-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2014/dla-33.wml 2016-04-09 01:32:21.000000000 +0500 +++ russian/security/2014/dla-33.wml 2016-06-22 15:31:14.138317859 +0500 @@ -1,16 +1,17 @@ - -<define-tag description>LTS security update</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи LTS</define-tag> <define-tag moreinfo> - -<p>Detailed descriptions of the vulnerabilities can be found at: +<p>ÐодÑобное опиÑание ÑÑзвимоÑÑей можно найÑи по ÑледÑÑÑÐµÐ¼Ñ Ð°Ð´ÑеÑÑ: <a href="https://www.openssl.org/news/secadv_20140806.txt">https://www.openssl.org/news/secadv_20140806.txt</a></p> - -<p>It's important that you upgrade the libssl0.9.8 package and not just - -the openssl package.</p> +<p>Ðажно, ÑÑÐ¾Ð±Ñ Ð²Ñ Ð¾Ð±Ð½Ð¾Ð²Ð¸Ð»Ð¸ Ð¿Ð°ÐºÐµÑ libssl0.9.8, а не ÑолÑко +Ð¿Ð°ÐºÐµÑ openssl.</p> - -<p>All applications linked to openssl need to be restarted. You can use - -the <q>checkrestart</q> tool from the debian-goodies package to detect - -affected programs. Alternatively, you may reboot your system.</p> +<p>ÐÑе пÑиложениÑ, ÑкомпонованнÑе Ñ openssl, ÑледÑÐµÑ Ð¿ÐµÑезапÑÑÑиÑÑ. ÐÑ Ð¼Ð¾Ð¶ÐµÑе иÑполÑзоваÑÑ +инÑÑÑÑÐ¼ÐµÐ½Ñ <q>checkrestart</q> из пакеÑа debian-goodies Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ +пÑогÑаммÑ, коÑоÑÑе нÑжно пеÑезапÑÑÑиÑÑ. Ðибо можно пеÑезагÑÑзиÑÑ Ð²ÑÑ ÑиÑÑемÑ.</p> - -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in openssl version 0.9.8o-4squeeze17</p> +<p>Ð Debian 6 <q>Squeeze</q> ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² пакеÑе openssl веÑÑии 0.9.8o-4squeeze17</p> </define-tag> # do not modify the following line - --- english/security/2014/dla-40.wml 2016-04-09 01:32:21.000000000 +0500 +++ russian/security/2014/dla-40.wml 2016-06-22 15:26:42.055758117 +0500 @@ -1,14 +1,15 @@ - -<define-tag description>LTS security update</define-tag> +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи LTS</define-tag> <define-tag moreinfo> - -<p>Multiple security issues (cross-site scripting, missing input sanitizing - -and SQL injection) have been discovered in Cacti, a web interface for - -graphing of monitoring systems.</p> +<p>Ð Cacti, веб-инÑеÑÑейÑе Ð´Ð»Ñ Ð¿Ð¾ÑÑÑÐ¾ÐµÐ½Ð¸Ñ Ð³ÑаÑиков ÑиÑÑем мониÑоÑинга, бÑли +обнаÑÑÐ¶ÐµÐ½Ñ Ð¼Ð½Ð¾Ð³Ð¾ÑиÑленнÑе пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи (межÑайÑовÑй ÑкÑипÑинг, оÑÑÑÑÑÑвие оÑиÑÑки Ð²Ñ Ð¾Ð´Ð½ÑÑ +даннÑÑ Ð¸ SQL-инÑекÑии).</p> - -<p>Furthermore, the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-4002">CVE-2014-4002</a> in the previous security update - -has been brought in-line with the upstream fix as it caused a - -regression for people using the plug-in system.</p> +<p>Ðолее Ñого, иÑпÑавление <a href="https://security-tracker.debian.org/tracker/CVE-2014-4002">CVE-2014-4002</a> в пÑедÑдÑÑем обновлении безопаÑноÑÑи +бÑло пÑиведено в ÑооÑвеÑÑÑвие Ñ Ð¸ÑпÑавлением из оÑновной веÑки ÑазÑабоÑки, поÑколÑÐºÑ Ð¾Ð½Ð¾ вÑзÑвало +ÑегÑеÑÑÐ¸Ñ Ñ ÑÐµÑ , кÑо иÑполÑзÑÐµÑ ÑиÑÑÐµÐ¼Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ð¹.</p> - -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in cacti version 0.8.7g-1+squeeze5</p> +<p>Ð Debian 6 <q>Squeeze</q> ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² пакеÑе cacti веÑÑии 0.8.7g-1+squeeze5</p> </define-tag> # do not modify the following line - --- english/security/2014/dla-96.wml 2016-04-08 01:27:55.000000000 +0500 +++ russian/security/2014/dla-96.wml 2016-06-22 15:28:48.380375608 +0500 @@ -1,15 +1,16 @@ - -<define-tag description>LTS security update</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи LTS</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in OpenJDK, an implementation - -of the Oracle Java platform, resulting in the execution of arbitrary code, - -breakouts of the Java sandbox, information disclosure or denial of service.</p> +<p>Ð OpenJDK, ÑеализаÑии плаÑÑоÑÐ¼Ñ Oracle Java, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей, пÑиводÑÑÐ¸Ñ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода, +вÑÑ Ð¾Ð´Ñ Ð·Ð° пÑÐµÐ´ÐµÐ»Ñ Ð¿ÐµÑоÑниÑÑ Java, ÑаÑкÑÑÑÐ¸Ñ Ð¸Ð½ÑоÑмаÑии или оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании.</p> - -<p>For Debian 6 <q>Squeeze</q>, these problems have been fixed in version +<p>Ð Debian 6 <q>Squeeze</q> ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² веÑÑии 6b33-1.13.5-2~deb6u1.</p> - -<p>We recommend that you upgrade your openjdk-6 packages and that you - -subscribe to <a href="https://lists.debian.org/debian-lts/">https://lists.debian.org/debian-lts/</a> to help test updated - -packages before we release them.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ openjdk-6 и подпиÑаÑÑÑÑ +на <a href="https://lists.debian.org/debian-lts/">https://lists.debian.org/debian-lts/</a> Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÑÑ +в ÑеÑÑиÑовании обновлÑннÑÑ Ð¿Ð°ÐºÐµÑов до моменÑа Ð¸Ñ Ð²ÑпÑÑка.</p> </define-tag> -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXamj1AAoJEF7nbuICFtKlgy0QAKyA7ErU7pIfRa3sUa7Jor1Z 5XvkYSocmUgWRHFMTanFG9O9iWUbW1g0LDw93X/Na1sZrA1EYaeoUX0v6EAmSYyf 67RyRLciKfzbUT0el/a3+90qdKDQn8iFAFdngDQGmHgyFda01K+R9wcXo95QT/QR pVAJz31Pe+dAnguFhFEaUCjsLBhRUNXMcEP2Oh+PrgNpQbKvmBS7QiY1lFYGYhJ7 /iwAMp12qxdbskyUBEJmEViL8BFaj8YBjG5VETsxJCbPiitzwUvr0yD9pjJMJlig qHgg3q6hJWtsZBN1HT/of4V0ethcwuvaPoy9nfSK1dapu1RjsA7XO6bdH43Gjenv i8ETiIBZzmnZukw5zstJ2/1a7Qm5u8u0Wdf0PFPuZlb7Jj0MmLdYI5V8ZCPkBJPI PLto5aOSKrb/l9MKri7nx7T7bRZpfDOa4JAjGgCFOCz85ZygdCHoe0aWBWA6tQia YL2PibtgxADQdKIp2l7xCMw24m4EqGCwYXIJki3pMJAI8VuOo+li17wFsAx3avmZ KVpFrw+An9f4ykqUUjlc9jFadtZSdBitOyE7rPaU2tpmMr6lyEss9dO/kAYXhMYs JnDhYVOk6Lv2EFrI+6J8WB8EXQhBh0KqOgHFbjiO1WptYLbwDrKuEZ2gklTSXSkH X8mhl6Dg7IJN/aVfgO1m =CJwH -----END PGP SIGNATURE-----