[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-22{7,8}6.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2276.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2276.wml	2016-10-30 17:59:57.060176962 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>multiple denial of service</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>множеÑ?Ñ?веннÑ?е оÑ?казÑ? в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>Paul Belanger reported a vulnerability in Asterisk identified as
+<p>Ð?ол Ð?еланджеÑ? Ñ?ообÑ?ил об Ñ?Ñ?звимоÑ?Ñ?и в Asterisk, полÑ?Ñ?ивÑ?ей иденÑ?иÑ?икаÑ?оÑ?
 <a href="http://downloads.asterisk.org/pub/security/AST-2011-008.html";>AST-2011-008</a>
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2011-2529";>CVE-2011-2529</a>)
- -through which an unauthenticated attacker may crash an Asterisk
- -server remotely. A package containing a NULL char causes the SIP header parser
- -to alter unrelated memory structures.</p>
- -
- -<p>Jared Mauch reported a vulnerability in Asterisk identified as 
- -<a href="http://downloads.asterisk.org/pub/security/AST-2011-009.html";>AST-2011-009</a>
- -through which an unauthenticated attacker may crash an Asterisk server remotely.
- -If a user sends a package with a Contact header with a missing left angle
- -bracket (&lt;) the server will crash. A possible workaround is to disable chan_sip.</p>
+(<a href="https://security-tracker.debian.org/tracker/CVE-2011-2529";>CVE-2011-2529</a>),
+Ñ? помоÑ?Ñ?Ñ? коÑ?оÑ?ой неаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?й злоÑ?мÑ?Ñ?ленник Ñ?далÑ?нно можеÑ? оÑ?Ñ?ановиÑ?Ñ?
+Ñ?еÑ?веÑ? Asterisk. Ð?акеÑ?, Ñ?одеÑ?жаÑ?ий NULL-Ñ?имвол, пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о код длÑ?
+гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а SIP-заголовка изменÑ?еÑ? неÑ?вÑ?заннÑ?е Ñ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ? памÑ?Ñ?и.</p>
+
+<p>Ð?жаÑ?ед Ð?аÑ?Ñ? Ñ?ообÑ?ил об Ñ?Ñ?звимоÑ?Ñ?и Asterisk, полÑ?Ñ?ивÑ?ей иденÑ?иÑ?икаÑ?оÑ?
+<a href="http://downloads.asterisk.org/pub/security/AST-2011-009.html";>AST-2011-009</a>,
+Ñ? помоÑ?Ñ?Ñ? коÑ?оÑ?ой неаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?й злоÑ?мÑ?Ñ?ленник Ñ?далÑ?нно можеÑ? оÑ?Ñ?ановиÑ?Ñ? Ñ?еÑ?веÑ? Asterisk.
+Ð?Ñ?ли полÑ?зоваÑ?елÑ? оÑ?пÑ?авлÑ?еÑ? пакеÑ? Ñ? заголовком Contact Ñ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?им Ñ?имволом
+<q>менÑ?Ñ?е</q> (&lt;), Ñ?о Ñ?Ñ?о пÑ?иведÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке Ñ?еÑ?веÑ?а. Ð?озможное вÑ?еменное Ñ?еÑ?ение Ñ?оÑ?Ñ?оиÑ? в оÑ?клÑ?Ñ?ении chan_sip.</p>
 
- -<p>The vulnerability identified as 
+<p>Ð?Ñ?ло Ñ?ообÑ?ено об Ñ?Ñ?звимоÑ?Ñ?и, опÑ?еделÑ?емой как
 <a href="http://downloads.asterisk.org/pub/security/AST-2011-010.html";>AST-2011-010</a>
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2011-2535";>CVE-2011-2535</a>)
- -reported about an
- -input validation error in the IAX2 channel driver. An unauthenticated attacker
- -may crash an Asterisk server remotely by sending a crafted option control frame.</p>
+(<a href="https://security-tracker.debian.org/tracker/CVE-2011-2535";>CVE-2011-2535</a>),
+коÑ?оÑ?аÑ? пÑ?едÑ?Ñ?авлÑ?еÑ? Ñ?обой оÑ?ибкÑ? пÑ?овеÑ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?
+в каналÑ?ном дÑ?айвеÑ?е IAX2. Ð?еаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?й злоÑ?мÑ?Ñ?ленник
+можеÑ? Ñ?далÑ?нно оÑ?Ñ?ановиÑ?Ñ? Ñ?еÑ?веÑ? Asterisk, оÑ?пÑ?авив Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?пÑ?авлÑ?Ñ?Ñ?Ñ?Ñ? Ñ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ?.</p>
 
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.4.21.2~dfsg-3+lenny5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.4.21.2~dfsg-3+lenny5.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.6.2.9-2+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.6.2.9-2+squeeze3.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 1:1.8.4.3-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.8.4.3-1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1:1.8.4.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:1.8.4.3-1.</p>
 
- -<p>We recommend that you upgrade your asterisk packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? asterisk.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2286.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2286.wml	2016-10-30 18:05:18.952560499 +0500
@@ -1,52 +1,53 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities were discovered in phpMyAdmin, a tool to
- -administrate MySQL over the web. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? phpMyAdmin, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? админиÑ?Ñ?Ñ?иÑ?ованиÑ? MySQL Ñ?еÑ?ез веб, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2505";>CVE-2011-2505</a>
 
- -  <p>Possible session manipulation in Swekey authentication.</p></li>
+  <p>Ð?озможнаÑ? манипÑ?лÑ?Ñ?иÑ? Ñ?еÑ?Ñ?ией в Swekey-аÑ?Ñ?енÑ?иÑ?икаÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2506";>CVE-2011-2506</a>
 
- -  <p>Possible code injection in setup script, in case session
- -  variables are compromised.</p></li>
+  <p>Ð?озможнаÑ? инÑ?екÑ?иÑ? кода к Ñ?Ñ?енаÑ?ии наÑ?Ñ?Ñ?ойки в Ñ?лÑ?Ñ?ае компÑ?омеÑ?аÑ?ии
+  пеÑ?еменнÑ?Ñ? Ñ?еÑ?Ñ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2507";>CVE-2011-2507</a>
 
- -  <p>Regular expression quoting issue in Synchronize code.</p></li>
+  <p>Ð?Ñ?облема Ñ? закавÑ?Ñ?иванием Ñ?егÑ?лÑ?Ñ?ного вÑ?Ñ?ажениÑ? в коде Synchronize.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2508";>CVE-2011-2508</a>
 
- -  <p>Possible directory traversal in MIME-type transformation.</p></li>
+  <p>Ð?озможнÑ?й обÑ?од каÑ?алога в Ñ?Ñ?анÑ?Ñ?оÑ?маÑ?ии MIME-Ñ?ипа.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2642";>CVE-2011-2642</a>
 
- -  <p>Cross site scripting in table Print view when the attacker can
- -  create crafted table names.</p></li>
+  <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в Ñ?аблиÑ?е окна Print в Ñ?лÑ?Ñ?ае, еÑ?ли злоÑ?мÑ?Ñ?ленник можеÑ?
+  Ñ?оздаваÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е имена Ñ?аблиÑ?.</p></li>
 
- -<li>No CVE name yet
+<li>Ð?денÑ?иÑ?икаÑ?оÑ? CVE пока оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?
 
- -  <p>Possible superglobal and local variables manipulation in
- -  Swekey authentication. (PMASA-2011-12)</p></li>
+  <p>Ð?озможнаÑ? манипÑ?лÑ?Ñ?иÑ? Ñ?веÑ?Ñ?глобалÑ?нÑ?ми и локалÑ?нÑ?ми пеÑ?еменнÑ?ми в
+  Swekey-аÑ?Ñ?енÑ?иÑ?икаÑ?ии. (PMASA-2011-12)</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (lenny) is only affected by 
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (lenny) подвеÑ?жен Ñ?олÑ?ко Ñ?Ñ?звимоÑ?Ñ?и
 <a href="https://security-tracker.debian.org/tracker/CVE-2011-2642";>\
- -CVE-2011-2642</a>, which has been fixed in version 2.11.8.1-5+lenny9.</p>
+CVE-2011-2642</a>, коÑ?оÑ?аÑ? бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 2.11.8.1-5+lenny9.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 3.3.7-6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.3.7-6.</p>
 
- -<p>For the testing distribution (wheezy) and unstable distribution (sid),
- -these problems have been fixed in version 3.4.3.2-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.4.3.2-1.</p>
 
- -<p>We recommend that you upgrade your phpmyadmin packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? phpmyadmin.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJYFfARAAoJEF7nbuICFtKlqr4QAJqB99++VPVSqnyfaU4fTUaB
EHyq+sbGnA9VQ+HgWLSCyy8rg1QKN0lC3xvF5xNmA7HrKV9cnClUnsTqwDCsDxS9
D1b8xXX7pk0ib7ruqo7hh4FP+sVtWtQE0adH0tL2kVeZ/TNuS6NIrCOrHZlNjxdI
DBEEShD1VK5fOvD85Ptj6hHfJYXpQuZ8/DfrraB4/dyxSb5DBjKVENFmYVAKPxBc
mWy0Xz3AMJk52yZPyK5WVgCuvSN16Z+YojOMzDKQO9y/rDWVfCad2sWWS53RfaHb
znERtkEBp1OAOTurATxNFJJi1T+bF10SDJsuqrACBKXTEW40wkUeKToh60eCjjYw
JkuLfpJrMWHWq4VLeaZljxFphzTlJORCxRHguu3Pt6F7C8Lcq3vEJV+K2vm5eqL+
GiZFBomk0s5DrGh+9JkmuASMXiQAIYbu1iXTTXi1sSrgRbGZ/s1RCx6a7Q3fTg/C
GecHT+1qzV36KBqP3an8I909RbNAwhuQLM6mQE/AjY2VveLp6CKO0OcregM8yO+A
V1MiJzKXW9ugz5lQ4j6c2dsXLa8rIKW2RVnUwvElwJJc8my2Kni/DjxnEo2WiPBR
uBORmPSthg29sVIsXHVcIWAjQjWE1zAzF97dhT2S7rR4nNyC1FZxCdj6RyZaGwJ8
1xHIbqWiN5g2KiJEt7+a
=aVGb
-----END PGP SIGNATURE-----


Reply to: