[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{391,395,531}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2391.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2391.wml	2016-08-23 22:22:26.284292158 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in phpMyAdmin, a tool
- -to administer MySQL over the web. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? phpMyAdmin, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL Ñ?еÑ?ез веб, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4107";>CVE-2011-4107</a>
 
- -  <p>The XML import plugin allowed a remote attacker to read arbitrary
- -  files via XML data containing external entity references.</p></li>
+  <p>Ð?ополнение длÑ? импоÑ?Ñ?а XML позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е
+  Ñ?айлÑ? Ñ? помоÑ?Ñ?Ñ? XML-даннÑ?Ñ?, Ñ?одеÑ?жаÑ?иÑ? Ñ?казаниÑ? на внеÑ?ние Ñ?Ñ?Ñ?ноÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1940";>CVE-2011-1940</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2011-3181";>CVE-2011-3181</a>
 
- -  <p>Cross site scripting was possible in the table tracking feature,
- -  allowing a remote attacker to inject arbitrary web script or HTML.</p></li>
+  <p>Ð?а Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? Ñ?аблиÑ? возможен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг,
+  позволÑ?Ñ?Ñ?ий Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (lenny) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (lenny) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 4:3.3.7-7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4:3.3.7-7.</p>
 
- -<p>For the testing distribution (wheezy) and unstable distribution (sid),
- -these problems have been fixed in version 4:3.4.7.1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 4:3.4.7.1-1.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2395.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2395.wml	2016-08-23 22:28:26.410892463 +0500
@@ -1,29 +1,30 @@
- -<define-tag description>buffer underflow</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
 
- -<p>Laurent Butti discovered a buffer underflow in the LANalyzer dissector
- -of the Wireshark network traffic analyzer, which could lead to the
- -execution of arbitrary code (<a
+<p>Ð?оÑ?ен Ð?Ñ?Ñ?Ñ?и обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в диÑ?Ñ?екÑ?оÑ?е LANalyzer
+в анализаÑ?оÑ?е Ñ?еÑ?евого Ñ?Ñ?аÑ?ика Wireshark, коÑ?оÑ?ое можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ?
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода (<a
 href="https://security-tracker.debian.org/tracker/CVE-2012-0068";>CVE-2012-0068</a>).
 </p>
 
- -<p>This update also addresses several bugs, which can lead to crashes of
- -Wireshark. These are not treated as security issues, but are fixed
- -nonetheless if security updates are scheduled: <a
+<p>Ð?Ñ?оме Ñ?ого, в данное обновлении иÑ?пÑ?авлено неÑ?колÑ?ко оÑ?ибок, коÑ?оÑ?Ñ?е могли пÑ?иводиÑ?Ñ? к аваÑ?ийнÑ?м
+оÑ?Ñ?ановка Wireshark. Ð?ни не Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ? пÑ?облемами безопаÑ?ноÑ?Ñ?и, но бÑ?ли иÑ?пÑ?авленÑ? в
+запланиÑ?ованнÑ?м обновлении безопаÑ?ноÑ?Ñ?и: <a
 href="https://security-tracker.debian.org/tracker/CVE-2011-3483";>CVE-2011-3483</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2012-0041";>CVE-2012-0041</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2012-0042";>CVE-2012-0042</a>,
- -<a href="https://security-tracker.debian.org/tracker/CVE-2012-0066";>CVE-2012-0066</a> and
+<a href="https://security-tracker.debian.org/tracker/CVE-2012-0066";>CVE-2012-0066</a> и
 <a href="https://security-tracker.debian.org/tracker/CVE-2012-0067";>CVE-2012-0067</a>.
 </p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.2.11-6+squeeze6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.11-6+squeeze6.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.6.5-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.6.5-1.</p>
 
- -<p>We recommend that you upgrade your wireshark packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wireshark.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2531.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2531.wml	2016-08-23 22:36:48.534914475 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>Denial of Service</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>Several denial-of-service vulnerabilities have been discovered in Xen,
- -the popular virtualization software. The Common Vulnerabilities and 
- -Exposures project identifies the following issues:</p>
+<p>Ð? Xen, попÑ?лÑ?Ñ?ном Ð?Ð? длÑ? виÑ?Ñ?Ñ?ализаÑ?ии, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко оÑ?казов
+в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3432";>CVE-2012-3432</a>
 
- - <p>Guest mode unprivileged code, which has been granted the privilege to 
- - access MMIO regions, may leverage that access to crash the whole guest.
- - Since this can be used to crash a client from within, this vulnerability is
- - considered to have low impact.</p></li>
+ <p>Ð?епÑ?ивилегиÑ?ованнÑ?й код, запÑ?Ñ?еннÑ?й в гоÑ?Ñ?евом Ñ?ежиме и полÑ?Ñ?ивÑ?ий пÑ?ава длÑ?
+ доÑ?Ñ?Ñ?па к облаÑ?Ñ?Ñ?м MMIO, можеÑ? вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? вÑ?ей гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ?.
+ Ð?оÑ?колÑ?кÑ? Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки клиенÑ?а изнÑ?Ñ?Ñ?и, Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+ не Ñ?Ñ?иÑ?аеÑ?Ñ?Ñ? Ñ?еÑ?Ñ?Ñ?зной.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3433";>CVE-2012-3433</a>
 
- - <p>A guest kernel can cause the host to become unresponsive for a period
- - of time, potentially leading to a DoS. Since an attacker with full
- - control in the guest can impact the host, this vulnerability is
- - considered to have high impact.</p></li>
+ <p>Ð?з-за Ñ?дÑ?а гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? Ñ?зел можеÑ? бÑ?Ñ?Ñ? недоÑ?Ñ?Ñ?пен некоÑ?оÑ?ое
+ вÑ?емÑ?, Ñ?Ñ?о поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании. Так как злоÑ?мÑ?Ñ?ленник, имеÑ?Ñ?ий полнÑ?й
+ конÑ?Ñ?олÑ? над гоÑ?Ñ?евой Ñ?иÑ?Ñ?емой, можеÑ? оказаÑ?Ñ? влиÑ?ние на главнÑ?Ñ? Ñ?иÑ?Ñ?емÑ?, Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+ Ñ?Ñ?иÑ?аеÑ?Ñ?Ñ? Ñ?еÑ?Ñ?Ñ?зной.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 4.0.1-5.3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.0.1-5.3.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 4.1.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.1.3-1.</p>
 
- -<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXvIm3AAoJEF7nbuICFtKlpjQP/3VHDF5q5gFj51aubMnVy97o
yH3gWe847jjBZu1dmyMHI0PQwVuqzBnnX7XmRZ8nkNySg0JbYfzDFBo/A73d4MSU
4pQdG7Sraeoz64NuAzccKKIVmN70tdZqlG9OHWRCsrfNoE3dah+yfvTyLh4+Gk1h
WIiUJ1+zjGLIAWGpb9M1lU3OIHcKM/0HaXZ8mu2iJuY5hlWXV28hsoG0OoGgyBhj
o8NNXcbBZkWxpTsi75m0TIwXSm9N6w4qd+NVnUzYE744B0GrXjN4Zy5vOnMhrbSy
1VUoSNW6ds/jVQKvD0y35HnQR2NxDAqEbf0gKnKcu0iwXynsasm0HKfD2YR5JcjV
ooLQNms1kDsJlLYAqgF42pCfsj5i+aZM+S6H+wrcvvXAN8xwxiOdkOuDjVb2FOnX
yRNvB9CWYXImTaXdUgyS/E8FypTkGD7pXdPYoMIvc0oqHK/gYqonXch3OH04vPEe
pzYIgu0A0VK7aFNInlKW3QyoiE1AEse4sK4l+XXIZS7db5R52dSiE8vAAms0P7rd
Sv6ZKdeRQUWW024x/3x8rrEN6C5spKX0xCV8FBZVAS2QtJRtdKiPtNyHCgHNwiR3
8dz/eSGQj0HvzlSnEajYx6QpElGQMw4k+G+9zt0ljIiv14KGKt9d8VnXUN6Wk7kD
XRIvi/Cpo8etay+i/xBF
=UQKS
-----END PGP SIGNATURE-----


Reply to: