[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{380,379,491}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2379.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2379.wml	2016-08-01 00:15:39.213531438 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that the Key Distribution Center (KDC) in Kerberos 5
- -crashes when processing certain crafted requests:</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Key Distribution Center (KDC, Ñ?енÑ?Ñ? Ñ?аÑ?пÑ?оÑ?Ñ?Ñ?анениÑ? клÑ?Ñ?ей) в Kerberos 5
+аваÑ?ийно завеÑ?Ñ?аеÑ? Ñ?воÑ? Ñ?абоÑ?Ñ? пÑ?и обÑ?абоÑ?ке опÑ?еделÑ?ннÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? запÑ?оÑ?ов:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1528";>CVE-2011-1528</a>
 
- -	<p>When the LDAP backend is used, remote users can trigger
- -	a KDC daemon crash and denial of service.</p></li>
+	<p>Ð?Ñ?ли иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? движок LDAP, Ñ?о Ñ?далÑ?ннÑ?е полÑ?зоваÑ?ели могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ?
+	аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? Ñ?лÑ?жбÑ? KDC и оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1529";>CVE-2011-1529</a>
 
- -	<p>When the LDAP or Berkeley DB backend is used, remote users
- -	can trigger a NULL pointer dereference in the KDC daemon
- -	and a denial of service.</p></li>
+	<p>Ð?Ñ?ли иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? движок LDAP или Berkeley DB, Ñ?о Ñ?далÑ?ннÑ?е полÑ?зоваÑ?ели
+	могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ? в Ñ?лÑ?жбе KDC
+	и оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (lenny) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (lenny) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 1.8.3+dfsg-4squeeze5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.8.3+dfsg-4squeeze5.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 1.10+dfsg~alpha1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.10+dfsg~alpha1-1.</p>
 
- -<p>We recommend that you upgrade your krb5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? krb5.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2380.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2380.wml	2016-08-01 00:11:08.922505353 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>shell command injection</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>инÑ?екÑ?иÑ? командÑ? командной оболоÑ?ки</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that the foomatic-filters, a support package for
- -setting up printers, allowed authenticated users to submit crafted
- -print jobs which would execute shell commands on the print servers.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о foomatic-filters, пакеÑ? поддеÑ?жки длÑ?
+наÑ?Ñ?Ñ?ойки пÑ?инÑ?еÑ?ов, позволÑ?еÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ? оÑ?пÑ?авлÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованнÑ?е заданиÑ? пеÑ?аÑ?и, коÑ?оÑ?Ñ?е пÑ?иводÑ?Ñ? к вÑ?полнениÑ? команд командной оболоÑ?ки на Ñ?еÑ?веÑ?аÑ? пеÑ?аÑ?и.</p>
 
 <p>
- -<a href="https://security-tracker.debian.org/tracker/CVE-2011-2697";>CVE-2011-2697</a>
- -was assigned to the vulnerability in the Perl
- -implementation included in lenny, and <a
+Ð?денÑ?иÑ?икаÑ?оÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2011-2697";>CVE-2011-2697</a>
+бÑ?л пÑ?иÑ?воен Ñ?Ñ?ой Ñ?Ñ?звимоÑ?Ñ?и, Ñ?одеÑ?жаÑ?ейÑ?Ñ? в Ñ?еализаÑ?ии на Ñ?зÑ?ке
+Perl, коÑ?оÑ?аÑ? имееÑ?Ñ?Ñ? в lenny, а иденÑ?иÑ?икаÑ?оÑ? <a
 href="https://security-tracker.debian.org/tracker/CVE-2011-2964";>CVE-2011-2964</a>
- -to the vulnerability affecting the C reimplementation part of squeeze.
+бÑ?л пÑ?иÑ?воен Ñ?Ñ?ой Ñ?Ñ?звимоÑ?Ñ?и, Ñ?одеÑ?жаÑ?ейÑ?Ñ? в Ñ?еализаÑ?ии на Ñ?зÑ?ке C, коÑ?оÑ?аÑ? имееÑ?Ñ?Ñ? в squeeze.
 </p>
 
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 3.0.2-20080211-3.2+lenny1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.0.2-20080211-3.2+lenny1.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 4.0.5-6+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.0.5-6+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), this problem has been fixed in version 4.0.9-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 4.0.9-1.</p>
 
- -<p>We recommend that you upgrade your foomatic-filters packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? foomatic-filters.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2491.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2491.wml	2016-08-01 00:19:29.950418410 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in PostgreSQL, an SQL database
- -server:</p>
+<p>Ð? PostgreSQL, Ñ?еÑ?веÑ?е баз даннÑ?Ñ? SQL, бÑ?ло обнаÑ?Ñ?жено
+две пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2143";>CVE-2012-2143</a>
 
- -	<p>The crypt(text, text) function in the pgcrypto contrib module
- -	did not handle certain passwords correctly when producing
- -	traditional DES-based hashes.  Characters after the first
- -	0x80 byte were ignored.</p>
+	<p>ФÑ?нкÑ?иÑ? crypt(text, text) в модÑ?ле pgcrypto
+	непÑ?авилÑ?но вÑ?полнÑ?еÑ? обÑ?абоÑ?кÑ? опÑ?еделÑ?ннÑ?Ñ? паÑ?олей пÑ?и Ñ?оздании
+	Ñ?Ñ?адиÑ?ионнÑ?Ñ? Ñ?еÑ?ей на оÑ?нове DES.  СимволÑ? поÑ?ле пеÑ?вого байÑ?а
+	0x80 игноÑ?иÑ?Ñ?Ñ?Ñ?Ñ?Ñ?.</p>
 </li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2655";>CVE-2012-2655</a>
 
- -	<p>SECURITY DEFINER and SET attributes for a call handler of a
- -	procedural language could crash the database server.</p>
+	<p>Ð?Ñ?Ñ?ибÑ?Ñ?Ñ? SECURITY DEFINER и SET длÑ? обÑ?абоÑ?Ñ?ика вÑ?зов
+	пÑ?оÑ?едÑ?Ñ?ного Ñ?зÑ?ка можеÑ? вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? Ñ?еÑ?веÑ?а баз даннÑ?Ñ?.</p>
 </li>
 
 </ul>
 
- -<p>In addition, this update contains reliability and stability fixes from
- -the 8.4.12 upstream release.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление Ñ?одеÑ?жиÑ? иÑ?пÑ?авлениÑ? надÑ?жноÑ?Ñ?и и Ñ?Ñ?абилÑ?ноÑ?Ñ?и из
+вÑ?пÑ?Ñ?ка 8.4.12 из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 8.4.12-0squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.4.12-0squeeze1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 8.4.12-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.4.12-1.</p>
 
- -<p>We recommend that you upgrade your postgresql-8.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-8.4.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=iMWX
-----END PGP SIGNATURE-----


Reply to: