[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2018/dsa-4122.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2018/dsa-4122.wml	2018-02-23 11:54:00.000000000 +0500
+++ russian/security/2018/dsa-4122.wml	2018-02-23 12:24:45.079959837 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Squid3, a fully featured
- -web proxy cache. The Common Vulnerabilities and Exposures project
- -identifies the following issues:</p>
+<p>Ð? Squid3, полноÑ?Ñ?нкÑ?ионалÑ?ном кÑ?Ñ?иÑ?Ñ?Ñ?Ñ?ем веб-пÑ?окÑ?и, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000024";>CVE-2018-1000024</a>
 
- -    <p>Louis Dion-Marcil discovered that Squid does not properly handle
- -    processing of certain ESI responses. A remote server delivering
- -    certain ESI response syntax can take advantage of this flaw to cause
- -    a denial of service for all clients accessing the Squid service.
- -    This problem is limited to the Squid custom ESI parser.</p>
+    <p>Ð?Ñ?и Ð?ион-Ð?аÑ?Ñ?илÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Squid непÑ?авилÑ?но вÑ?полнÑ?еÑ? обÑ?абоÑ?кÑ?
+    опÑ?еделÑ?ннÑ?Ñ? ESI-оÑ?веÑ?ов. УдалÑ?ннÑ?й Ñ?еÑ?веÑ?, пеÑ?едаÑ?Ñ?ий опÑ?еделÑ?ннÑ?е
+    ESI-оÑ?веÑ?Ñ? Ñ? Ñ?обÑ?Ñ?веннÑ?м Ñ?инÑ?акÑ?иÑ?ом, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова
+    оÑ?каза в обÑ?лÑ?живании Ñ? вÑ?еÑ? клиенÑ?ов, обÑ?аÑ?аÑ?Ñ?иÑ?Ñ?Ñ? к Ñ?лÑ?жбе Squid.
+    Ð?аннаÑ? пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Ñ?обÑ?Ñ?венного кода длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а ESI в Squid.</p>
 
     <p><url "http://www.squid-cache.org/Advisories/SQUID-2018_1.txt"; /></p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000027";>CVE-2018-1000027</a>
 
- -    <p>Louis Dion-Marcil discovered that Squid is prone to a denial of
- -    service vulnerability when processing ESI responses or downloading
- -    intermediate CA certificates. A remote attacker can take advantage
- -    of this flaw to cause a denial of service for all clients accessing
- -    the Squid service.</p>
+    <p>Ð?Ñ?и Ð?ион-Ð?аÑ?Ñ?илÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Squid Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании,
+    коÑ?оÑ?Ñ?й возникаеÑ? пÑ?и обÑ?абоÑ?ке ESI-оÑ?веÑ?ов или загÑ?Ñ?зке
+    Ñ?еÑ?Ñ?иÑ?икаÑ?ов пÑ?омежÑ?Ñ?оÑ?нÑ?Ñ? Ñ?еÑ?Ñ?ов Ñ?еÑ?Ñ?иÑ?икаÑ?ии. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+    Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании Ñ? вÑ?еÑ? клиенÑ?ов, обÑ?аÑ?аÑ?Ñ?иÑ?Ñ?Ñ?
+    к Ñ?лÑ?жбе Squid.</p>
 
     <p><url "http://www.squid-cache.org/Advisories/SQUID-2018_2.txt"; /></p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 3.4.8-6+deb8u5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.4.8-6+deb8u5.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 3.5.23-5+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.5.23-5+deb9u1.</p>
 
- -<p>We recommend that you upgrade your squid3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? squid3.</p>
 
- -<p>For the detailed security status of squid3 please refer to 
- -its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и squid3 можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
 <a href="https://security-tracker.debian.org/tracker/squid3";>\
 https://security-tracker.debian.org/tracker/squid3</a></p>
 </define-tag>
-----BEGIN PGP SIGNATURE-----
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=cYbq
-----END PGP SIGNATURE-----


Reply to: