[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-25{19,00}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2500.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2500.wml	2016-11-06 16:45:17.230258759 +0500
@@ -1,53 +1,54 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities were discovered in Mantis, an issue tracking
- -system.</p>
+<p>Ð? Mantis, Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? пÑ?облем, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1118";>CVE-2012-1118</a>
 
- -	<p>Mantis installation in which the private_bug_view_threshold
- -	configuration option has been set to an array value do not
- -	properly enforce bug viewing restrictions.</p></li>
+	<p>УÑ?Ñ?ановки Mantis, в коÑ?оÑ?Ñ?Ñ? паÑ?амеÑ?Ñ? наÑ?Ñ?Ñ?ойки private_bug_view_threshold
+	Ñ?Ñ?Ñ?ановлен в знаÑ?ение маÑ?Ñ?ива, непÑ?авилÑ?но Ñ?абоÑ?аеÑ? Ñ? огÑ?аниÑ?ениÑ?ми
+        пÑ?оÑ?моÑ?Ñ?а Ñ?ообÑ?ений об оÑ?ибкаÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1119";>CVE-2012-1119</a>
 
- -	<p>Copy/clone bug report actions fail to leave an audit trail.</p></li>
+	<p>Ð?ейÑ?Ñ?виÑ? по копиÑ?ованиÑ?/клониÑ?ованиÑ? Ñ?ообÑ?ений об оÑ?ибкаÑ? не оÑ?Ñ?авлÑ?Ñ?Ñ? Ñ?лед аÑ?диÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1120";>CVE-2012-1120</a>
 
- -	<p>The delete_bug_threshold/bugnote_allow_user_edit_delete
- -	access check can be bypassed by users who have write
- -	access to the SOAP API.</p></li>
+	<p>Ð?олÑ?зоваÑ?ели, имеÑ?Ñ?ие доÑ?Ñ?Ñ?п к API SOAP, могÑ?Ñ?
+        обойÑ?и пÑ?овеÑ?кÑ? доÑ?Ñ?Ñ?па
+        delete_bug_threshold/bugnote_allow_user_edit_delete.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1122";>CVE-2012-1122</a>
 
- -	<p>Mantis performed access checks incorrectly when moving bugs
- -	between projects.</p></li>
+	<p>Mantis непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?ки доÑ?Ñ?Ñ?па пÑ?и пеÑ?емеÑ?ении Ñ?ообÑ?ений
+        об оÑ?ибкаÑ? междÑ? пÑ?оекÑ?ами.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1123";>CVE-2012-1123</a>
 
- -	<p>A SOAP client sending a null password field can authenticate
- -	as the Mantis administrator.</p></li>
+	<p>SOAP-клиенÑ?, оÑ?пÑ?авлÑ?Ñ?Ñ?ий пÑ?Ñ?Ñ?ое поле длÑ? ввода паÑ?олÑ?, можеÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?оваÑ?Ñ?Ñ?Ñ?
+	как админиÑ?Ñ?Ñ?аÑ?оÑ? Mantis.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2692";>CVE-2012-2692</a>
 
- -	<p>Mantis does not check the delete_attachments_threshold
- -	permission when a user attempts to delete an attachment from
- -	an issue.</p></li>
+	<p>Mantis не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? пÑ?ав доÑ?Ñ?Ñ?па delete_attachments_threshold
+	в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ? пÑ?Ñ?аеÑ?Ñ?Ñ? Ñ?далиÑ?Ñ? вложение из Ñ?ообÑ?ениÑ?
+	об оÑ?ибке.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 1.1.8+dfsg-10squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.1.8+dfsg-10squeeze2.</p>
 
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 1.2.11-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.2.11-1.</p>
 
- -<p>We recommend that you upgrade your mantis packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mantis.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2519.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2519.wml	2016-11-06 16:27:35.791144345 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several security vulnerabilities affecting ISC dhcpd, a server for
- -automatic IP address assignment, have been discovered.  Additionally, the
- -latest security update for isc-dhcp, <a href="../dsa-2516">DSA-2516-1</a>,
- -did not properly apply the patches for 
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей в dhcpd оÑ? ISC, Ñ?еÑ?веÑ?е длÑ?
+авÑ?омаÑ?иÑ?еÑ?кого назнаÑ?ениÑ? IP адÑ?еÑ?ов.  Ð?Ñ?оме Ñ?ого в поÑ?леднем
+обновлении безопаÑ?ноÑ?Ñ?и длÑ? isc-dhcp, <a href="../dsa-2516">DSA-2516-1</a>,
+непÑ?авилÑ?но бÑ?ли пÑ?имененÑ? заплаÑ?Ñ? длÑ?
 <a href="https://security-tracker.debian.org/tracker/CVE-2012-3571";>CVE-2012-3571</a>
- -and
+и
 <a href="https://security-tracker.debian.org/tracker/CVE-2012-3954";>CVE-2012-3954</a>.
- -This has been addressed
- -in this additional update.</p>
+ЭÑ?а пÑ?облема бÑ?ла Ñ?еÑ?ена
+в данном обновлении.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4539";>CVE-2011-4539</a>
 
- -  <p>BlueCat Networks discovered that it is possible to crash DHCP servers
- -  configured to evaluate requests with regular expressions via crafted
- -  DHCP request packets.</p></li>
+  <p>СоÑ?Ñ?Ñ?дники BlueCat Networks обнаÑ?Ñ?жили, Ñ?Ñ?о пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ?
+  DHCP-запÑ?оÑ?ов можно аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? DHCP-Ñ?еÑ?веÑ?Ñ?, наÑ?Ñ?Ñ?оеннÑ?е на обÑ?абоÑ?кÑ?
+  запÑ?оÑ?ов Ñ? Ñ?егÑ?лÑ?Ñ?нÑ?ми вÑ?Ñ?ажениÑ?ми.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3571";>CVE-2012-3571</a>
 
- -  <p>Markus Hietava of the Codenomicon CROSS project discovered that it is
- -  possible to force the server to enter an infinite loop via messages with
- -  malformed client identifiers.</p></li>
+  <p>Ð?аÑ?кÑ?Ñ? ХиеÑ?ава из пÑ?оекÑ?а Codenomicon CROSS обнаÑ?Ñ?жил, Ñ?Ñ?о можно
+  ввеÑ?Ñ?и Ñ?еÑ?веÑ? в беÑ?конеÑ?нÑ?й Ñ?икл Ñ? помоÑ?Ñ?Ñ? Ñ?ообÑ?ений Ñ?
+  некоÑ?Ñ?екÑ?нÑ?ми иденÑ?иÑ?икаÑ?оÑ?ами клиенÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3954";>CVE-2012-3954</a>
 
- -  <p>Glen Eustace discovered that DHCP servers running in DHCPv6 mode
- -  and possibly DHCPv4 mode suffer of memory leaks while processing messages.
- -  An attacker can use this flaw to exhaust resources and perform denial
- -  of service attacks.</p></li>
+  <p>Ð?лен Ð?Ñ?Ñ?иÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о DHCP-Ñ?еÑ?веÑ?Ñ?, Ñ?абоÑ?аÑ?Ñ?ие в Ñ?ежиме DHCPv6
+  и возможном Ñ?ежиме DHCPv4, подвеÑ?женÑ? Ñ?Ñ?еÑ?кам памÑ?Ñ?и, коÑ?оÑ?Ñ?е возникаÑ?Ñ? пÑ?и обÑ?абоÑ?ке Ñ?ообÑ?ений.
+  Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? иÑ?Ñ?еÑ?паниÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов и вÑ?зова оÑ?каза
+  в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 4.1.1-P1-15+squeeze6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.1.1-P1-15+squeeze6.</p>
 
- -<p>For the testing (wheezy) and unstable (sid) distributions, this problem
- -will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а пÑ?облема
+бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
 
- -<p>We recommend that you upgrade your isc-dhcp packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? isc-dhcp.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJYHxfSAAoJEF7nbuICFtKlrd8P/1aULhWhsHVMa+8XgU4mwxRD
MydZ5KsGvEiYgU6SqrAwZyJy5EdJ4hB8Dx7P5bAjnIUk2YMqVaLPmDTB2t6m8i3J
uEy5Qgoa325YwGva/lcOUxi48oupQYipYwtN3Wc5nZrkLdkDfjHchAW+osDdb2ej
riyenBm5/NXZncfmY0YUlINvLESGrCM1l+rHunuQ9dnoUqvoGA6pzzi5RbrSIUQI
MHaZIeiHWxGupxD7vDiHM+m+mZP2wB0Th7oDC0Yxrc94y4MVZkbKMY5MIUfAXVjz
dQo5k/WhwbcK/w9wvKNKSotOMT6qDbSJ33KPYY/7llhJ+iRCZV8GwAC56FQgOpvX
6NFIebI93oxTf1D+PvIWXG+4g4bvqAcdmWMP5J98hicwjBrNPQFUv6+RA85araaV
MGE6Ge/XyxeIJMK13a0QolEf8KnHfYFdzwsElJVvX9Chp9EVpz7C6Zvl2l43h4vK
NHro/O94E0L0DdeVRqmRRZ146+26epWOdM3BtAFkAv2/7Nf4mJSoktzzjEVEy+nr
2+jSpgsi3AkHIN7Nk1O6y8S/0aK1jsHqUp7TaxVaqu5KOkJXU79U6BnPKpR0w0/O
hVrncPsi9Ak+nfSGDq8sCI/xb+VGqWDCxqUM4WEkNFaBomscYrYBactZFBu6CgCQ
pF05VW8ePABfLSf9SCqA
=OgCV
-----END PGP SIGNATURE-----


Reply to: