[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{175,294}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-175.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-175.wml	2016-05-04 13:49:51.258453880 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in GnuPG, the GNU Privacy Guard:</p>
+<p>Ð? GnuPG, GNU Privacy Guard, бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3591";>CVE-2014-3591</a>
 
- -    <p>The Elgamal decryption routine was susceptible to a side-channel
- -    attack discovered by researchers of Tel Aviv University. Ciphertext
- -    blinding was enabled to counteract it. Note that this may have a quite
- -    noticeable impact on Elgamal decryption performance.</p></li>
+    <p>ФÑ?нкÑ?иÑ? Ñ?аÑ?Ñ?иÑ?Ñ?овки Elgamal можеÑ? бÑ?Ñ?Ñ? подвеÑ?жена аÑ?аке Ñ?еÑ?ез Ñ?Ñ?оÑ?онний
+    канал, Ñ?Ñ?о бÑ?ло обнаÑ?Ñ?жено иÑ?Ñ?ледоваÑ?елÑ?ми из ТелÑ?-Ð?вивÑ?кого Ñ?нивеÑ?Ñ?иÑ?еÑ?е. Ð?лÑ? Ñ?ого, Ñ?Ñ?обÑ?
+    пÑ?оÑ?ивоÑ?Ñ?оÑ?Ñ?Ñ? Ñ?Ñ?ой пÑ?облеме бÑ?ла вклÑ?Ñ?ена маÑ?киÑ?овка Ñ?иÑ?Ñ?оÑ?екÑ?Ñ?а. Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?о Ñ?илÑ?но
+    влиÑ?еÑ? на пÑ?оизводиÑ?елÑ?ноÑ?Ñ?Ñ? Ñ?аÑ?Ñ?иÑ?Ñ?овки Elgamal.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0837";>CVE-2015-0837</a>
 
- -    <p>The modular exponentiation routine mpi_powm() was susceptible to a
- -    side-channel attack caused by data-dependent timing variations when
- -    accessing its internal pre-computed table.</p></li>
+    <p>ФÑ?нкÑ?иÑ? mpi_powm() длÑ? модÑ?лÑ?ного поÑ?енÑ?иÑ?ованиÑ? можеÑ? бÑ?Ñ?Ñ? подвеÑ?жена аÑ?аке
+    Ñ?еÑ?ез Ñ?Ñ?оÑ?онний канал, Ñ?Ñ?о вÑ?звано ваÑ?иаÑ?иÑ?ми Ñ?аймингов в завиÑ?имоÑ?Ñ?и оÑ? даннÑ?е пÑ?и
+    обÑ?аÑ?ении к внÑ?Ñ?Ñ?енней пÑ?едваÑ?иÑ?елÑ?но вÑ?Ñ?иÑ?ленной Ñ?аблиÑ?е.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1606";>CVE-2015-1606</a>
 
- -    <p>The keyring parsing code did not properly reject certain packet types
- -    not belonging in a keyring, which caused an access to memory already
- -    freed. This could allow remote attackers to cause a denial of service
- -    (crash) via crafted keyring files.</p></li>
+    <p>Ð?од длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а бÑ?елоков клÑ?Ñ?ей непÑ?авилÑ?но оÑ?клонÑ?еÑ? опÑ?еделÑ?ннÑ?е Ñ?ипÑ? пакеÑ?ов,
+    не оÑ?ноÑ?Ñ?Ñ?иÑ?Ñ?Ñ? к бÑ?елокÑ?, Ñ?Ñ?о пÑ?иводиÑ? к обÑ?аÑ?ениÑ? к памÑ?Ñ?и, коÑ?оÑ?аÑ? Ñ?же бÑ?ла
+    оÑ?вобождена. ЭÑ?о можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+    (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов бÑ?елоков клÑ?Ñ?ей.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (squeeze), those problems have been fixed in
- -version 1.4.10-4+squeeze7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.10-4+squeeze7.</p>
 
- -<p>For the stable distribution (wheezy), these problems have been fixed in
- -version 1.4.12-7+deb7u7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.12-7+deb7u7.</p>
 
- -<p>We recommend that you upgrade your gnupg packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gnupg.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-294.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-294.wml	2016-05-04 13:55:13.629715021 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been fixed in Wordpress, the popular
- -blogging engine.</p>
+<p>Ð? Wordpress, попÑ?лÑ?Ñ?ном движке ведениÑ? блога, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-2213";>CVE-2015-2213</a>
 
- -    <p>SQL Injection allowed a remote attacker to compromise the site.</p></li>
+    <p>SQL-инÑ?екÑ?иÑ? позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? компÑ?омеÑ?иÑ?оваÑ?Ñ? Ñ?айÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5622";>CVE-2015-5622</a>
 
- -    <p>The robustness of the shortcodes HTML tags filter has been
- -    improved. The parsing is a bit more strict, which may affect
- -    your installation. This is the corrected version of the patch
- -    that needed to be reverted in DSA 3328-2.</p></li>
+    <p>Ð?Ñ?ла Ñ?лÑ?Ñ?Ñ?ена надÑ?жноÑ?Ñ?Ñ? Ñ?илÑ?Ñ?Ñ?а кÑ?аÑ?киÑ? Ñ?егов
+    HTML. Ð?Ñ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? Ñ?Ñ?ал более Ñ?Ñ?Ñ?огим, Ñ?Ñ?о можеÑ? повлиÑ?Ñ?Ñ?
+    на ваÑ?и наÑ?Ñ?Ñ?ойки. ЭÑ?о иÑ?пÑ?авленнаÑ? веÑ?Ñ?иÑ? заплаÑ?Ñ?,
+    коÑ?оÑ?Ñ?Ñ? нÑ?жно бÑ?ло оÑ?мениÑ?Ñ? в DSA 3328-2.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5731";>CVE-2015-5731</a>
 
- -    <p>An attacker could lock a post that was being edited.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленник можеÑ? закÑ?Ñ?Ñ?Ñ? Ñ?едакÑ?иÑ?Ñ?емое Ñ?ообÑ?ение.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5732";>CVE-2015-5732</a>
 
- -    <p>Cross site scripting in a widget title allows an attacker to
- -    steal sensitive information.</p></li>
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в заголовке виджеÑ?а позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ?
+    кÑ?аÑ?Ñ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-5734";>CVE-2015-5734</a>
 
- -    <p>Fix some broken links in the legacy theme preview.</p></li>
+    <p>Ð?Ñ?пÑ?авление неÑ?колÑ?киÑ? Ñ?ломаннÑ?Ñ? Ñ?Ñ?Ñ?лок в пÑ?едваÑ?иÑ?елÑ?ном пÑ?оÑ?моÑ?Ñ?е Ñ?емÑ? legacy.</p></li>
 
 </ul>
 
- -<p>The issues were discovered by Marc-Alexandre Montpas of Sucuri, Helen
- -Hou-Sandí of the WordPress security team, Netanel Rubin of Check Point,
- -Ivan Grigorov, Johannes Schmitt of Scrutinizer and Mohamed A. Baset.</p>
+<p>ЭÑ?и пÑ?облемÑ? бÑ?ли обнаÑ?Ñ?женÑ? Ð?аÑ?ком-Ð?лекÑ?андÑ?ом Ð?онпаÑ?ом из Sucuri, Хелен
+ХоÑ?-Санди из командÑ? безопаÑ?ноÑ?Ñ?и WordPress, Ð?Ñ?Ñ?анелем Рабином из Check Point,
+Ð?ваном Ð?Ñ?игоÑ?овÑ?м, Ð?оÑ?аннеÑ?ом ШмиÑ?Ñ?ом из Scrutinizer и Ð?оÑ?амедом Ð?аÑ?е.</p>
 
- -<p>We recommend that you upgrade your wordpress packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wordpress.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=mVno
-----END PGP SIGNATURE-----


Reply to: