[DONE] wml://{security/2012/dsa-2451.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2012/dsa-2451.wml 2017-11-01 10:11:10.335844997 +0500
+++ russian/security/2012/dsa-2451.wml 2018-03-07 16:38:02.635402693 +0500
@@ -1,50 +1,51 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Puppet, a centralized
- -configuration management system. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? Puppet, Ñ?иÑ?Ñ?еме Ñ?енÑ?Ñ?ализованного Ñ?пÑ?авлениÑ? наÑ?Ñ?Ñ?ойками, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1906">CVE-2012-1906</a>
- - <p>Puppet is using predictable temporary file names when downloading
- - Mac OS X package files. This allows a local attacker to either
- - overwrite arbitrary files on the system or to install an arbitrary
- - package.</p></li>
+ <p>Puppet иÑ?полÑ?зÑ?еÑ? пÑ?едÑ?казÑ?емÑ?е имена вÑ?еменнÑ?Ñ? Ñ?айлов пÑ?и загÑ?Ñ?зке
+ пакеÑ?нÑ?Ñ? Ñ?айлов Mac OS X. ÐÑ?о позволÑ?еÑ? локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? пеÑ?езапиÑ?Ñ?ваÑ?Ñ?
+ пÑ?оизволÑ?нÑ?е Ñ?айлÑ? в Ñ?иÑ?Ñ?еме или Ñ?Ñ?Ñ?анавливаÑ?Ñ? пÑ?оизволÑ?нÑ?е
+ пакеÑ?Ñ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1986">CVE-2012-1986</a>
- - <p>When handling requests for a file from a remote filebucket, Puppet
- - can be tricked into overwriting its defined location for filebucket
- - storage. This allows an authorized attacker with access to the Puppet
- - master to read arbitrary files.</p></li>
+ <p>Ð?Ñ?и обÑ?абоÑ?ке Ñ?айловÑ?Ñ? запÑ?оÑ?ов оÑ? Ñ?далÑ?нного Ñ?Ñ?анилиÑ?а Puppet
+ можеÑ? пеÑ?езапиÑ?аÑ?Ñ? опÑ?еделÑ?нное в наÑ?Ñ?Ñ?ойкаÑ? меÑ?Ñ?оположение
+ Ñ?Ñ?анилиÑ?а. ÐÑ?о позволÑ?еÑ? авÑ?оÑ?изованномÑ? злоÑ?мÑ?Ñ?ленникÑ?, имеÑ?Ñ?емÑ? доÑ?Ñ?Ñ?п к
+ главномÑ? Ñ?злÑ? Puppet, Ñ?иÑ?аÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1987">CVE-2012-1987</a>
- - <p>Puppet is incorrectly handling filebucket store requests. This allows
- - an attacker to perform denial of service attacks against Puppet by
- - resource exhaustion.</p></li>
+ <p>Puppet непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? запÑ?оÑ?Ñ? Ñ?Ñ?анилиÑ?а по Ñ?оÑ?Ñ?анениÑ? Ñ?айлов. ÐÑ?о позволÑ?еÑ?
+ злоÑ?мÑ?Ñ?ленникÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании в Puppet пÑ?Ñ?Ñ?м
+ иÑ?Ñ?еÑ?паниÑ? памÑ?Ñ?и.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1988">CVE-2012-1988</a>
- - <p>Puppet is incorrectly handling filebucket requests. This allows an
- - attacker with access to the certificate on the agent and an unprivileged
- - account on Puppet master to execute arbitrary code via crafted file
- - path names and making a filebucket request.</p></li>
+ <p>Puppet непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? запÑ?оÑ?Ñ? Ñ?Ñ?анилиÑ?а. ÐÑ?о позволÑ?еÑ?
+ злоÑ?мÑ?Ñ?ленникÑ?, имеÑ?Ñ?емÑ? доÑ?Ñ?Ñ?п к Ñ?еÑ?Ñ?иÑ?икаÑ?Ñ? на Ñ?зле-агенÑ?е и непÑ?ивилегиÑ?ованнÑ?Ñ?
+ Ñ?Ñ?Ñ?Ñ?нÑ?Ñ? запиÑ?Ñ? на главном Ñ?зле Puppet, вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+ Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? пÑ?Ñ?ей к Ñ?айлам и запÑ?оÑ?ов к Ñ?Ñ?анилиÑ?Ñ?.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.6.2-5+squeeze5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.6.2-5+squeeze5.</p>
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 2.7.13-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.7.13-1.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.7.13-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.7.13-1.</p>
- -<p>We recommend that you upgrade your puppet packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? puppet.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=Avlg
-----END PGP SIGNATURE-----
Reply to: