-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- --- english/security/2015/dla-175.wml 2016-04-09 01:32:24.0 +0500
+++ russian/security/2015/dla-175.wml 2016-05-04 13:49:51.258453880 +0500
@@ -1,38 +1,39 @@
- -LTS security update
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+обновление безопаÑноÑÑи
LTS
- -Multiple vulnerabilities were discovered in GnuPG, the GNU Privacy
Guard:
+Ð GnuPG, GNU Privacy Guard, бÑли обнаÑÑженÑ
многоÑиÑленнÑе ÑÑзвимоÑÑи:
https://security-tracker.debian.org/tracker/CVE-2014-3591;>CVE-2014-3591
- -The Elgamal decryption routine was susceptible to a side-channel
- -attack discovered by researchers of Tel Aviv University. Ciphertext
- -blinding was enabled to counteract it. Note that this may have a quite
- -noticeable impact on Elgamal decryption performance.
+ФÑнкÑÐ¸Ñ ÑаÑÑиÑÑовки Elgamal Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ
подвеÑжена аÑаке ÑеÑез ÑÑоÑонний
+канал, ÑÑо бÑло обнаÑÑжено
иÑÑледоваÑелÑми из ТелÑ-ÐвивÑкого
ÑнивеÑÑиÑеÑе. ÐÐ»Ñ Ñого, ÑÑобÑ
+пÑоÑивоÑÑоÑÑÑ ÑÑой пÑоблеме бÑла
вклÑÑена маÑкиÑовка ÑиÑÑоÑекÑÑа. ÐамеÑÑÑе,
ÑÑо ÑÑо ÑилÑно
+влиÑÐµÑ Ð½Ð° пÑоизводиÑелÑноÑÑÑ
ÑаÑÑиÑÑовки Elgamal.
https://security-tracker.debian.org/tracker/CVE-2015-0837;>CVE-2015-0837
- -The modular exponentiation routine mpi_powm() was susceptible to a
- -side-channel attack caused by data-dependent timing variations when
- -accessing its internal pre-computed table.
+ФÑнкÑÐ¸Ñ mpi_powm() Ð´Ð»Ñ Ð¼Ð¾Ð´ÑлÑного
поÑенÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¿Ð¾Ð´Ð²ÐµÑжена аÑаке
+ÑеÑез ÑÑоÑонний канал, ÑÑо вÑзвано
ваÑиаÑиÑми Ñаймингов в завиÑимоÑÑи оÑ
даннÑе пÑи
+обÑаÑении к внÑÑÑенней пÑедваÑиÑелÑно
вÑÑиÑленной ÑаблиÑе.
https://security-tracker.debian.org/tracker/CVE-2015-1606;>CVE-2015-1606
- -The keyring parsing code did not properly reject certain packet types
- -not belonging in a keyring, which caused an access to memory already
- -freed. This could allow remote attackers to cause a denial of service
- -(crash) via crafted keyring files.
+Ðод Ð´Ð»Ñ Ð³ÑаммаÑиÑеÑкого ÑазбоÑа
бÑелоков клÑÑей непÑавилÑно оÑклонÑеÑ
опÑеделÑннÑе ÑÐ¸Ð¿Ñ Ð¿Ð°ÐºÐµÑов,
+не оÑноÑÑÑиÑ
ÑÑ Ðº бÑелокÑ, ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº
обÑаÑÐµÐ½Ð¸Ñ Ðº памÑÑи, коÑоÑÐ°Ñ Ñже бÑла
+оÑвобождена. ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸ÑÑ
ÑдалÑннÑм злоÑмÑÑленникам вÑзваÑÑ Ð¾Ñказ в
обÑлÑживании
+(аваÑÐ¸Ð¹Ð½Ð°Ñ Ð¾ÑÑановка) Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ
ÑпеÑиалÑно ÑÑоÑмиÑованнÑÑ
Ñайлов бÑелоков
клÑÑей.
- -For the oldstable distribution (squeeze), those problems have been fixed
in
- -version 1.4.10-4+squeeze7.
+РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (squeeze)
ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð²
+веÑÑии 1.4.10-4+squeeze7.
- -For the stable distribution (wheezy), these problems have been fixed in
- -version 1.4.12-7+deb7u7.
+Ð ÑÑабилÑном вÑпÑÑке (wheezy) ÑÑи пÑоблемÑ
бÑли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð²
+веÑÑии 1.4.12-7+deb7u7.
- -We recommend that you upgrade your gnupg packages.
+РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ gnupg.
# do not modify the following line
- --- english/security/2015/dla-294.wml 2016-04-08 01:24:54.0 +0500
+++ russian/security/2015/dla-294.wml 2016-05-04 13:55:13.629715021 +0500
@@ -1,41 +1,42 @@
- -LTS security update
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+обновление безопаÑноÑÑи
LTS
- -Several vulnerabilities have been fixed in Wordpress, the popular
- -blogging engine.
+Ð Wordpress, попÑлÑÑном движке Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð±Ð»Ð¾Ð³Ð°,
бÑло обнаÑÑжено
+неÑколÑко ÑÑзвимоÑÑей.
https://security-tracker.debian.org/tracker/CVE-2015-2213;>CVE-2015-2213
- -SQL Injection allowed a remote attacker to compromise the
site.
+SQL-инÑекÑÐ¸Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ ÑдалÑнномÑ
злоÑмÑÑÐ»ÐµÐ½Ð½Ð¸ÐºÑ ÐºÐ¾Ð¼Ð¿ÑомеÑиÑоваÑÑ ÑайÑ.
https://security-tracker.debian.org/tracker/CVE-2015-5622;>CVE-2015-5622
- -The robustness of the shortcodes HTML tags filter has been
- -improved. The parsing is a bit more strict, which may affect
- -your