[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{666,530,446}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1446.wml	2014-04-30 13:16:14.000000000 +0600
+++ russian/security/2008/dsa-1446.wml	2016-07-08 18:07:09.058362958 +0500
@@ -1,10 +1,11 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 <p>
- -Several remote vulnerabilities have been discovered in the Wireshark
- -network traffic analyzer, which may lead to denial of service. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:
+Ð? Wireshark, анализаÑ?оÑ?е Ñ?еÑ?евого Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:
 </p>
 
 <ul>
@@ -12,35 +13,35 @@
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6450";>CVE-2007-6450</a>
 
     <p>
- -    The RPL dissector could be tricked into an infinite loop.
+    Ð?иÑ?Ñ?екÑ?оÑ? RPL можеÑ? вÑ?одиÑ?Ñ? в беÑ?конеÑ?нÑ?й Ñ?икл.
     </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6451";>CVE-2007-6451</a>
 
     <p>
- -    The CIP dissector could be tricked into excessive memory
- -    allocation.
+    Ð?иÑ?Ñ?екÑ?оÑ? CIP можеÑ? вÑ?делиÑ?Ñ? Ñ?лиÑ?ком болÑ?Ñ?ой обÑ?Ñ?м
+    памÑ?Ñ?и.
     </p></li>
 
 </ul>
 
 <p>
- -For the old stable distribution (sarge), these problems have been fixed in
- -version 0.10.10-2sarge11. (In Sarge Wireshark used to be called Ethereal).
+Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.10.10-2sarge11. (Ð? вÑ?пÑ?Ñ?ке Sarge Wireshark вÑ?зÑ?ваеÑ?Ñ?Ñ? Ethereal).
 </p>
 
 <p>
- -For the stable distribution (etch), these problems have been fixed in
- -version 0.99.4-5.etch.2.
+Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.99.4-5.etch.2.
 </p>
 
 <p>
- -For the unstable distribution (sid), these problems have been fixed in
- -version 0.99.7-1.
+Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.99.7-1.
 </p>
 
 <p>
- -We recommend that you upgrade your wireshark packages.
+РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wireshark.
 </p>
 
 </define-tag>
- --- english/security/2008/dsa-1530.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1530.wml	2016-07-08 18:04:01.065051907 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>Several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local/remote vulnerabilities have been discovered in cupsys, the
- -Common Unix Printing System.  The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? cupsys, обÑ?ей Ñ?иÑ?Ñ?еме пеÑ?аÑ?и Unix, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+локалÑ?нÑ?Ñ?/Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0047";>CVE-2008-0047</a>
 <p>
- -Heap-based buffer overflow in CUPS, when printer sharing is enabled,
- -allows remote attackers to execute arbitrary code via crafted search
- -expressions.
+Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в CUPS (еÑ?ли вклÑ?Ñ?ен обÑ?ий доÑ?Ñ?Ñ?п к пÑ?инÑ?еÑ?Ñ?)
+позволÑ?еÑ? Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? поиÑ?ковÑ?Ñ? вÑ?Ñ?ажений.
 </p>
 </li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0882";>CVE-2008-0882</a>
 <p>
- -Double free vulnerability in the process_browse_data function in CUPS
- -1.3.5 allows remote attackers to cause a denial of service (daemon
- -crash) and possibly the execution of arbitrary code via crafted packets to the
- -cupsd port (631/udp), related to an unspecified manipulation of a
- -remote printer.
+Ð?войное оÑ?вобождение памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии process_browse_data в CUPS
+1.3.5 позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ?
+оÑ?Ñ?ановка Ñ?лÑ?жбÑ?) и вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? оÑ?пÑ?авки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ?
+пакеÑ?ов на поÑ?Ñ? cupsd (631/udp). ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? Ñ?вÑ?зана Ñ? неопÑ?еделÑ?ннÑ?ми дейÑ?Ñ?виÑ?ми
+Ñ? Ñ?далÑ?ннÑ?м пÑ?инÑ?еÑ?ом.
 </p>
 </li>
 </ul>
 
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.2.7-4etch3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.7-4etch3.</p>
 
- -<p>We recommend that you upgrade your cupsys packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? cupsys.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1666.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1666.wml	2016-07-08 16:46:20.369096575 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the GNOME XML library.
- -The Common Vulnerabilities and Exposures project identifies the 
- -following problems:</p>
+<p>Ð? XML-библиоÑ?еке длÑ? GNOME бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4225";>CVE-2008-4225</a>
 
- -    <p>Drew Yao discovered that missing input sanitising in the
- -    xmlBufferResize() function may lead to an infinite loop,
- -    resulting in denial of service.</p></li>
+    <p>Ð?Ñ?Ñ? Яо обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в
+    Ñ?Ñ?нкÑ?ии xmlBufferResize() можеÑ? пÑ?иводиÑ?Ñ? к беÑ?конеÑ?номÑ? Ñ?иклÑ?,
+    Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4226";>CVE-2008-4226</a>
 
- -    <p>Drew Yao discovered that an integer overflow in the
- -    xmlSAX2Characters() function may lead to denial of service or
- -    the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?Ñ? Яо обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в
+    Ñ?Ñ?нкÑ?ии xmlSAX2Characters() можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.6.27.dfsg-6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.27.dfsg-6.</p>
 
- -<p>For the upcoming stable distribution (lenny) and the unstable
- -distribution (sid), these problems have been fixed in 
- -version 2.6.32.dfsg-5.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (lenny) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.32.dfsg-5.</p>
 
- -<p>We recommend that you upgrade your libxml2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libxml2.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=OA7X
-----END PGP SIGNATURE-----


Reply to: