[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-402{7,8,9}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-4027.wml	2017-11-10 04:02:56.000000000 +0500
+++ russian/security/2017/dsa-4027.wml	2017-11-10 11:16:17.768216056 +0500
@@ -1,13 +1,14 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>A vulnerabilitiy has been found in the PostgreSQL database system:
- -Denial of service and potential memory disclosure in the
- -json_populate_recordset() and jsonb_populate_recordset() functions.</p>
+<p>Ð? Ñ?иÑ?Ñ?еме баз даннÑ?Ñ? PostgreSQL бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?:
+оÑ?каз в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?ное Ñ?аÑ?кÑ?Ñ?Ñ?ие Ñ?одеÑ?жимого памÑ?Ñ?и в
+Ñ?Ñ?нкÑ?иÑ?Ñ? json_populate_recordset() и jsonb_populate_recordset().</p>
 
- -<p>For the oldstable distribution (jessie), this problem has been fixed
- -in version 9.4.15-0+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 9.4.15-0+deb8u1.</p>
 
- -<p>We recommend that you upgrade your postgresql-9.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-9.4.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-4028.wml	2017-11-10 04:05:35.000000000 +0500
+++ russian/security/2017/dsa-4028.wml	2017-11-10 11:18:16.041785815 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in the PostgreSQL database system:</p>
+<p>Ð? Ñ?иÑ?Ñ?еме баз даннÑ?Ñ? PostgreSQL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15098";>CVE-2017-15098</a>
 
- -    <p>Denial of service and potential memory disclosure in the
- -    json_populate_recordset() and jsonb_populate_recordset() functions</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?ное Ñ?аÑ?кÑ?Ñ?Ñ?ие Ñ?одеÑ?жимого памÑ?Ñ?и в
+    Ñ?Ñ?нкÑ?иÑ?Ñ? json_populate_recordset() и jsonb_populate_recordset().</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15099";>CVE-2017-15099</a>
 
- -    <p>Insufficient permissions checks in <q>INSERT ... ON CONFLICT DO UPDATE</q>
- -    statements.</p></li>
+    <p>Ð?едоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка пÑ?ав доÑ?Ñ?Ñ?па в Ñ?Ñ?веÑ?ждениÑ?Ñ?
+    <q>INSERT ... ON CONFLICT DO UPDATE</q>.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 9.6.6-0+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 9.6.6-0+deb9u1.</p>
 
- -<p>We recommend that you upgrade your postgresql-9.6 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-9.6.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-4029.wml	2017-11-10 04:06:57.000000000 +0500
+++ russian/security/2017/dsa-4029.wml	2017-11-10 11:20:45.284862346 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that the pg_ctlcluster, pg_createcluster and
- -pg_upgradecluster commands handled symbolic links insecurely which could
- -result in local denial of service by overwriting arbitrary files.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о командÑ? pg_ctlcluster, pg_createcluster и
+pg_upgradecluster обÑ?абаÑ?Ñ?ваÑ?Ñ? Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки небезопаÑ?нÑ?м обÑ?азом, Ñ?Ñ?о
+можеÑ? пÑ?иводиÑ?Ñ? к локалÑ?номÑ? оÑ?казÑ? в обÑ?лÑ?живании из-за пеÑ?езапиÑ?и пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов.</p>
 
- -<p>For the oldstable distribution (jessie), this problem has been fixed
- -in version 165+deb8u3.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 165+deb8u3.</p>
 
- -<p>For the stable distribution (stretch), this problem has been fixed in
- -version 181+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 181+deb9u1.</p>
 
- -<p>We recommend that you upgrade your postgresql-common packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-common.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=CSyc
-----END PGP SIGNATURE-----


Reply to: