[DONE] wml://security/2015/dla-{207,342}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-207.wml 2016-04-07 03:47:55.000000000 +0500
+++ russian/security/2015/dla-207.wml 2016-05-04 16:16:45.295878202 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Subversion, a version control
- -system. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? Subversion, Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0248">CVE-2015-0248</a>
- - <p>Subversion mod_dav_svn and svnserve were vulnerable to a remotely
- - triggerable assertion DoS vulnerability for certain requests with
- - dynamically evaluated revision numbers.</p></li>
+ <p>Subversion mod_dav_svn и svnserve Ñ?Ñ?звимÑ? к вÑ?зÑ?ваемой Ñ?далÑ?нно
+ оÑ?ибке Ñ?Ñ?веÑ?ждениÑ?, пÑ?иводÑ?Ñ?ей к оÑ?казÑ? в обÑ?лÑ?живании пÑ?и опÑ?еделÑ?ннÑ?Ñ? запÑ?оÑ?аÑ? Ñ?
+ динамиÑ?еÑ?ки оÑ?ениваемÑ?ми номеÑ?ами Ñ?евизии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0251">CVE-2015-0251</a>
- - <p>Subversion HTTP servers allow spoofing svn:author property values for
- - new revisions via specially crafted v1 HTTP protocol request
- - sequences.</p></li>
+ <p>HTTP-Ñ?еÑ?веÑ?Ñ? Subversion позволÑ?Ñ?Ñ? подделÑ?ваÑ?Ñ? знаÑ?ениÑ? Ñ?войÑ?Ñ?ва svn:author длÑ?
+ новÑ?Ñ? Ñ?евизий Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? поÑ?ледоваÑ?елÑ?ноÑ?Ñ?ей запÑ?оÑ?ов по
+ пÑ?оÑ?околÑ? HTTP v1.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1845">CVE-2013-1845</a>
- - <p>Subversion mod_dav_svn was vulnerable to a denial of service attack
- - through a remotely triggered memory exhaustion.</p></li>
+ <p>Subversion mod_dav_svn Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании
+ Ñ?еÑ?ез вÑ?зÑ?ваемое Ñ?далÑ?нно Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление памÑ?Ñ?и.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1846">CVE-2013-1846</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2013-1847">CVE-2013-1847</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2013-1849">CVE-2013-1849</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-0032">CVE-2014-0032</a>
- - <p>Subversion mod_dav_svn was vulnerable to multiple remotely triggered
- - crashes.</p></li>
+ <p>Subversion mod_dav_svn Ñ?Ñ?звим к многоÑ?иÑ?леннÑ?м вÑ?зÑ?ваемÑ?м Ñ?далÑ?нно
+ аваÑ?ийнÑ?м Ñ?Ñ?Ñ?ановкам.</p></li>
</ul>
- -<p>This update has been prepared by James McCoy.</p>
+<p>Ð?анное обновление бÑ?ло подгоÑ?овлено Ð?жеймÑ?ом Ð?аккоем.</p>
</define-tag>
# do not modify the following line
- --- english/security/2015/dla-342.wml 2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-342.wml 2016-05-04 16:21:36.139269328 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been found and solved in the distributed file
- -system OpenAFS:</p>
+<p>Ð? Ñ?аÑ?пÑ?еделÑ?нной Ñ?айловой Ñ?иÑ?Ñ?еме OpenAFS бÑ?ло обнаÑ?Ñ?жено и иÑ?пÑ?авлено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3282">CVE-2015-3282</a>
- - <p>vos leaked stack data clear on the wire when updating vldb entries.</p></li>
+ <p>УÑ?еÑ?ка даннÑ?Ñ? Ñ?Ñ?ека из vos пÑ?и обновлении запиÑ?ей vldb.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3283">CVE-2015-3283</a>
- - <p>OpenAFS allowed remote attackers to spoof bos commands via unspecified
- - vectors.</p></li>
+ <p>OpenAFS позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам подделÑ?ваÑ?Ñ? командÑ? bos Ñ? помоÑ?Ñ?Ñ?
+ неопÑ?еделÑ?ннÑ?Ñ? векÑ?оÑ?ов.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3285">CVE-2015-3285</a>
- - <p>pioctl wrongly used the pointer related to the RPC, allowing local users to
- - cause a denial of service (memory corruption and kernel panic) via a
- - crafted OSD FS command.</p></li>
+ <p>pioctl непÑ?авилÑ?но иÑ?полÑ?зÑ?еÑ? Ñ?казаÑ?елÑ?, Ñ?вÑ?заннÑ?й Ñ? RPC, позволÑ?Ñ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м
+ вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и и паника Ñ?дÑ?а) Ñ? помоÑ?Ñ?Ñ?
+ Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованной командÑ? OSD FS.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6587">CVE-2015-6587</a>
- - <p>vlserver allowed remote authenticated users to cause a denial of service
- - (out-of-bounds read and crash) via a crafted regular expression in a
- - VL_ListAttributesN2 RPC.</p></li>
+ <p>vlserver позволÑ?еÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+ (Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и и аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?егÑ?лÑ?Ñ?ного вÑ?Ñ?ажениÑ? в
+ RPC VL_ListAttributesN2.</p></li>
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7762">CVE-2015-7762</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2015-7763">CVE-2015-7763</a> ("Tattletale")
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7762">CVE-2015-7762</a> и <a href="https://security-tracker.debian.org/tracker/CVE-2015-7763">CVE-2015-7763</a> ("Tattletale")
- - <p>John Stumpo found that Rx ACK packets leaked plaintext of packets
- - previously processed.</p></li>
+ <p>Ð?жон СÑ?ампо обнаÑ?Ñ?жил, Ñ?Ñ?о Rx-пакеÑ?Ñ? ACK Ñ?одеÑ?жаÑ? в виде оÑ?кÑ?Ñ?Ñ?ого Ñ?екÑ?Ñ?а Ñ?анее
+ обÑ?абоÑ?аннÑ?е пакеÑ?Ñ?.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in openafs version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в openafs веÑ?Ñ?ии
1.4.12.1+dfsg-4+squeeze4.</p>
- -<p>We recommend that you upgrade your OpenAFS packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? OpenAFS.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=VT9L
-----END PGP SIGNATURE-----
Reply to: