[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-2{193,281,287}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2193.wml	2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2193.wml	2016-07-09 17:58:00.970732821 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several issues have been discovered in libcgroup, a library to control
- -and monitor control groups:</p>
+<p>Ð? libcgroup, библиоÑ?еке длÑ? Ñ?пÑ?авлениÑ? и оÑ?Ñ?леживаниÑ? cgroups, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1006";>CVE-2011-1006</a>
 
- -   <p>Heap-based buffer overflow by converting list of controllers for
- -   given task into an array of strings could lead to privilege
- -   escalation by a local attacker.</p></li>
+   <p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и из-за пÑ?еобÑ?азованиÑ? Ñ?пиÑ?ка конÑ?Ñ?оллеÑ?ов длÑ?
+   данной задаÑ?и в маÑ?Ñ?ив Ñ?Ñ?Ñ?ок можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ?
+   пÑ?ивилегий локалÑ?ного злоÑ?мÑ?Ñ?ленника.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1022";>CVE-2011-1022</a>
 
- -    <p>libcgroup did not properly check the origin of Netlink messages,
- -    allowing a local attacker to send crafted Netlink messages which
- -    could lead to privilege escalation.</p></li>
+    <p>libcgroup непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? иÑ?Ñ?оÑ?ника Ñ?ообÑ?ений Netlink,
+    Ñ?Ñ?о позволÑ?еÑ? локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е Ñ?ообÑ?ениÑ? Netlink,
+    коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (lenny) does not contain libcgroup packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) пакеÑ?Ñ? libcgroup оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 0.36.2-3+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.36.2-3+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy) and unstable distribution (sid),
- -this problem will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your libcgroup packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libcgroup.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2281.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2281.wml	2016-07-09 18:04:33.249166301 +0500
@@ -1,26 +1,27 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Sebastian Krahmer discovered that opie, a system that makes it simple to use 
- -One-Time passwords in applications, is prone to a privilege escalation 
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2011-2490";>CVE-2011-2490</a>) 
- -and an off-by-one error, which can lead to the execution of arbitrary code 
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2011-2489";>CVE-2011-2489</a>). 
- -Adam Zabrocki and Maksymilian Arciemowicz also discovered another off-by-one 
- -error 
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2010-1938";>CVE-2010-1938</a>), 
- -which only affects the lenny version as the fix was already included in 
- -squeeze.</p>
+<p>СебаÑ?Ñ?иан Ð?Ñ?амеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о opie, Ñ?иÑ?Ñ?ема, Ñ?пÑ?оÑ?аÑ?Ñ?аÑ? иÑ?полÑ?зование
+одноÑ?азовÑ?Ñ? паÑ?олей в пÑ?иложениÑ?Ñ?, Ñ?Ñ?звима к повÑ?Ñ?ениÑ? пÑ?ивилегий
+(<a href="https://security-tracker.debian.org/tracker/CVE-2011-2490";>CVE-2011-2490</a>)
+и оÑ?ибке на единиÑ?Ñ?, коÑ?оÑ?аÑ? можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода
+(<a href="https://security-tracker.debian.org/tracker/CVE-2011-2489";>CVE-2011-2489</a>).
+Ð?дам Ð?абÑ?оÑ?кий и Ð?акÑ?имилиан Ð?Ñ?Ñ?емовиÑ? Ñ?акже обнаÑ?Ñ?жили еÑ?Ñ? однÑ? оÑ?ибкÑ? на
+единиÑ?Ñ?
+(<a href="https://security-tracker.debian.org/tracker/CVE-2010-1938";>CVE-2010-1938</a>),
+коÑ?оÑ?аÑ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко веÑ?Ñ?ии из вÑ?пÑ?Ñ?ка lenny, в вÑ?пÑ?Ñ?ке squeeze иÑ?пÑ?авление длÑ?
+неÑ? Ñ?же вклÑ?Ñ?ено.</p>
 
- -<p>For the oldstable distribution (lenny), these problems have been fixed in
- -version 2.32-10.2+lenny2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.32-10.2+lenny2.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 2.32.dfsg.1-0.2+squeeze1</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?обемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.32.dfsg.1-0.2+squeeze1</p>
 
- -<p>The testing distribution (wheezy) and the unstable distribution (sid) do
- -not contain opie.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+пакеÑ? opie оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>We recommend that you upgrade your opie packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? opie.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2287.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2287.wml	2016-07-09 18:09:29.149194833 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>The PNG library libpng has been affected by several vulnerabilities. The most 
- -critical one is the identified as 
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о libpng, библиоÑ?ека PNG, подвеÑ?жена неÑ?колÑ?ким Ñ?Ñ?звимоÑ?Ñ?Ñ?м. Ð?аиболее
+кÑ?иÑ?иÑ?ной Ñ?влÑ?еÑ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?
 <a href="https://security-tracker.debian.org/tracker/CVE-2011-2690";>\
- -CVE-2011-2690</a>. Using this vulnerability, an attacker is able to overwrite 
- -memory with an arbitrary amount of data controlled by her via a crafted PNG 
- -image.</p>
- -
- -<p>The other vulnerabilities are less critical and allow an attacker to 
- -cause a crash in the program (denial of service) via a crafted PNG 
- -image.</p>
- -
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.2.27-2+lenny5. Due to a technical limitation in the Debian
- -archive processing scripts, the updated packages cannot be released
- -in parallel with the packages for Squeeze. They will appear shortly.</p>
+CVE-2011-2690</a>. Ð?Ñ?полÑ?зÑ?Ñ? еÑ?, злоÑ?мÑ?Ñ?ленник можеÑ? пеÑ?езапиÑ?аÑ?Ñ? Ñ?одеÑ?жимое
+памÑ?Ñ?и, заменив его на пÑ?оизволÑ?нÑ?й обÑ?Ñ?м Ñ?обÑ?Ñ?веннÑ?Ñ? даннÑ?Ñ?, Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+изобÑ?ажениÑ? в Ñ?оÑ?маÑ?еPNG.</p>
+
+<p>Ð?Ñ?Ñ?гие Ñ?Ñ?звимоÑ?Ñ?и менее кÑ?иÑ?иÑ?нÑ?, они позволÑ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленникÑ?
+вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? пÑ?огÑ?аммÑ? (оÑ?каз в обÑ?лÑ?живании) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованного изобÑ?ажениÑ? в Ñ?оÑ?маÑ?е PNG.</p>
+
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.27-2+lenny5. Ð?з-за Ñ?еÑ?ниÑ?еÑ?кого огÑ?аниÑ?ениÑ? в Ñ?Ñ?енаÑ?иÑ?Ñ? обÑ?абоÑ?ки
+аÑ?Ñ?ива Debian обновлÑ?ннÑ?е пакеÑ?Ñ? нелÑ?зÑ? вÑ?пÑ?Ñ?Ñ?иÑ?Ñ? одновÑ?еменно
+Ñ? пакеÑ?ами длÑ? Squeeze. Ð?бновлÑ?ннÑ?е пакеÑ?Ñ? поÑ?вÑ?Ñ?Ñ?Ñ? в Ñ?коÑ?ом вÑ?емени.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.2.44-1+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.44-1+squeeze1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.2.46-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.46-1.</p>
 
- -<p>We recommend that you upgrade your libpng packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libpng.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=fiNs
-----END PGP SIGNATURE-----


Reply to: