[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{207,342}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-207.wml	2016-04-07 03:47:55.000000000 +0500
+++ russian/security/2015/dla-207.wml	2016-05-04 16:16:45.295878202 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Subversion, a version control
- -system. The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? Subversion, Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0248";>CVE-2015-0248</a>
 
- -    <p>Subversion mod_dav_svn and svnserve were vulnerable to a remotely
- -    triggerable assertion DoS vulnerability for certain requests with
- -    dynamically evaluated revision numbers.</p></li>
+    <p>Subversion mod_dav_svn и svnserve Ñ?Ñ?звимÑ? к вÑ?зÑ?ваемой Ñ?далÑ?нно
+    оÑ?ибке Ñ?Ñ?веÑ?ждениÑ?, пÑ?иводÑ?Ñ?ей к оÑ?казÑ? в обÑ?лÑ?живании пÑ?и опÑ?еделÑ?ннÑ?Ñ? запÑ?оÑ?аÑ? Ñ?
+    динамиÑ?еÑ?ки оÑ?ениваемÑ?ми номеÑ?ами Ñ?евизии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0251";>CVE-2015-0251</a>
 
- -    <p>Subversion HTTP servers allow spoofing svn:author property values for
- -    new revisions via specially crafted v1 HTTP protocol request
- -    sequences.</p></li>
+    <p>HTTP-Ñ?еÑ?веÑ?Ñ? Subversion позволÑ?Ñ?Ñ? подделÑ?ваÑ?Ñ? знаÑ?ениÑ? Ñ?войÑ?Ñ?ва svn:author длÑ?
+    новÑ?Ñ? Ñ?евизий Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? поÑ?ледоваÑ?елÑ?ноÑ?Ñ?ей запÑ?оÑ?ов по
+    пÑ?оÑ?околÑ? HTTP v1.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1845";>CVE-2013-1845</a>
 
- -    <p>Subversion mod_dav_svn was vulnerable to a denial of service attack
- -    through a remotely triggered memory exhaustion.</p></li>
+    <p>Subversion mod_dav_svn Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании
+    Ñ?еÑ?ез вÑ?зÑ?ваемое Ñ?далÑ?нно Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1846";>CVE-2013-1846</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2013-1847";>CVE-2013-1847</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2013-1849";>CVE-2013-1849</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-0032";>CVE-2014-0032</a>
 
- -    <p>Subversion mod_dav_svn was vulnerable to multiple remotely triggered
- -    crashes.</p></li>
+    <p>Subversion mod_dav_svn Ñ?Ñ?звим к многоÑ?иÑ?леннÑ?м вÑ?зÑ?ваемÑ?м Ñ?далÑ?нно
+    аваÑ?ийнÑ?м Ñ?Ñ?Ñ?ановкам.</p></li>
 
 </ul>
 
- -<p>This update has been prepared by James McCoy.</p>
+<p>Ð?анное обновление бÑ?ло подгоÑ?овлено Ð?жеймÑ?ом Ð?аккоем.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-342.wml	2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-342.wml	2016-05-04 16:21:36.139269328 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found and solved in the distributed file
- -system OpenAFS:</p>
+<p>Ð? Ñ?аÑ?пÑ?еделÑ?нной Ñ?айловой Ñ?иÑ?Ñ?еме OpenAFS бÑ?ло обнаÑ?Ñ?жено и иÑ?пÑ?авлено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3282";>CVE-2015-3282</a>
 
- -    <p>vos leaked stack data clear on the wire when updating vldb entries.</p></li>
+    <p>УÑ?еÑ?ка даннÑ?Ñ? Ñ?Ñ?ека из vos пÑ?и обновлении запиÑ?ей vldb.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3283";>CVE-2015-3283</a>
 
- -    <p>OpenAFS allowed remote attackers to spoof bos commands via unspecified
- -    vectors.</p></li>
+    <p>OpenAFS позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам подделÑ?ваÑ?Ñ? командÑ? bos Ñ? помоÑ?Ñ?Ñ?
+    неопÑ?еделÑ?ннÑ?Ñ? векÑ?оÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3285";>CVE-2015-3285</a>
 
- -    <p>pioctl wrongly used the pointer related to the RPC, allowing local users to
- -    cause a denial of service (memory corruption and kernel panic) via a
- -    crafted OSD FS command.</p></li>
+    <p>pioctl непÑ?авилÑ?но иÑ?полÑ?зÑ?еÑ? Ñ?казаÑ?елÑ?, Ñ?вÑ?заннÑ?й Ñ? RPC, позволÑ?Ñ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и и паника Ñ?дÑ?а) Ñ? помоÑ?Ñ?Ñ?
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованной командÑ? OSD FS.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6587";>CVE-2015-6587</a>
 
- -    <p>vlserver allowed remote authenticated users to cause a denial of service
- -    (out-of-bounds read and crash) via a crafted regular expression in a
- -    VL_ListAttributesN2 RPC.</p></li>
+    <p>vlserver позволÑ?еÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+    (Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и и аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?егÑ?лÑ?Ñ?ного вÑ?Ñ?ажениÑ? в
+    RPC VL_ListAttributesN2.</p></li>
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7762";>CVE-2015-7762</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2015-7763";>CVE-2015-7763</a> ("Tattletale")
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7762";>CVE-2015-7762</a> и <a href="https://security-tracker.debian.org/tracker/CVE-2015-7763";>CVE-2015-7763</a> ("Tattletale")
 
- -    <p>John Stumpo found that Rx ACK packets leaked plaintext of packets
- -    previously processed.</p></li>
+    <p>Ð?жон СÑ?ампо обнаÑ?Ñ?жил, Ñ?Ñ?о Rx-пакеÑ?Ñ? ACK Ñ?одеÑ?жаÑ? в виде оÑ?кÑ?Ñ?Ñ?ого Ñ?екÑ?Ñ?а Ñ?анее
+    обÑ?абоÑ?аннÑ?е пакеÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in openafs version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в openafs веÑ?Ñ?ии
 1.4.12.1+dfsg-4+squeeze4.</p>
 
- -<p>We recommend that you upgrade your OpenAFS packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? OpenAFS.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=VT9L
-----END PGP SIGNATURE-----


Reply to: