[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3897.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3897.wml	2017-06-24 17:19:54.000000000 +0500
+++ russian/security/2017/dsa-3897.wml	2017-06-24 17:54:44.529529542 +0500
@@ -1,44 +1,46 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in Drupal, a fully-featured content
- -management framework. The Common Vulnerabilities and Exposures project
- -identifies the following issues:</p>
+<p>Ð? Drupal, полноÑ?Ñ?нкÑ?ионалÑ?ной инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е Ñ?пÑ?авлениÑ? Ñ?одеÑ?жимÑ?м, бÑ?ли
+обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7943";>CVE-2015-7943</a>
 
- -    <p>Samuel Mortenson and Pere Orga discovered that the overlay module
- -    does not sufficiently validate URLs prior to displaying their
- -    contents, leading to an open redirect vulnerability.</p>
+    <p>СамÑ?Ñ?лÑ? Ð?оÑ?Ñ?енÑ?он и Ð?еÑ?е Ð?Ñ?га обнаÑ?Ñ?жили, Ñ?Ñ?о модÑ?лÑ? overlay
+    вÑ?полнÑ?еÑ? недоÑ?Ñ?аÑ?оÑ?нÑ?Ñ? пÑ?овеÑ?кÑ? URL пеÑ?ед оÑ?обÑ?ажением иÑ?
+    Ñ?одеÑ?жимого, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?Ñ?звимоÑ?Ñ?Ñ?м пÑ?и оÑ?кÑ?Ñ?Ñ?Ñ?Ñ? пеÑ?енапÑ?авлениÑ?Ñ?.</p>
 
- -    <p>More information can be found at
+    <p>Ð?ополниÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? можно найÑ?и по адÑ?еÑ?Ñ?
     <a href="https://www.drupal.org/SA-CORE-2015-004";>https://www.drupal.org/SA-CORE-2015-004</a>
 	</p>
 </li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-6922";>CVE-2017-6922</a>
 
- -    <p>Greg Knaddison, Mori Sugimoto and iancawthorne discovered that files
- -    uploaded by anonymous users into a private file system can be
- -    accessed by other anonymous users leading to an access bypass
- -    vulnerability.</p>
+    <p>Ð?Ñ?ег Ð?наддиÑ?он, Ð?оÑ?и СÑ?гимоÑ?о и iancawthorne обнаÑ?Ñ?жили, Ñ?Ñ?о к Ñ?айлам,
+    загÑ?Ñ?женнÑ?м анонимнÑ?ми полÑ?зоваÑ?елÑ?ми в пÑ?иваÑ?нÑ?Ñ? Ñ?айловÑ?Ñ? Ñ?иÑ?Ñ?емÑ?, дÑ?Ñ?гие
+    могÑ?Ñ? полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п дÑ?Ñ?гие анонимнÑ?е полÑ?зоваÑ?ели, Ñ?Ñ?о пÑ?иводиÑ? к обÑ?одÑ?
+    огÑ?аниÑ?ений доÑ?Ñ?Ñ?па.</p>
 
- -    <p>More information can be found at
+    <p>Ð?ополниÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? можно найÑ?и по адÑ?еÑ?Ñ?
     <a href="https://www.drupal.org/SA-CORE-2017-003";>https://www.drupal.org/SA-CORE-2017-003</a>
 	</p>
 </li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 7.32-1+deb8u9.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 7.32-1+deb8u9.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 7.52-2+deb9u1. For the stable distribution (stretch),
- -<a href="https://security-tracker.debian.org/tracker/CVE-2015-7943";>CVE-2015-7943</a> was already fixed before the initial release.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7.52-2+deb9u1. Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?звимоÑ?Ñ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/CVE-2015-7943";>CVE-2015-7943</a>
+бÑ?ла иÑ?пÑ?авлена еÑ?Ñ? до вÑ?пÑ?Ñ?ка.</p>
 
- -<p>We recommend that you upgrade your drupal7 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? drupal7.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=vQl9
-----END PGP SIGNATURE-----


Reply to: