[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-2{338,197}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2197.wml	2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2197.wml	2016-10-30 17:33:18.458840218 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>It has been discovered that the Quagga routing daemon contains two
- -denial-of-service vulnerabilities in its BGP implementation:</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Quagga, Ñ?лÑ?жба маÑ?Ñ?Ñ?Ñ?Ñ?изаÑ?ии, Ñ?одеÑ?жиÑ? два
+оÑ?каза в обÑ?лÑ?живании в Ñ?еализаÑ?ии BGP:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1674";>CVE-2010-1674</a>
 
- -    <p>A crafted Extended Communities attribute triggers a NULL
- -    pointer dereference which causes the BGP daemon to crash.
- -    The crafted attributes are not propagated by the Internet
- -    core, so only explicitly configured direct peers are able
- -    to exploit this vulnerability in typical configurations.</p></li>
+    <p>СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й аÑ?Ñ?ибÑ?Ñ? Extended Communities вÑ?зÑ?ваеÑ?
+    Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?, Ñ?Ñ?о пÑ?иводиÑ? к аваÑ?ийной оÑ?Ñ?ановке Ñ?лÑ?жбÑ? BGP.
+    СпеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е аÑ?Ñ?ибÑ?Ñ?Ñ? не пеÑ?едаÑ?Ñ?Ñ?Ñ? Internet-Ñ?дÑ?ом,
+    поÑ?Ñ?омÑ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? пÑ?и обÑ?Ñ?нÑ?Ñ? наÑ?Ñ?Ñ?ойкаÑ? могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? лиÑ?Ñ?
+    Ñ?вно наÑ?Ñ?Ñ?оеннÑ?е Ñ?авнÑ?е Ñ?злÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1675";>CVE-2010-1675</a>
 
- -    <p>The BGP daemon resets BGP sessions when it encounters
- -    malformed AS_PATHLIMIT attributes, introducing a distributed
- -    BGP session reset vulnerability which disrupts packet
- -    forwarding.  Such malformed attributes are propagated by the
- -    Internet core, and exploitation of this vulnerability is not
- -    restricted to directly configured BGP peers.</p></li>
+    <p>СлÑ?жба BGP Ñ?бÑ?аÑ?Ñ?ваеÑ? BGP-Ñ?еÑ?Ñ?ии, еÑ?ли вÑ?Ñ?Ñ?еÑ?аÑ?Ñ?Ñ?Ñ? некоÑ?Ñ?екÑ?нÑ?е
+    аÑ?Ñ?ибÑ?Ñ?Ñ? AS_PATHLIMIT, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?бÑ?оÑ?Ñ? Ñ?аÑ?пÑ?еделÑ?нной
+    BGP-Ñ?еÑ?Ñ?ии и наÑ?Ñ?Ñ?аеÑ? пеÑ?едаÑ?Ñ? пакеÑ?ов. Такие
+    некоÑ?Ñ?екÑ?нÑ?е аÑ?Ñ?ибÑ?Ñ?Ñ? пеÑ?едаÑ?Ñ?Ñ?Ñ?
+    Internet-Ñ?дÑ?ом, а иÑ?полÑ?зование Ñ?Ñ?ой Ñ?Ñ?звимоÑ?Ñ?и не огÑ?аниÑ?иваеÑ?Ñ?Ñ?
+    Ñ?олÑ?ко Ñ?вно наÑ?Ñ?Ñ?оеннÑ?ми Ñ?авнÑ?ми BGP-Ñ?злами.</p></li>
 
 </ul>
 
- -<p>This security update removes AS_PATHLIMIT processing from the BGP
- -implementation, preserving the configuration statements for backwards
- -compatibility.  (Standardization of this BGP extension was abandoned
- -long ago.)</p>
+<p>Ð? данном обновлении безопаÑ?ноÑ?Ñ?и Ñ?далÑ?н код длÑ? обÑ?абоÑ?ки AS_PATHLIMIT из
+Ñ?еализаÑ?ии BGP, но паÑ?амеÑ?Ñ?Ñ? наÑ?Ñ?Ñ?ойки Ñ?оÑ?Ñ?аненÑ? Ñ? Ñ?елÑ?Ñ? обеÑ?пеÑ?ениÑ? обÑ?аÑ?ной
+Ñ?овмеÑ?Ñ?имоÑ?Ñ?и.  (СÑ?андаÑ?Ñ?изаÑ?ии Ñ?Ñ?ого Ñ?аÑ?Ñ?иÑ?ениÑ? BGP бÑ?ла забÑ?оÑ?ена
+долгое вÑ?емÑ? назад.)</p>
 
- -<p>For the oldstable distribution (lenny), these problems have been fixed
- -in version 0.99.10-1lenny5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.99.10-1lenny5.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 0.99.17-2+squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.99.17-2+squeeze2.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your quagga packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? quagga.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2338.wml	2011-11-08 03:37:24.000000000 +0600
+++ russian/security/2011/dsa-2338.wml	2016-10-30 17:12:50.313147448 +0500
@@ -1,65 +1,66 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several cross-site scripting and information disclosure issues have
- -been fixed in Moodle, a course management system for online learning:</p>
+<p>Ð? Moodle, Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? кÑ?Ñ?Ñ?ами длÑ? онлайн обÑ?Ñ?ениÑ?, бÑ?ло иÑ?пÑ?авленÑ?
+неÑ?колÑ?ко Ñ?лÑ?Ñ?аев межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга и Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии:</p>
 
 <ul>
 
 <li><a href="http://moodle.org/mod/forum/discuss.php?d=182737";>MSA-11-0020</a>
 <p>
- -Continue links in error messages can lead offsite
+СÑ?Ñ?лки длÑ? пÑ?одолжениÑ? в Ñ?ообÑ?ениÑ?Ñ? об оÑ?ибкаÑ? могÑ?Ñ? веÑ?Ñ?и за пÑ?еделÑ? Ñ?айÑ?а
 </p></li>
 
 <li><a href="moodle.org/mod/forum/discuss.php?d=182741">MSA-11-0024</a>
 <p>
- -reCAPTCHA images were being authenticated from an older
- -server
+Ð?зобÑ?ажениÑ? reCAPTCHA аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?Ñ?Ñ?Ñ?Ñ?Ñ? Ñ? более Ñ?Ñ?аÑ?ого
+Ñ?еÑ?веÑ?а
 </p></li>
 
 <li><a href="moodle.org/mod/forum/discuss.php?d=182742">MSA-11-0025</a>
 <p>
- -Group names in user upload CSV not escaped
+Ð?мена гÑ?Ñ?пп в загÑ?Ñ?зкаÑ? полÑ?зоваÑ?елей в CSV не Ñ?кÑ?аниÑ?Ñ?Ñ?Ñ?Ñ?Ñ?
 </p></li>
 
 <li><a href="moodle.org/mod/forum/discuss.php?d=182743">MSA-11-0026</a>
 <p>
- -Fields in user upload CSV not escaped
+Ð?олÑ? в загÑ?Ñ?зкаÑ? полÑ?зоваÑ?елей CSV не Ñ?кÑ?аниÑ?Ñ?Ñ?Ñ?Ñ?Ñ?
 </p></li>
 
 <li><a href="http://moodle.org/mod/forum/discuss.php?d=188313";>MSA-11-0031</a>
 <p>
- -Forms API constant issue
+Ð?Ñ?облема Ñ? API Ñ?оÑ?м
 </p></li>
 
 <li><a href="http://moodle.org/mod/forum/discuss.php?d=188314";>MSA-11-0032</a>
 <p>
- -MNET SSL validation issue
+Ð?Ñ?облема Ñ? пÑ?овеÑ?кой MNET SSL
 </p></li>
 
 <li><a href="http://moodle.org/mod/forum/discuss.php?d=188318";>MSA-11-0036</a>
 <p>
- -Messaging refresh vulnerability
+УÑ?звимоÑ?Ñ?Ñ? в обновлении Ñ?ообÑ?ений
 </p></li>
 
 <li><a href="http://moodle.org/mod/forum/discuss.php?d=188319";>MSA-11-0037</a>
 <p>
- -Course section editing injection vulnerability
+Ð?нÑ?екÑ?иÑ? в Ñ?азделе кÑ?Ñ?Ñ?ов
 </p></li>
 
 <li><a href="http://moodle.org/mod/forum/discuss.php?d=188320";>MSA-11-0038</a>
 <p>
- -Database injection protection strengthened
+УÑ?илена заÑ?иÑ?а оÑ? инÑ?екÑ?ии в базÑ? даннÑ?Ñ?
 </p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.9.9.dfsg2-2.1+squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.9.9.dfsg2-2.1+squeeze2.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.9.9.dfsg2-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.9.9.dfsg2-4.</p>
 
- -<p>We recommend that you upgrade your moodle packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? moodle.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=kqoS
-----END PGP SIGNATURE-----


Reply to: