[DONE] wml://security/2012/dsa-2567.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- ../../english/security/2012/dsa-2567.wml 2017-11-01 10:11:10.379847866 +0500
+++ 2012/dsa-2567.wml 2018-03-24 22:32:26.162127145 +0500
@@ -1,56 +1,56 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" mindelta="1"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Request Tracker (RT), an issue
- -tracking system.</p>
+<p>Ð?еÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей бÑ?ло обнаÑ?Ñ?жено в Request Tracker (RT), Ñ?иÑ?Ñ?еме
+оÑ?Ñ?леживаниÑ? пÑ?облем.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4730">CVE-2012-4730</a>
- - <p>Authenticated users can add arbitrary headers or content to
- - mail generated by RT. </p></li>
+ <p>Ð?Ñ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е полÑ?зоваÑ?ели могÑ?Ñ? добавлÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е заголовки или
+ Ñ?одеÑ?жимое, Ñ?оздаваемое RT.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4732">CVE-2012-4732</a>
- - <p>A CSRF vulnerability may allow attackers to toggle ticket
- - bookmarks.</p></li>
+ <p>Ð?одделка межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов можеÑ? позволиÑ?Ñ? злоÑ?мÑ?Ñ?ленникам изменÑ?Ñ?Ñ?
+ закладки.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4734">CVE-2012-4734</a>
- - <p>If users follow a crafted URI and log in to RT, they may
- - trigger actions which would ordinarily blocked by the CSRF
- - prevention logic.</p></li>
+ <p>Ð?Ñ?ли полÑ?зоваÑ?ели пеÑ?еÑ?одÑ?Ñ? по Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованномÑ? URI и вÑ?одÑ?Ñ? в RT, Ñ?о
+ они могÑ?Ñ? вÑ?зваÑ?Ñ? дейÑ?Ñ?виÑ?, коÑ?оÑ?Ñ?е обÑ?Ñ?но блокиÑ?Ñ?Ñ?Ñ?Ñ?Ñ? Ñ?пеÑ?иалÑ?ной логикой,
+ пÑ?едназнаÑ?енной длÑ? пÑ?оÑ?иводейÑ?Ñ?виÑ? подделке межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6578">CVE-2012-6578</a>,
<a href="https://security-tracker.debian.org/tracker/CVE-2012-6579">CVE-2012-6579</a>,
<a href="https://security-tracker.debian.org/tracker/CVE-2012-6580">CVE-2012-6580</a>,
<a href="https://security-tracker.debian.org/tracker/CVE-2012-6581">CVE-2012-6581</a>
- - <p>Several different vulnerabilities in GnuPG processing allow
- - attackers to cause RT to improperly sign outgoing email.</p></li>
+ <p>Ð?еÑ?колÑ?ко Ñ?азлиÑ?нÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей в обÑ?абоÑ?ке GnuPG позволÑ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленникам
+ вÑ?зÑ?ваÑ?Ñ? Ñ?иÑ?Ñ?аÑ?иÑ?, пÑ?и коÑ?оÑ?ой RT некоÑ?Ñ?екÑ?но подпиÑ?Ñ?ваеÑ? иÑ?Ñ?одÑ?Ñ?Ñ?Ñ? поÑ?Ñ?Ñ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4884">CVE-2012-4884</a>
- - <p>If GnuPG support is enabled, authenticated users can
- - create arbitrary files as the web server user, which may
- - enable arbitrary code execution.</p></li>
+ <p>Ð?Ñ?ли вклÑ?Ñ?ена поддеÑ?жка GnuPG, Ñ?о аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е полÑ?зоваÑ?ели могÑ?Ñ?
+ Ñ?оздаваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ? оÑ? лиÑ?а полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?его веб-Ñ?еÑ?веÑ?, Ñ?Ñ?о
+ можеÑ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
</ul>
- - <p>Please note that if you run request-tracker3.8 under the Apache web
- - server, you must stop and start Apache manually. The <q>restart</q>
- - mechanism is not recommended, especially when using mod_perl.</p>
+ <p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о еÑ?ли request-tracker3.8 иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? Ñ?овмеÑ?Ñ?но Ñ? веб-Ñ?еÑ?веÑ?ом
+ Apache, Ñ?о Ñ?ледÑ?еÑ? вÑ?Ñ?Ñ?нÑ?Ñ? оÑ?Ñ?ановиÑ?Ñ? и запÑ?Ñ?Ñ?иÑ?Ñ? Apache. Ð?еÑ?анизм <q>restart</q>
+ не Ñ?екомендÑ?еÑ?Ñ?Ñ? иÑ?полÑ?зоваÑ?Ñ?, оÑ?обенно пÑ?и иÑ?полÑ?зовании mod_perl.</p>
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 3.8.8-7+squeeze6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.8.8-7+squeeze6.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 4.0.7-2 of the request-tracker4 package.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.0.7-2 пакеÑ?а request-tracker4 package.</p>
- -<p>We recommend that you upgrade your request-tracker3.8 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? request-tracker3.8.</p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2012/dsa-2567.data"
- -# $Id: dsa-2567.wml,v 1.4 2014/04/30 07:16:29 pabs Exp $
-----BEGIN PGP SIGNATURE-----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=Q32t
-----END PGP SIGNATURE-----
Reply to: