[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-384{0,1,2,3}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3840.wml	2017-05-03 02:21:50.000000000 +0500
+++ russian/security/2017/dsa-3840.wml	2017-05-03 22:10:50.774844527 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Thijs Alkemade discovered that unexpected automatic deserialisation of
- -Java objects in the MySQL Connector/J JDBC driver may result in the
- -execution of arbitary code. For additional details, please refer to the
- -advisory at
+<p>ТийÑ? Ð?лкемад обнаÑ?Ñ?жил, Ñ?Ñ?о неожиданнаÑ? авÑ?омаÑ?иÑ?еÑ?каÑ? деÑ?еÑ?иализаÑ?иÑ?
+Java-обÑ?екÑ?ов в MySQL-движке Connector/J JDBC можеÑ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?а дополниÑ?елÑ?нÑ?ми подÑ?обноÑ?Ñ?Ñ?ми обÑ?аÑ?айÑ?еÑ?Ñ? в
+Ñ?екомендаÑ?ии по адÑ?еÑ?Ñ?
 <a href="https://www.computest.nl/advisories/CT-2017-0425_MySQL-Connector-J.txt";>https://www.computest.nl/advisories/CT-2017-0425_MySQL-Connector-J.txt</a></p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 5.1.41-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.1.41-1~deb8u1.</p>
 
- -<p>For the upcoming stable distribution (stretch), this problem has been
- -fixed in version 5.1.41-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в веÑ?Ñ?ии 5.1.41-1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 5.1.41-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.1.41-1.</p>
 
- -<p>We recommend that you upgrade your mysql-connector-java packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql-connector-java.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3841.wml	2017-05-03 13:11:01.000000000 +0500
+++ russian/security/2017/dsa-3841.wml	2017-05-03 22:12:55.037754573 +0500
@@ -1,19 +1,20 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that XStream, a Java library to serialise objects to
- -XML and back again, was suspectible to denial of service during
- -unmarshalling.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о XStream, Java-библиоÑ?ека длÑ? Ñ?еÑ?иализаÑ?ии обÑ?екÑ?ов в
+XML и обÑ?аÑ?но, Ñ?одеÑ?жиÑ? оÑ?каз в обÑ?лÑ?живании, возникаÑ?Ñ?ий в Ñ?оде
+вÑ?полнениÑ? деÑ?еÑ?иализаÑ?ии.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 1.4.7-2+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4.7-2+deb8u2.</p>
 
- -<p>For the upcoming stable distribution (stretch), this problem will be
- -fixed soon.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?деÑ?
+иÑ?пÑ?авлена позже.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.4.9-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4.9-2.</p>
 
- -<p>We recommend that you upgrade your libxstream-java packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libxstream-java.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3842.wml	2017-05-03 13:11:17.000000000 +0500
+++ russian/security/2017/dsa-3842.wml	2017-05-03 22:19:37.104235339 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in tomcat7, a servlet and JSP
- -engine.</p>
+<p>Ð? tomcat7, Ñ?еÑ?влеÑ?е и движке JSP, бÑ?ли обнаÑ?Ñ?женÑ? две
+Ñ?Ñ?звимоÑ?Ñ?и.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5647";>CVE-2017-5647</a>
 
- -  <p>Pipelined requests were processed incorrectly, which could result in
- -  some responses appearing to be sent for the wrong request.</p></li>
+  <p>Ð?онвейеÑ?но обÑ?абаÑ?Ñ?ваемÑ?е запÑ?оÑ?Ñ? обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+  Ñ?омÑ?, Ñ?Ñ?о некоÑ?оÑ?Ñ?е оÑ?веÑ?Ñ? оÑ?меÑ?аÑ?Ñ?Ñ?Ñ? длÑ? оÑ?пÑ?авки в оÑ?веÑ? на неÑ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ие запÑ?оÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5648";>CVE-2017-5648</a>
 
- -  <p>Some application listeners calls were issued against the wrong
- -  objects, allowing untrusted applications running under a
- -  SecurityManager to bypass that protection mechanism and access or
- -  modify information associated with other web applications.</p></li>
+  <p>Ð?екоÑ?оÑ?Ñ?е вÑ?зовÑ? пÑ?иложений-пÑ?иÑ?мников вÑ?полнÑ?Ñ?Ñ?Ñ?Ñ? длÑ? неÑ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ?
+  обÑ?екÑ?ов, Ñ?Ñ?о позволÑ?еÑ? недовеÑ?еннÑ?м пÑ?иложениÑ?м, запÑ?Ñ?еннÑ?м под Ñ?пÑ?авлением
+  SecurityManager, обÑ?одиÑ?Ñ? меÑ?анизм заÑ?иÑ?Ñ? и полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п или даже изменÑ?Ñ?Ñ?
+  инÑ?оÑ?маÑ?иÑ?, Ñ?вÑ?заннÑ?Ñ? Ñ? дÑ?Ñ?гими веб-пÑ?иложениÑ?ми.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 7.0.56-3+deb8u10.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7.0.56-3+deb8u10.</p>
 
- -<p>For the upcoming stable (stretch) and unstable (sid) distributions,
- -these problems have been fixed in version 7.0.72-3.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 7.0.72-3.</p>
 
- -<p>We recommend that you upgrade your tomcat7 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tomcat7.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3843.wml	2017-05-03 13:11:31.000000000 +0500
+++ russian/security/2017/dsa-3843.wml	2017-05-03 22:21:21.028824982 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in tomcat8, a servlet and JSP
- -engine.</p>
+<p>Ð? tomcat8, Ñ?еÑ?влеÑ?е и движке JSP, бÑ?ли обнаÑ?Ñ?женÑ? две
+Ñ?Ñ?звимоÑ?Ñ?и.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5647";>CVE-2017-5647</a>
 
- -  <p>Pipelined requests were processed incorrectly, which could result in
- -  some responses appearing to be sent for the wrong request.</p></li>
+  <p>Ð?онвейеÑ?но обÑ?абаÑ?Ñ?ваемÑ?е запÑ?оÑ?Ñ? обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+  Ñ?омÑ?, Ñ?Ñ?о некоÑ?оÑ?Ñ?е оÑ?веÑ?Ñ? оÑ?меÑ?аÑ?Ñ?Ñ?Ñ? длÑ? оÑ?пÑ?авки в оÑ?веÑ? на неÑ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ие запÑ?оÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5648";>CVE-2017-5648</a>
 
- -  <p>Some application listeners calls were issued against the wrong
- -  objects, allowing untrusted applications running under a
- -  SecurityManager to bypass that protection mechanism and access or
- -  modify information associated with other web applications.</p></li>
+  <p>Ð?екоÑ?оÑ?Ñ?е вÑ?зовÑ? пÑ?иложений-пÑ?иÑ?мников вÑ?полнÑ?Ñ?Ñ?Ñ?Ñ? длÑ? неÑ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ?
+  обÑ?екÑ?ов, Ñ?Ñ?о позволÑ?еÑ? недовеÑ?еннÑ?м пÑ?иложениÑ?м, запÑ?Ñ?еннÑ?м под Ñ?пÑ?авлением
+  SecurityManager, обÑ?одиÑ?Ñ? меÑ?анизм заÑ?иÑ?Ñ? и полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п или даже изменÑ?Ñ?Ñ?
+  инÑ?оÑ?маÑ?иÑ?, Ñ?вÑ?заннÑ?Ñ? Ñ? дÑ?Ñ?гими веб-пÑ?иложениÑ?ми.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 8.0.14-1+deb8u9.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8.0.14-1+deb8u9.</p>
 
- -<p>For the upcoming stable (stretch) and unstable (sid) distributions,
- -these problems have been fixed in version 8.5.11-2.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 8.5.11-2.</p>
 
- -<p>We recommend that you upgrade your tomcat8 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tomcat8.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlkKEZcACgkQXudu4gIW
0qVxjA/6AlieHRI76tgFmUD/mYq5y8waq5Mss7m+U3CQjsvXEAcREsHKRSf4r78H
392eKrxZrPwNsdz4SqkiIjjibTkJwMMHcE6lZ4ufdxXovGpggQfjgPJMLEVkw3oM
Kndn7S0zOLkVVH8DXZo3Iyh/VxRlVwdMb36I5e4sqbTZrH6uhBXnwEFtDbzfBQ2c
MSX21KfIs8PfJLdbB2OCQDDEG7NulKQMTt7oo0Zb8+/Qkn6E/uglquZvZPsUmFgj
4jZEm4AsjO+hABE9cVmyi/XyvUeoKGiZgCPC6aWtfoCI837x1UTvyciJEFmgiBT2
E9a9lCGHiSRR9yq+WERY3TMyYqJCGqgthMYxoTt91yL0iQd31463jvZvgiezkV5h
09cRgipox8/tYnS7fYUbnYrcl37HQtXijbfGGeCqrmfQOt4i9Z3QPCfStTWOpvQ4
G/LGv3vfhPmOTW+i0Bj54gCjhm5tOLik0ieBTQ+hiWUCEygrvajAAWCOGNt32oL/
bhDTRThqbmj8SHHGdBU8dHUAlKQG8NFc936U4zT//gajkbOfEYzW2yLpelz3ujEg
RvNLqOO2oBwsjY4zF8cyQNBdWtnu9KGAV4MSM8SU3MDODyJql2ztI0GvZobY1lio
ENzyC4EOCNHKSccvJ1P6rEJoUbFEdl7hFHFlg+zrozyH+HD4CUM=
=W9O1
-----END PGP SIGNATURE-----


Reply to: