[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{152,219}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-152.wml	2016-04-09 01:32:24.000000000 +0500
+++ russian/security/2015/dla-152.wml	2016-05-06 22:30:00.777172157 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in PostgreSQL, a relational
- -database server system.  The 8.4 branch is EOLed upstream, but still
- -present in Debian squeeze.  This new LTS minor version contains the
- -fixes that were applied upstream to the 9.0.19 version, backported to
- -8.4.22 which was the last version officially released by the PostgreSQL
- -developers.  This LTS effort for squeeze-lts is a community project
- -sponsored by credativ GmbH.</p>
+<p>Ð? PostgreSQL, Ñ?еÑ?веÑ?ной Ñ?иÑ?Ñ?еме Ñ?елÑ?Ñ?ионнÑ?Ñ? баз даннÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?оддеÑ?жка веÑ?ки 8.4 в оÑ?новной веÑ?ке Ñ?азÑ?абоÑ?ки пÑ?екÑ?аÑ?ена, но она
+вÑ?Ñ? еÑ?Ñ? имееÑ?Ñ?Ñ? в Debian squeeze.  ЭÑ?а новаÑ? младÑ?аÑ? веÑ?Ñ?иÑ? LTS Ñ?одеÑ?жиÑ?
+иÑ?пÑ?авлениÑ?, коÑ?оÑ?Ñ?е бÑ?ли пÑ?имененÑ? в оÑ?новной веÑ?ке Ñ?азÑ?абоÑ?ки к веÑ?Ñ?ии 9.0.19, они бÑ?ли адапÑ?иÑ?ованÑ?
+к веÑ?Ñ?ии 8.4.22, коÑ?оÑ?аÑ? Ñ?влÑ?еÑ?Ñ?Ñ? поÑ?ледней веÑ?Ñ?ией, оÑ?иÑ?иалÑ?но вÑ?пÑ?Ñ?енной Ñ?азÑ?абоÑ?Ñ?иками
+PostgreSQL.  Ð?оддеÑ?жка в squeeze-lts Ñ?влÑ?еÑ?Ñ?Ñ? пÑ?оекÑ?ом Ñ?ообÑ?еÑ?Ñ?ва, коÑ?оÑ?Ñ?й
+Ñ?понÑ?иÑ?Ñ?еÑ?Ñ?Ñ? credativ GmbH.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8161";>CVE-2014-8161</a>:
 
- -<p>Information leak
- -A user with limited clearance on a table might have access to information
- -in columns without SELECT rights on through server error messages.</p></li>
+<p>УÑ?еÑ?ка инÑ?оÑ?маÑ?ии.
+Ð?олÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий огÑ?аниÑ?еннÑ?й допÑ?Ñ?к к Ñ?аблиÑ?е, можеÑ? полÑ?Ñ?иÑ?Ñ? доÑ?Ñ?Ñ?п к инÑ?оÑ?маÑ?ии
+в Ñ?Ñ?олбÑ?аÑ?, не имеÑ? длÑ? ниÑ? пÑ?ав SELECT, иÑ?полÑ?зÑ?Ñ? Ñ?еÑ?веÑ?нÑ?е Ñ?ообÑ?ениÑ? об оÑ?ибкаÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0241";>CVE-2015-0241</a>:
 
- -<p>Out of boundaries read/write
- -The function to_char() might read/write past the end of a buffer. This
- -might crash the server when a formatting template is processed.</p></li>
+<p>ЧÑ?ение/запиÑ?Ñ? за пÑ?еделами бÑ?Ñ?еÑ?а.
+ФÑ?нкÑ?иÑ? to_char() можеÑ? вÑ?полнÑ?Ñ?Ñ? Ñ?Ñ?ение/запиÑ?Ñ? за гÑ?аниÑ?ами бÑ?Ñ?еÑ?а. ЭÑ?о
+можеÑ? пÑ?иводиÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке Ñ?еÑ?веÑ?а пÑ?и обÑ?абоÑ?ке Ñ?оÑ?маÑ?иÑ?ованиÑ? Ñ?аблона.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0243";>CVE-2015-0243</a>:
 
- -<p>Buffer overruns in contrib/pgcrypto
- -The pgcrypto module is vulnerable to stack buffer overrun that might
- -crash the server.</p></li>
+<p>Ð?еÑ?еполнениÑ? бÑ?Ñ?еÑ?а в contrib/pgcrypto.
+Ð?одÑ?лÑ? pgcrypto Ñ?Ñ?звим к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к
+аваÑ?ийной оÑ?Ñ?ановке Ñ?еÑ?веÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0244";>CVE-2015-0244</a>:
 
- -<p>SQL command injection
- -Emil Lenngren reported that an attacker can inject SQL commands when the
- -synchronization between client and server is lost.</p></li>
+<p>Ð?нÑ?екÑ?иÑ? команд SQL.
+ЭмилÑ? Ð?еннгÑ?ен Ñ?ообÑ?ил, Ñ?Ñ?о злоÑ?мÑ?Ñ?ленник можеÑ? вводиÑ?Ñ? командÑ? SQL в Ñ?лÑ?Ñ?ае, когда
+Ñ?еÑ?Ñ?еÑ?Ñ?Ñ? Ñ?инÑ?Ñ?онизаÑ?иÑ? междÑ? клиенÑ?ом и Ñ?еÑ?веÑ?ом.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in postgresql-8.4 version 8.4.22lts1-0+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в postgresql-8.4 веÑ?Ñ?ии 8.4.22lts1-0+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2015/dla-219.wml	2016-04-08 01:27:55.000000000 +0500
+++ russian/security/2015/dla-219.wml	2016-05-06 22:34:55.180458808 +0500
@@ -1,53 +1,54 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in the International Components
- -for Unicode (ICU) library:</p>
+<p>Ð? библиоÑ?еке International Components for Unicode (ICU) бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1569";>CVE-2013-1569</a>
 
- -    <p>Glyph table issue.</p></li>
+    <p>Ð?Ñ?облема Ñ? Ñ?аблиÑ?ей глиÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2383";>CVE-2013-2383</a>
 
- -    <p>Glyph table issue.</p></li>
+    <p>Ð?Ñ?облема Ñ? Ñ?аблиÑ?ей глиÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2384";>CVE-2013-2384</a>
 
- -    <p>Font layout issue.</p></li>
+    <p>Ð?Ñ?облема Ñ? Ñ?азмеÑ?кой Ñ?Ñ?иÑ?Ñ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-2419";>CVE-2013-2419</a>
 
- -    <p>Font processing issue.</p></li>
+    <p>Ð?Ñ?облема Ñ? обÑ?абоÑ?кой Ñ?Ñ?иÑ?Ñ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6585";>CVE-2014-6585</a>
 
- -    <p>Out-of-bounds read.</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6591";>CVE-2014-6591</a>
 
- -    <p>Additional out-of-bounds reads.</p></li>
+    <p>Ð?Ñ?Ñ? Ñ?Ñ?ениÑ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7923";>CVE-2014-7923</a>
 
- -    <p>Memory corruption in regular expression comparison.</p></li>
+    <p>Ð?овÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и пÑ?и Ñ?Ñ?авнении Ñ?егÑ?лÑ?Ñ?нÑ?Ñ? вÑ?Ñ?ажений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7926";>CVE-2014-7926</a>
 
- -    <p>Memory corruption in regular expression comparison.</p></li>
+    <p>Ð?овÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и пÑ?и Ñ?Ñ?авнении Ñ?егÑ?лÑ?Ñ?нÑ?Ñ? вÑ?Ñ?ажений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7940";>CVE-2014-7940</a>
 
- -    <p>Uninitialized memory.</p></li>
+    <p>Ð?еиниÑ?иализиÑ?ованнаÑ? памÑ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9654";>CVE-2014-9654</a>
 
- -    <p>More regular expression flaws.</p></li>
+    <p>Ð?Ñ?Ñ? пÑ?облемÑ? Ñ? Ñ?егÑ?лÑ?Ñ?нÑ?ми вÑ?Ñ?ажениÑ?ми.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in icu version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в icu веÑ?Ñ?ии
 4.4.1-8+squeeze3.</p>
 </define-tag>
 
-----BEGIN PGP SIGNATURE-----
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=zX/r
-----END PGP SIGNATURE-----


Reply to: