[DONE] wml://security/2016/dsa-361{3,4,5}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3613.wml 2016-07-02 14:33:11.000000000 +0500
+++ russian/security/2016/dsa-3613.wml 2016-07-02 18:58:03.808627394 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Vivian Zhang and Christoph Anton Mitterer discovered that setting an
- -empty VNC password does not work as documented in Libvirt, a
- -virtualisation abstraction library. When the password on a VNC server is
- -set to the empty string, authentication on the VNC server will be
- -disabled, allowing any user to connect, despite the documentation
- -declaring that setting an empty password for the VNC server prevents all
- -client connections. With this update the behaviour is enforced by
- -setting the password expiration to <q>now</q>.</p>
+<p>Ð?ивиан Чжан и Ð?Ñ?иÑ?Ñ?оÑ? Ð?нÑ?он Ð?иÑ?Ñ?еÑ?еÑ? обнаÑ?Ñ?жили, Ñ?Ñ?о вÑ?боÑ?
+пÑ?Ñ?Ñ?ого паÑ?олÑ? длÑ? VNC Ñ?абоÑ?аеÑ? не Ñ?ак, как опиÑ?ано в докÑ?менÑ?аÑ?ии по Libvirt,
+библиоÑ?еке абÑ?Ñ?Ñ?акÑ?ии над виÑ?Ñ?Ñ?ализаÑ?ией. Ð?Ñ?ли паÑ?олÑ? на VNC-Ñ?еÑ?веÑ?е
+вÑ?Ñ?Ñ?авлен в знаÑ?ение пÑ?Ñ?Ñ?ой Ñ?Ñ?Ñ?оки, Ñ?о аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ? на VNC-Ñ?еÑ?веÑ?е бÑ?деÑ?
+оÑ?клÑ?Ñ?ена, Ñ?Ñ?о позволÑ?еÑ? лÑ?бомÑ? полÑ?зоваÑ?елÑ? вÑ?полнÑ?Ñ?Ñ? подклÑ?Ñ?ение, Ñ?оÑ?Ñ? в докÑ?мнÑ?аÑ?ии
+Ñ?казано, Ñ?Ñ?о вÑ?боÑ? пÑ?Ñ?Ñ?ого паÑ?олÑ? длÑ? VNC-Ñ?еÑ?веÑ?а пÑ?иводиÑ? к запÑ?еÑ?Ñ? вÑ?еÑ?
+клиенÑ?Ñ?киÑ? Ñ?оединений. Ð? данном обновлении Ñ?еализÑ?еÑ?Ñ?Ñ? Ñ?казанное поведение пÑ?Ñ?Ñ?м
+Ñ?Ñ?Ñ?ановки иÑ?Ñ?еÑ?ениÑ? Ñ?Ñ?ока дейÑ?Ñ?виÑ? паÑ?олÑ? в знаÑ?ение <q>now</q>.</p>
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 1.2.9-9+deb8u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.9-9+deb8u3.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.0.0-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.0-1.</p>
- -<p>We recommend that you upgrade your libvirt packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libvirt.</p>
</define-tag>
# do not modify the following line
- --- english/security/2016/dsa-3614.wml 2016-07-02 17:57:33.000000000 +0500
+++ russian/security/2016/dsa-3614.wml 2016-07-02 19:38:42.022765827 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>The TERASOLUNA Framework Development Team discovered a denial of service
- -vulnerability in Apache Commons FileUpload, a package to make it
- -easy to add robust, high-performance, file upload capability to servlets
- -and web applications. A remote attacker can take advantage of this flaw
- -by sending file upload requests that cause the HTTP server using the
- -Apache Commons Fileupload library to become unresponsive, preventing the
- -server from servicing other requests.</p>
- -
- -<p>Apache Tomcat uses a package renamed copy of Apache Commons FileUpload
- -to implement the file upload requirements of the Servlet specification
- -and is therefore also vulnerable to the denial of service vulnerability.</p>
- -
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 7.0.56-3+deb8u3.</p>
+<p>Ð?оманда Ñ?азÑ?абоÑ?ки инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ? TERASOLUNA обнаÑ?Ñ?жила оÑ?каз в обÑ?лÑ?живании
+в Apache Commons FileUpload, пакеÑ?е длÑ? облегÑ?ениÑ?
+добавлениÑ? Ñ?еÑ?влеÑ?ам и веб-пÑ?иложениÑ?м Ñ?Ñ?Ñ?ойÑ?ивÑ?Ñ? и вÑ?Ñ?окопÑ?оизводиÑ?елÑ?нÑ?Ñ?
+возможноÑ?Ñ?ей длÑ? загÑ?Ñ?зки Ñ?айлов. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?Ñ?, оÑ?пÑ?авлÑ?Ñ? запÑ?оÑ?Ñ? о загÑ?Ñ?зке Ñ?айлов, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о HTTP-Ñ?еÑ?веÑ?,
+иÑ?полÑ?зÑ?Ñ?Ñ?ий библиоÑ?екÑ? Apache Commons Fileupload, пеÑ?еÑ?Ñ?аÑ?Ñ? оÑ?веÑ?аÑ?Ñ? на запÑ?оÑ?Ñ?, Ñ?Ñ?о
+не позволÑ?еÑ? Ñ?еÑ?веÑ?Ñ? обÑ?лÑ?живаÑ?Ñ? дÑ?Ñ?гие запÑ?оÑ?Ñ?.</p>
+
+<p>Apache Tomcat иÑ?полÑ?зÑ?еÑ? пакеÑ?, коÑ?оÑ?Ñ?й Ñ?влÑ?еÑ?Ñ?Ñ? пеÑ?еименованной копией Apache Commons FileUpload
+длÑ? Ñ?еализаÑ?ии Ñ?Ñ?ебований по загÑ?Ñ?зки Ñ?айлов из Ñ?пеÑ?иÑ?икаÑ?ии Servlet,
+поÑ?Ñ?омÑ? Apache Tomcat Ñ?акже Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 7.0.56-3+deb8u3.</p>
- -<p>For the testing distribution (stretch), this problem has been fixed
- -in version 7.0.70-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 7.0.70-1.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 7.0.70-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 7.0.70-1.</p>
- -<p>We recommend that you upgrade your tomcat7 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tomcat7.</p>
</define-tag>
# do not modify the following line
- --- english/security/2016/dsa-3615.wml 2016-07-02 18:50:47.000000000 +0500
+++ russian/security/2016/dsa-3615.wml 2016-07-02 19:41:25.287520061 +0500
@@ -1,20 +1,21 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in the dissectors/parsers for
- -PKTC, IAX2, GSM CBCH and NCP, SPOOLS, IEEE 802.11, UMTS FP, USB,
- -Toshiba, CoSine, NetScreen, WBXML which could result in denial of service
- -or potentially the execution of arbitrary code.</p>
+<p>Ð? диÑ?Ñ?екÑ?оÑ?аÑ?-паÑ?Ñ?еÑ?аÑ? длÑ? PKTC, IAX2, GSM CBCH and NCP, SPOOLS,
+IEEE 802.11, UMTS FP, USB, Toshiba, CoSine, NetScreen, WBXML бÑ?ли
+обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ?
+в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.12.1+g01b65bf-4+deb8u7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.12.1+g01b65bf-4+deb8u7.</p>
- -<p>For the testing distribution (stretch), these problems have been fixed
- -in version 2.0.4+gdd7746e-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.0.4+gdd7746e-1.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.0.4+gdd7746e-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.4+gdd7746e-1.</p>
- -<p>We recommend that you upgrade your wireshark packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wireshark.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXd9KYAAoJEF7nbuICFtKloykP/A14bNRnSIGY3X2mN+sEfRs8
4L0p0iI5n7KOL30vZXu31rgOxYlXt4MjftYWEZ7Y+hQVkpIRWFZ/dUL5QWyg7yKl
UNHu0NvmT6TfQv+1lizPmdv5Rptro83nCkD2atAexdsOaWzB4tgj5CHWtgWZlvN5
ZXFL4beqUgSTnBnUGci1pKARPUPhkupi1y6MwvwF1N4qmsQyw4kfrBSXB2oa/vvA
7hS5e9rjVWG1gRXGhFvxbL0wFTuOwWWy7csmLiYVfcE6/z9dIbK5K4ILbmW4HRZo
p/wlhbMXxiyOerggUnWaxnImUeaAPNtUImQUVmt5Pqdf4Mirnr0q39QDsE4L8Nua
csN37SliPn/bF0lSvFzbZGU9yr3ACCSgc3aU82SC60VePjs814Z5FUZtRN6BgpEs
BwFotPI8knNvVGz1npjXLqNO4D+sZtkRLDqNUcJzKhsOzANE7NigXpjw0hKefA8x
yzjRhpR8TrrzS9BNA13k+ORPaQduKKVPMgCTtaw9MZ2bluUdAWJyE89hs+AljGck
Fndhwo3QsWEgP94fGqRKCDjI8lotBIynAxbYtaBxmOto5XyiQlKx4P3SUGxPgPrg
j4mSf/W0bxYfXC2eLrL/rJIa4oOZdehy9uCFb6FFeVwjDQClZ9D0bZE3cFNjvixt
u5QP7F9VRPbxl55t6Fd3
=IFjQ
-----END PGP SIGNATURE-----
Reply to: