-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2016/dsa-3489.wml 2016-02-24 13:11:06.000000000 +0500 +++ russian/security/2016/dsa-3489.wml 2016-02-24 13:15:13.174133243 +0500 @@ -1,12 +1,13 @@ - -<define-tag description>security update</define-tag> +#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи</define-tag> <define-tag moreinfo> - -<p>lighttpd, a small webserver, is vulnerable to the POODLE attack via - -the use of SSLv3. This protocol is now disabled by default.</p> +<p>lighttpd, неболÑÑой веб-ÑеÑвеÑ, ÑÑзвим к аÑаке по пÑинÑÐ¸Ð¿Ñ POODLE ÑеÑез +иÑполÑзование SSLv3. ÐÑÐ¾Ñ Ð¿ÑоÑокол ÑепеÑÑ Ð¿Ð¾ ÑмолÑÐ°Ð½Ð¸Ñ Ð¾ÑклÑÑен.</p> - -<p>For the oldstable distribution (wheezy), this problem has been fixed - -in version 1.4.31-4+deb7u4.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (wheezy) ÑÑа пÑоблема бÑла иÑпÑавлена +в веÑÑии 1.4.31-4+deb7u4.</p> - -<p>We recommend that you upgrade your lighttpd packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ lighttpd.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJWzWbLAAoJEF7nbuICFtKl2UMP/RsoNJa4XO6xLPArCejI4BUb WjJw/CKWuhJHCTB5R7b7l6xFB9/NL1jz4u8NcMEIVOrS2bTr7vCBEbbzh2/zCyAZ RYavK4mWx+g4k1TsfPyyml5fG0LvdH5zgkIwtkb8Ug89D/cXRx6/sZchJLTnKPN3 RnooylcdEl6VhBLgXdEX2Kk7zNE5F8vkQCGePQFRCxud6siNHYGr+ofttshbF6J+ 1OZVwlrC21Ei7k6wR317j2rB3rSm7UCshY7vTgAd2J2RpwtLqFJN6I7MP0jzDg98 fYD8yTO2Ww87rO+1rKH/9xXqwDIsn+qkO7kAQVP7yg8Bt8JtAhxSFqd1tQWGOlMV 3Ktj/psnsjrkZoBHXH1JmbhUCMeOBhC1+e+zST+cpMwi0JvKkMPlNY6bpLP7hSq/ kkgRQH6KY4gEa+u9Vy07KcyJjePUe9DevQKwgi8hnIBQVsMmHTBbCoYHksqH/2n2 CEd6ema8gkXOv59EbFdlZJl1B7GKXSlYFhFpCdtb7jCD96HfqZxxUbX/2ZyEbx6C l4JgMgV0Gk1XCfn11Xfvb8/MI02423K9LVgyv9XxZ7ZqBi9bd0QVQktLdCO49Zec 3EXrsKS8ooONqKDSZhwsuCswrJ/mXPtizDdhxvTCOJi21TA5PCyHiGogNhBbfvFq /A5LeqiXxv8+MlurHoGn =yZsK -----END PGP SIGNATURE-----