www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/proprietary-insecurity.ru.html ...


From: GNUN
Subject: www proprietary/proprietary-insecurity.ru.html ...
Date: Sun, 25 Jun 2017 01:30:14 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/06/25 01:30:14

Modified files:
        proprietary    : proprietary-insecurity.ru.html 
        proprietary/po : proprietary-insecurity.ru-en.html 
                         proprietary-insecurity.ru.po 
        software       : recent-releases-include.ru.html 
        software/po    : recent-releases-include.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ru.html?cvsroot=www&r1=1.1223&r2=1.1224
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.ru.po?cvsroot=www&r1=1.1708&r2=1.1709

Patches:
Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/proprietary-insecurity.ru.html  16 Jun 2017 09:02:28 -0000      
1.40
+++ proprietary/proprietary-insecurity.ru.html  25 Jun 2017 05:30:13 -0000      
1.41
@@ -91,6 +91,12 @@
 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>10&nbsp;лет
 была серьезная прореха в безопасности</a>.</p>
 
+  <p>Уязвимость возволила взломщику 
получить доступ к системе Intel Active
+Management Technology (AMT) компьютера <a
+href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/";>
+по Интернету с пустым паролем и правами 
администратора</a> для доступа к
+клавиатуре, мыши и монитору, кроме прочих 
разрешений.</p>
+
        <p>Положение не улучшает то, что в более 
поздних процессорах Intel отключить
 Intel Management Engine невозможно. Таким образом, 
даже пользователи,
 активно работающие над своей 
безопасностью, не могут сделать ничего, 
чтобы
@@ -563,7 +569,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2017/06/16 09:02:28 $
+$Date: 2017/06/25 05:30:13 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-insecurity.ru-en.html    16 Jun 2017 09:02:28 
-0000      1.40
+++ proprietary/po/proprietary-insecurity.ru-en.html    25 Jun 2017 05:30:13 
-0000      1.41
@@ -79,6 +79,13 @@
        <a 
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>major
 security
        vulnerability for 10 years</a>.</p>
 
+  <p>The vulnerability allowed a cracker to access the computer's Intel Active
+      Management Technology
+      (AMT) <a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/";>
+      web interface with an empty password and gave administrative
+      access</a> to access the computer's keyboard, mouse, monitor
+      among other privileges.</p>
+
        <p>It does not help that in newer Intel processors, it is impossible
        to turn off the Intel Management Engine. Thus, even users who are 
        proactive about their security can do nothing to protect themselves 
@@ -507,7 +514,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2017/06/16 09:02:28 $
+$Date: 2017/06/25 05:30:13 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary/po/proprietary-insecurity.ru.po 25 Jun 2017 05:22:52 -0000      
1.138
+++ proprietary/po/proprietary-insecurity.ru.po 25 Jun 2017 05:30:13 -0000      
1.139
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-06-24 17:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -187,9 +186,8 @@
 "Уязвимость возволила взломщику получить 
доступ к системе Intel Active "
 "Management Technology (AMT) компьютера <a 
href=\"https://arstechnica.com/";
 "security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-"
-"anyone-thought/\"> по Интернету с пустым паролем и 
правами "
-"администратора</a> для доступа к 
клавиатуре, мыши и монитору, кроме прочих "
-"разрешений."
+"anyone-thought/\"> по Интернету с пустым паролем и 
правами администратора</"
+"a> для доступа к клавиатуре, мыши и 
монитору, кроме прочих разрешений."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: software/recent-releases-include.ru.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ru.html,v
retrieving revision 1.1223
retrieving revision 1.1224
diff -u -b -r1.1223 -r1.1224
--- software/recent-releases-include.ru.html    23 Jun 2017 21:29:11 -0000      
1.1223
+++ software/recent-releases-include.ru.html    25 Jun 2017 05:30:13 -0000      
1.1224
@@ -2,8 +2,8 @@
 <li><strong>23 июня 2017</strong>
 <ul>
 <li><a
-href="http://lists.gnu.org/archive/html/info-gnu/2017-06/msg00011.html";>Texinfo
-6.4 released</a>, <i>Gavin Smith</i>, <tt>17:13</tt></li>
+href="http://lists.gnu.org/archive/html/info-gnu/2017-06/msg00011.html";>Выпущен
+Texinfo 6.4</a>, <i>Гевин Смит</i>, <tt>17:13</tt></li>
 <li><a
 
href="http://lists.gnu.org/archive/html/info-gnu/2017-06/msg00010.html";>Выпущен
 GNU Cgicc 3.2.17</a>, <i>Себастьян Диаз</i>, <tt>09:07</tt></li>

Index: software/po/recent-releases-include.ru.po
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.ru.po,v
retrieving revision 1.1708
retrieving revision 1.1709
diff -u -b -r1.1708 -r1.1709
--- software/po/recent-releases-include.ru.po   25 Jun 2017 05:22:53 -0000      
1.1708
+++ software/po/recent-releases-include.ru.po   25 Jun 2017 05:30:13 -0000      
1.1709
@@ -14,22 +14,12 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-06-23 21:27+0000\n"
 
 #. type: Content of: <ul><li>
 msgid "<strong>June 23, 2017</strong>"
 msgstr "<strong>23 июня 2017</strong>"
 
 #. type: Content of: <ul><li><ul><li>
-# | <a
-# | 
[-href=\"http://lists.gnu.org/archive/html/info-gnu/2016-09/msg00005.html\";>Texinfo
-# | 6.2-]
-# | 
{+href=\"http://lists.gnu.org/archive/html/info-gnu/2017-06/msg00011.html\";>Texinfo
-# | 6.4+} released</a>, <i>Gavin Smith</i>, [-<tt>18:03</tt>-]
-# | {+<tt>17:13</tt>+}
-#| msgid ""
-#| "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2016-09/msg00005.html";
-#| "\">Texinfo 6.2 released</a>, <i>Gavin Smith</i>, <tt>18:03</tt>"
 msgid ""
 "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2017-06/msg00011.html";
 "\">Texinfo 6.4 released</a>, <i>Gavin Smith</i>, <tt>17:13</tt>"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]