[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3974.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3974.wml	2017-09-15 23:17:20.000000000 +0500
+++ russian/security/2017/dsa-3974.wml	2017-09-15 23:21:37.630163852 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Two issues were discovered in the Tomcat servlet and JSP engine.</p>
+<p>Ð? Tomcat, движке Ñ?еÑ?влеÑ?ов и JSP, бÑ?ли обнаÑ?Ñ?женÑ? две пÑ?облемÑ?.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7674";>CVE-2017-7674</a>
 
- -    <p>Rick Riemer discovered that the Cross-Origin Resource Sharing
- -    filter did not add a Vary header indicating possible different
- -    responses, which could lead to cache poisoning.</p></li>
+    <p>Рик РимеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?илÑ?Ñ?Ñ? Cross-Origin Resource Sharing
+    не добавлÑ?еÑ? заголовок Vary, оÑ?меÑ?аÑ?Ñ?ий возможнÑ?е Ñ?азлиÑ?нÑ?е
+    оÑ?веÑ?Ñ?, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к оÑ?Ñ?авлениÑ? кÑ?Ñ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7675";>CVE-2017-7675</a> (stretch only)
 
- -    <p>Markus Dörschmidt found that the HTTP/2 implementation bypassed
- -    some security checks, thus allowing an attacker to conduct
- -    directory traversal attacks by using specially crafted URLs.</p></li>
+    <p>Ð?аÑ?кÑ?Ñ? Ð?Ñ?Ñ?Ñ?мидÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? HTTP/2 обÑ?одиÑ?
+    некоÑ?оÑ?Ñ?е пÑ?овеÑ?ки безопаÑ?ноÑ?Ñ?и, позволÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? аÑ?аки
+    по обÑ?одÑ? каÑ?алога Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? URL.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 8.0.14-1+deb8u11.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 8.0.14-1+deb8u11.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 8.5.14-1+deb9u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8.5.14-1+deb9u2.</p>
 
- -<p>We recommend that you upgrade your tomcat8 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tomcat8.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=jTRe
-----END PGP SIGNATURE-----


Reply to: