[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-2{367,334,251}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2251.wml	2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2251.wml	2016-07-09 19:20:50.424113667 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Subversion, the version
- -control system. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Subversion, Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1752";>CVE-2011-1752</a>
 
- -    <p>The mod_dav_svn Apache HTTPD server module can be crashed though
- -    when asked to deliver baselined WebDAV resources.</p></li>
+    <p>Ð?одÑ?лÑ? mod_dav_svn Ñ?еÑ?веÑ?а Apache HTTPD можеÑ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?воÑ? Ñ?абоÑ?Ñ? пÑ?и
+    запÑ?оÑ?е пеÑ?едаÑ?Ñ? Ñ?компонованнÑ?е WebDAV-Ñ?еÑ?Ñ?Ñ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1783";>CVE-2011-1783</a>
 
- -    <p>The mod_dav_svn Apache HTTPD server module can trigger a loop which
- -    consumes all available memory on the system.</p></li>
+    <p>Ð?одÑ?лÑ? mod_dav_svn Ñ?еÑ?веÑ?а Apache HTTPD можеÑ? вÑ?зÑ?ваÑ?Ñ? Ñ?икл, коÑ?оÑ?Ñ?й
+    поÑ?Ñ?еблÑ?еÑ? вÑ?Ñ? доÑ?Ñ?Ñ?пнÑ?Ñ? в Ñ?иÑ?Ñ?еме памÑ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1921";>CVE-2011-1921</a>
 
- -    <p>The mod_dav_svn Apache HTTPD server module may leak to remote users
- -    the file contents of files configured to be unreadable by those
- -    users.</p></li>
+    <p>Ð?одÑ?лÑ? mod_dav_svn Ñ?еÑ?веÑ?а Apache HTTPD можеÑ? пеÑ?едаваÑ?Ñ? Ñ?далÑ?ннÑ?м
+    полÑ?зоваÑ?елÑ?м Ñ?одеÑ?жимое Ñ?айлов, длÑ? коÑ?оÑ?Ñ?Ñ? имеÑ?Ñ?Ñ?Ñ? наÑ?Ñ?Ñ?ойки, не позволÑ?Ñ?Ñ?ие
+    Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? иÑ? Ñ?Ñ?им полÑ?зоваÑ?елÑ?м.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.5.1dfsg1-7.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.5.1dfsg1-7.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.6.12dfsg-6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.6.12dfsg-6.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.6.17dfsg-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.6.17dfsg-1.</p>
 
- -<p>We recommend that you upgrade your subversion packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? subversion.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2334.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2334.wml	2016-07-09 19:16:29.962443288 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Mahara, an electronic portfolio, 
- -weblog, and resume builder:</p>
+<p>Ð? Mahara, Ñ?лекÑ?Ñ?онном поÑ?Ñ?Ñ?олио, блоге и пÑ?огÑ?амме поÑ?Ñ?Ñ?оениÑ? Ñ?езÑ?ме, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2771";>CVE-2011-2771</a>
 
- -   <p>Teemu Vesala discovered that missing input sanitising of RSS
- -   feeds could lead to cross-site scripting.</p></li>
+   <p>ТимÑ? Ð?аÑ?ала обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в RSS-каналаÑ?
+   можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2772";>CVE-2011-2772</a>
 
- -   <p>Richard Mansfield discovered that insufficient upload restrictions
- -   allowed denial of service.</p></li>
+   <p>РиÑ?аÑ?д Ð?Ñ?нÑ?Ñ?илд обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?нÑ?е огÑ?аниÑ?ениÑ? загÑ?Ñ?зки
+   позволÑ?Ñ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2773";>CVE-2011-2773</a>
 
- -   <p>Richard Mansfield discovered that the management of institutions was prone to
- -   cross-site request forgery.</p></li>
+   <p>РиÑ?аÑ?д Ð?Ñ?нÑ?Ñ?илд обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пÑ?авление обÑ?единениÑ?ми подвеÑ?жено
+   подделке межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов.</p></li>
 
- -<li>(no CVE ID available yet)
+<li>(Ð?денÑ?иÑ?икаÑ?оÑ? CVE пока недоÑ?Ñ?Ñ?пен)
 
- -   <p>Andrew Nichols discovered a privilege escalation vulnerability
- -   in MNet handling.</p></li>
+   <p>ЭндÑ?Ñ? Ð?иÑ?олÑ? обнаÑ?Ñ?жил повÑ?Ñ?ение пÑ?ивилегий
+   в коде обÑ?абоÑ?ки MNet.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.0.4-4+lenny11.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.4-4+lenny11.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.2.6-2+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.6-2+squeeze3.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.4.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4.1-1.</p>
 
- -<p>We recommend that you upgrade your mahara packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mahara.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2367.wml	2014-04-30 13:16:26.000000000 +0600
+++ russian/security/2011/dsa-2367.wml	2016-07-09 19:09:18.173173061 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Asterisk, an Open 
- -Source PBX and telephony toolkit:</p>
+<p>Ð? Asterisk, набоÑ?е инÑ?Ñ?Ñ?Ñ?менÑ?ов длÑ? PBX и Ñ?елеÑ?онии Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м иÑ?Ñ?однÑ?м
+кодом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4597";>CVE-2011-4597</a>
 
- -   <p>Ben Williams discovered that it was possible to enumerate SIP
- -   user names in some configurations. Please see the <a
- -   href="http://downloads.asterisk.org/pub/security/AST-2011-013.html";>upstream
- -   advisory</a> for details.</p>
- -   
- -   <p>This update only modifies the sample sip.conf configuration
- -   file. Please see README.Debian for more information on how
- -   to update your installation.</p></li>
+   <p>Ð?ен УилÑ?Ñ?мÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?и некоÑ?оÑ?Ñ?Ñ? наÑ?Ñ?Ñ?ойкаÑ? можно пеÑ?еÑ?иÑ?лиÑ?Ñ? имена полÑ?зоваÑ?елей
+   SIP. Ð?а подÑ?обноÑ?Ñ?Ñ?ми обÑ?аÑ?айÑ?еÑ?Ñ? к <a
+   href="http://downloads.asterisk.org/pub/security/AST-2011-013.html";>Ñ?екомендаÑ?ии из
+   оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки</a>.</p>
+
+   <p>Ð?анное обновление лиÑ?Ñ? изменÑ?еÑ? пÑ?имеÑ? Ñ?айла наÑ?Ñ?Ñ?оек,
+   sip.conf. Ð?ополниÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? о Ñ?ом, как обновиÑ?Ñ? ваÑ?Ñ? Ñ?иÑ?Ñ?емÑ?
+   Ñ?моÑ?Ñ?иÑ?е в README.Debian.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4598";>CVE-2011-4598</a>
 
- -   <p>Kristijan Vrban discovered that Asterisk can be crashed with
- -   malformed SIP packets if the <q>automon</q> feature is enabled.</p></li>
+   <p>Ð?Ñ?иÑ?Ñ?иÑ?н Ð?Ñ?бан обнаÑ?Ñ?жил, Ñ?Ñ?о Asterisk можеÑ? аваÑ?ийно завеÑ?Ñ?аÑ?Ñ? Ñ?воÑ? Ñ?абоÑ?Ñ? из-за
+   некоÑ?Ñ?екÑ?нÑ?Ñ? SIP-пакеÑ?ов в Ñ?лÑ?Ñ?ае вклÑ?Ñ?ениÑ? <q>automon</q>.</p></li>
 
 </ul>
 
- - 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1:1.4.21.2~dfsg-3+lenny6.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1:1.6.2.9-2+squeeze4.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.4.21.2~dfsg-3+lenny6.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:1.8.8.0~dfsg-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.6.2.9-2+squeeze4.</p>
 
- -<p>We recommend that you upgrade your asterisk packages.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.8.8.0~dfsg-1.</p>
+
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? asterisk.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=pmJY
-----END PGP SIGNATURE-----


Reply to: