[DONE] wml://security/2012/dsa-25{19,00}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2012/dsa-2500.wml 2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2500.wml 2016-11-06 16:45:17.230258759 +0500
@@ -1,53 +1,54 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Mantis, an issue tracking
- -system.</p>
+<p>Ð? Mantis, Ñ?иÑ?Ñ?еме оÑ?Ñ?леживаниÑ? пÑ?облем, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1118">CVE-2012-1118</a>
- - <p>Mantis installation in which the private_bug_view_threshold
- - configuration option has been set to an array value do not
- - properly enforce bug viewing restrictions.</p></li>
+ <p>УÑ?Ñ?ановки Mantis, в коÑ?оÑ?Ñ?Ñ? паÑ?амеÑ?Ñ? наÑ?Ñ?Ñ?ойки private_bug_view_threshold
+ Ñ?Ñ?Ñ?ановлен в знаÑ?ение маÑ?Ñ?ива, непÑ?авилÑ?но Ñ?абоÑ?аеÑ? Ñ? огÑ?аниÑ?ениÑ?ми
+ пÑ?оÑ?моÑ?Ñ?а Ñ?ообÑ?ений об оÑ?ибкаÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1119">CVE-2012-1119</a>
- - <p>Copy/clone bug report actions fail to leave an audit trail.</p></li>
+ <p>Ð?ейÑ?Ñ?виÑ? по копиÑ?ованиÑ?/клониÑ?ованиÑ? Ñ?ообÑ?ений об оÑ?ибкаÑ? не оÑ?Ñ?авлÑ?Ñ?Ñ? Ñ?лед аÑ?диÑ?а.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1120">CVE-2012-1120</a>
- - <p>The delete_bug_threshold/bugnote_allow_user_edit_delete
- - access check can be bypassed by users who have write
- - access to the SOAP API.</p></li>
+ <p>Ð?олÑ?зоваÑ?ели, имеÑ?Ñ?ие доÑ?Ñ?Ñ?п к API SOAP, могÑ?Ñ?
+ обойÑ?и пÑ?овеÑ?кÑ? доÑ?Ñ?Ñ?па
+ delete_bug_threshold/bugnote_allow_user_edit_delete.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1122">CVE-2012-1122</a>
- - <p>Mantis performed access checks incorrectly when moving bugs
- - between projects.</p></li>
+ <p>Mantis непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?ки доÑ?Ñ?Ñ?па пÑ?и пеÑ?емеÑ?ении Ñ?ообÑ?ений
+ об оÑ?ибкаÑ? междÑ? пÑ?оекÑ?ами.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1123">CVE-2012-1123</a>
- - <p>A SOAP client sending a null password field can authenticate
- - as the Mantis administrator.</p></li>
+ <p>SOAP-клиенÑ?, оÑ?пÑ?авлÑ?Ñ?Ñ?ий пÑ?Ñ?Ñ?ое поле длÑ? ввода паÑ?олÑ?, можеÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?оваÑ?Ñ?Ñ?Ñ?
+ как админиÑ?Ñ?Ñ?аÑ?оÑ? Mantis.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2692">CVE-2012-2692</a>
- - <p>Mantis does not check the delete_attachments_threshold
- - permission when a user attempts to delete an attachment from
- - an issue.</p></li>
+ <p>Mantis не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? пÑ?ав доÑ?Ñ?Ñ?па delete_attachments_threshold
+ в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ? пÑ?Ñ?аеÑ?Ñ?Ñ? Ñ?далиÑ?Ñ? вложение из Ñ?ообÑ?ениÑ?
+ об оÑ?ибке.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 1.1.8+dfsg-10squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.1.8+dfsg-10squeeze2.</p>
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 1.2.11-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.2.11-1.</p>
- -<p>We recommend that you upgrade your mantis packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mantis.</p>
</define-tag>
# do not modify the following line
- --- english/security/2012/dsa-2519.wml 2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2519.wml 2016-11-06 16:27:35.791144345 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several security vulnerabilities affecting ISC dhcpd, a server for
- -automatic IP address assignment, have been discovered. Additionally, the
- -latest security update for isc-dhcp, <a href="../dsa-2516">DSA-2516-1</a>,
- -did not properly apply the patches for
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей в dhcpd оÑ? ISC, Ñ?еÑ?веÑ?е длÑ?
+авÑ?омаÑ?иÑ?еÑ?кого назнаÑ?ениÑ? IP адÑ?еÑ?ов. Ð?Ñ?оме Ñ?ого в поÑ?леднем
+обновлении безопаÑ?ноÑ?Ñ?и длÑ? isc-dhcp, <a href="../dsa-2516">DSA-2516-1</a>,
+непÑ?авилÑ?но бÑ?ли пÑ?имененÑ? заплаÑ?Ñ? длÑ?
<a href="https://security-tracker.debian.org/tracker/CVE-2012-3571">CVE-2012-3571</a>
- -and
+и
<a href="https://security-tracker.debian.org/tracker/CVE-2012-3954">CVE-2012-3954</a>.
- -This has been addressed
- -in this additional update.</p>
+ÐÑ?а пÑ?облема бÑ?ла Ñ?еÑ?ена
+в данном обновлении.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4539">CVE-2011-4539</a>
- - <p>BlueCat Networks discovered that it is possible to crash DHCP servers
- - configured to evaluate requests with regular expressions via crafted
- - DHCP request packets.</p></li>
+ <p>СоÑ?Ñ?Ñ?дники BlueCat Networks обнаÑ?Ñ?жили, Ñ?Ñ?о пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ?
+ DHCP-запÑ?оÑ?ов можно аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? DHCP-Ñ?еÑ?веÑ?Ñ?, наÑ?Ñ?Ñ?оеннÑ?е на обÑ?абоÑ?кÑ?
+ запÑ?оÑ?ов Ñ? Ñ?егÑ?лÑ?Ñ?нÑ?ми вÑ?Ñ?ажениÑ?ми.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3571">CVE-2012-3571</a>
- - <p>Markus Hietava of the Codenomicon CROSS project discovered that it is
- - possible to force the server to enter an infinite loop via messages with
- - malformed client identifiers.</p></li>
+ <p>Ð?аÑ?кÑ?Ñ? ХиеÑ?ава из пÑ?оекÑ?а Codenomicon CROSS обнаÑ?Ñ?жил, Ñ?Ñ?о можно
+ ввеÑ?Ñ?и Ñ?еÑ?веÑ? в беÑ?конеÑ?нÑ?й Ñ?икл Ñ? помоÑ?Ñ?Ñ? Ñ?ообÑ?ений Ñ?
+ некоÑ?Ñ?екÑ?нÑ?ми иденÑ?иÑ?икаÑ?оÑ?ами клиенÑ?а.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3954">CVE-2012-3954</a>
- - <p>Glen Eustace discovered that DHCP servers running in DHCPv6 mode
- - and possibly DHCPv4 mode suffer of memory leaks while processing messages.
- - An attacker can use this flaw to exhaust resources and perform denial
- - of service attacks.</p></li>
+ <p>Ð?лен Ð?Ñ?Ñ?иÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о DHCP-Ñ?еÑ?веÑ?Ñ?, Ñ?абоÑ?аÑ?Ñ?ие в Ñ?ежиме DHCPv6
+ и возможном Ñ?ежиме DHCPv4, подвеÑ?женÑ? Ñ?Ñ?еÑ?кам памÑ?Ñ?и, коÑ?оÑ?Ñ?е возникаÑ?Ñ? пÑ?и обÑ?абоÑ?ке Ñ?ообÑ?ений.
+ Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? иÑ?Ñ?еÑ?паниÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов и вÑ?зова оÑ?каза
+ в обÑ?лÑ?живании.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 4.1.1-P1-15+squeeze6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.1.1-P1-15+squeeze6.</p>
- -<p>For the testing (wheezy) and unstable (sid) distributions, this problem
- -will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а пÑ?облема
+бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
- -<p>We recommend that you upgrade your isc-dhcp packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? isc-dhcp.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJYHxfSAAoJEF7nbuICFtKlrd8P/1aULhWhsHVMa+8XgU4mwxRD
MydZ5KsGvEiYgU6SqrAwZyJy5EdJ4hB8Dx7P5bAjnIUk2YMqVaLPmDTB2t6m8i3J
uEy5Qgoa325YwGva/lcOUxi48oupQYipYwtN3Wc5nZrkLdkDfjHchAW+osDdb2ej
riyenBm5/NXZncfmY0YUlINvLESGrCM1l+rHunuQ9dnoUqvoGA6pzzi5RbrSIUQI
MHaZIeiHWxGupxD7vDiHM+m+mZP2wB0Th7oDC0Yxrc94y4MVZkbKMY5MIUfAXVjz
dQo5k/WhwbcK/w9wvKNKSotOMT6qDbSJ33KPYY/7llhJ+iRCZV8GwAC56FQgOpvX
6NFIebI93oxTf1D+PvIWXG+4g4bvqAcdmWMP5J98hicwjBrNPQFUv6+RA85araaV
MGE6Ge/XyxeIJMK13a0QolEf8KnHfYFdzwsElJVvX9Chp9EVpz7C6Zvl2l43h4vK
NHro/O94E0L0DdeVRqmRRZ146+26epWOdM3BtAFkAv2/7Nf4mJSoktzzjEVEy+nr
2+jSpgsi3AkHIN7Nk1O6y8S/0aK1jsHqUp7TaxVaqu5KOkJXU79U6BnPKpR0w0/O
hVrncPsi9Ak+nfSGDq8sCI/xb+VGqWDCxqUM4WEkNFaBomscYrYBactZFBu6CgCQ
pF05VW8ePABfLSf9SCqA
=OgCV
-----END PGP SIGNATURE-----
Reply to: