[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-375{8,9}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3758.wml	2017-01-12 15:58:36.000000000 +0500
+++ russian/security/2017/dsa-3758.wml	2017-01-12 17:13:47.426139156 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several denial-of-service vulnerabilities (assertion failures) were
- -discovered in BIND, a DNS server implementation.</p>
+<p>Ð? BIND, Ñ?еализаÑ?ии DNS-Ñ?еÑ?веÑ?а, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко оÑ?казов
+в обÑ?лÑ?живании (оÑ?ибки Ñ?Ñ?веÑ?ждениÑ?).</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9131";>CVE-2016-9131</a>
 
- -    <p>A crafted upstream response to an ANY query could cause an
- -    assertion failure.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й оÑ?веÑ? оÑ? абоненÑ?а к коммÑ?Ñ?иÑ?Ñ?Ñ?Ñ?емÑ? Ñ?злÑ? на запÑ?оÑ? ANY
+    можеÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?ибкÑ? Ñ?Ñ?веÑ?ждениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9147";>CVE-2016-9147</a>
 
- -    <p>A crafted upstream response with self-contradicting DNSSEC data
- -    could cause an assertion failure.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й оÑ?веÑ? оÑ? абоненÑ?а к коммÑ?Ñ?иÑ?Ñ?Ñ?Ñ?емÑ? Ñ?злÑ? Ñ? даннÑ?ми DNSSEC,
+    пÑ?оÑ?ивоÑ?еÑ?аÑ?ими Ñ?амим Ñ?ебе, могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?ибкÑ? Ñ?Ñ?веÑ?ждениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9444";>CVE-2016-9444</a>
 
- -    <p>Specially-crafted upstream responses with a DS record could cause
- -    an assertion failure.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е оÑ?веÑ?Ñ? оÑ? абоненÑ?а к коммÑ?Ñ?иÑ?Ñ?Ñ?Ñ?емÑ? Ñ?злÑ? Ñ? запиÑ?Ñ?Ñ?
+    DS могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?ибкÑ? Ñ?Ñ?веÑ?ждениÑ?.</p></li>
 
 </ul>
 
- -<p>These vulnerabilities predominantly affect DNS servers providing
- -recursive service.  Client queries to authoritative-only servers
- -cannot trigger these assertion failures.  These vulnerabilities are
- -present whether or not DNSSEC validation is enabled in the server
- -configuration.</p>
+<p>ЭÑ?и Ñ?Ñ?звимоÑ?Ñ?и по пÑ?еимÑ?Ñ?еÑ?Ñ?вÑ? каÑ?аÑ?Ñ?Ñ?Ñ? Ñ?екÑ?Ñ?Ñ?ивнÑ?Ñ? DNS-Ñ?еÑ?веÑ?ов.
+Ð?лиенÑ?Ñ?кие запÑ?оÑ?Ñ?, напÑ?авленнÑ?е Ñ?олÑ?ко авÑ?оÑ?иÑ?еÑ?нÑ?м Ñ?еÑ?веÑ?ам,
+не вÑ?зÑ?ваÑ?Ñ? Ñ?казаннÑ?Ñ? оÑ?ибок Ñ?Ñ?веÑ?ждениÑ?. ЭÑ?и Ñ?Ñ?звимоÑ?Ñ?и
+пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? незавиÑ?имо оÑ? Ñ?ого, вклÑ?Ñ?ена или неÑ? в наÑ?Ñ?Ñ?ойкаÑ? Ñ?еÑ?веÑ?а
+пÑ?овеÑ?ка DNSSEC.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1:9.9.5.dfsg-9+deb8u9.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:9.9.5.dfsg-9+deb8u9.</p>
 
- -<p>We recommend that you upgrade your bind9 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? bind9.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3759.wml	2017-01-12 15:58:50.000000000 +0500
+++ russian/security/2017/dsa-3759.wml	2017-01-12 17:16:30.720294650 +0500
@@ -1,18 +1,19 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Matias P. Brutti discovered that python-pysaml2, a Python
- -implementation of the Security Assertion Markup Language 2.0, did not
- -correctly sanitize the XML messages it handled. This allowed a remote
- -attacker to perform XML External Entity attacks, leading to a wide
- -range of exploits.</p>
+<p>Ð?аÑ?иаÑ? Ð?Ñ?Ñ?Ñ?Ñ?и обнаÑ?Ñ?жил, Ñ?Ñ?о python-pysaml2, Ñ?еализаÑ?иÑ? Security
+Assertion Markup Language 2.0 длÑ? Python, непÑ?авилÑ?но вÑ?полнÑ?еÑ?
+оÑ?иÑ?Ñ?кÑ? обÑ?абаÑ?Ñ?ваемÑ?Ñ? Ñ?ообÑ?ений в Ñ?оÑ?меÑ? XML. ЭÑ?о позволÑ?еÑ? Ñ?далÑ?нномÑ?
+злоÑ?мÑ?Ñ?ленникÑ? вÑ?полнÑ?Ñ?Ñ? аÑ?аки Ñ?еÑ?ез внеÑ?ние Ñ?Ñ?Ñ?ноÑ?Ñ?и XML, Ñ?Ñ?о пÑ?иводиÑ?
+к болÑ?Ñ?омÑ? колиÑ?еÑ?Ñ?вÑ? возможнÑ?Ñ? Ñ?кÑ?плоиÑ?ов.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 2.0.0-1+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.0-1+deb8u1.</p>
 
- -<p>For the testing (stretch) and unstable (sid) distributions, this
- -problem has been fixed in version 3.0.0-5.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а
+пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 3.0.0-5.</p>
 
- -<p>We recommend that you upgrade your python-pysaml2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? python-pysaml2.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=sG2X
-----END PGP SIGNATURE-----


Reply to: