[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-364{1,2,5,6,7}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3641.wml	2016-08-12 22:42:57.000000000 +0500
+++ russian/security/2016/dsa-3641.wml	2016-08-12 23:14:58.838955393 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in OpenJDK, an
- -implementation of the Oracle Java platform, resulting in breakouts of
- -the Java sandbox or denial of service.</p>
+<p>Ð? OpenJDK, Ñ?еализаÑ?ии плаÑ?Ñ?оÑ?мÑ? Oracle Java, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, пÑ?иводÑ?Ñ?иÑ? к вÑ?Ñ?одÑ? из
+пеÑ?оÑ?ниÑ?Ñ? Java или оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 7u111-2.6.7-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7u111-2.6.7-1~deb8u1.</p>
 
- -<p>We recommend that you upgrade your openjdk-7 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openjdk-7.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3642.wml	2016-08-12 22:47:20.000000000 +0500
+++ russian/security/2016/dsa-3642.wml	2016-08-12 23:17:41.001859569 +0500
@@ -1,15 +1,16 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Dominic Scheirlinck and Scott Geary of Vend reported insecure behavior
- -in the lighttpd web server. Lighttpd assigned Proxy header values from
- -client requests to internal HTTP_PROXY environment variables, allowing
- -remote attackers to carry out Man in the Middle (MITM) attacks or
- -initiate connections to arbitrary hosts.</p>
+<p>Ð?оминик ШайÑ?линк и СкоÑ?Ñ? Ð?иÑ?и из Vend Ñ?ообÑ?или о небезопаÑ?ном поведении
+веб-Ñ?еÑ?веÑ?а lighttpd. Lighttpd назнаÑ?аеÑ? знаÑ?ениÑ? заголовка Proxy из
+клиенÑ?Ñ?киÑ? запÑ?оÑ?ов внÑ?Ñ?Ñ?енним пеÑ?еменнÑ?м окÑ?Ñ?жениÑ? HTTP_PROXY, позволÑ?Ñ?
+Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам оÑ?Ñ?Ñ?еÑ?Ñ?влÑ?Ñ?Ñ? аÑ?аки по пÑ?инÑ?ипÑ? Ñ?еловек-в-Ñ?еÑ?едине (MITM) или
+иниÑ?иализиÑ?оваÑ?Ñ? Ñ?оединениÑ? к пÑ?оизволÑ?нÑ?м Ñ?злам.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 1.4.35-4+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4.35-4+deb8u1.</p>
 
- -<p>We recommend that you upgrade your lighttpd packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? lighttpd.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3645.wml	2016-08-12 22:49:11.000000000 +0500
+++ russian/security/2016/dsa-3645.wml	2016-08-12 23:22:11.364109772 +0500
@@ -1,49 +1,50 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilites have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5139";>CVE-2016-5139</a>
 
- -    <p>GiWan Go discovered a use-after-free issue in the pdfium library.</p></li>
+    <p>Ð?иван Ð?о обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5140";>CVE-2016-5140</a>
 
- -    <p>Ke Liu discovered a use-after-free issue in the pdfium library.</p></li>
+    <p>Ð?е Ð?Ñ? обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5141";>CVE-2016-5141</a>
 
- -    <p>Sergey Glazunov discovered a URL spoofing issue.</p></li>
+    <p>СеÑ?гей Ð?лазÑ?нов обнаÑ?Ñ?жил подделкÑ? URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5142";>CVE-2016-5142</a>
 
- -    <p>Sergey Glazunov discovered a use-after-free issue.</p></li>
+    <p>СеÑ?гей Ð?лазÑ?нов обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5143";>CVE-2016-5143</a>
 
- -    <p>Gregory Panakkal discovered an issue in the developer tools.</p></li>
+    <p>Ð?Ñ?егоÑ?и Ð?анаккал обнаÑ?Ñ?жил пÑ?облемÑ? в инÑ?Ñ?Ñ?Ñ?менÑ?аÑ? Ñ?азÑ?абоÑ?Ñ?ика.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5144";>CVE-2016-5144</a>
 
- -    <p>Gregory Panakkal discovered another issue in the developer tools.</p></li>
+    <p>Ð?Ñ?егоÑ?и Ð?анаккал обнаÑ?Ñ?жил еÑ?Ñ? однÑ? пÑ?облемÑ? в инÑ?Ñ?Ñ?Ñ?менÑ?аÑ? Ñ?азÑ?абоÑ?Ñ?ика.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5146";>CVE-2016-5146</a>
 
- -    <p>The chrome development team found and fixed various issues during
- -    internal auditing.</p></li>
+    <p>Ð?оманда Ñ?азÑ?абоÑ?ки chrome обнаÑ?Ñ?жила и иÑ?пÑ?авила Ñ?азлиÑ?нÑ?е пÑ?облемÑ? в Ñ?оде
+    внÑ?Ñ?Ñ?еннего аÑ?диÑ?а.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 52.0.2743.116-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 52.0.2743.116-1~deb8u1.</p>
 
- -<p>For the testing distribution (stretch), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 52.0.2743.116-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 52.0.2743.116-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3646.wml	2016-08-12 22:53:50.870256131 +0500
+++ russian/security/2016/dsa-3646.wml	2016-08-12 23:26:35.329982610 +0500
@@ -1,29 +1,30 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in PostgreSQL-9.4, a SQL
- -database system.</p>
+<p>Ð? PostgreSQL-9.4, Ñ?иÑ?Ñ?еме баз даннÑ?Ñ? SQL, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5423";>CVE-2016-5423</a>
 
- -    <p>Karthikeyan Jambu Rajaraman discovered that nested CASE-WHEN
- -    expressions are not properly evaluated, potentially leading to a
- -    crash or allowing to disclose portions of server memory.</p></li>
+    <p>Ð?аÑ?Ñ?икеÑ?н Ð?жамбÑ? РаджаÑ?аман обнаÑ?Ñ?жил, Ñ?Ñ?о вложеннÑ?е вÑ?Ñ?ажениÑ? CASE-WHEN
+    оÑ?ениваÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но, Ñ?Ñ?о поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к
+    аваÑ?ийной оÑ?Ñ?ановке или позволÑ?еÑ? Ñ?аÑ?кÑ?Ñ?Ñ?Ñ? Ñ?аÑ?Ñ?и памÑ?Ñ?и Ñ?еÑ?веÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5424";>CVE-2016-5424</a>
 
- -    <p>Nathan Bossart discovered that special characters in database and
- -    role names are not properly handled, potentially leading to the
- -    execution of commands with superuser privileges, when a superuser
- -    executes pg_dumpall or other routine maintenance operations.</p></li>
+    <p>Ð?аÑ?ан Ð?оÑ?Ñ?аÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?имволÑ? в базе даннÑ?Ñ? и
+    именаÑ? Ñ?олей обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но, Ñ?Ñ?о поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к
+    вÑ?полнениÑ? команд Ñ? пÑ?авами Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ? в Ñ?лÑ?Ñ?ае, когда Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?
+    вÑ?полнÑ?еÑ? pg_dumpall или дÑ?Ñ?гие опеÑ?аÑ?ии по Ñ?опÑ?овождениÑ? базÑ? даннÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 9.4.9-0+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 9.4.9-0+deb8u1.</p>
 
- -<p>We recommend that you upgrade your postgresql-9.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-9.4.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3647.wml	2016-08-12 22:51:18.000000000 +0500
+++ russian/security/2016/dsa-3647.wml	2016-08-12 23:28:52.983316603 +0500
@@ -1,19 +1,20 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple security issues have been found in Icedove, Debian's version of
- -the Mozilla Thunderbird mail client: Multiple memory safety errors may
- -lead to the execution of arbitrary code or denial of service.</p>
+<p>Ð? Icedove, веÑ?Ñ?ии поÑ?Ñ?ового клиенÑ?а Mozilla Thunderbird длÑ? Debian, бÑ?ли
+обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и: многоÑ?иÑ?леннÑ?е оÑ?ибки Ñ?елоÑ?Ñ?ноÑ?Ñ?и Ñ?одеÑ?жимого
+памÑ?Ñ?и могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода или оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 1:45.2.0-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:45.2.0-1~deb8u1.</p>
 
- -<p>For the testing distribution (stretch), this problem has been fixed
- -in version 1:45.2.0-2.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 1:45.2.0-2.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:45.2.0-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:45.2.0-2.</p>
 
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=oiOo
-----END PGP SIGNATURE-----


Reply to: