[DONE] wml://security/2011/dsa-2{367,334,251}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2011/dsa-2251.wml 2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2251.wml 2016-07-09 19:20:50.424113667 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Subversion, the version
- -control system. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Subversion, Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1752">CVE-2011-1752</a>
- - <p>The mod_dav_svn Apache HTTPD server module can be crashed though
- - when asked to deliver baselined WebDAV resources.</p></li>
+ <p>Ð?одÑ?лÑ? mod_dav_svn Ñ?еÑ?веÑ?а Apache HTTPD можеÑ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?воÑ? Ñ?абоÑ?Ñ? пÑ?и
+ запÑ?оÑ?е пеÑ?едаÑ?Ñ? Ñ?компонованнÑ?е WebDAV-Ñ?еÑ?Ñ?Ñ?Ñ?Ñ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1783">CVE-2011-1783</a>
- - <p>The mod_dav_svn Apache HTTPD server module can trigger a loop which
- - consumes all available memory on the system.</p></li>
+ <p>Ð?одÑ?лÑ? mod_dav_svn Ñ?еÑ?веÑ?а Apache HTTPD можеÑ? вÑ?зÑ?ваÑ?Ñ? Ñ?икл, коÑ?оÑ?Ñ?й
+ поÑ?Ñ?еблÑ?еÑ? вÑ?Ñ? доÑ?Ñ?Ñ?пнÑ?Ñ? в Ñ?иÑ?Ñ?еме памÑ?Ñ?Ñ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1921">CVE-2011-1921</a>
- - <p>The mod_dav_svn Apache HTTPD server module may leak to remote users
- - the file contents of files configured to be unreadable by those
- - users.</p></li>
+ <p>Ð?одÑ?лÑ? mod_dav_svn Ñ?еÑ?веÑ?а Apache HTTPD можеÑ? пеÑ?едаваÑ?Ñ? Ñ?далÑ?ннÑ?м
+ полÑ?зоваÑ?елÑ?м Ñ?одеÑ?жимое Ñ?айлов, длÑ? коÑ?оÑ?Ñ?Ñ? имеÑ?Ñ?Ñ?Ñ? наÑ?Ñ?Ñ?ойки, не позволÑ?Ñ?Ñ?ие
+ Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? иÑ? Ñ?Ñ?им полÑ?зоваÑ?елÑ?м.</p></li>
</ul>
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.5.1dfsg1-7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.5.1dfsg1-7.</p>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.6.12dfsg-6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.6.12dfsg-6.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.6.17dfsg-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.6.17dfsg-1.</p>
- -<p>We recommend that you upgrade your subversion packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? subversion.</p>
</define-tag>
# do not modify the following line
- --- english/security/2011/dsa-2334.wml 2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2334.wml 2016-07-09 19:16:29.962443288 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Mahara, an electronic portfolio,
- -weblog, and resume builder:</p>
+<p>Ð? Mahara, Ñ?лекÑ?Ñ?онном поÑ?Ñ?Ñ?олио, блоге и пÑ?огÑ?амме поÑ?Ñ?Ñ?оениÑ? Ñ?езÑ?ме, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2771">CVE-2011-2771</a>
- - <p>Teemu Vesala discovered that missing input sanitising of RSS
- - feeds could lead to cross-site scripting.</p></li>
+ <p>ТимÑ? Ð?аÑ?ала обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в RSS-каналаÑ?
+ можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2772">CVE-2011-2772</a>
- - <p>Richard Mansfield discovered that insufficient upload restrictions
- - allowed denial of service.</p></li>
+ <p>РиÑ?аÑ?д Ð?Ñ?нÑ?Ñ?илд обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?нÑ?е огÑ?аниÑ?ениÑ? загÑ?Ñ?зки
+ позволÑ?Ñ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2773">CVE-2011-2773</a>
- - <p>Richard Mansfield discovered that the management of institutions was prone to
- - cross-site request forgery.</p></li>
+ <p>РиÑ?аÑ?д Ð?Ñ?нÑ?Ñ?илд обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пÑ?авление обÑ?единениÑ?ми подвеÑ?жено
+ подделке межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов.</p></li>
- -<li>(no CVE ID available yet)
+<li>(Ð?денÑ?иÑ?икаÑ?оÑ? CVE пока недоÑ?Ñ?Ñ?пен)
- - <p>Andrew Nichols discovered a privilege escalation vulnerability
- - in MNet handling.</p></li>
+ <p>ÐндÑ?Ñ? Ð?иÑ?олÑ? обнаÑ?Ñ?жил повÑ?Ñ?ение пÑ?ивилегий
+ в коде обÑ?абоÑ?ки MNet.</p></li>
</ul>
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.0.4-4+lenny11.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.4-4+lenny11.</p>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.2.6-2+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.6-2+squeeze3.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.4.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4.1-1.</p>
- -<p>We recommend that you upgrade your mahara packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mahara.</p>
</define-tag>
# do not modify the following line
- --- english/security/2011/dsa-2367.wml 2014-04-30 13:16:26.000000000 +0600
+++ russian/security/2011/dsa-2367.wml 2016-07-09 19:09:18.173173061 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Asterisk, an Open
- -Source PBX and telephony toolkit:</p>
+<p>Ð? Asterisk, набоÑ?е инÑ?Ñ?Ñ?Ñ?менÑ?ов длÑ? PBX и Ñ?елеÑ?онии Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м иÑ?Ñ?однÑ?м
+кодом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4597">CVE-2011-4597</a>
- - <p>Ben Williams discovered that it was possible to enumerate SIP
- - user names in some configurations. Please see the <a
- - href="http://downloads.asterisk.org/pub/security/AST-2011-013.html">upstream
- - advisory</a> for details.</p>
- -
- - <p>This update only modifies the sample sip.conf configuration
- - file. Please see README.Debian for more information on how
- - to update your installation.</p></li>
+ <p>Ð?ен УилÑ?Ñ?мÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?и некоÑ?оÑ?Ñ?Ñ? наÑ?Ñ?Ñ?ойкаÑ? можно пеÑ?еÑ?иÑ?лиÑ?Ñ? имена полÑ?зоваÑ?елей
+ SIP. Ð?а подÑ?обноÑ?Ñ?Ñ?ми обÑ?аÑ?айÑ?еÑ?Ñ? к <a
+ href="http://downloads.asterisk.org/pub/security/AST-2011-013.html">Ñ?екомендаÑ?ии из
+ оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки</a>.</p>
+
+ <p>Ð?анное обновление лиÑ?Ñ? изменÑ?еÑ? пÑ?имеÑ? Ñ?айла наÑ?Ñ?Ñ?оек,
+ sip.conf. Ð?ополниÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? о Ñ?ом, как обновиÑ?Ñ? ваÑ?Ñ? Ñ?иÑ?Ñ?емÑ?
+ Ñ?моÑ?Ñ?иÑ?е в README.Debian.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4598">CVE-2011-4598</a>
- - <p>Kristijan Vrban discovered that Asterisk can be crashed with
- - malformed SIP packets if the <q>automon</q> feature is enabled.</p></li>
+ <p>Ð?Ñ?иÑ?Ñ?иÑ?н Ð?Ñ?бан обнаÑ?Ñ?жил, Ñ?Ñ?о Asterisk можеÑ? аваÑ?ийно завеÑ?Ñ?аÑ?Ñ? Ñ?воÑ? Ñ?абоÑ?Ñ? из-за
+ некоÑ?Ñ?екÑ?нÑ?Ñ? SIP-пакеÑ?ов в Ñ?лÑ?Ñ?ае вклÑ?Ñ?ениÑ? <q>automon</q>.</p></li>
</ul>
- -
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1:1.4.21.2~dfsg-3+lenny6.</p>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1:1.6.2.9-2+squeeze4.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.4.21.2~dfsg-3+lenny6.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:1.8.8.0~dfsg-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.6.2.9-2+squeeze4.</p>
- -<p>We recommend that you upgrade your asterisk packages.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.8.8.0~dfsg-1.</p>
+
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? asterisk.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=pmJY
-----END PGP SIGNATURE-----
Reply to: