[DONE] wml://security/2015/dla-{227,316}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-227.wml 2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-227.wml 2016-05-04 16:30:05.537419965 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in PostgreSQL, a relational
- -database server system. The 8.4 branch is EOLed upstream, but still
- -present in Debian squeeze. This new LTS minor version contains the
- -fixes that were applied upstream to the 9.0.20 version, backported to
- -8.4.22 which was the last version officially released by the PostgreSQL
- -developers. This LTS effort for squeeze-lts is a community project
- -sponsored by credativ GmbH.</p>
+<p>Ð? PostgreSQL, Ñ?еÑ?веÑ?ной Ñ?иÑ?Ñ?еме Ñ?елÑ?Ñ?ионнÑ?Ñ? баз даннÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?оддеÑ?жка веÑ?ки 8.4 в оÑ?новной веÑ?ке Ñ?азÑ?абоÑ?ки бÑ?ла пÑ?екÑ?аÑ?ена, но
+Ñ?Ñ?а веÑ?Ñ?иÑ? вÑ?Ñ? еÑ?Ñ? пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? в Debian squeeze. Ð?аннаÑ? новаÑ? миноÑ?наÑ? веÑ?Ñ?иÑ? LTS Ñ?одеÑ?жиÑ?
+иÑ?пÑ?авлениÑ?, коÑ?оÑ?Ñ?й бÑ?ли пÑ?имененÑ? в оÑ?новной веÑ?ке к веÑ?Ñ?ии 9.0.20 и адапÑ?иÑ?ованÑ?
+длÑ? 8.4.22, коÑ?оÑ?аÑ? бÑ?ла поÑ?ледней веÑ?Ñ?ией, оÑ?иÑ?иалÑ?но вÑ?пÑ?Ñ?енной Ñ?азÑ?абоÑ?Ñ?иками
+PostgreSQL. Ð?аннаÑ? Ñ?абоÑ?а длÑ? squeeze-lts Ñ?влÑ?еÑ?Ñ?Ñ? пÑ?оекÑ?ом Ñ?ообÑ?еÑ?Ñ?ва
+и Ñ?понÑ?иÑ?Ñ?еÑ?Ñ?Ñ? credativ GmbH.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3165">CVE-2015-3165</a>:
- -<p>Remote crash
- -SSL clients disconnecting just before the authentication timeout expires
- -can cause the server to crash.</p></li>
+<p>УдалÑ?ннаÑ? аваÑ?ийнаÑ? оÑ?Ñ?ановка.
+Ð?лиенÑ?Ñ? SSL, оÑ?клÑ?Ñ?аÑ?Ñ?иеÑ?Ñ? до завеÑ?Ñ?ениÑ? пеÑ?иода аÑ?Ñ?енÑ?иÑ?икаÑ?ии, могÑ?Ñ?
+вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? Ñ?еÑ?веÑ?а.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3166">CVE-2015-3166</a>:
- -<p>Information exposure
- -The replacement implementation of snprintf() failed to check for errors
- -reported by the underlying system library calls; the main case that
- -might be missed is out-of-memory situations. In the worst case this
- -might lead to information exposure.</p></li>
+<p>РаÑ?кÑ?Ñ?Ñ?ие инÑ?оÑ?маÑ?ии.
+Ð?амена Ñ?еализаÑ?ии snprintf() не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? на оÑ?ибки,
+о коÑ?оÑ?Ñ?Ñ? Ñ?ообÑ?аÑ?Ñ? вÑ?зовÑ? подлежаÑ?ей Ñ?иÑ?Ñ?емной библиоÑ?еки; в оÑ?новном
+могÑ?Ñ? бÑ?Ñ?Ñ? пÑ?опÑ?Ñ?енÑ? Ñ?иÑ?Ñ?аÑ?ии Ñ? доÑ?Ñ?Ñ?пам за пÑ?еделÑ? вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и. Ð? Ñ?Ñ?дÑ?иÑ? Ñ?лÑ?Ñ?аÑ?Ñ? Ñ?Ñ?о
+можеÑ? пÑ?иводиÑ?Ñ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3167">CVE-2015-3167</a>:
- -<p>Possible side-channel key exposure
- -In contrib/pgcrypto, some cases of decryption with an incorrect key
- -could report other error message texts. Fix by using a one-size-fits-all
- -message.</p>
- -
- -<p>Note that the next round of minor releases for PostgreSQL have already
- -been scheduled for early June 2015. There will be a corresponding
- -8.4.22lts3 update at the same time.</p></li>
+<p>Ð?озможное Ñ?аÑ?кÑ?Ñ?Ñ?ие клÑ?Ñ?а Ñ?еÑ?ез Ñ?Ñ?оÑ?онний канал.
+Ð? contrib/pgcrypto в некоÑ?оÑ?Ñ?Ñ? Ñ?лÑ?Ñ?аÑ?Ñ? Ñ?аÑ?Ñ?иÑ?Ñ?овка Ñ? непÑ?авилÑ?нÑ?м клÑ?Ñ?ом
+можеÑ? пÑ?иводиÑ?Ñ? к вÑ?водÑ? какого-Ñ?о дÑ?Ñ?гого Ñ?ообÑ?ениÑ? об оÑ?ибке. Ð?Ñ?пÑ?авлено Ñ? помоÑ?Ñ?Ñ?
+Ñ?ообÑ?ениÑ? one-size-fits-all.</p>
+
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?ледÑ?Ñ?Ñ?ий Ñ?Ñ?ап миноÑ?нÑ?Ñ? вÑ?пÑ?Ñ?ков PostgreSQL Ñ?же
+запланиÑ?ован на наÑ?ало иÑ?нÑ? 2015 года. Ð? Ñ?о же вÑ?емÑ? бÑ?деÑ? вÑ?пÑ?Ñ?ено
+обновление 8.4.22lts3.</p></li>
</ul>
</define-tag>
- --- english/security/2015/dla-316.wml 2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-316.wml 2016-05-04 16:39:57.099126525 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in eglibc that
- -may lead to a privilege escalation or denial of service.</p>
+<p>Ð? eglibc бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий или оÑ?казÑ? в обÑ?лÑ?живании.</p>
<ul>
- -<li>Glibc pointer guarding weakness
+<li>СлабаÑ? заÑ?иÑ?Ñ? Ñ?казаÑ?елей в glibc.
- - <p>A weakness in the dynamic loader prior has been found. The issue is
- - that the LD_POINTER_GUARD in the environment is not sanitized
- - allowing local attackers easily to bypass the pointer guarding
- - protection on set-user-ID and set-group-ID programs.</p></li>
+ <p>СнаÑ?ала Ñ?Ñ?а пÑ?облема бÑ?ла обнаÑ?Ñ?жена в динамиÑ?еÑ?ком загÑ?Ñ?зÑ?ике. Ð?Ñ?облема
+ Ñ?оÑ?Ñ?оиÑ? в Ñ?ом, Ñ?Ñ?о LD_POINTER_GUARD в окÑ?Ñ?жении не оÑ?иÑ?аеÑ?Ñ?Ñ?,
+ Ñ?Ñ?о позволÑ?еÑ? локалÑ?нÑ?м злоÑ?мÑ?Ñ?ленникам легко обÑ?одиÑ?Ñ? заÑ?иÑ?Ñ?
+ Ñ?казаÑ?елей в пÑ?огÑ?аммаÑ? set-user-ID и set-group-ID.</p></li>
- -<li>Potential application crash due to overread in fnmatch
+<li>Ð?оÑ?енÑ?иалÑ?наÑ? аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ? из-за Ñ?Ñ?ениÑ? за пÑ?еделами огÑ?аниÑ?ениÑ? в fnmatch.
- - <p>When processing certain malformed patterns, fnmatch can skip over the
- - NUL byte terminating the pattern. This can potentially result in an
- - application crash if fnmatch hits an unmapped page before
- - encountering a NUL byte.</p></li>
+ <p>Ð?Ñ?и обÑ?абоÑ?ке опÑ?еделÑ?ннÑ?Ñ? непÑ?авилÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?аблонов fnmatch можеÑ? пÑ?опÑ?Ñ?Ñ?иÑ?Ñ?
+ NUL-байÑ?, завеÑ?Ñ?аÑ?Ñ?ий Ñ?аблон. Ð?оÑ?енÑ?иалÑ?но Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+ аваÑ?ийной оÑ?Ñ?ановке пÑ?иложениÑ? в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли fnmatch вÑ?Ñ?Ñ?еÑ?аеÑ? неназнаÑ?еннÑ?Ñ? Ñ?Ñ?Ñ?аниÑ?Ñ? до
+ обнаÑ?Ñ?жениÑ? NUL-байÑ?а.</p></li>
- -<li>_IO_wstr_overflow integer overflow
+<li>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в _IO_wstr_overflow
- - <p>A miscalculation in _IO_wstr_overflow could potentially be exploited
- - to overflow a buffer.</p></li>
+ <p>Ð?епÑ?авилÑ?ное вÑ?Ñ?иÑ?ление в _IO_wstr_overflow поÑ?енÑ?иалÑ?но можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+ длÑ? пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8121">CVE-2014-8121</a>
- - <p>DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS)
- - in GNU C Library (aka glibc or libc6) 2.21 and earlier does not
- - properly check if a file is open, which allows remote attackers to
- - cause a denial of service (infinite loop) by performing a look-up
- - while the database is iterated over the database, which triggers the
- - file pointer to be reset.</p></li>
+ <p>DB_LOOKUP в nss_files/files-XXX.c в Name Service Switch (NSS)
+ в библиоÑ?еке GNU C (Ñ?акже извеÑ?Ñ?ной как glibc или libc6) веÑ?Ñ?ии 2.21 и более Ñ?анниÑ?
+ непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? Ñ?ого, Ñ?Ñ?о Ñ?айл оÑ?кÑ?Ñ?Ñ?, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+ вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (беÑ?конеÑ?нÑ?й Ñ?икл) пÑ?Ñ?Ñ?м вÑ?полнениÑ? поиÑ?ка
+ в Ñ?о вÑ?емÑ?, когда база даннÑ?Ñ? вÑ?полнÑ?еÑ? иÑ?еÑ?аÑ?иÑ? по базе даннÑ?Ñ?, Ñ?Ñ?о пÑ?иводиÑ?
+ к Ñ?бÑ?оÑ?Ñ? Ñ?казаÑ?елÑ? на Ñ?айл.</p></li>
</ul>
- -<p>For the oldoldstable distribution (squeeze), these problems have been fixed
- -in version 2.11.3-4+deb6u7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.11.3-4+deb6u7.</p>
- -<p>We recommend that you update your packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ?.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=hVN1
-----END PGP SIGNATURE-----
Reply to: