[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{520,487,570,483,419,377,470,494,527,506,510,460,550,429}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2377.wml	2012-01-02 06:48:44.000000000 +0600
+++ russian/security/2012/dsa-2377.wml	2015-12-29 16:56:44.023870604 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>NULL pointer dereference</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that cyrus-imapd, a highly scalable mail system designed
- -for use in enterprise environments, is not properly parsing mail headers
- -when a client makes use of the IMAP threading feature.  As a result, a NULL
- -pointer is dereferenced which crashes the daemon.  An attacker can trigger
- -this by sending a mail containing crafted reference headers and access the
- -mail with a client that uses the server threading feature of IMAP.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о cyrus-imapd, Ñ?оÑ?оÑ?о маÑ?Ñ?Ñ?абиÑ?Ñ?емаÑ? поÑ?Ñ?оваÑ? Ñ?иÑ?Ñ?ема, Ñ?азÑ?абоÑ?аннаÑ?
+длÑ? иÑ?полÑ?зованиÑ? в коÑ?поÑ?аÑ?ивнÑ?Ñ? окÑ?Ñ?жениÑ?Ñ?, непÑ?авилÑ?но вÑ?полнÑ?еÑ? гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? заголовков
+Ñ?ообÑ?ений Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ? в Ñ?лÑ?Ñ?ае, когда клиенÑ? иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? многопоÑ?оÑ?ноÑ?Ñ?Ñ? IMAP.  Ð? Ñ?езÑ?лÑ?Ñ?аÑ?е
+пÑ?оиÑ?Ñ?одиÑ? Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?, Ñ?Ñ?о пÑ?иводиÑ? к аваÑ?ийномÑ? завеÑ?Ñ?ениÑ? Ñ?абоÑ?Ñ? Ñ?лÑ?жбÑ?.  Ð?лоÑ?мÑ?Ñ?ленник
+можеÑ? вÑ?зваÑ?Ñ? Ñ?Ñ?о пÑ?Ñ?Ñ?м оÑ?пÑ?авки Ñ?ообÑ?ениÑ?, Ñ?одеÑ?жаÑ?его Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е заголовки, и обÑ?аÑ?ениÑ?
+к Ñ?Ñ?омÑ? Ñ?ообÑ?ениÑ? пÑ?и помоÑ?и клиенÑ?а, иÑ?полÑ?зÑ?Ñ?Ñ?его многопоÑ?оÑ?ноÑ?Ñ?Ñ? IMAP.</p>
 
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 2.2.13-14+lenny6.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.13-14+lenny6.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.2.13-19+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.2.13-19+squeeze3.</p>
 
- -<p>For the testing (wheezy) and unstable (sid) distributions, this problem has been
- -fixed in cyrus-imapd-2.4 version 2.4.11-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а пÑ?облема бÑ?ла
+иÑ?пÑ?авлена в пакеÑ?е cyrus-imapd-2.4 веÑ?Ñ?ии 2.4.11-1.</p>
 
 
- -<p>We recommend that you upgrade your cyrus-imapd-2.2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? cyrus-imapd-2.2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2419.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2419.wml	2015-12-29 16:51:32.761731145 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in Puppet, a centralized
- -configuration management tool.</p>
+<p>Ð? Puppet, инÑ?Ñ?Ñ?Ñ?менÑ?е Ñ?енÑ?Ñ?ализованного Ñ?пÑ?авлениÑ? наÑ?Ñ?Ñ?ойками, обнаÑ?Ñ?жено
+две Ñ?Ñ?звимоÑ?Ñ?и.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1053";>CVE-2012-1053</a>
 
- -	<p>Puppet runs execs with an unintended group privileges,
- -	potentially leading to privilege escalation.</p></li>
+	<p>Puppet запÑ?Ñ?каеÑ? иÑ?полнÑ?емÑ?е Ñ?айлÑ? оÑ? лиÑ?а гÑ?Ñ?ппÑ?, пÑ?ава коÑ?оÑ?ой не должнÑ?
+	пеÑ?едаваÑ?Ñ?Ñ?Ñ? иÑ?полнÑ?емомÑ? Ñ?айлÑ?, Ñ?Ñ?о поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1054";>CVE-2012-1054</a>
 
- -	<p>The k5login type writes to untrusted locations,
- -	enabling local users to escalate their privileges
- -	if the k5login type is used.</p></li>
+	<p>Тип k5login вÑ?полнÑ?еÑ? запиÑ?Ñ? в недовеÑ?еннÑ?е меÑ?Ñ?а,
+	Ñ?Ñ?о позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м повÑ?Ñ?аÑ?Ñ? Ñ?вои пÑ?ава доÑ?Ñ?Ñ?па в Ñ?лÑ?Ñ?ае,
+	еÑ?ли иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? Ñ?ип k5login.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 2.6.2-5+squeeze4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.6.2-5+squeeze4.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 2.7.11-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.7.11-1.</p>
 
- -<p>We recommend that you upgrade your puppet packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? puppet.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2429.wml	2012-03-09 02:45:40.000000000 +0600
+++ russian/security/2012/dsa-2429.wml	2015-12-29 17:52:51.509927948 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
 <p>
- -   Due to the non-disclosure of security patch information from Oracle,
- -   we are forced to ship an upstream version update of MySQL 5.1.
- -   There are several known incompatible
- -   changes, which are listed in /usr/share/doc/mysql-server/NEWS.Debian.gz.
+   Ð?з-за Ñ?окÑ?Ñ?Ñ?иÑ? Oracle инÑ?оÑ?маÑ?ии о заплаÑ?аÑ? длÑ? иÑ?пÑ?авлениÑ? пÑ?облем безопаÑ?ноÑ?Ñ?и
+   мÑ? бÑ?ли вÑ?нÑ?жденÑ? пÑ?едоÑ?Ñ?авиÑ?Ñ? обновлÑ?ннÑ?Ñ? веÑ?Ñ?иÑ? MySQL 5.1 из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки.
+   Ð?звеÑ?Ñ?но, Ñ?Ñ?о она Ñ?одеÑ?жиÑ? неÑ?колÑ?ко неÑ?овмеÑ?Ñ?имÑ?Ñ? изменений,
+   коÑ?оÑ?Ñ?е пÑ?иводÑ?Ñ?Ñ?Ñ? в Ñ?айле /usr/share/doc/mysql-server/NEWS.Debian.gz.
 </p>
 
- -<p>Several security vulnerabilities were discovered in MySQL, a database
- -management system.  The vulnerabilities are addressed by upgrading
- -MySQL to a new upstream version, 5.1.61, which includes additional
- -changes, such as performance improvements and corrections for data
- -loss defects.  These changes are described in the MySQL release notes
- -at: <url http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html>.</p>
+<p>Ð? MySQL, Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? базами даннÑ?Ñ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  УÑ?звимоÑ?Ñ?и Ñ?еÑ?енÑ? пÑ?Ñ?Ñ?м обновлениÑ?
+MySQL до новой веÑ?Ñ?ии, 5.1.61, из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки, коÑ?оÑ?аÑ? Ñ?одеÑ?жиÑ?
+и дÑ?Ñ?гие изменениÑ?, Ñ?акие как Ñ?лÑ?Ñ?Ñ?ениÑ? пÑ?оизводиÑ?елÑ?ноÑ?Ñ?и и иÑ?пÑ?авлениÑ? пÑ?облем Ñ?
+поÑ?еÑ?ей даннÑ?Ñ?.  ЭÑ?и изменениÑ? опиÑ?анÑ? в инÑ?оÑ?маÑ?ии о вÑ?пÑ?Ñ?ке MySQL,
+коÑ?оÑ?аÑ? доÑ?Ñ?Ñ?пна по Ñ?ледÑ?Ñ?Ñ?емÑ? адÑ?еÑ?Ñ?: <url http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html>.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 5.1.61-0+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 5.1.61-0+squeeze1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 5.1.61-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.1.61-2.</p>
 
- -<p>We recommend that you upgrade your mysql-5.1 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql-5.1.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2460.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2460.wml	2015-12-29 17:30:36.334700278 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in the Asterisk PBX and telephony
- -toolkit:</p>
+<p>Ð? Asterisk, набоÑ?е инÑ?Ñ?Ñ?Ñ?менÑ?ов длÑ? оÑ?иÑ?нÑ?Ñ? Ð?ТС и Ñ?елеÑ?онии, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1183";>CVE-2012-1183</a>
 
- -    <p>Russell Bryant discovered a buffer overflow in the Milliwatt 
- -    application.</p></li>
+    <p>РаÑ?Ñ?ел Ð?Ñ?ианÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в пÑ?иложении
+    Milliwatt.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2414";>CVE-2012-2414</a>
 
- -    <p>David Woolley discovered a privilege escalation in the Asterisk
- -    manager interface.</p></li>
+    <p>Ð?Ñ?вид Ð?Ñ?лли обнаÑ?Ñ?жил повÑ?Ñ?ение пÑ?ивилегий в Ñ?пÑ?авлÑ?Ñ?Ñ?ем инÑ?еÑ?Ñ?ейÑ?е
+    Asterisk.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2415";>CVE-2012-2415</a>
 
- -    <p>Russell Bryant discovered a buffer overflow in the Skinny 
- -    driver.</p></li>
+    <p>РаÑ?Ñ?ел Ð?Ñ?ианÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в движке
+    Skinny.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1:1.6.2.9-2+squeeze5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.6.2.9-2+squeeze5.</p>
 
- -<p>For the unstable distribution (sid), this problem will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your asterisk packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? asterisk.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2470.wml	2012-05-12 03:57:20.000000000 +0600
+++ russian/security/2012/dsa-2470.wml	2015-12-29 17:03:45.933771908 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities were identified in WordPress, a web blogging
- -tool.  As the CVEs were allocated from releases announcements and
- -specific fixes are usually not identified, it has been decided to
- -upgrade the wordpress package to the latest upstream version instead
- -of backporting the patches.</p>
- -
- -<p>This means extra care should be taken when upgrading, especially when
- -using third-party plugins or themes, since compatibility may have been
- -impacted along the way.  We recommend that users check their install
- -before doing the upgrade.</p>
+<p>Ð? WordPress, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? ведениÑ? блога, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?оÑ?колÑ?кÑ? иденÑ?иÑ?икаÑ?оÑ?Ñ? CVE бÑ?ли вÑ?деленÑ? в инÑ?оÑ?маÑ?ии о вÑ?пÑ?Ñ?каÑ?, а
+конкÑ?еÑ?нÑ?е иÑ?пÑ?авлениÑ? опÑ?еделенÑ? бÑ?л не могÑ?Ñ?, бÑ?ло Ñ?еÑ?ено
+обновиÑ?Ñ? пакеÑ? wordpress до поÑ?ледней веÑ?Ñ?ии оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки вмеÑ?Ñ?о
+оÑ?Ñ?Ñ?еÑ?Ñ?влениÑ? обÑ?аÑ?ного пеÑ?еноÑ?а заплаÑ?.</p>
+
+<p>ЭÑ?о ознаÑ?аеÑ?, Ñ?Ñ?о Ñ?ледÑ?еÑ? оÑ?обенно внимаÑ?елÑ?но подойÑ?и к обновлениÑ?, оÑ?обенно в Ñ?ом Ñ?лÑ?Ñ?ае,
+еÑ?ли вÑ? иÑ?полÑ?зÑ?еÑ?е дополнениÑ? или Ñ?емÑ? оÑ? Ñ?Ñ?еÑ?Ñ?иÑ? лиÑ?, Ñ?ак как Ñ?овмеÑ?Ñ?имоÑ?Ñ?Ñ? можеÑ?
+бÑ?Ñ?Ñ? наÑ?Ñ?Ñ?ена.  РекомендÑ?еÑ?Ñ?Ñ? до вÑ?полнениÑ? Ñ?Ñ?Ñ?ановки пÑ?овеÑ?иÑ?Ñ?
+Ñ?вои наÑ?Ñ?Ñ?ойки.</p>
 
- -<p>For the stable distribution (squeeze), those problems have been fixed in
- -version 3.3.2+dfsg-1~squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.3.2+dfsg-1~squeeze1.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), those problems have been fixed in version 3.3.2+dfsg-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.3.2+dfsg-1.</p>
 
- -<p>We recommend that you upgrade your wordpress packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wordpress.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2483.wml	2012-06-01 00:06:36.000000000 +0600
+++ russian/security/2012/dsa-2483.wml	2015-12-29 16:47:11.440709965 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>authentication bypass</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обÑ?од аÑ?Ñ?енÑ?иÑ?икаÑ?ии</define-tag>
 <define-tag moreinfo>
- -<p>An authentication bypass issue was discovered by the Codenomicon CROSS
- -project in strongSwan, an IPsec-based VPN solution. When using
- -RSA-based setups, a missing check in the gmp plugin could allow an
- -attacker presenting a forged signature to successfully authenticate
- -against a strongSwan responder.</p>
- -
- -<p>The default configuration in Debian does not use the gmp plugin for
- -RSA operations but rather the OpenSSL plugin, so the packages as
- -shipped by Debian are not vulnerable.</p>
- -
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 4.4.1-5.2.</p>
+<p>Ð? пÑ?оекÑ?е Codenomicon CROSS из strongSwan, Ñ?еÑ?ениÑ? длÑ? VPN на оÑ?нове IPsec, бÑ?ла
+обнаÑ?Ñ?жена пÑ?облема, Ñ?вÑ?заннаÑ? Ñ? обÑ?одом аÑ?Ñ?енÑ?иÑ?икаÑ?ии. Ð?Ñ?и иÑ?полÑ?зовании
+наÑ?Ñ?Ñ?оек на оÑ?нове RSA оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?аÑ? пÑ?овеÑ?ка в дополнении gmp можеÑ? позволиÑ?Ñ?
+злоÑ?мÑ?Ñ?ленникÑ? пÑ?едоÑ?Ñ?авиÑ?Ñ? подделÑ?нÑ?Ñ? подпиÑ?Ñ? Ñ? Ñ?елÑ?Ñ? Ñ?Ñ?пеÑ?ной аÑ?Ñ?енÑ?иÑ?икаÑ?ии
+в Ñ?лÑ?жбе оÑ?веÑ?ов strongSwan.</p>
+
+<p>Ð?о Ñ?молÑ?аниÑ? в Debian дополнение gmp длÑ? опеÑ?аÑ?ий Ñ? RSA не
+иÑ?полÑ?зÑ?еÑ?Ñ?Ñ?, вмеÑ?Ñ?о него иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? дополнение OpenSSL, поÑ?Ñ?омÑ? пакеÑ?Ñ?,
+поÑ?Ñ?авлÑ?емÑ?е Debian Ñ? наÑ?Ñ?Ñ?ойками по Ñ?молÑ?аниÑ? не подвеÑ?женÑ? Ñ?казанной пÑ?облеме.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.4.1-5.2.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 4.5.2-1.4.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.5.2-1.4.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 4.5.2-1.4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.5.2-1.4.</p>
 
- -<p>We recommend that you upgrade your strongswan packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? strongswan.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2487.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2487.wml	2015-12-29 16:40:00.398758385 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that OpenOffice.org would not properly process
- -crafted document files, possibly leading to arbitrary code execution.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о OpenOffice.org непÑ?авилÑ?ном обÑ?абаÑ?Ñ?ваеÑ?
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е докÑ?менÑ?Ñ?, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1149";>CVE-2012-1149</a>
 
- -	<p>Integer overflows in PNG image handling.</p></li>
+	<p>Ð?еÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде обÑ?абоÑ?ки изобÑ?ажений в Ñ?оÑ?маÑ?е PNG.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2334";>CVE-2012-2334</a>
 
- -	<p>Integer overflow in operator new[] invocation and heap-based
- -	buffer overflow inside the MS-ODRAW parser.</p></li>
+	<p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в вÑ?зове опеÑ?аÑ?оÑ?а new[] и пеÑ?еполнение динамиÑ?еÑ?кой
+	памÑ?Ñ?и в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а MS-ODRAW.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1:3.2.1-11+squeeze6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:3.2.1-11+squeeze6.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1:3.5.2~rc2-1 of the libreoffice package.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:3.5.2~rc2-1 пакеÑ?а libreoffice.</p>
 
- -<p>We recommend that you upgrade your openoffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openoffice.org.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2494.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2494.wml	2015-12-29 17:06:11.555762614 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that FFmpeg, Debian's version of the Libav media
- -codec suite, contains vulnerabilities in the DPCM codecs
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о FFmpeg, веÑ?Ñ?иÑ? набоÑ?а кодеков Libav длÑ? Debian,
+Ñ?одеÑ?жиÑ? Ñ?Ñ?звимоÑ?Ñ?и в кодекаÑ? DPCM
 (<a href="https://security-tracker.debian.org/tracker/CVE-2011-3951";>CVE-2011-3951</a>),
 H.264 (<a href="https://security-tracker.debian.org/tracker/CVE-2012-0851";>CVE-2012-0851</a>),
- -ADPCM (<a href="https://security-tracker.debian.org/tracker/CVE-2012-0852";>CVE-2012-0852</a>), and the
- -KMVC decoder (<a href="https://security-tracker.debian.org/tracker/CVE-2011-3952";>CVE-2011-3952</a>).</p>
+ADPCM (<a href="https://security-tracker.debian.org/tracker/CVE-2012-0852";>CVE-2012-0852</a>) и
+декодеÑ?е KMVC (<a href="https://security-tracker.debian.org/tracker/CVE-2011-3952";>CVE-2011-3952</a>).</p>
 
- -<p>In addition, this update contains bug fixes from the Libav 0.5.9
- -upstream release.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление Ñ?одеÑ?жиÑ? иÑ?пÑ?авлениÑ? оÑ?ибок из вÑ?пÑ?Ñ?ка оÑ?новной
+веÑ?ки Ñ?азÑ?абоÑ?ки 0.5.9.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 4:0.5.9-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4:0.5.9-1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 6:0.8.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 6:0.8.3-1.</p>
 
- -<p>We recommend that you upgrade your ffmpeg packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ffmpeg.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2506.wml	2012-07-04 21:01:42.000000000 +0600
+++ russian/security/2012/dsa-2506.wml	2015-12-29 17:16:12.253734328 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>ModSecurity bypass</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обÑ?од ModSecurity</define-tag>
 <define-tag moreinfo>
- -<p>Qualys Vulnerability &amp; Malware Research Labs discovered a vulnerability in
- -ModSecurity, a security module for the Apache webserver. In situations where
- -both <q>Content:Disposition: attachment</q> and <q>Content-Type: multipart</q> were
- -present in HTTP headers, the vulnerability could allow an attacker to bypass
- -policy and execute cross-site script (XSS) attacks through properly crafted
- -HTML documents.</p>
- -
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.5.12-1+squeeze1.</p>
+<p>СоÑ?Ñ?Ñ?дники Qualys Vulnerability &amp; Malware Research Labs обнаÑ?Ñ?жили Ñ?Ñ?звимоÑ?Ñ?Ñ? в
+ModSecurity, модÑ?ле безопаÑ?ноÑ?Ñ?и длÑ? веб-Ñ?еÑ?веÑ?а Apache. Ð? Ñ?иÑ?Ñ?аÑ?иÑ?Ñ?, когда
+в заголовкаÑ? HTTP одновÑ?еменно Ñ?одеÑ?жаÑ?Ñ?Ñ? и <q>Content:Disposition: attachment</q>,
+и <q>Content-Type: multipart</q>, Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникÑ? обойÑ?и
+пÑ?авило и вÑ?полниÑ?Ñ? аÑ?акÑ? Ñ?еÑ?ез межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? докÑ?менÑ?ов в Ñ?оÑ?маÑ?е HTML.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.5.12-1+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 2.6.6-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.6.6-1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.6.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.6.6-1.</p>
 
- -<p>In testing and unstable distribution, the source package has been renamed to
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом и неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?каÑ? пакеÑ? Ñ? иÑ?Ñ?однÑ?м кодом бÑ?л пеÑ?еименован в
 modsecurity-apache.</p>
 
- -<p>We recommend that you upgrade your libapache-mod-security packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libapache-mod-security.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2510.wml	2012-07-13 06:52:36.000000000 +0600
+++ russian/security/2012/dsa-2510.wml	2015-12-29 17:24:01.929754776 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>Cross-site request forgery</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>подделка межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов</define-tag>
 <define-tag moreinfo>
- -<p>John Leitch has discovered a vulnerability in eXtplorer, a very feature
- -rich web server file manager, which can be exploited by malicious people
- -to conduct cross-site request forgery attacks.</p>
+<p>Ð?жон Ð?ейÑ? обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в eXtplorer, многоÑ?Ñ?нкÑ?ионалÑ?ном
+Ñ?айловом менеджеÑ?е длÑ? веб-Ñ?еÑ?веÑ?а, коÑ?оÑ?аÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? злоÑ?мÑ?Ñ?ленниками
+длÑ? вÑ?полнениÑ? аÑ?ак по подделке межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов.</p>
 
- -<p>The vulnerability allows users to perform certain actions via HTTP requests 
- -without performing any validity checks to verify the request. This can be 
- -exploited for example, to create an administrative user account by tricking
- -an logged administrator to visiting an attacker-defined web link.</p>
+<p>УÑ?звимоÑ?Ñ?Ñ? позволÑ?еÑ? полÑ?зоваÑ?елÑ?м вÑ?полниÑ?Ñ? опÑ?еделÑ?ннÑ?е дейÑ?Ñ?виÑ? Ñ? помоÑ?Ñ?Ñ?
+HTTP-запÑ?оÑ?ов без вÑ?полнениÑ? какиÑ?-либо пÑ?оекÑ?ов Ñ?Ñ?иÑ? запÑ?оÑ?ов. ЭÑ?о можеÑ?
+иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?, напÑ?имеÑ?, длÑ? Ñ?озданиÑ? полÑ?зоваÑ?елÑ? Ñ? пÑ?авами админиÑ?Ñ?Ñ?аÑ?оÑ?а, еÑ?ли воÑ?едÑ?ий
+админиÑ?Ñ?Ñ?аÑ?оÑ? оÑ?кÑ?оеÑ? Ñ?Ñ?Ñ?лкÑ? злоÑ?мÑ?Ñ?ленника.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.1.0b6+dfsg.2-1+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.1.0b6+dfsg.2-1+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 2.1.0b6+dfsg.3-3.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.1.0b6+dfsg.3-3.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.1.0b6+dfsg.3-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.1.0b6+dfsg.3-3.</p>
 
- -<p>We recommend that you upgrade your extplorer packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? extplorer.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2520.wml	2012-08-04 21:30:19.000000000 +0600
+++ russian/security/2012/dsa-2520.wml	2015-12-29 16:34:10.741569999 +0500
@@ -1,23 +1,24 @@
- -<define-tag description>Multiple heap-based buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Timo Warns from PRE-CERT discovered multiple heap-based buffer overflows in
- -OpenOffice.org, an office productivity suite. The issues lies in the XML
- -manifest encryption tag parsing code. Using specially crafted files, an
- -attacker can cause application crash and could cause arbitrary code execution.</p>
+<p>Тимо УоÑ?нÑ? из PRE-CERT обнаÑ?Ñ?жил многоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и в
+OpenOffice.org, набоÑ?е длÑ? оÑ?иÑ?ной Ñ?абоÑ?Ñ?. Ð?Ñ?облемÑ? обнаÑ?Ñ?женÑ? в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого
+Ñ?азбоÑ?а обÑ?Ñ?влений Ñ?иÑ?Ñ?ованиÑ? XML. Ð?Ñ?полÑ?зÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е Ñ?айлÑ?, злоÑ?мÑ?Ñ?ленник
+можеÑ? вÑ?зваÑ?Ñ? аваÑ?ийное завеÑ?Ñ?ение Ñ?абоÑ?Ñ? пÑ?иложениÑ? и вÑ?полнение пÑ?оизволÑ?ного кода.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1:3.2.1-11+squeeze7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:3.2.1-11+squeeze7.</p>
 
- -<p>openoffice.org package has been replaced by libreoffice in testing (wheezy) and
- -unstable (sid) distributions.</p>
+<p>Ð?акеÑ? openoffice.org бÑ?л заменÑ?н на пакеÑ? libreoffice в Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и
+неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 1:3.5.4-7.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:3.5.4-7.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:3.5.4-7.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:3.5.4-7.</p>
 
- -<p>We recommend that you upgrade your openoffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openoffice.org.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2527.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2527.wml	2015-12-29 17:08:56.201886647 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in PHP, the web scripting
- -language. The Common Vulnerabilities and Exposures project identifies
- -the following issues:</p>
+<p>Ð? PHP, Ñ?зÑ?ке длÑ? напиÑ?аниÑ? веб-Ñ?Ñ?енаÑ?иев, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2688";>CVE-2012-2688</a>
 
- -   <p>A buffer overflow in the scandir() function could lead to denial of
- -   service or the execution of arbitrary code.</p></li>
+   <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии scandir() можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в
+   обÑ?лÑ?живании или вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3450";>CVE-2012-3450</a>
 
- -   <p>It was discovered that inconsistent parsing of PDO prepared
- -   statements could lead to denial of service.</p></li>
+   <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о некоÑ?Ñ?екÑ?нÑ?й гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? подгоÑ?овленнÑ?Ñ? PDO
+   Ñ?Ñ?веÑ?ждений можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 5.3.3-7+squeeze14.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.3.3-7+squeeze14.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 5.4.4-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.4.4-4.</p>
 
- -<p>We recommend that you upgrade your php5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php5.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2550.wml	2012-09-26 23:28:01.000000000 +0600
+++ russian/security/2012/dsa-2550.wml	2015-12-29 17:33:14.712040759 +0500
@@ -1,23 +1,24 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Asterisk, a PBX and telephony
- -toolkit, allowing privilege escalation in the Asterisk Manager, denial of
- -service or privilege escalation.</p>
+<p>Ð? Asterisk, набоÑ?е инÑ?Ñ?Ñ?Ñ?менÑ?ов длÑ? оÑ?иÑ?нÑ?Ñ? Ð?ТС и Ñ?елеÑ?онии, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, позволÑ?Ñ?Ñ?иÑ? вÑ?полнÑ?Ñ?Ñ? повÑ?Ñ?ение пÑ?ивилегий в менеджеÑ?е Asterisk, вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+в обÑ?лÑ?живании или повÑ?Ñ?аÑ?Ñ? пÑ?ивилегии.</p>
 
- -<p>More detailed information can be found in the Asterisk advisories:
+<p>Ð?одÑ?обноÑ?Ñ?и можно найÑ?и в Ñ?екомендаÑ?иÑ?Ñ? Asterisk:
 <a href="http://downloads.asterisk.org/pub/security/AST-2012-010.html";>AST-2012-010</a>,
 <a href="http://downloads.asterisk.org/pub/security/AST-2012-011.html";>AST-2012-011</a>,
- -<a href="http://downloads.asterisk.org/pub/security/AST-2012-012.html";>AST-2012-012</a>, and
+<a href="http://downloads.asterisk.org/pub/security/AST-2012-012.html";>AST-2012-012</a> и
 <a href="http://downloads.asterisk.org/pub/security/AST-2012-013.html";>AST-2012-013</a>.
 </p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 1:1.6.2.9-2+squeeze8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:1.6.2.9-2+squeeze8.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution (sid),
- -these problems have been fixed in version 1:1.8.13.1~dfsg-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1:1.8.13.1~dfsg-1.</p>
 
- -<p>We recommend that you upgrade your asterisk packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? asterisk.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2570.wml	2012-11-01 03:11:42.000000000 +0600
+++ russian/security/2012/dsa-2570.wml	2015-12-29 16:43:07.278937280 +0500
@@ -1,24 +1,25 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>High-Tech Bridge SA Security Research Lab discovered multiple null-pointer
- -dereferences based vulnerabilities in OpenOffice.org which could cause
- -application crash or even arbitrary code execution using specially crafted
- -files. Affected file types are LWP (Lotus Word Pro), ODG, PPT (PowerPoint
- -2003) and XLS (Excel 2003).</p>
+<p>СоÑ?Ñ?Ñ?дники High-Tech Bridge SA Security Research Lab обнаÑ?Ñ?жили многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и,
+Ñ?вÑ?заннÑ?е Ñ? Ñ?азÑ?менованием null-Ñ?казаÑ?елÑ?, в OpenOffice.org, коÑ?оÑ?Ñ?е могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ?
+аваÑ?ийное завеÑ?Ñ?ение Ñ?абоÑ?Ñ? пÑ?иложениÑ? или даже вÑ?полнение пÑ?оизволÑ?ного кода пÑ?и иÑ?полÑ?зовании Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов. УÑ?звимоÑ?Ñ?и пÑ?оÑ?влÑ?Ñ?Ñ?Ñ?Ñ? пÑ?и обÑ?абоÑ?ке Ñ?айлов LWP (Lotus Word Pro), ODG, PPT (PowerPoint
+2003) и XLS (Excel 2003).</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1:3.2.1-11+squeeze8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:3.2.1-11+squeeze8.</p>
 
- -<p>openoffice.org package has been replaced by libreoffice in testing (wheezy)
- -and unstable (sid) distributions.</p>
+<p>Ð?акеÑ? openoffice.org бÑ?ла заменÑ?н на пакеÑ? libreoffice в Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy)
+и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 1:3.5.4+dfsg-3.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:3.5.4+dfsg-3.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:3.5.4+dfsg-3.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:3.5.4+dfsg-3.</p>
 
- -<p>We recommend that you upgrade your openoffice.org packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openoffice.org.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=T8UN
-----END PGP SIGNATURE-----


Reply to: