="68e58f55529766dd62029fba99d7b7a4fad42ba0" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Tom Lane discovered that ALTER ... DEPENDS ON EXTENSION sub
commands
- -in the PostgreSQL database did not perform authorisation checks.
+Том Лэйн обнаружил, что подкоманды
="d568552e131ea2c7ea7f32112237692071899e0b" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Tom Lane discovered that ALTER ... DEPENDS ON EXTENSION sub
commands
- -in the PostgreSQL database did not perform authorisation checks.
+Том Лэйн обнаружил, что подкоманды
="fcaa4a008ecfa168724ebd844e253d66450b96d3" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple security issues have been found in the Mozilla Firefox web
- -browser, which could potentially result in the execution of arbitrary
- -code.
+В веб-браузере M
="8e8c01053acfcad3b37f0c4932fbaf9682de2121" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in the OpenJDK Java runtime,
- -resulting in denial of service, incorrect implementation of Kerberos
- -GSSAPI and TGS requests o
Вс 09 фев 2020 @ 22:49 shilin.alek...@gmail.com:
> В Вс, 09/02/2020 в 23:39 +0500, Lev Lamberov пишет:
>> msgstr ""
>> "Так как это может привести к последствиям, связанным с
>> безопасностью, по "
>> "умолчанию служба выключена
Вс 09 фев 2020 @ 22:38 shilin.alek...@gmail.com:
> В Вс, 09/02/2020 в 23:30 +0500, Lev Lamberov пишет:
>> msgstr ""
>> "Служба MiniSSDP установлена (возможно в качестве зависимости для
>> поддержки "
>> "UPnP), но не будет работать пр
Вс 09 фев 2020 @ 22:24 shilin.alek...@gmail.com:
> В Вс, 09/02/2020 в 23:22 +0500, Lev Lamberov пишет:
>> msgstr "Загрузка компонентов программы установки с установочного
>> носителя"
>
> В комментарии для переводчиков сказано, что следует ограничить длину
> п
Вс 09 фев 2020 @ 21:56 shilin.alek...@gmail.com:
> В Вс, 09/02/2020 в 23:17 +0500, Lev Lamberov пишет:
>> msgstr ""
>> "Запишите эту секретную строку. Вам будет необходимо ввести её на
>> самом "
>> "первом экране после запуска веб-интерфейса F
Вс 09 фев 2020 @ 21:54 shilin.alek...@gmail.com:
> В Вс, 09/02/2020 в 23:14 +0500, Lev Lamberov пишет:
>> #. Type: string
>> #. Description
>> #: ../progress-linux.templates:4001
>> msgid ""
>> "If unsure, leave empty which will use the default mirr
Вс 09 фев 2020 @ 21:49 shilin.alek...@gmail.com:
> В Вс, 09/02/2020 в 23:10 +0500, Lev Lamberov пишет:
>> msgstr ""
>> "Заметим, что при выборе компонента для работы которого нужны другие
>> "
>> "компоненты, эти компоненты также будут загружены
Вс 09 фев 2020 @ 21:42 shilin.alek...@gmail.com:
> В Вс, 09/02/2020 в 23:03 +0500, Lev Lamberov пишет:
>> msgstr ""
>> "Настройка аппаратных часов занимаетла больше времени чем ожидалось.
>> У "
>> "используемой для выставления часов програ
Вс 09 фев 2020 @ 21:34 shilin.alek...@gmail.com:
> В Вс, 09/02/2020 в 22:56 +0500, Lev Lamberov пишет:
>> msgstr ""
>> "Микропрограмма данной машины запустила установщик в режиме UEFI, но
>> возможно "
>> "уже установлена другая ОС
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
# translation of ru.po to Russian
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the PACKAGE package.
#
# Yuri Kozlov , 2007.
# Lev Lamberov , 2020.
msgid ""
msgstr ""
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
# Russian translation of minissdpd debconf template
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the minissdpd package.
# Lev Lamberov , 2018-2020.
msgid ""
msgstr ""
, 2005, 2006, 2007, 2008.
# Yuri Kozlov , 2009, 2010, 2011.
# Alastair McKinstry , 2004.
# Mikhail Zabaluev , 2006.
# Nikolai Prokoschenko , 2004.
# Pavel Maryanov , 2009,2010.
# Yuri Kozlov , 2004, 2005, 2006, 2007, 2008, 2009, 2010,
2011, 2012, 2013, 2014, 2015, 2016, 2018.
# Lev Lamberov , 2020
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
# Russian translation of powerline debconf template.
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the powerline package.
# Lev Lamberov , 2018-2020.
#
msgid ""
msgstr ""
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
# Russian translation of plinth debconf template.
# Copyright (C) 2019 FreedomBox packaging team
# This file is distributed under the same license as the plinth package.
# Lev Lamberov , 2020.
#
msgid ""
msgstr ""
"Pro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
# Russian debconf translation of progress-linux
# Copyright (C) 2019-2020 Lev Lamberov
# This file is distributed under the same license as the progress-linux package.
msgid ""
msgstr ""
"Project-Id-Version: progress-li
, 2005, 2006, 2007, 2008.
# Yuri Kozlov , 2009, 2010, 2011.
# Alastair McKinstry , 2004.
# Mikhail Zabaluev , 2006.
# Nikolai Prokoschenko , 2004.
# Pavel Maryanov , 2009,2010.
# Yuri Kozlov , 2004, 2005, 2006, 2007, 2008, 2009, 2010,
2011, 2012, 2013, 2014, 2015, 2016, 2018.
# Lev Lamberov , 2020
in the Public Interest, Inc.
# This file is distributed under the same license as debian-installer.
#
# Russian L10N Team , 2004.
# Yuri Kozlov , 2004, 2005.
# Dmitry Beloglazov , 2005.
# Yuri Kozlov , 2005, 2006, 2007.
# Lev Lamberov , 2020.
msgid ""
msgstr ""
"Project-Id-Ver
, 2005, 2006, 2007, 2008.
# Yuri Kozlov , 2009, 2010, 2011.
# Alastair McKinstry , 2004.
# Mikhail Zabaluev , 2006.
# Nikolai Prokoschenko , 2004.
# Pavel Maryanov , 2009,2010.
# Yuri Kozlov , 2004, 2005, 2006, 2007, 2008, 2009, 2010,
2011, 2012, 2013, 2014, 2015, 2016, 2018.
# Lev Lamberov , 2020
translation="1a43dd4c64597cdad71e88ac50a1e22bd3e60b8b" maintainer="Lev Lamberov"
+Обновлённый Debian 9: выпуск 9.12
2020-02-08
#use wml::debian::news
- -# $Id:
9
stretch
@@ -24,121 +24,121 @@
https://packages.debian.org/src:%0;>%0
- -The Debian project is pleased to ann
translation="96c05360e385187167f1ccbce37d38ce2e5e6920" maintainer="Lev Lamberov"
+Обновлённый Debian 10: выпуск 10.3
2020-02-08
#use wml::debian::news
- -# $Id:
10
buster
@@ -24,145 +24,145 @@
https://packages.debian.org/src:%0;>%0
- -The Debian project is pleased to an
="3ad892d074815a517f2a1d8ec799fa696a08d752" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -An out-of-bounds write vulnerability due to an integer overflow was
- -reported in libexif, a library to parse EXIF files, which could result
- -in denial of service
="abccef21651668bce87fe0103d623399ffd369cd" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Guillaume Teissier reported that the XMLRPC client in libxmlrpc3-java,
- -an XML-RPC implementation in Java, does perform deserialization of the
- -server-side exceptio
="446ba0301e18f9722b30306206b2c61e7c957ed8" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Two security issues were found in the Qt library, which could result in
- -plugins and libraries being loaded from the current working directory,
- -resulting in potential co
="15dec87b51ed957e42773ff91217a26555cc3465" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Two security issues have been found in the SLiRP networking
- -implementation of QEMU, a fast processor emulator, which could result
- -in the execution of arbitrary
="cc26fa4daf1ca0a0ad161b8f9a5b226f730a186c" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Two vulnerabilities were discovered in spamassassin, a Perl-based spam
- -filter using text analysis. Malicious rule or configuration files,
- -possibly downloaded from an
="10d6441f58b80849b1c23b3599dafc9a773a04f2" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Joe Vennix discovered a stack-based buffer overflow vulnerability in
- -sudo, a program designed to provide limited super user privileges to
- -specific user
="e25d434dcac8f08adc70199ce09f30f14d4e8555" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -A heap-based buffer overflow vulnerability was discovered in the
- -idn2_to_ascii_4i() function in libidn2, the GNU library for
- -Internationalized Domain Names (IDNs)
="fb7d29f63f0954976c5fc7cf9c9bddd6cbb49710" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that the LDAP authentication modules for the Prosody
- -Jabber/XMPP server incorrectly validated the XMPP address when checking
- -whether a user has admin
="3ca692b931073b2f0a3154ffd1fc96ac6743ed54" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Qualys discovered that the OpenSMTPD SMTP server performed insufficient
- -validation of email addresses which could result in the execution of
- -arbitrary commands as root.
="e6ae6b986a5a91be7e9c7bf01d816a4dac8d86bc" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -The following vulnerabilities have been discovered in the webkit2gtk
- -web engine:
+В веб-движке webkit2gtk были обнаружены следующие
+уязвимости:
https://security-
="f744d49feeb6c6afe3a22a3ed5e2a43eefbe3d46" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Two security issues were found in the Python interface to the apt
- -package manager; package downloads from unsigned repositories were
- -incorrectly rejected and the has
2020 - description"
+#use wml::debian::template title="Партнёрская программа Debian 2020 года
описание"
+#use wml::debian::translation-check
translation="8005362aeedcf547967ac0878ac330f78c04491e" maintainer="Lev Lamberov"
- -What is the Debian Partners Program?
+#use wml::debian::template title="Партнёры Debian в 2020 году"
#use wml::debian::recent_list
#include "$(ENGLISHDIR)/partners/index.include"
+#use wml::debian::translation-check
translation="e3775d7c5e7b808a0aa6cf6078021f0a6327e44f" maintainer="Lev Lamberov"
uot;
+#use wml::debian::translation-check
translation="af0d62759061fb6f4cd1ea9f0b8e66b459ed2aaa" maintainer="Lev Lamberov"
- -Aravind Infovays Providing The Excellence Service In A Field Of Foss
- -Without Compromising The Quality In The Industries.
- -We Have 4+ Years Of Ex
="44243a6fa6e0b893fa8ad64f679b1c1d7dfd6e6d" maintainer="Lev Lamberov"
- -High School Technology Services, Washington DC
USA
+High School Technology Services, Вашингтон,
США
https://myhsts.org/
#use wml::debian::users
- - Our org is a member of Open Source I
="a1d2cac4bbcf10458b534cb59d95237ca8dd2708" maintainer="Lev Lamberov"
- -Agencja interaktywna Avangardo, Szczecin,
Poland
+Agencja interaktywna Avangardo, Щецин,
Польша
https://avangardo.pl
#use wml::debian::users
- - Our agency uses Debian on two of our workstati
="c61db2c587e6eed3dcf7c02b4a7f4500c4561841" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple integer overflows have been discovered in the libtiff library
- -and the included tools.
+В библиотеке libtiff и сопутствующих инструментах были обнаружены
+мно
="54ed69c467a43952f4d70f1aaf9fbc9a5d4b6fcd" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP
- -in openconnect, an open client for Cisco AnyConnect, Pulse and
- -GlobalProtect VPN. A malic
="dca7d154a9aa9b577d941477e201293dd96b6dbc" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in the chromium web
browser.
+В веб-браузере chromium было обнаружено несколько уязвимостей.
https://security-track
="f63afc8ad74e4e06be31ba0f4afdb777d0097a69" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in the OpenJDK Java
- -runtime, resulting in denial of service, incorrect implementation of
- -Kerberos GSSAPI and TGS requests o
="73b976c71b8b4c13c331a478bd9111aa6f64627e" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple issues have been found in cacti, a server monitoring system,
- -potentially resulting in SQL code execution or information disclosure by
- -authenticated users.
="37106d7a2bf19436b2c3fcedd284e215a16d849a" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple security issues have been found in Thunderbird which could
- -potentially result in the execution of arbitrary code or information
- -disclosure.
+В Thunderbird
="4c0996e191dd68b6dfbadfee3c048714d4cfa961" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple vulnerabilities have been discovered in the Xen hypervisor, which
- -could result in denial of service, guest-to-host privilege escalation or
- -information leaks.
Вс 12 янв 2020 @ 16:42 Debian Webmaster :
> *** Errors validating /srv/www.debian.org/www/CD/jigdo-cd/index.ru.html:
> ***
> Line 78, character 1: character "+" not allowed in attribute specification
> list
> Line 105, character 1:character "+" not allowed in attribute
>
="7d75d8928987af424e3e50ff2103a45da9815c40" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that a hook script of ldm, the display manager for the
- -Linux Terminal Server Project, incorrectly parsed responses from an SSH
- -server, which could
="8a8180313689caf093ac3fe147b1018a2c6545dd" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was reported that Netty, a Java NIO client/server framework, is prone
- -to a HTTP request smuggling vulnerability due to mishandling whitespace
- -before the colon in HTT
="2c2490c9749352191c6f084851eb0832e358ca83" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple security issues have been found in the Mozilla Firefox
- -web browser, which could potentially result in the execution
- -of arbitrary code, data exfiltration o
="e79b7fa9c4d19ab016e9734db7cf5427757e7c5e" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities were discovered in Wordpress, a web blogging
- -tool. They allowed remote attackers to perform various Cross-Side
- -Scripting (XSS) and Cross-Site
="f141e134bdc80eb626430d22803e62ca0e69b576" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Simon Charette reported that the password reset functionality in Django,
- -a high-level Python web development framework, uses a Unicode
- -case-insensitive query to retrie
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAl4WwHIACgkQXudu4gIW
0qXGUA/+NYeNovNZJ9/OQZ5pBbhtfGAOYW8oOl+kGJQPj7MlehcibXBk/7vadVBj
wFxuq+1/IH47mO8zBNGXxsdSZEpnw6yCCvqIm5Q7FEnDnaMB+EDWIH67c1c5RlH2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAl4WwGYACgkQXudu4gIW
0qVrsxAAqh5JHlHHHKrwRC7R2YJ28tGWt4X8UzE9DSE1suxwGkItc3sv9qv9ozLZ
DtWzzNZyj2iK0aGtOmVF7TIS9l+AFTsw2QpxCRA508fK26Im86S3E8Cxqb4of9ZE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAl4Rga4ACgkQXudu4gIW
0qXINxAApp5H8BbyqFdar8/ggBeVHQxP/+g04kyk8M+sLdNoBBncnNXdKLF6MF57
kYDvwLjy5xd2XDahAkm2Y5WO09feoQ7yI506/KrYylCA+deZ/UwAKoUfSXsp0q5A
="11e1663e57afd4ec01a9dcd0258d09273ea21e5e" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Guido Vranken discovered an overflow bug in the x64_64 Montgomery
- -squaring procedure used in exponentiation with 512-bit moduli.
+Гвидо Вранкен обнаружил переполнение в
="65d7367533385d5273f2b4e5575c52530adab6a9" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several issues were discovered in the Tomcat servlet and JSP engine, which
- -could result in session fixation attacks, information disclosure, cross-site
- -scripting,
="6519242e58366ed179bc8c8fb2e8ca3bf298cfae" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that debian-lan-config, a FAI config space for the
- -Debian-LAN system, configured too permissive ACLs for the Kerberos admin
- -server, which allowed p
="4b462ea192fc355c557625a4edd8b02668ca91dd" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was found that freeimage, a graphics library, was affected by the
- -following two security issues:
+Было обнаружено, что freeimage, графическая библиотека, подвер
="c8a1be83043aff5fa848cf416ba036a1bf88afe8" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that the Title blacklist functionality in MediaWiki,
- -a website engine for collaborative work, could by bypassed.
+Было обнаружено, что чёрный список
Сб 07 апр 2018 @ 08:43 Gali Anikina :
> Можете кто-то отправить ru.po по acheck? С reportbug пока не
> подружилась.
На днях наконец-то загрузили в архив:
https://tracker.debian.org/news/1088218/accepted-acheck-058-source-into-unstable/
="df11709715cec99dcc46d31e0498723d0062fe70" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Stephan Zeisberg reported an out-of-bounds write vulnerability in the
- -_sasl_add_string() function in cyrus-sasl2, a library implementing the
- -Simple Authenticatio
="49ebb54e257a4235010353f0f35ea62dfeff80af" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that the lmtpd component of the Cyrus IMAP server
- -created mailboxes with administrator privileges if the fileinto was
- -used, bypassing ACL checks.
+
="75f72653f09f3b9a1c1b3b6d4d31909e56f4509f" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that debian-edu-config, a set of configuration files
- -used for the Debian Edu blend, configured too permissive ACLs for the
- -Kerberos admin server,
="fd5cf2fc0633cd70b5c718df841025bd8ad4c7d6" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that python-ecdsa, a cryptographic signature library
- -for Python, incorrectly handled certain signatures. A remote attacker
- -could use this issue t
="fe7a9c4114dfb923fc5e6bf04150e3dc3482a0e5" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in the interpreter for the
- -Ruby language, which could result in unauthorized access by bypassing
- -intended pat
="b4c714c22a33415dcea3a5208ae0bc6f09c4ebe8" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in the interpreter for the
- -Ruby language, which could result in unauthorized access by bypassing
- -intended pat
="be70261454371a10eda4db4df697e3ff80e95b74" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Two vulnerabilities were discovered in spamassassin, a Perl-based spam
- -filter using text analysis.
+В spamassassin, системе фильтрации спама с текстовым анализом на
="add2c354d4048bff1caa9e7e9ab5fd4711d2cf3d" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -A vulnerability was discovered in the SPIP publishing system, which
- -could result in unauthorised writes to the database by authors.
+В SPIP, системе публикации, была
="96cc70c332b480ca413d25d5ea30e55f6f1eaae5" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple security issues have been found in Thunderbird which could
- -potentially result in the execution of arbitrary code.
+В Thunderbird были обнаружены многочисленные п
="1805cdfc5bb13a0344534933964b35950f37b42d" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple cross-site scripting and cross-site request forgery issues were
- -discovered in the DAViCal CalDAV Server.
+В CalDAV-сервере DAViCal были обнаружены мног
="41fccd54a1ae7357406e95e4ab18163caf63a70f" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in git, a fast, scalable,
- -distributed revision control system.
+В git, быстрой масштабируемой распределённой системе
="1d6c487247b8ca7c8917eb22b2aea23d31765e27" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple security issues have been found in the Mozilla Firefox web
- -browser, which could potentially result in the execution of arbitrary
- -code.
+В веб-браузере M
="22917e527177fdfaccbe319ac11e4e591fe492f8" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Two vulnerabilities were discovered in NSS, a set of cryptographic
- -libraries, which may result in denial of service and potentially the
- -execution of arbitrary code.
+В
Вс 01 дек 2019 @ 12:01 Vladimir Zhbanov :
> On Sun, Dec 01, 2019 at 11:40:01AM +0300, Galina Anikina wrote:
>> On Sat, 2019-11-30 at 20:52 +0500, Lev Lamberov wrote:
>> > +В libvpx, мультимедиа библиотеке, были обнаружены многочисленные
>> > проблемы
>> > +без
="aa85f70dae1f544aa3a41633fcaa9e4c231b3548" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Tim Düsterhus discovered that haproxy, a TCP/HTTP reverse proxy, did
- -not properly sanitize HTTP headers when converting from HTTP/2 to
- -HTTP/1. This would allow
="d9f28d597b792649fe587d865a643263d9c0a3bd" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple security issues were found in libvpx multimedia library which
- -could result in denial of service and potentially the execution of
- -arbitrary code if malforme
="a3e9011061fe14746edd52c7a1e14d8c89ba439b" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -An out-of-bounds write vulnerability was discovered in php-imagick, a
- -PHP extension to create and modify images using the ImageMagick API,
- -which could result in den
="1975c9db16f264b28b074f2173a6bcda403cd1f1" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in the chromium web
browser.
+В веб-браузере chromium было обнаружено несколько уязвимостей.
https://security-tracker.deb
="e17c59c7c54d3dcb2c084a37856d591c54ff39c9" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Hoger Just discovered an SQL injection in Redmine, a project management
- -web application. In addition a cross-site scripting issue was found in
- -Textile formatting.
+Хоге
="21677aab7abaa5aba8cdae17e68bc66f39e97357" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple vulnerabilities have been found in the Symfony PHP framework
- -which could lead to a timing attack/information leak, argument injection
- -and code executi
="137e4da6051203d226eeef60c621df2dce3a99c0" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that the Simple Linux Utility for Resource Management
- -(SLURM), a cluster resource management and job scheduling system, did
- -not escape strings
Вт 19 ноя 2019 @ 02:46 Алексей Шилин :
> В Пн, 18/11/2019 в 14:45 +0500, Lev Lamberov пишет:
>> Внёс пару исправлений ("псевдо-заголовки" (и формы) переделал на
>> "псевдозаголовки", "www-сайт" на "веб-сайт"
>
> В Developer.wml о
Пт 15 ноя 2019 @ 03:02 Алексей Шилин :
> Привет!
>
> Вложены патчи с предложениями по исправлению перевода раздела Bugs/
> web-сайта. (А также минимально подправил форматирование отдельным
> патчем, чтобы хоть читать можно было; впрочем, конкретно этот патч
> совсем не принципиален.)
>
>
Вс 17 ноя 2019 @ 10:48 Galina Anikina :
> On Sat, 2019-11-16 at 21:07 +0500, Lev Lamberov wrote:
>> исправление аварийной остановки при клике правой кнопкой мыше в окне
>> субтитров">
>
> при клике правой кнопкой мышИ
>> +> версии 3.0.0 или более ранних&
="94483780a4ee5447d63c7ccf6a51a1500ca3edf0" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -A vulnerability was discovered in mosquitto, a MQTT version 3.1/3.1.1
- -compatible message broker, allowing a malicious MQTT client to cause a
- -denial of service (s
="60422bd0c097175d65df54198ba0c43ce4827c17" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Multiple security issues have been found in Thunderbird which could
- -potentially result in the execution of arbitrary code or denial of
- -service.
+В Thunderbird были обна
translation="a6e124e3bdf8bba46778a528df9a1e871c2f4b94" maintainer="Lev Lamberov"
+Обновлённый Debian 10: выпуск 10.2
2019-11-16
#use wml::debian::news
- -# $Id:
10
buster
@@ -24,27 +24,27 @@
https://packages.debian.org/src:%0;>%0
- -The Debian project is pleased to ann
="648ff72f6ffd3349cfdce3e4231f45386fc97aa0" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that the vhost PMD in DPDK, a set of libraries for
- -fast packet processing, was affected by memory and file descriptor leaks
- -which could resu
="82b298d8baf108aa4e5fd50bb44362370b794adc" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Rich Mirch discovered that the pg_ctlcluster script didn't drop
- -privileges when creating socket/statistics temporary directories, which
- -could result in local p
="771af82940577334ab5d15e6b8037ed647902c1a" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -This update for QEMU, a fast processor emulator, backports support to
- -passthrough the pschange-mc-no CPU flag. The virtualised MSR seen by a
- -guest is set to s
="b8b00bff47207c34c4758856b55dada46b60eea2" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Manfred Paul and Lukas Schauer reported that the .charkeys procedure in
- -Ghostscript, the GPL PostScript/PDF interpreter, does not properly
- -restrict privileged calls
="45bbfa11bc27bcea1ec2a28b213e086f5b18be60" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -This update ships updated CPU microcode for some types of Intel CPUs. In
- -particular it provides mitigations for the TAA (TSX Asynchronous Abort)
- -vulnerability. For af
="b6e08a2f2188ab1bf8b75fba4f8f2d9861f035e4" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -These vulnerabilities have been discovered in the webkit2gtk web
engine:
+В веб-движке webkit2gtk были обнаружены следующие уязвимости:
https://security-tracker.de
="0cc922cd661d77cfeed7f482bce1cfba75c197ae" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a privilege escalation, denial of service, or information
- -leak.
+В ядре L
="760d05261a5f3ebd0572961cf16b78a849bea91a" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Several vulnerabilities have been discovered in the chromium web
browser.
+В веб-браузере chromium было обнаружено несколько уязвимостей.
https://security-track
="6286cf953c8e8e38255f3121c0edf3daa3904692" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Alex Murray discovered a stack-based buffer overflow vulnerability in
- -fribidi, an implementation of the Unicode Bidirectional Algorithm
- -algorithm, which cou
="38a4027b3a627340890c62d9540431aedc0a25e5" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -It was discovered that in SimpleSAMLphp, an implementation of the
- -SAML 2.0 protocol, it was possible to circumvent XML signature
- -verification on SAML messages.
+Было о
Вт 05 ноя 2019 @ 21:28 Алексей Шилин :
> В Вт, 05/11/2019 в 22:34 +0500, Lev Lamberov пишет:
>> Вт 05 ноя 2019 @ 11:23 Алексей Шилин :
>>
>> > В Вт, 05/11/2019 в 12:16 +0500, Lev Lamberov пишет:
>> > > - The Operating System
>> > > -
="12b7e90602cd5c473864d880b87e4a67b94c67d1" mindelta="1"
maintainer="Lev Lamberov"
+обновление безопасности
- -Stephan Zeisberg discovered that missing input validation in ProFTPD, a
- -FTP/SFTP/FTPS server, could result in denial of service via an infinite
- -loop.
+Штефан Цайс
Результаты 601 - 700 из 3647 matches
Mail list logo