[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{288,142}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-142.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-142.wml	2016-05-03 23:06:39.314181992 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been fixed in privoxy, a privacy enhancing
- -HTTP proxy:</p>
+<p>Ð? privoxy, HTTP-пÑ?окÑ?и Ñ? пÑ?одвинÑ?Ñ?Ñ?ми возможноÑ?Ñ?Ñ?ми заÑ?иÑ?Ñ? конÑ?иденÑ?иалÑ?нÑ?Ñ? даннÑ?Ñ?, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1031";>CVE-2015-1031</a>, CID66394:
 
- -    <p>unmap(): Prevent use-after-free if the map only consists of one item.</p></li>
+    <p>unmap(): пÑ?едоÑ?вÑ?аÑ?ение иÑ?полÑ?зованиÑ? Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Ñ?лÑ?Ñ?ае, еÑ?ли оÑ?обÑ?ажение Ñ?оÑ?Ñ?оиÑ? Ñ?олÑ?ко из одного пÑ?едмеÑ?а.</p></li>
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1031";>CVE-2015-1031</a>, CID66376 and CID66391:
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1031";>CVE-2015-1031</a>, CID66376 и CID66391:
 
- -     <p>pcrs_execute(): Consistently set *result to NULL in case of errors.
- -     Should make use-after-free in the caller less likely.</p></li>
+     <p>pcrs_execute(): поÑ?Ñ?оÑ?ннаÑ? Ñ?Ñ?Ñ?ановка *result в знаÑ?ение NULL в Ñ?лÑ?Ñ?ае оÑ?ибок.
+     ЭÑ?о должно Ñ?делаÑ?Ñ? иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в вÑ?зÑ?ваÑ?Ñ?ей Ñ?Ñ?нкÑ?ии менее веÑ?оÑ?Ñ?нÑ?м.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1381";>CVE-2015-1381</a>:
 
- -     <p>Fix multiple segmentation faults and memory leaks in the pcrs code.</p></li>
+     <p>Ð?Ñ?пÑ?авление многоÑ?иÑ?леннÑ?е оÑ?ибок Ñ?егменÑ?иÑ?ованиÑ? и Ñ?Ñ?еÑ?ек памÑ?Ñ?и в коде pcrs.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1382";>CVE-2015-1382</a>:
 
- -     <p>Fix invalid read to prevent potential crashes.</p></li>
+     <p>Ð?Ñ?пÑ?авление непÑ?авилÑ?ного Ñ?Ñ?ениÑ? Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? поÑ?енÑ?иалÑ?нÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок.</p></li>
 
 </ul>
 
- -<p>We recommend that you upgrade your privoxy packages.</p>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in privoxy version 3.0.16-1+deb6u1</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? privoxy.</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в privoxy веÑ?Ñ?ии 3.0.16-1+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-288.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-288.wml	2016-05-03 22:52:50.872050055 +0500
@@ -1,23 +1,24 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>In Debian LTS (squeeze), the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-5600";>CVE-2015-5600</a> in openssh
- -1:5.5p1-6+squeeze7 breaks authentication mechanisms that rely on the
- -keyboard-interactive method. Thanks to Colin Watson for making aware of
- -that.</p>
+<p>Ð? Debian LTS (squeeze) иÑ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2015-5600";>CVE-2015-5600</a> в openssh
+веÑ?Ñ?ии 1:5.5p1-6+squeeze7 ломаеÑ? меÑ?анизмÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии, полагаÑ?Ñ?иеÑ?Ñ? на меÑ?од
+инÑ?еÑ?акÑ?ивной Ñ?абоÑ?Ñ? Ñ? клавиаÑ?Ñ?Ñ?ой. Ð?лагодаÑ?им Ð?олина УоÑ?Ñ?она за обнаÑ?Ñ?жение
+Ñ?Ñ?ой пÑ?облемÑ?.</p>
 
- -<p>The patch fixing <a href="https://security-tracker.debian.org/tracker/CVE-2015-5600";>CVE-2015-5600</a> introduces the field <q>devices_done</q> to the
- -KbdintAuthctxt struct, but does not initialize the field in the
- -kbdint_alloc() function. On Linux, this ends up filling that field with
- -junk data. The result of this are random login failures when
- -keyboard-interactive authentication is used.</p>
+<p>Ð?аплаÑ?а, иÑ?пÑ?авлÑ?Ñ?Ñ?аÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2015-5600";>CVE-2015-5600</a> добавлÑ?еÑ? поле <q>devices_done</q> в
+Ñ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ? KbdintAuthctxt, но не иниÑ?иализиÑ?Ñ?еÑ? Ñ?Ñ?о поле в
+Ñ?Ñ?нкÑ?ии kbdint_alloc(). Ð? Linux Ñ?Ñ?и пÑ?оводиÑ? к заполнениÑ? полÑ?
+ненÑ?жнÑ?ми даннÑ?ми. Ð? Ñ?езÑ?лÑ?Ñ?аÑ?е Ñ?Ñ?о пÑ?иводиÑ? к Ñ?лÑ?Ñ?айнÑ?м оÑ?ибкам пÑ?и вводе даннÑ?Ñ? Ñ?Ñ?Ñ?Ñ?ной запиÑ?и
+пÑ?и иÑ?полÑ?зовании инÑ?еÑ?акÑ?ивной аÑ?Ñ?енÑ?иÑ?икаÑ?ии Ñ? помоÑ?Ñ?Ñ? клавиаÑ?Ñ?Ñ?Ñ?.</p>
 
- -<p>This upload of openssh 1:5.5p1-6+squeeze7 to Debian LTS (squeeze) adds
- -that initialization of the `devices_done` field alongside the existing
- -initialization code.</p>
+<p>Ð?аннаÑ? загÑ?Ñ?зка openssh 1:5.5p1-6+squeeze7 в Debian LTS (squeeze) добавлÑ?еÑ?
+иниÑ?иализаÑ?иÑ? полÑ? `devices_done` в Ñ?Ñ?Ñ?еÑ?Ñ?вÑ?Ñ?Ñ?ий код
+иниÑ?иализаÑ?ии.</p>
 
- -<p>People relying on keyboard-interactive based authentication mechanisms with
- -OpenSSH on Debian squeeze(-lts) systems are recommended to upgrade
- -OpenSSH to 1:5.5p1-6+squeeze7.</p>
+<p>Тем, кÑ?о полагаеÑ?Ñ?Ñ? на инÑ?еÑ?акÑ?ивнÑ?е меÑ?анизмÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии Ñ? помоÑ?Ñ?Ñ? клавиаÑ?Ñ?Ñ?Ñ? в
+OpenSSH в Ñ?иÑ?Ñ?емаÑ? Debian squeeze(-lts), Ñ?екомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ?
+OpenSSH до веÑ?Ñ?ии 1:5.5p1-6+squeeze7.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=jKPU
-----END PGP SIGNATURE-----


Reply to: