[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{427,516,573}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2427.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2427.wml	2016-08-01 00:24:41.815570048 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Two security vulnerabilities related to EXIF processing were
- -discovered in ImageMagick, a suite of programs to manipulate images.</p>
+<p>Ð? ImageMagick, набоÑ?е пÑ?огÑ?амм длÑ? Ñ?абоÑ?Ñ? Ñ? изобÑ?ажениÑ?ми, бÑ?ли обнаÑ?Ñ?женÑ?
+две пÑ?облемÑ?, Ñ?вÑ?заннÑ?е Ñ? обÑ?абоÑ?кой EXIF.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0247";>CVE-2012-0247</a>
 
- -	<p>When parsing a maliciously crafted image with incorrect offset
- -	and count in the ResolutionUnit tag in EXIF IFD0, ImageMagick
- -	writes two bytes to an invalid address.</p></li>
+	<p>Ð?Ñ?и обÑ?абоÑ?ке Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? изобÑ?ажений Ñ? некоÑ?Ñ?екÑ?нÑ?м оÑ?Ñ?Ñ?Ñ?пом
+	и знаÑ?ение Ñ?Ñ?Ñ?Ñ?Ñ?ика в Ñ?еге ResolutionUnit в EXIF IFD0, ImageMagick
+	вÑ?полнÑ?еÑ? запиÑ?Ñ? двÑ?Ñ? байÑ?ов в непÑ?авилÑ?нÑ?й адÑ?еÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0248";>CVE-2012-0248</a>
 
- -	<p>Parsing a maliciously crafted image with an IFD whose all IOP
- -	tags value offsets point to the beginning of the IFD itself
- -	results in an endless loop and a denial of service.</p></li>
+	<p>Ð?Ñ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного изобÑ?ажениÑ? Ñ? IFD, Ñ?Ñ?и знаÑ?ениÑ?
+        Ñ?егов IOP Ñ?меÑ?аÑ?Ñ? Ñ?оÑ?кÑ? к наÑ?алÑ? Ñ?амого IFD, пÑ?иводиÑ?
+	к беÑ?конеÑ?номÑ? Ñ?иклÑ? и оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 8:6.6.0.4-3+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 8:6.6.0.4-3+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 8:6.6.9.7-6.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 8:6.6.9.7-6.</p>
 
- -<p>We recommend that you upgrade your imagemagick packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? imagemagick.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2516.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2516.wml	2016-08-01 00:29:13.330515642 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two security vulnerabilities affecting ISC dhcpd, a server for automatic
- -IP address assignment, in Debian have been discovered.</p>
+<p>Ð? ISC dhcpd, Ñ?еÑ?веÑ?е длÑ? авÑ?омаÑ?иÑ?еÑ?кого пÑ?иÑ?воениÑ? IP адÑ?еÑ?ов,
+в Debian бÑ?ли обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3571";>CVE-2012-3571</a>
 
- -  <p>Markus Hietava of the Codenomicon CROSS project discovered that it is
- -  possible to force the server to enter an infinite loop via messages with
- -  malformed client identifiers.</p></li>
+  <p>Ð?аÑ?кÑ?Ñ? ХиÑ?ава из пÑ?оекÑ?а Codenomicon CROSS обнаÑ?Ñ?жил, Ñ?Ñ?о можно
+  ввеÑ?Ñ?и Ñ?еÑ?веÑ? в беÑ?конеÑ?нÑ?й Ñ?икл пÑ?и помоÑ?и Ñ?ообÑ?ений, Ñ?одеÑ?жаÑ?иÑ?
+  Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е иденÑ?иÑ?икаÑ?оÑ?Ñ? клиенÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3954";>CVE-2012-3954</a>
 
- -  <p>Glen Eustace discovered that DHCP servers running in DHCPv6 mode
- -  and possibly DHCPv4 mode suffer of memory leaks while processing messages.
- -  An attacker can use this flaw to exhaust resources and perform denial
- -  of service attacks.</p></li>
+  <p>Ð?лен ЭÑ?Ñ?ейÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еÑ?веÑ?Ñ? DHCP, Ñ?абоÑ?аÑ?Ñ?ие в Ñ?ежиме DHCPv6,
+  а Ñ?акже возможно в Ñ?ежиме DHCPv4, подвеÑ?женÑ? Ñ?Ñ?еÑ?кам памÑ?Ñ?и, коÑ?оÑ?Ñ?е возникаÑ?Ñ? пÑ?и обÑ?абоÑ?ке
+  Ñ?ообÑ?ений.  Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? иÑ?Ñ?оÑ?ениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов и
+  вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 4.1.1-P1-15+squeeze4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.1.1-P1-15+squeeze4.</p>
 
- -<p>For the testing (wheezy) and unstable (sid) distributions, this problem
- -will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а пÑ?облема
+бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
 
- -<p>We recommend that you upgrade your isc-dhcp packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? isc-dhcp.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2573.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2573.wml	2016-08-01 00:35:50.903628346 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>SSL certificate verification weakness</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>Ñ?лабаÑ? пÑ?овеÑ?ка SSL-Ñ?еÑ?Ñ?иÑ?икаÑ?ов</define-tag>
 <define-tag moreinfo>
- -<p>Ralf Paffrath reported that Radsecproxy, a RADIUS protocol proxy, mixed up 
- -pre- and post-handshake verification of clients. This vulnerability may
- -wrongly accept clients without checking their certificate chain under 
- -certain configurations.</p>
+<p>РалÑ?Ñ? Ð?аÑ?Ñ?Ñ?аÑ? Ñ?ообÑ?ил, Ñ?Ñ?о Radsecproxy, пÑ?окÑ?и длÑ? пÑ?оÑ?окола RADIUS, Ñ?меÑ?иваеÑ?
+веÑ?иÑ?икаÑ?иÑ? клиенÑ?ов до и поÑ?ле Ñ?Ñ?копожаÑ?иÑ?. Ð?Ñ?и опÑ?еделÑ?ннÑ?Ñ? наÑ?Ñ?Ñ?ойкаÑ?
+даннаÑ? Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? пÑ?иводиÑ?Ñ? к оÑ?ибоÑ?номÑ? пÑ?инÑ?Ñ?иÑ? клиенÑ?ов без вÑ?полнениÑ?
+пÑ?овеÑ?ки иÑ? Ñ?епоÑ?ек Ñ?еÑ?Ñ?иÑ?икаÑ?ов.</p>
 
- -<p>Raphael Geissert spotted that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2012-4523";>CVE-2012-4523</a> was incomplete, 
- -giving origin to <a href="https://security-tracker.debian.org/tracker/CVE-2012-4566";>CVE-2012-4566</a>. Both vulnerabilities are fixed with this 
- -update.</p>
+<p>РаÑ?аÑ?лÑ? Ð?еÑ?Ñ?еÑ? замеÑ?ил, Ñ?Ñ?о иÑ?пÑ?авление <a href="https://security-tracker.debian.org/tracker/CVE-2012-4523";>CVE-2012-4523</a> неполно и
+пÑ?иводиÑ? к <a href="https://security-tracker.debian.org/tracker/CVE-2012-4566";>CVE-2012-4566</a>. Ð?бе Ñ?Ñ?звимоÑ?Ñ?и иÑ?пÑ?авленÑ? в
+данной обновлении.</p>
 
- -<p>Notice that this fix may make Radsecproxy reject some clients that are 
- -currently (erroneously) being accepted.</p>
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?о обновление можеÑ? пÑ?ивеÑ?Ñ?и к Ñ?омÑ?, Ñ?Ñ?о Radsecproxy бÑ?деÑ? оÑ?клонÑ?Ñ?Ñ? некоÑ?оÑ?Ñ?Ñ? клиенÑ?ов, коÑ?оÑ?Ñ?е
+в наÑ?Ñ?оÑ?Ñ?ее вÑ?емÑ? (оÑ?ибоÑ?но) пÑ?инимаÑ?Ñ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 1.4-1+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4-1+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy), these problems have been fixed in
- -version 1.6.2-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.6.2-1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.6.2-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.6.2-1.</p>
 
- -<p>We recommend that you upgrade your radsecproxy packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? radsecproxy.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=iEpn
-----END PGP SIGNATURE-----


Reply to: