[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2014/dla-{82,62,17}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2014/dla-17.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-17.wml	2016-06-22 15:59:19.672574423 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The Tor version previously in Debian squeeze, 0.2.2.39, is no longer
- -supported by upstream.</p>
+<p>Ð?еÑ?Ñ?иÑ? Tor, коÑ?оÑ?аÑ? Ñ?анее бÑ?ла в Ñ?оÑ?Ñ?аве Debian squeeze, 0.2.2.39, более
+не поддеÑ?живаеÑ?Ñ?Ñ? оÑ?новной веÑ?кой Ñ?азÑ?абоÑ?ки.</p>
 
- -<p>This update brings the currently stable version of Tor, 0.2.4.23, to
- -Debian squeeze.</p>
+<p>Ð?анное обновление добавлÑ?еÑ? в Debian squeeze Ñ?екÑ?Ñ?Ñ?Ñ? Ñ?Ñ?абилÑ?нÑ?Ñ?
+веÑ?Ñ?иÑ? Tor, 0.2.4.23.</p>
 
- -<p>Changes include use of stronger cryptographic primitives, always
- -clearing bignums before freeing them to avoid leaving key material in
- -memory, mitigating several linkability vectors such as by disabling
- -client-side DNS caches, blacklisting authority signing keys potentially
- -compromised due to heartbleed, updating the list of directory
- -authorities, and much more.</p>
+<p>СÑ?еди изменениÑ? можно Ñ?казаÑ?Ñ? иÑ?полÑ?зование более Ñ?Ñ?ойкиÑ? пÑ?имиÑ?ивов Ñ?иÑ?Ñ?ованиÑ?,
+вÑ?полнение оÑ?иÑ?Ñ?ки Ñ?веÑ?Ñ?болÑ?Ñ?иÑ? Ñ?иÑ?ел до иÑ? оÑ?вобождениÑ? Ñ? Ñ?елÑ?Ñ? избежаÑ?Ñ? Ñ?иÑ?Ñ?аÑ?ий, когда Ñ?аÑ?Ñ?Ñ? маÑ?еÑ?иала клÑ?Ñ?а
+оÑ?Ñ?авалаÑ?Ñ? в памÑ?Ñ?и, Ñ?нижение Ñ?иÑ?ка Ñ?Ñ?да векÑ?оÑ?ов, Ñ?вÑ?заннÑ?Ñ? Ñ? возможноÑ?Ñ?Ñ?Ñ? компоновки, напÑ?имеÑ?, пÑ?Ñ?Ñ?м оÑ?клÑ?Ñ?ениÑ?
+кеÑ?иÑ?ованиÑ? DNS на Ñ?Ñ?оÑ?оне клиенÑ?а, добавление клÑ?Ñ?ей авÑ?оÑ?иÑ?еÑ?ов, коÑ?оÑ?Ñ?е поÑ?енÑ?иалÑ?но
+бÑ?ли компÑ?омеÑ?иÑ?ованÑ? аÑ?акой heartbleed, обновление Ñ?пиÑ?ка авÑ?оÑ?иÑ?еÑ?ов
+и многое дÑ?Ñ?гое.</p>
 
- -<p>We recommend that you upgrade your tor packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tor.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tor version 0.2.4.23-1~deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е tor веÑ?Ñ?ии 0.2.4.23-1~deb6u1</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-62.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-62.wml	2016-06-22 15:53:44.037756690 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Antoine Delignat-Lavaud from Inria discovered an issue in the way NSS
- -(the Mozilla Network Security Service library) was parsing ASN.1 data
- -used in signatures, making it vulnerable to a signature forgery attack.</p>
+<p>Ð?нÑ?Ñ?ан Ð?елинÑ?-Ð?авÑ? из Inria обнаÑ?Ñ?жил пÑ?облемÑ? в Ñ?поÑ?обе, иÑ?полÑ?зÑ?емом NSS
+(библиоÑ?ека Mozilla Network Security Service) длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а даннÑ?Ñ? ASN.1,
+иÑ?полÑ?зÑ?емÑ?Ñ? в подпиÑ?Ñ?Ñ?, Ñ?Ñ?о делаеÑ? Ñ?Ñ?Ñ? библиоÑ?екÑ? Ñ?Ñ?звимой к аÑ?аке Ñ?еÑ?ез подделкÑ? подпиÑ?и.</p>
 
- -<p>An attacker could craft ASN.1 data to forge RSA certificates with a
- -valid certification chain to a trusted CA.</p>
+<p>Ð?лоÑ?мÑ?Ñ?ленник можеÑ? Ñ?Ñ?оÑ?миÑ?оваÑ?Ñ? даннÑ?е ASN.1 длÑ? подделки Ñ?еÑ?Ñ?иÑ?икаÑ?ов RSA, имеÑ?Ñ?иÑ?
+коÑ?Ñ?екÑ?нÑ?Ñ? Ñ?епоÑ?кÑ? Ñ?еÑ?Ñ?иÑ?икаÑ?ов к довеÑ?енномÑ? авÑ?оÑ?иÑ?еÑ?Ñ? CA.</p>
 
- -<p>This update fixes this issue for the NSS libraries.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?казаннÑ?Ñ? пÑ?облемÑ? в библиоÑ?екаÑ? NSS.</p>
 
- -<p>Note that iceweasel, which is also affected by <a href="https://security-tracker.debian.org/tracker/CVE-2014-1568";>CVE-2014-1568</a>, however
- -has reached end-of-life in Squeeze(-LTS) and thus has not been fixed.</p>
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о поддеÑ?жка веб-бÑ?аÑ?зеÑ?а iceweasel, коÑ?оÑ?Ñ?й Ñ?акже подвеÑ?жен <a href="https://security-tracker.debian.org/tracker/CVE-2014-1568";>CVE-2014-1568</a>,
+в Squeeze(-LTS) пÑ?екÑ?аÑ?ена, в нÑ?м Ñ?Ñ?а оÑ?ибка иÑ?пÑ?авлена не бÑ?деÑ?.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in nss version 3.12.8-1+squeeze9</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е nss веÑ?Ñ?ии 3.12.8-1+squeeze9</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-82.wml	2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-82.wml	2016-06-22 15:49:27.492331307 +0500
@@ -1,17 +1,18 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>HD Moore of Rapid7 discovered a symlink attack in Wget, a command-line
- -utility to retrieve files via HTTP, HTTPS, and FTP. The vulnerability
- -allows to create arbitrary files on the user's system when Wget runs in
- -recursive mode against a malicious FTP server. Arbitrary file creation
- -may override content of user's files or permit remote code execution with
- -the user privilege.</p>
+<p>ЭйÑ?ди Ð?Ñ?Ñ? из Rapid7 обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки в Wget, Ñ?Ñ?илиÑ?е
+командной Ñ?Ñ?Ñ?оки длÑ? загÑ?Ñ?зки Ñ?айлов по пÑ?оÑ?околам HTTP, HTTPS и FTP. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+позволÑ?еÑ? Ñ?оздаваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ? в полÑ?зоваÑ?елÑ?Ñ?кой Ñ?иÑ?Ñ?еме в Ñ?ом Ñ?лÑ?Ñ?ае, когда Wget запÑ?Ñ?ен
+в Ñ?екÑ?Ñ?Ñ?ивном Ñ?ежиме длÑ? обÑ?абоÑ?ки FTP-Ñ?еÑ?веÑ?а злоÑ?мÑ?Ñ?ленника. Создание пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов
+можеÑ? пÑ?ивеÑ?Ñ?и к пеÑ?езапиÑ?и Ñ?одеÑ?жимого Ñ?айлов полÑ?зоваÑ?елÑ? или позволиÑ?Ñ? Ñ?далÑ?нно вÑ?полниÑ?Ñ? код Ñ?
+пÑ?авами полÑ?зоваÑ?елÑ?.</p>
 
- -<p>This update changes the default setting in Wget such that it no longer
- -creates local symbolic links, but rather traverses them and retrieves the
- -pointed-to file in such a retrieval.</p>
+<p>Ð?анное обновление изменÑ?еÑ? наÑ?Ñ?Ñ?ойки по Ñ?молÑ?аниÑ? в Wget Ñ?ак, Ñ?Ñ?о пÑ?огÑ?амма более
+не Ñ?оздаÑ?Ñ? локалÑ?нÑ?е Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки, а пеÑ?еÑ?одиÑ? по ним и загÑ?Ñ?жаеÑ?
+Ñ?казÑ?ваем ими Ñ?айл.</p>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in wget version 1.12-2.1+deb6u1</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е wget веÑ?Ñ?ии 1.12-2.1+deb6u1</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=kvO6
-----END PGP SIGNATURE-----


Reply to: