[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2567.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- ../../english/security/2012/dsa-2567.wml	2017-11-01 10:11:10.379847866 +0500
+++ 2012/dsa-2567.wml	2018-03-24 22:32:26.162127145 +0500
@@ -1,56 +1,56 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" mindelta="1"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities were discovered in Request Tracker (RT), an issue
- -tracking system.</p>
+<p>Ð?еÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей бÑ?ло обнаÑ?Ñ?жено в Request Tracker (RT), Ñ?иÑ?Ñ?еме
+оÑ?Ñ?леживаниÑ? пÑ?облем.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4730";>CVE-2012-4730</a>
 
- -	<p>Authenticated users can add arbitrary headers or content to
- -	mail generated by RT.	</p></li>
+	<p>Ð?Ñ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е полÑ?зоваÑ?ели могÑ?Ñ? добавлÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е заголовки или
+	Ñ?одеÑ?жимое, Ñ?оздаваемое RT.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4732";>CVE-2012-4732</a>
 
- -	<p>A CSRF vulnerability may allow attackers to toggle ticket
- -	bookmarks.</p></li>
+	<p>Ð?одделка межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникам изменÑ?Ñ?Ñ?
+        закладки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4734";>CVE-2012-4734</a>
 
- -	<p>If users follow a crafted URI and log in to RT, they may
- -	trigger actions which would ordinarily blocked by the CSRF
- -	prevention logic.</p></li>
+	<p>Ð?Ñ?ли полÑ?зоваÑ?ели пеÑ?еÑ?одÑ?Ñ? по Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованномÑ? URI и вÑ?одÑ?Ñ? в RT, Ñ?о
+        они могÑ?Ñ? вÑ?зваÑ?Ñ? дейÑ?Ñ?виÑ?, коÑ?оÑ?Ñ?е обÑ?Ñ?но блокиÑ?Ñ?Ñ?Ñ?Ñ?Ñ? Ñ?пеÑ?иалÑ?ной логикой,
+	пÑ?едназнаÑ?енной длÑ? пÑ?оÑ?иводейÑ?Ñ?виÑ? подделке межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6578";>CVE-2012-6578</a>,
     <a href="https://security-tracker.debian.org/tracker/CVE-2012-6579";>CVE-2012-6579</a>,
     <a href="https://security-tracker.debian.org/tracker/CVE-2012-6580";>CVE-2012-6580</a>,
     <a href="https://security-tracker.debian.org/tracker/CVE-2012-6581";>CVE-2012-6581</a>
 
- -	<p>Several different vulnerabilities in GnuPG processing allow
- -	attackers to cause RT to improperly sign outgoing email.</p></li>
+	<p>Ð?еÑ?колÑ?ко Ñ?азлиÑ?нÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей в обÑ?абоÑ?ке GnuPG позволÑ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленникам
+        вÑ?зÑ?ваÑ?Ñ? Ñ?иÑ?Ñ?аÑ?иÑ?, пÑ?и коÑ?оÑ?ой RT некоÑ?Ñ?екÑ?но подпиÑ?Ñ?ваеÑ? иÑ?Ñ?одÑ?Ñ?Ñ?Ñ? поÑ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4884";>CVE-2012-4884</a>
 
- -	<p>If GnuPG support is enabled, authenticated users can
- -	create arbitrary files as the web server user, which may
- -	enable arbitrary code execution.</p></li>
+	<p>Ð?Ñ?ли вклÑ?Ñ?ена поддеÑ?жка GnuPG, Ñ?о аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е полÑ?зоваÑ?ели могÑ?Ñ?
+	Ñ?оздаваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ? оÑ? лиÑ?а полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?его веб-Ñ?еÑ?веÑ?, Ñ?Ñ?о
+        можеÑ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 </ul>
 
- -	<p>Please note that if you run request-tracker3.8 under the Apache web
- -	server, you must stop and start Apache manually.  The <q>restart</q>
- -	mechanism is not recommended, especially when using mod_perl.</p>
+	<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о еÑ?ли request-tracker3.8 иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? Ñ?овмеÑ?Ñ?но Ñ? веб-Ñ?еÑ?веÑ?ом
+        Apache, Ñ?о Ñ?ледÑ?еÑ? вÑ?Ñ?Ñ?нÑ?Ñ? оÑ?Ñ?ановиÑ?Ñ? и запÑ?Ñ?Ñ?иÑ?Ñ? Apache. Ð?еÑ?анизм <q>restart</q>
+	не Ñ?екомендÑ?еÑ?Ñ?Ñ? иÑ?полÑ?зоваÑ?Ñ?, оÑ?обенно пÑ?и иÑ?полÑ?зовании mod_perl.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 3.8.8-7+squeeze6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.8.8-7+squeeze6.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 4.0.7-2 of the request-tracker4 package.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.0.7-2 пакеÑ?а request-tracker4 package.</p>
 
- -<p>We recommend that you upgrade your request-tracker3.8 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? request-tracker3.8.</p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2012/dsa-2567.data"
- -# $Id: dsa-2567.wml,v 1.4 2014/04/30 07:16:29 pabs Exp $
-----BEGIN PGP SIGNATURE-----
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=Q32t
-----END PGP SIGNATURE-----


Reply to: