-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2015/dla-207.wml 2016-04-07 03:47:55.000000000 +0500 +++ russian/security/2015/dla-207.wml 2016-05-04 16:16:45.295878202 +0500 @@ -1,36 +1,37 @@ - -<define-tag description>LTS security update</define-tag> +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи LTS</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities were discovered in Subversion, a version control - -system. The Common Vulnerabilities and Exposures project identifies the - -following problems:</p> +<p>Ð Subversion, ÑиÑÑеме ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð²ÐµÑÑиÑми, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures опÑеделÑÐµÑ +ÑледÑÑÑие пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0248">CVE-2015-0248</a> - - <p>Subversion mod_dav_svn and svnserve were vulnerable to a remotely - - triggerable assertion DoS vulnerability for certain requests with - - dynamically evaluated revision numbers.</p></li> + <p>Subversion mod_dav_svn и svnserve ÑÑÐ·Ð²Ð¸Ð¼Ñ Ðº вÑзÑваемой ÑдалÑнно + оÑибке ÑÑвеÑждениÑ, пÑиводÑÑей к оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании пÑи опÑеделÑннÑÑ Ð·Ð°Ð¿ÑоÑÐ°Ñ Ñ + динамиÑеÑки оÑениваемÑми номеÑами Ñевизии.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0251">CVE-2015-0251</a> - - <p>Subversion HTTP servers allow spoofing svn:author property values for - - new revisions via specially crafted v1 HTTP protocol request - - sequences.</p></li> + <p>HTTP-ÑеÑвеÑÑ Subversion позволÑÑÑ Ð¿Ð¾Ð´Ð´ÐµÐ»ÑваÑÑ Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ ÑвойÑÑва svn:author Ð´Ð»Ñ + новÑÑ Ñевизий Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑпеÑиалÑно ÑÑоÑмиÑованнÑÑ Ð¿Ð¾ÑледоваÑелÑноÑÑей запÑоÑов по + пÑоÑÐ¾ÐºÐ¾Ð»Ñ HTTP v1.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1845">CVE-2013-1845</a> - - <p>Subversion mod_dav_svn was vulnerable to a denial of service attack - - through a remotely triggered memory exhaustion.</p></li> + <p>Subversion mod_dav_svn ÑÑзвим к оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании + ÑеÑез вÑзÑваемое ÑдалÑнно ÑÑезмеÑное поÑÑебление памÑÑи.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1846">CVE-2013-1846</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2013-1847">CVE-2013-1847</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2013-1849">CVE-2013-1849</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2014-0032">CVE-2014-0032</a> - - <p>Subversion mod_dav_svn was vulnerable to multiple remotely triggered - - crashes.</p></li> + <p>Subversion mod_dav_svn ÑÑзвим к многоÑиÑленнÑм вÑзÑваемÑм ÑдалÑнно + аваÑийнÑм ÑÑÑановкам.</p></li> </ul> - -<p>This update has been prepared by James McCoy.</p> +<p>Ðанное обновление бÑло подгоÑовлено ÐжеймÑом Ðаккоем.</p> </define-tag> # do not modify the following line - --- english/security/2015/dla-342.wml 2016-04-08 01:24:54.000000000 +0500 +++ russian/security/2015/dla-342.wml 2016-05-04 16:21:36.139269328 +0500 @@ -1,42 +1,43 @@ - -<define-tag description>LTS security update</define-tag> +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи LTS</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been found and solved in the distributed file - -system OpenAFS:</p> +<p>Ð ÑаÑпÑеделÑнной Ñайловой ÑиÑÑеме OpenAFS бÑло обнаÑÑжено и иÑпÑавлено +неÑколÑко ÑÑзвимоÑÑей:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3282">CVE-2015-3282</a> - - <p>vos leaked stack data clear on the wire when updating vldb entries.</p></li> + <p>УÑеÑка даннÑÑ ÑÑека из vos пÑи обновлении запиÑей vldb.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3283">CVE-2015-3283</a> - - <p>OpenAFS allowed remote attackers to spoof bos commands via unspecified - - vectors.</p></li> + <p>OpenAFS позволÑÐµÑ ÑдалÑннÑм злоÑмÑÑленникам подделÑваÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ bos Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ + неопÑеделÑннÑÑ Ð²ÐµÐºÑоÑов.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-3285">CVE-2015-3285</a> - - <p>pioctl wrongly used the pointer related to the RPC, allowing local users to - - cause a denial of service (memory corruption and kernel panic) via a - - crafted OSD FS command.</p></li> + <p>pioctl непÑавилÑно иÑполÑзÑÐµÑ ÑказаÑелÑ, ÑвÑзаннÑй Ñ RPC, позволÑÑ Ð»Ð¾ÐºÐ°Ð»ÑнÑм полÑзоваÑелÑм + вÑзÑваÑÑ Ð¾Ñказ в обÑлÑживании (повÑеждение ÑодеÑжимого памÑÑи и паника ÑдÑа) Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ + ÑпеÑиалÑно ÑÑоÑмиÑованной ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ OSD FS.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-6587">CVE-2015-6587</a> - - <p>vlserver allowed remote authenticated users to cause a denial of service - - (out-of-bounds read and crash) via a crafted regular expression in a - - VL_ListAttributesN2 RPC.</p></li> + <p>vlserver позволÑÐµÑ Ð°ÑÑенÑиÑиÑиÑованнÑм полÑзоваÑелÑм вÑзÑваÑÑ Ð¾Ñказ в обÑлÑживании + (ÑÑение за пÑеделами вÑделенного бÑÑеÑа памÑÑи и аваÑÐ¸Ð¹Ð½Ð°Ñ Ð¾ÑÑановка) Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑпеÑиалÑно ÑÑоÑмиÑованного ÑегÑлÑÑного вÑÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð² + RPC VL_ListAttributesN2.</p></li> - -<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7762">CVE-2015-7762</a> and <a href="https://security-tracker.debian.org/tracker/CVE-2015-7763">CVE-2015-7763</a> ("Tattletale") +<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7762">CVE-2015-7762</a> и <a href="https://security-tracker.debian.org/tracker/CVE-2015-7763">CVE-2015-7763</a> ("Tattletale") - - <p>John Stumpo found that Rx ACK packets leaked plaintext of packets - - previously processed.</p></li> + <p>Ðжон СÑампо обнаÑÑжил, ÑÑо Rx-пакеÑÑ ACK ÑодеÑÐ¶Ð°Ñ Ð² виде оÑкÑÑÑого ÑекÑÑа Ñанее + обÑабоÑаннÑе пакеÑÑ.</p></li> </ul> - -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in openafs version +<p>Ð Debian 6 <q>Squeeze</q> ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² openafs веÑÑии 1.4.12.1+dfsg-4+squeeze4.</p> - -<p>We recommend that you upgrade your OpenAFS packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ OpenAFS.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXKdtDAAoJEF7nbuICFtKlucQP/0CIqlqo3Ty+JLLODPv4OEAG tJ9IsuIStuY2wSjRx3u63SMO4jmXkx/2p35znNPgA/q8lQZQH0bfjkkjJYtZdzTB db3pbXVG/UbzvryeJWdKOOYj1HC6z0LJ+gjex1cfxW0hqtOrcpZ/9rNqKeSm0xw/ t5IzJuwj0iFfBFVzb18WeCLkvALG7mqO0YnvbHyiaeF5D1xOXSjuwI7lOqxoSKiW XtYyeeF4JNU8b/JiDdaSYbIJKtwgpNw2fE3RtA/KBKIJbIZ4wgI/hCs3PiNwD0jq zU6aAzf5eIp1aqnaX7Tboj8jUaDF1r+ASp4uKrCYTpnERa3HNqKpEVNC7USEL9T3 rY6Sa9SQlusCEYBDwB0BUtN9/6eVRetRxPBSNSX6bOpDLKnmovlwVIzRbfIvmVDA u2Nfd9ibMPC6KHPSVWnnB1k1D2Fz9w8SyLZyOfcDpvDKYRaJMxCoJIeJQvSaod+l E08Mji5Q2iQlMGZQXbyGOYWKfpZ9muRColc2QYTYtJGFRsSdD3wi2Si2pRshAKhn 7bd+NFbO9igZ0g50NNYMsJr/2gMgBzQ98LifI6nuGHUBDZUNOe4Qj/P0OwcXZ8Tf gNUYnfpzTUQyh75epjejU6Ng/lh/tw6EhkHYgvWqJZHmcMldcTTnWqao+Rpf0jR8 JC1n3gfvJgAJ0psw/o/V =VT9L -----END PGP SIGNATURE-----