[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{315,178}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-178.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-178.wml	2016-05-03 13:52:02.550748710 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several issues have been discovered and fixed in Tor, a connection-based
- -low-latency anonymous communication system.</p>
+<p>Ð? Tor, Ñ?иÑ?Ñ?еме анонимного взаимодейÑ?Ñ?виÑ? Ñ? низкой задеÑ?жкой на
+оÑ?нове Ñ?оединений, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
- -  <p>o Jowr discovered that very high DNS query load on a relay could
- -    trigger an assertion error.</p>
+  <p>Jowr обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?енÑ? вÑ?Ñ?окаÑ? загÑ?Ñ?зка по DNS-запÑ?оÑ?ам на Ñ?зле можеÑ?
+    вÑ?зваÑ?Ñ? оÑ?ибкÑ? Ñ?Ñ?веÑ?ждениÑ?.</p>
 
- -  <p>o A relay could crash with an assertion error if a buffer of exactly
- -    the wrong layout was passed to buf_pullup() at exactly the wrong
- -    time.</p>
+  <p>Узел можеÑ? аваÑ?ийное завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? Ñ? оÑ?ибкой Ñ?Ñ?веÑ?ждениÑ? в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?Ñ?нкÑ?ии
+    buf_pullup() бÑ?деÑ? пеÑ?едан бÑ?Ñ?еÑ? Ñ? непÑ?авилÑ?ной Ñ?азмеÑ?кой в
+    непÑ?авилÑ?но вÑ?емÑ?.</p>
 
- -  <p>o When sending the address of the chosen rendezvous point to a hidden
- -    service clients were leaking to the hidden service they were on a
- -    little-endian or big-endian systems.</p>
+  <p>Ð?Ñ?и оÑ?пÑ?авлении адÑ?еÑ?а вÑ?бÑ?анной Ñ?оÑ?ки вÑ?Ñ?Ñ?еÑ?и Ñ?кÑ?Ñ?Ñ?омÑ? Ñ?еÑ?виÑ?Ñ?
+    клиенÑ?Ñ? Ñ?Ñ?ого Ñ?еÑ?виÑ?а Ñ?аÑ?кÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли они иÑ?полÑ?зÑ?Ñ?Ñ?
+    Ñ?иÑ?Ñ?емÑ? Ñ? поÑ?Ñ?дком байÑ?ов о младÑ?его к Ñ?Ñ?аÑ?Ñ?емÑ? или оÑ? Ñ?Ñ?аÑ?Ñ?его к младÑ?емÑ?.</p>
 
- -<p>Furthermore, this update disables support for SSLv3 in Tor. All
- -versions of OpenSSL in use with Tor today support TLS 1.0 or later.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление оÑ?клÑ?Ñ?аеÑ? поддеÑ?жкÑ? SSLv3 в Tor. Ð?Ñ?е
+веÑ?Ñ?ии OpenSSL, иÑ?полÑ?зÑ?емÑ?е в наÑ?Ñ?оÑ?Ñ?ее вÑ?емÑ? в Tor поддеÑ?живаÑ?Ñ? TLS 1.0 и более поздниÑ? веÑ?Ñ?иÑ?Ñ?.</p>
 
- -<p>Additionally, this release updates the geoIP database used by Tor as
- -well as the list of directory authority servers, which Tor clients use
- -to bootstrap and trust to sign the Tor directory consensus document.</p>
+<p>Также даннÑ?й вÑ?пÑ?Ñ?к Ñ?одеÑ?жиÑ? обновление базÑ? даннÑ?Ñ? geoIP, иÑ?полÑ?зÑ?емой Tor,
+а Ñ?акже обновление Ñ?пиÑ?ка каÑ?алогов авÑ?оÑ?иÑ?еÑ?нÑ?Ñ? Ñ?еÑ?веÑ?ов, коÑ?оÑ?Ñ?е клиенÑ?Ñ? Tor иÑ?полÑ?зÑ?Ñ?Ñ?
+длÑ? запÑ?Ñ?ка и коÑ?оÑ?Ñ?м довеÑ?Ñ?Ñ?Ñ? подпиÑ?Ñ?вание докÑ?менÑ?а Ñ?оглаÑ?иÑ? каÑ?алога Tor.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tor version 0.2.4.26-1~deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в tor веÑ?Ñ?ии 0.2.4.26-1~deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-315.wml	2016-04-07 03:10:36.000000000 +0500
+++ russian/security/2015/dla-315.wml	2016-05-03 13:43:51.930589577 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in nss, the Mozilla Network
- -Security Service library. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? nss, библиоÑ?еке Mozilla Network Security Service, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2721";>CVE-2015-2721</a>
 
- -    <p>Karthikeyan Bhargavan discovered that NSS incorrectly handles state
- -    transitions for the TLS state machine. A man-in-the-middle attacker
- -    could exploit this flaw to skip the ServerKeyExchange message and
- -    remove the forward-secrecy property.</p></li>
+    <p>Ð?аÑ?Ñ?икеÑ?н Ð?Ñ?агаван обнаÑ?Ñ?жил, Ñ?Ñ?о NSS непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? пеÑ?еÑ?одÑ?
+    Ñ?оÑ?Ñ?оÑ?ний длÑ? маÑ?инÑ? Ñ?оÑ?Ñ?оÑ?ний TLS. Ð?лоÑ?мÑ?Ñ?ленник, иÑ?полÑ?зÑ?Ñ?Ñ?ий пÑ?инÑ?ип
+    Ñ?еловек-в-Ñ?еÑ?едине, можеÑ? иÑ?полÑ?зоваÑ?Ñ? даннÑ?Ñ? пÑ?облемÑ? длÑ? Ñ?ого, Ñ?Ñ?обÑ? пÑ?опÑ?Ñ?Ñ?иÑ?Ñ? Ñ?ообÑ?ение ServerKeyExchange и
+    Ñ?далиÑ?Ñ? Ñ?войÑ?Ñ?во forward-secrecy.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2730";>CVE-2015-2730</a>
 
- -    <p>Watson Ladd discovered that NSS does not properly perform Elliptical
- -    Curve Cryptography (ECC) multiplication, allowing a remote attacker
- -    to potentially spoof ECDSA signatures.</p></li>
+    <p>УоÑ?Ñ?он Ð?Ñ?дд обнаÑ?Ñ?жил, Ñ?Ñ?о NSS непÑ?авилÑ?но вÑ?полнÑ?еÑ? Ñ?множение в Ñ?иÑ?Ñ?овании
+    Ñ? иÑ?полÑ?зование Ñ?ллипÑ?иÑ?еÑ?киÑ? кÑ?ивÑ?Ñ? (ECC), Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ?
+    поÑ?енÑ?иалÑ?но подделаÑ?Ñ? подпиÑ?и ECDSA.</p></li>
 
 </ul>
 
- -<p>For the oldoldstable distribution (squeeze), these problems have been fixed
- -in version 3.12.8-1+squeeze12.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.12.8-1+squeeze12.</p>
 
- -<p>We recommend that you upgrade your nss packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? nss.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=JQs6
-----END PGP SIGNATURE-----


Reply to: