[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{149,321}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-149.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-149.wml	2016-05-03 13:35:11.378839073 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in the ntp package, an
- -implementation of the Network Time Protocol. The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? пакеÑ?е ntp, Ñ?еализаÑ?ии пÑ?оÑ?окола Ñ?еÑ?евого вÑ?емени, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9297";>CVE-2014-9297</a>
 
- -    <p>Stephen Roettger of the Google Security Team, Sebastian Krahmer of
- -    the SUSE Security Team and Harlan Stenn of Network Time Foundation
- -    discovered that the length value in extension fields is not properly
- -    validated in several code paths in ntp_crypto.c, which could lead to
- -    information leakage or denial of service (ntpd crash).</p></li>
+    <p>СÑ?ивен РоÑ?геÑ? из командÑ? безопаÑ?ноÑ?Ñ?и Google, СебаÑ?Ñ?иан Ð?Ñ?амеÑ? из
+    командÑ? безопаÑ?ноÑ?Ñ?и SUSE и ХаÑ?лан ШÑ?енн из Network Time Foundation
+    обнаÑ?Ñ?жили, Ñ?Ñ?о знаÑ?ение длинÑ? в полÑ?Ñ? Ñ?аÑ?Ñ?иÑ?ениÑ? пÑ?овеÑ?Ñ?Ñ?Ñ? в неÑ?колÑ?киÑ?
+    Ñ?Ñ?аÑ?Ñ?каÑ? кода в ntp_crypto.c непÑ?авилÑ?но, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+    Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии или оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка ntpd).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9298";>CVE-2014-9298</a>
 
- -    <p>Stephen Roettger of the Google Security Team reported that ACLs
- -    based on IPv6 ::1 addresses can be bypassed.</p></li>
+    <p>СÑ?ивен РоÑ?геÑ? из командÑ? безопаÑ?ноÑ?Ñ?и Google Ñ?ообÑ?ил, Ñ?Ñ?о ACL
+    на оÑ?нове адÑ?еÑ?ов IPv6 ::1 можно обойÑ?и.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ntp version 1:4.2.6.p2+dfsg-1+deb6u2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в ntp веÑ?Ñ?ии 1:4.2.6.p2+dfsg-1+deb6u2</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-321.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-321.wml	2016-05-03 13:39:56.931647542 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Various security issue have been fixed in the Debian LTS (squeeze)
- -version of the Wordpress content management system.</p>
+<p>Ð? веÑ?Ñ?ии Wordpress, Ñ?иÑ?Ñ?емÑ? Ñ?пÑ?авлениÑ? Ñ?одеÑ?жимÑ?м, из
+Debian LTS (squeeze) бÑ?ли обнаÑ?Ñ?женÑ? Ñ?азлиÑ?нÑ?е пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5714";>CVE-2015-5714</a>
 
- -    <p>A cross-site scripting vulnerability when processing shortcode tags
- -    has been discovered.</p>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг пÑ?и обÑ?абоÑ?ке
+    Ñ?окÑ?аÑ?Ñ?ннÑ?Ñ? Ñ?егов.</p>
 
- -    <p>The issue has been fixed by not allowing unclosed HTML elements in
- -    attributes.</p></li>
+    <p>Ð?Ñ?облема бÑ?ла иÑ?пÑ?авлена пÑ?Ñ?Ñ?м запÑ?еÑ?а незакÑ?Ñ?Ñ?Ñ?Ñ? Ñ?леменÑ?ов HTML в
+    аÑ?Ñ?ибÑ?Ñ?аÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5715";>CVE-2015-5715</a>
 
- -    <p>A vulnerability has been discovered, allowing users without proper
- -    permissions to publish private posts and make them sticky.</p>
+    <p>Ð?Ñ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?, позволÑ?Ñ?Ñ?аÑ? полÑ?зоваÑ?елÑ?м без Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ?
+    пÑ?ав доÑ?Ñ?Ñ?па пÑ?бликоваÑ?Ñ? закÑ?Ñ?Ñ?Ñ?е Ñ?ообÑ?ениÑ? и пÑ?икÑ?еплÑ?Ñ?Ñ? иÑ?.</p>
 
- -    <p>The issue has been fixed in the XMLRPC code of Wordpress by not
- -    allowing private posts to be sticky.</p></li>
+    <p>Ð?Ñ?облема бÑ?ла иÑ?пÑ?авлена в коде XMLRPC Wordpress пÑ?Ñ?Ñ?м запÑ?еÑ?а
+    пÑ?икÑ?еплениÑ? закÑ?Ñ?Ñ?Ñ?Ñ? Ñ?ообÑ?ений.</p></li>
 
- -<li>Other issue(s)
+<li>Ð?Ñ?Ñ?гие пÑ?облемÑ?
 
- -   <p>A cross-site scripting vulnerability in user list tables has been
- -   discovered.</p>
+   <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в Ñ?аблиÑ?аÑ? Ñ?пиÑ?ков
+   полÑ?зоваÑ?елей.</p>
 
- -   <p>The issue has been fixed by URL-escaping email addresses in those user
- -   lists.</p></li>
+   <p>Ð?Ñ?облема бÑ?ла иÑ?пÑ?авлена пÑ?Ñ?Ñ?м Ñ?кÑ?аниÑ?ованиÑ? URL адÑ?еÑ?ов Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ? в
+   Ñ?пиÑ?каÑ? полÑ?зоваÑ?елей.</p></li>
 
 </ul>
 </define-tag>
-----BEGIN PGP SIGNATURE-----
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=J8Kf
-----END PGP SIGNATURE-----


Reply to: