[DONE] wml://security/2014/dla-{80,66,71}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2014/dla-66.wml 2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-66.wml 2016-06-22 16:05:23.441318927 +0500
@@ -1,19 +1,20 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0231">CVE-2014-0231</a>:
- -<p>prevent denial of service in mod_cgid.</p></li>
+<p>пÑ?едоÑ?вÑ?аÑ?ение оÑ?каза в обÑ?лÑ?живании в mod_cgid.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0226">CVE-2014-0226</a>:
- -<p>prevent denial of service via race in mod_status.</p></li>
+<p>пÑ?едоÑ?вÑ?аÑ?ение оÑ?каза в обÑ?лÑ?живании из-за Ñ?оÑ?Ñ?оÑ?ниÑ? гонки в mod_status.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0118">CVE-2014-0118</a>:
- -<p>fix resource consumption via mod_deflate body decompression.</p></li>
+<p>иÑ?пÑ?авление поÑ?Ñ?еблениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов пÑ?и Ñ?аÑ?паковке Ñ?ела mod_deflate.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-6438">CVE-2013-6438</a>:
- -<p>prevent denial of service via mod_dav incorrect end of string</p></li>
+<p>пÑ?едоÑ?вÑ?аÑ?ение оÑ?каза в обÑ?лÑ?живании из-за некоÑ?Ñ?екÑ?ного конÑ?а Ñ?Ñ?Ñ?оки в mod_dav</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apache2 version 2.2.16-6+squeeze13</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е apache2 веÑ?Ñ?ии 2.2.16-6+squeeze13</p>
</define-tag>
# do not modify the following line
- --- english/security/2014/dla-71.wml 2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-71.wml 2016-06-22 16:09:36.090445359 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>This update fixes two security issues with apache2.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? две пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и в apache2.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-5704">CVE-2013-5704</a>
- - <p>Disable the possibility to replace HTTP headers with HTTP trailers
- - as this could be used to circumvent earlier header operations made by
- - other modules. This can be restored with a new MergeTrailers
- - directive.</p></li>
+ <p>Ð?Ñ?клÑ?Ñ?ение возможноÑ?Ñ?и заменÑ? заголовков HTTP на конÑ?евÑ?е меÑ?ки HTTP,
+ поÑ?колÑ?кÑ? Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? обÑ?ода опеÑ?аÑ?ий над заголовками, оÑ?Ñ?Ñ?еÑ?Ñ?влÑ?ннÑ?Ñ?
+ дÑ?Ñ?гими модÑ?лÑ?ми. ÐÑ?о поведение можно воÑ?Ñ?Ñ?ановиÑ?Ñ? Ñ? помоÑ?Ñ?Ñ? новой диÑ?екÑ?ивÑ?
+ MergeTrailers.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3581">CVE-2014-3581</a>
- - <p>Fix denial of service where Apache can segfault when mod_cache is used
- - and when the cached request contains an empty Content-Type header.</p></li>
+ <p>Ð?Ñ?пÑ?авление оÑ?каза в обÑ?лÑ?живании, пÑ?и коÑ?оÑ?ом Apache можеÑ? завеÑ?Ñ?иÑ?Ñ?Ñ?Ñ? Ñ? оÑ?ибкой Ñ?егменÑ?иÑ?ованиÑ?, еÑ?ли иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? mod_cache,
+ и еÑ?ли кеÑ?иÑ?ованнÑ?й запÑ?оÑ? Ñ?одеÑ?жиÑ? пÑ?Ñ?Ñ?ой заголовок Content-Type.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in apache2 version 2.2.16-6+squeeze14</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е apache2 веÑ?Ñ?ии 2.2.16-6+squeeze14</p>
</define-tag>
# do not modify the following line
- --- english/security/2014/dla-80.wml 2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-80.wml 2016-06-22 16:03:38.186158197 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Sogeti found a denial of service flaw in libxml2, a library providing
- -support to read, modify and write XML and HTML files. A remote attacker
- -could provide a specially crafted XML file that, when processed by an
- -application using libxml2, would lead to excessive CPU consumption
- -(denial of service) based on excessive entity substitutions, even if
- -entity substitution was disabled, which is the parser default behavior.
+<p>СоÑ?Ñ?Ñ?дники Sogeti обнаÑ?Ñ?жили оÑ?каз в обÑ?лÑ?живании в libxml2, библиоÑ?еке, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ей
+поддеÑ?жкÑ? Ñ?Ñ?ениÑ?, изменениÑ? и запиÑ?и Ñ?айлов XML и HTML. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник
+можеÑ? пеÑ?едаÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл XML, коÑ?оÑ?Ñ?й пÑ?и его обÑ?абоÑ?ки
+пÑ?иложением, иÑ?полÑ?зÑ?Ñ?Ñ?им libxml2, можеÑ? пÑ?ивеÑ?Ñ?и к Ñ?Ñ?езмеÑ?номÑ? поÑ?Ñ?еблениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?
+(оÑ?каз в обÑ?лÑ?живании) из-за излиÑ?ней подÑ?Ñ?ановки Ñ?Ñ?Ñ?ноÑ?Ñ?ей даже в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли
+подÑ?Ñ?ановка Ñ?Ñ?Ñ?ноÑ?Ñ?ей оÑ?клÑ?Ñ?ена, Ñ?Ñ?о Ñ?влÑ?еÑ?Ñ?Ñ? поведение по Ñ?молÑ?аниÑ?.
(<a href="https://security-tracker.debian.org/tracker/CVE-2014-3660">CVE-2014-3660</a>)</p>
- -<p>In addition, this update addresses a misapplied chunk for a patch
- -released the previous version (#762864).</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? непÑ?авилÑ?но пÑ?именÑ?ннÑ?Ñ? поÑ?Ñ?иÑ? заплаÑ?Ñ?,
+вÑ?пÑ?Ñ?енной в пÑ?едÑ?дÑ?Ñ?ем веÑ?Ñ?ии (#762864).</p>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in libxml2 version 2.7.8.dfsg-2+squeeze10</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е libxml2 веÑ?Ñ?ии 2.7.8.dfsg-2+squeeze10</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXanHzAAoJEF7nbuICFtKlcGAP+wfHQQ9CytCCFcOArMjVfGt0
npUPNsVmHT46YXl9uUgswQzmPm89+aurwfLcxMSLhbuXbsMtrMY2kaJdJpaK8FrY
DC5sHBr4WuyMiR1WvOFuLZ80A2Jiy5CHFxkQLhVwvFlPRvhHUeHVLYItxprFzW49
3abWGjcnQj9JTOaWQWuPKI2N0my8mnXbpJ+H9/SJG9B6Ch8veUD68NP/MtOC8Fbm
x3BLnw1UQjoScX9GJyM9PNpPK2+iywY7EZ83oMcLN/bIyp7vFHU1kLvxM4U8KRDf
9imNIsJaCz4u2xVDm05Vk7qqco8sa2FEjAIrNsTXP/F8koQY+47ubshgaAyqiogh
/2rRsRWk5uxzJk3BcxQi/mbKlQ5MjMO7gDfLhGLbBPaDju1Ku/WtMliBKAHEuR42
5umyvbYp8Qe5XY23anzynpk6AlQ6qfSwS7aTBmWR2ukFlMJvmoottGcXvXGQqszH
5GRCbrnQH1nk/Q1yyBL+exSReoS0hcnKFcT9HwkfTV/tZugdmmqSYhf6JwV9nb1B
ryZ5hwHTroIElPUuiB6wpZ4g/T8807JOYjIxA9Y6unE7G/tUTipiv7QBn5j6QR6q
nw7dwwLzNlM2xuf+h6hCdqz5UOcuU7e1QDolFZdGgU9CvJ2QIBZr8KkFgJN3kHEW
ShVvo7c+X1mQJlOgXsku
=jsNr
-----END PGP SIGNATURE-----
Reply to: