[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-393{5,6}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3935.wml	2017-08-11 19:32:09.000000000 +0500
+++ russian/security/2017/dsa-3935.wml	2017-08-11 19:38:28.419152456 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in the PostgreSQL database
- -system:</p>
+<p>Ð? Ñ?иÑ?Ñ?еме баз даннÑ?Ñ? PostgreSQL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7546";>CVE-2017-7546</a>
 
- -    <p>In some authentication methods empty passwords were accepted.</p></li>
+    <p>Ð? некоÑ?оÑ?Ñ?Ñ? меÑ?одаÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии Ñ?азÑ?еÑ?енÑ? пÑ?Ñ?Ñ?Ñ?е паÑ?оли.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7547";>CVE-2017-7547</a>
 
- -    <p>User mappings could leak data to unprivileged users.</p></li>
+    <p>Ð?олÑ?зоваÑ?елÑ?Ñ?кие оÑ?обÑ?ажениÑ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ке даннÑ?Ñ? непÑ?ивилегиÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7548";>CVE-2017-7548</a>
 
- -    <p>The lo_put() function ignored ACLs.</p>
+    <p>ФÑ?нкÑ?иÑ? lo_put() игноÑ?иÑ?Ñ?еÑ? Ñ?пиÑ?ки Ñ?пÑ?авлениÑ? доÑ?Ñ?Ñ?пом.</p>
 
- -<p>For more in-depth descriptions of the security vulnerabilities, please see
+<p>Ð?а подÑ?обнÑ?м опиÑ?анием Ñ?Ñ?звимоÑ?Ñ?ей обÑ?аÑ?айÑ?еÑ?Ñ? по адÑ?еÑ?Ñ?
 <a href="https://www.postgresql.org/about/news/1772/";>https://www.postgresql.org/about/news/1772/</a></p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 9.4.13-0+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 9.4.13-0+deb8u1.</p>
 
- -<p>We recommend that you upgrade your postgresql-9.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-9.4.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3936.wml	2017-08-11 19:33:19.000000000 +0500
+++ russian/security/2017/dsa-3936.wml	2017-08-11 19:39:49.756624113 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in the PostgreSQL database
- -system:</p>
+<p>Ð? Ñ?иÑ?Ñ?еме баз даннÑ?Ñ? PostgreSQL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7546";>CVE-2017-7546</a>
 
- -    <p>In some authentication methods empty passwords were accepted.</p></li>
+    <p>Ð? некоÑ?оÑ?Ñ?Ñ? меÑ?одаÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?ии Ñ?азÑ?еÑ?енÑ? пÑ?Ñ?Ñ?Ñ?е паÑ?оли.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7547";>CVE-2017-7547</a>
 
- -    <p>User mappings could leak data to unprivileged users.</p></li>
+    <p>Ð?олÑ?зоваÑ?елÑ?Ñ?кие оÑ?обÑ?ажениÑ? могÑ?Ñ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ке даннÑ?Ñ? непÑ?ивилегиÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7548";>CVE-2017-7548</a>
 
- -    <p>The lo_put() function ignored ACLs.</p>
+    <p>ФÑ?нкÑ?иÑ? lo_put() игноÑ?иÑ?Ñ?еÑ? Ñ?пиÑ?ки Ñ?пÑ?авлениÑ? доÑ?Ñ?Ñ?пом.</p>
 
- -<p>For more in-depth descriptions of the security vulnerabilities, please see
+<p>Ð?а подÑ?обнÑ?м опиÑ?анием Ñ?Ñ?звимоÑ?Ñ?ей обÑ?аÑ?айÑ?еÑ?Ñ? по адÑ?еÑ?Ñ?
 <a href="https://www.postgresql.org/about/news/1772/";>https://www.postgresql.org/about/news/1772/</a></p></li>
 
 </ul>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 9.6.4-0+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 9.6.4-0+deb9u1.</p>
 
- -<p>We recommend that you upgrade your postgresql-9.6 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-9.6.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlmNwbsACgkQXudu4gIW
0qVS+BAAsCGxlyXgi92HCt449wBeWf4Zbk7vISysvGtlw6dMmkEthWjrIsV2DN4q
5x3l0hR4aegv5h5zy2OHq4spAubnho5ggTikyUMeyokBIA2Liqzk5UGkqQxw20Ec
5gqRgQ+R1WOqau9vB8ZdD6xPwFUef8DjafuWOrGTFuNSalwtzrBYTMIUQaGZgBo9
IPs+Co6ZFuElwmuPm2BLlFf98NSeV4DbJu1iiXEtrSf29EE6q0HKrIvrZZzkyDlw
f3r51LxRHJOByp5pgv6ZwE93NyunADC+9Y6Y+r3moQ0R4v+TfpR6/owUyHCaOUCz
wlKUBJXRSkeOP09zR+DZ2YlpSP83lKYveAHLx+BCN/SUFClkXpZRDKu5CrqcK3vv
Wt4CjPDTFCaqe/pi2XV1JwPZ7u6+RxzDamZlMRHEDHDZgFpLb6sjXOwqUGzkV4fj
mZvXDDyC4GKJ9VcclEBv5wb3LT9f1n6s9wXUAIT0gM6nZQabE+f6xLP0eeWHHuKl
Vn4VGKc9kJVxHwYxyEiYu/B0uu8Ct+q5jtYcp4ZSbbXLFWsb+y7+qiJxaADARhnl
LY/BBHKX2TkujwJmqTRpZfsydaEYBmymWO8neub1a87UMT65kARG7qsvgBvwsv77
Xlv4lnw6ENFn3K3YmBWO9ixL+fQrvY1SanqkJIgxT66Uc1k/vWU=
=eVRM
-----END PGP SIGNATURE-----


Reply to: