-321.wml 2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-321.wml 2016-05-03 13:39:56.931647542 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Various security issue have been fixed in the Debian LTS (squeeze)
- -version of the Wordpress content management system.</p>
+<p>Ð? веÑ?Ñ?ии Wordpress, Ñ?иÑ?Ñ?емÑ? Ñ?пÑ?авлениÑ? Ñ?одеÑ?жимÑ?м, из
+Debian LTS (squeeze) бÑ?ли обнаÑ?Ñ?женÑ? Ñ?азлиÑ?нÑ?е пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5714">CVE-2015-5714</a>
- - <p>A cross-site scripting vulnerability when processing shortcode tags
- - has been discovered.</p>
+ <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг пÑ?и обÑ?абоÑ?ке
+ Ñ?окÑ?аÑ?Ñ?ннÑ?Ñ? Ñ?егов.</p>
- - <p>The issue has been fixed by not allowing unclosed HTML elements in
- - attributes.</p></li>
+ <p>Ð?Ñ?облема бÑ?ла иÑ?пÑ?авлена пÑ?Ñ?Ñ?м запÑ?еÑ?а незакÑ?Ñ?Ñ?Ñ?Ñ? Ñ?леменÑ?ов HTML в
+ аÑ?Ñ?ибÑ?Ñ?аÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5715">CVE-2015-5715</a>
- - <p>A vulnerability has been discovered, allowing users without proper
- - permissions to publish private posts and make them sticky.</p>
+ <p>Ð?Ñ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?, позволÑ?Ñ?Ñ?аÑ? полÑ?зоваÑ?елÑ?м без Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ?
+ пÑ?ав доÑ?Ñ?Ñ?па пÑ?бликоваÑ?Ñ? закÑ?Ñ?Ñ?Ñ?е Ñ?ообÑ?ениÑ? и пÑ?икÑ?еплÑ?Ñ?Ñ? иÑ?.</p>
- - <p>The issue has been fixed in the XMLRPC code of Wordpress by not
- - allowing private posts to be sticky.</p></li>
+ <p>Ð?Ñ?облема бÑ?ла иÑ?пÑ?авлена в коде XMLRPC Wordpress пÑ?Ñ?Ñ?м запÑ?еÑ?а
+ пÑ?икÑ?еплениÑ? закÑ?Ñ?Ñ?Ñ?Ñ? Ñ?ообÑ?ений.</p></li>
- -<li>Other issue(s)
+<li>Ð?Ñ?Ñ?гие пÑ?облемÑ?
- - <p>A cross-site scripting vulnerability in user list tables has been
- - discovered.</p>
+ <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в Ñ?аблиÑ?аÑ? Ñ?пиÑ?ков
+ полÑ?зоваÑ?елей.</p>
- - <p>The issue has been fixed by URL-escaping email addresses in those user
- - lists.</p></li>
+ <p>Ð?Ñ?облема бÑ?ла иÑ?пÑ?авлена пÑ?Ñ?Ñ?м Ñ?кÑ?аниÑ?ованиÑ? URL адÑ?еÑ?ов Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ? в
+ Ñ?пиÑ?каÑ? полÑ?зоваÑ?елей.</p></li>
</ul>
</define-tag>
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXKGPfAAoJEF7nbuICFtKluSIP/1YRuBacsZ5efr4UG/wj4OII
DtiTPJYNd5eBcrYUmyRJU3glCmo4wrW6LsVMm/odxm1IJMmIVJQKevCDXpuk/FUp
0C0yJ/MQkgiMqZRA9KwzCWJT7Vag6TG43781/a0gUJfCPMlKbjabLc8oH1zbVG0P
bBtZSX7HP3oJMsOK1lYqEsseKlHccAxYLyKHliQUBj8KSHVU0GOCIR2ti0P/IlGm
HFha2HDoQXrgVPEjPwuUP/AxrNOtCx4oVQLMnGYqK+Rpg23bb0Z9GtYsAF9hlV14
QVx2+4mHQetZfypQF13x+S2LflEeaaSBodsmaM45qTI48Jp0pq6mAtAhobUlDisi
f4r0Bqb2bM7LkU9kFMoeWyuMxjvyZ+E6lw0uyceEYBeG/q1k2qKXfI2ICCljBxdI
yj5U54se9T6Ms+WvpfwRgctuijSPPfae4hKiqFqEeonOnrcCtvMQ28yO6FscvjGH
wCNrTmjTFolQMtsmSGKtkUM8CLIxDF08zKHV7HY/q8uF9w+QuX9rWFM6U6OcO83+
rnDC2xC7THPU0m1EbGDzmZUY11Vk90V0vjcNr6a1FY/7bH1qJT/1okUX53eACuQb
zpW7DaDw3T56gRGb8dAAKzsR+bI/TKWrbXcibBHUrDHmudDPEbUEX4EFrg84quMx
24ML4+ruJ2WSuoMUhw9R
=J8Kf
-----END PGP SIGNATURE-----
Reply to: