[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2014/dla-{40,96,33}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2014/dla-33.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-33.wml	2016-06-22 15:31:14.138317859 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Detailed descriptions of the vulnerabilities can be found at:
+<p>Ð?одÑ?обное опиÑ?ание Ñ?Ñ?звимоÑ?Ñ?ей можно найÑ?и по Ñ?ледÑ?Ñ?Ñ?емÑ? адÑ?еÑ?Ñ?:
 <a href="https://www.openssl.org/news/secadv_20140806.txt";>https://www.openssl.org/news/secadv_20140806.txt</a></p>
 
- -<p>It's important that you upgrade the libssl0.9.8 package and not just
- -the openssl package.</p>
+<p>Ð?ажно, Ñ?Ñ?обÑ? вÑ? обновили пакеÑ? libssl0.9.8, а не Ñ?олÑ?ко
+пакеÑ? openssl.</p>
 
- -<p>All applications linked to openssl need to be restarted. You can use
- -the <q>checkrestart</q> tool from the debian-goodies package to detect
- -affected programs. Alternatively, you may reboot your system.</p>
+<p>Ð?Ñ?е пÑ?иложениÑ?, Ñ?компонованнÑ?е Ñ? openssl, Ñ?ледÑ?еÑ? пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ?. Ð?Ñ? можеÑ?е иÑ?полÑ?зоваÑ?Ñ?
+инÑ?Ñ?Ñ?Ñ?менÑ? <q>checkrestart</q> из пакеÑ?а debian-goodies длÑ? Ñ?ого, Ñ?Ñ?обÑ? опÑ?еделиÑ?Ñ?
+пÑ?огÑ?аммÑ?, коÑ?оÑ?Ñ?е нÑ?жно пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ?. Ð?ибо можно пеÑ?езагÑ?Ñ?зиÑ?Ñ? вÑ?Ñ? Ñ?иÑ?Ñ?емÑ?.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssl version 0.9.8o-4squeeze17</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е openssl веÑ?Ñ?ии 0.9.8o-4squeeze17</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-40.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-40.wml	2016-06-22 15:26:42.055758117 +0500
@@ -1,14 +1,15 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Multiple security issues (cross-site scripting, missing input sanitizing
- -and SQL injection) have been discovered in Cacti, a web interface for
- -graphing of monitoring systems.</p>
+<p>Ð? Cacti, веб-инÑ?еÑ?Ñ?ейÑ?е длÑ? поÑ?Ñ?Ñ?оениÑ? гÑ?аÑ?иков Ñ?иÑ?Ñ?ем мониÑ?оÑ?инга, бÑ?ли
+обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и (межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг, оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ?
+даннÑ?Ñ? и SQL-инÑ?екÑ?ии).</p>
 
- -<p>Furthermore, the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-4002";>CVE-2014-4002</a> in the previous security update
- -has been brought in-line with the upstream fix as it caused a
- -regression for people using the plug-in system.</p>
+<p>Ð?олее Ñ?ого, иÑ?пÑ?авление <a href="https://security-tracker.debian.org/tracker/CVE-2014-4002";>CVE-2014-4002</a> в пÑ?едÑ?дÑ?Ñ?ем обновлении безопаÑ?ноÑ?Ñ?и
+бÑ?ло пÑ?иведено в Ñ?ооÑ?веÑ?Ñ?Ñ?вие Ñ? иÑ?пÑ?авлением из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки, поÑ?колÑ?кÑ? оно вÑ?зÑ?вало
+Ñ?егÑ?еÑ?Ñ?иÑ? Ñ? Ñ?еÑ?, кÑ?о иÑ?полÑ?зÑ?еÑ? Ñ?иÑ?Ñ?емÑ? дополнений.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in cacti version 0.8.7g-1+squeeze5</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е cacti веÑ?Ñ?ии 0.8.7g-1+squeeze5</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-96.wml	2016-04-08 01:27:55.000000000 +0500
+++ russian/security/2014/dla-96.wml	2016-06-22 15:28:48.380375608 +0500
@@ -1,15 +1,16 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in OpenJDK, an implementation
- -of the Oracle Java platform, resulting in the execution of arbitrary code,
- -breakouts of the Java sandbox, information disclosure or denial of service.</p>
+<p>Ð? OpenJDK, Ñ?еализаÑ?ии плаÑ?Ñ?оÑ?мÑ? Oracle Java, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей, пÑ?иводÑ?Ñ?иÑ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода,
+вÑ?Ñ?одÑ? за пÑ?еделÑ? пеÑ?оÑ?ниÑ?Ñ? Java, Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии или оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 6b33-1.13.5-2~deb6u1.</p>
 
- -<p>We recommend that you upgrade your openjdk-6 packages and that you
- -subscribe to <a href="https://lists.debian.org/debian-lts/";>https://lists.debian.org/debian-lts/</a> to help test updated
- -packages before we release them.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openjdk-6 и подпиÑ?аÑ?Ñ?Ñ?Ñ?
+на <a href="https://lists.debian.org/debian-lts/";>https://lists.debian.org/debian-lts/</a> длÑ? Ñ?ого, Ñ?Ñ?обÑ? помогаÑ?Ñ?
+в Ñ?еÑ?Ñ?иÑ?овании обновлÑ?ннÑ?Ñ? пакеÑ?ов до моменÑ?а иÑ? вÑ?пÑ?Ñ?ка.</p>
 
 </define-tag>
 
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXamj1AAoJEF7nbuICFtKlgy0QAKyA7ErU7pIfRa3sUa7Jor1Z
5XvkYSocmUgWRHFMTanFG9O9iWUbW1g0LDw93X/Na1sZrA1EYaeoUX0v6EAmSYyf
67RyRLciKfzbUT0el/a3+90qdKDQn8iFAFdngDQGmHgyFda01K+R9wcXo95QT/QR
pVAJz31Pe+dAnguFhFEaUCjsLBhRUNXMcEP2Oh+PrgNpQbKvmBS7QiY1lFYGYhJ7
/iwAMp12qxdbskyUBEJmEViL8BFaj8YBjG5VETsxJCbPiitzwUvr0yD9pjJMJlig
qHgg3q6hJWtsZBN1HT/of4V0ethcwuvaPoy9nfSK1dapu1RjsA7XO6bdH43Gjenv
i8ETiIBZzmnZukw5zstJ2/1a7Qm5u8u0Wdf0PFPuZlb7Jj0MmLdYI5V8ZCPkBJPI
PLto5aOSKrb/l9MKri7nx7T7bRZpfDOa4JAjGgCFOCz85ZygdCHoe0aWBWA6tQia
YL2PibtgxADQdKIp2l7xCMw24m4EqGCwYXIJki3pMJAI8VuOo+li17wFsAx3avmZ
KVpFrw+An9f4ykqUUjlc9jFadtZSdBitOyE7rPaU2tpmMr6lyEss9dO/kAYXhMYs
JnDhYVOk6Lv2EFrI+6J8WB8EXQhBh0KqOgHFbjiO1WptYLbwDrKuEZ2gklTSXSkH
X8mhl6Dg7IJN/aVfgO1m
=CJwH
-----END PGP SIGNATURE-----


Reply to: