[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{609,604,496}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1496.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1496.wml	2016-07-08 19:43:41.620836668 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several buffer overflows have been discovered in the MPlayer movie player,
- -which might lead to the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? MPlayer, пÑ?оигÑ?Ñ?ваÑ?еле мÑ?лÑ?Ñ?имедиа, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пеÑ?еполнений бÑ?Ñ?еÑ?а,
+коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0485";>CVE-2008-0485</a>
 
- -    <p>Felipe Manzano and Anibal Sacco discovered a buffer overflow in
- -    the demuxer for MOV files.</p></li>
+    <p>Фелипе Ð?анзано и Ð?нибал Сакко обнаÑ?Ñ?жили пеÑ?еполнение бÑ?Ñ?еÑ?а в
+    демÑ?лÑ?Ñ?иплекÑ?оÑ?е Ñ?айлов MOV.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0486";>CVE-2008-0486</a>
 
- -    <p>Reimar Doeffinger discovered a buffer overflow in the FLAC header
- -    parsing.</p></li>
+    <p>РаймаÑ? Ð?Ñ?Ñ?Ñ?ингеÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а
+    заголовка FLAC.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0629";>CVE-2008-0629</a>
 
- -    <p>Adam Bozanich discovered a buffer overflow in the CDDB access code.</p></li>
+    <p>Ð?дам Ð?озаниÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде длÑ? доÑ?Ñ?Ñ?па к CDDB.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0630";>CVE-2008-0630</a>
 
- -    <p>Adam Bozanich discovered a buffer overflow in URL parsing.</p></li>
+    <p>Ð?дам Ð?озаниÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а URL.</p></li>
 
 </ul>
 
 
- -<p>The old stable distribution (sarge) doesn't contain mplayer.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) пакеÑ? mplayer оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.0~rc1-12etch2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0~rc1-12etch2.</p>
 
- -<p>We recommend that you upgrade your mplayer packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mplayer.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1604.wml	2008-07-09 22:03:34.000000000 +0600
+++ russian/security/2008/dsa-1604.wml	2016-07-08 19:39:56.202321600 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>DNS cache poisoning</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?авление кеÑ?а DNS</define-tag>
 <define-tag moreinfo>
 
- -<p>Dan Kaminsky discovered that properties inherent to the DNS protocol
- -lead to practical DNS cache poisoning attacks.  Among other things,
- -successful attacks can lead to misdirected web traffic and email
- -rerouting.</p>
- -
- -<p>The BIND 8 legacy code base could not be updated to include the
- -recommended countermeasure (source port randomization, see
- -<a href="dsa-1603">DSA-1603-1</a>
- -for details).  There are two ways to deal with this situation:</p>
- -
- -<p>1. Upgrade to BIND 9 (or another implementation with source port
- -randomization).  The documentation included with BIND 9 contains a
- -migration guide.</p>
- -
- -<p>2. Configure the BIND 8 resolver to forward queries to a BIND 9
- -resolver.  Provided that the network between both resolvers is trusted,
- -this protects the BIND 8 resolver from cache poisoning attacks (to the
- -same degree that the BIND 9 resolver is protected).</p>
- -
- -<p>This problem does not apply to BIND 8 when used exclusively as an
- -authoritative DNS server.  It is theoretically possible to safely use
- -BIND 8 in this way, but updating to BIND 9 is strongly recommended.
- -BIND 8 (that is, the bind package) will be removed from the etch
- -distribution in a future point release.</p>
+<p>Ð?Ñ?н Ð?аминÑ?ки обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?обÑ?Ñ?веннÑ?е Ñ?войÑ?Ñ?ва пÑ?оÑ?окола DNS
+пÑ?иводÑ?Ñ? к пÑ?акÑ?иÑ?еÑ?ким аÑ?акам по оÑ?Ñ?авлениÑ? кеÑ?а DNS. Ð?омимо пÑ?оÑ?его
+Ñ?Ñ?пеÑ?нÑ?е аÑ?аки могÑ?Ñ? пÑ?иводиÑ?Ñ? к непÑ?авилÑ?номÑ? напÑ?авлениÑ? веб-Ñ?Ñ?аÑ?ика и
+Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ?.</p>
+
+<p>УÑ?Ñ?аÑ?евÑ?аÑ? кодоваÑ? база BIND 8 не можеÑ? бÑ?Ñ?Ñ? обновлена Ñ? Ñ?елÑ?Ñ? вклÑ?Ñ?ениÑ?
+Ñ?екомендÑ?емой конÑ?Ñ?меÑ?Ñ? (Ñ?лÑ?Ñ?айнÑ?й вÑ?боÑ? поÑ?Ñ?а иÑ?Ñ?оÑ?ника, подÑ?обноÑ?Ñ?и
+Ñ?моÑ?Ñ?иÑ?е в
+<a href="dsa-1603">DSA-1603-1</a>).  Ð? Ñ?Ñ?ой Ñ?иÑ?Ñ?аÑ?ии имееÑ?Ñ?Ñ? два ваÑ?ианÑ?а дейÑ?Ñ?вий:</p>
+
+<p>1. Ð?Ñ?полниÑ?Ñ? обновление до BIND 9 (или дÑ?Ñ?гой Ñ?еализаÑ?ии Ñ?о Ñ?лÑ?Ñ?айнÑ?м вÑ?боÑ?ом поÑ?Ñ?а
+иÑ?Ñ?оÑ?ника).  Ð?окÑ?менÑ?аÑ?иÑ? в пакеÑ?е BIND 9 Ñ?одеÑ?жиÑ?
+Ñ?Ñ?ководÑ?Ñ?во по мигÑ?аÑ?ии.</p>
+
+<p>2. Ð?аÑ?Ñ?Ñ?оиÑ?Ñ? Ñ?еÑ?аÑ?елÑ? BIND 8 на пеÑ?едаÑ?Ñ? запÑ?оÑ?ов Ñ?еÑ?аÑ?елÑ?
+BIND 9.  УÑ?иÑ?Ñ?ваÑ?, Ñ?Ñ?о Ñ?еÑ?Ñ? междÑ? обоими Ñ?еÑ?аÑ?елÑ?ми безопаÑ?на,
+Ñ?Ñ?о заÑ?иÑ?аеÑ? Ñ?еÑ?аÑ?елÑ? BIND 8 оÑ? аÑ?ак по оÑ?Ñ?авлениÑ? кеÑ?а (до Ñ?ой
+Ñ?Ñ?епени, до коÑ?оÑ?ой заÑ?иÑ?Ñ?н Ñ?еÑ?аÑ?елÑ? BIND 9).</p>
+
+<p>ЭÑ?а пÑ?облема не каÑ?аеÑ?Ñ?Ñ? BIND 8 в Ñ?ом Ñ?лÑ?Ñ?ае, когда он иÑ?полÑ?зÑ?еÑ?Ñ?Ñ?
+Ñ?олÑ?ко в каÑ?еÑ?Ñ?ве авÑ?оÑ?иÑ?еÑ?ного DNS-Ñ?еÑ?веÑ?а.  ТеоÑ?еÑ?иÑ?еÑ?ки можно безопаÑ?ноÑ?Ñ?и иÑ?полÑ?зоваÑ?Ñ?
+BIND 8, но наÑ?Ñ?оÑ?Ñ?елÑ?но Ñ?екомендÑ?ем вÑ?полниÑ?Ñ? обновление до BIND 9.
+BIND 8 (Ñ?о еÑ?Ñ?Ñ?, пакеÑ? bind) бÑ?деÑ? Ñ?далÑ?н из вÑ?пÑ?Ñ?ка etch
+в бÑ?дÑ?Ñ?ей Ñ?едаÑ?ии.</p>
 
 </define-tag>
 
- --- english/security/2008/dsa-1609.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1609.wml	2016-07-08 19:32:07.371109909 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>various</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>Ñ?азное</define-tag>
 <define-tag moreinfo>
- -<p>Several local/remote vulnerabilities have been discovered in lighttpd,
- -a fast webserver with minimal memory footprint.</p>
+<p>Ð? lighttpf, бÑ?Ñ?Ñ?Ñ?ом веб-Ñ?еÑ?веÑ?е Ñ? минималÑ?нÑ?м поÑ?Ñ?еблением памÑ?Ñ?и, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко локалÑ?нÑ?Ñ?/Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
- -<p>The Common Vulnerabilities and Exposures project identifies the 
- -following problems:</p>
+<p>Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0983";>CVE-2008-0983</a>
- -  <p>lighttpd 1.4.18, and possibly other versions before 1.5.0, does not
- -  properly calculate the size of a file descriptor array, which allows 
- -  remote attackers to cause a denial of service (crash) via a large number 
- -  of connections, which triggers an out-of-bounds access. </p></li>
+  <p>lighttpd 1.4.18 (а возможно и дÑ?Ñ?гие веÑ?Ñ?ии до 1.5.0) непÑ?авилÑ?но
+  вÑ?Ñ?иÑ?лÑ?Ñ?Ñ? Ñ?азмеÑ? маÑ?Ñ?ива Ñ?айловÑ?Ñ? деÑ?кÑ?ипÑ?оÑ?ов, Ñ?Ñ?о позволÑ?еÑ?
+  Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ? болÑ?Ñ?ого
+  Ñ?иÑ?ла Ñ?оединений, Ñ?Ñ?о пÑ?иводиÑ? к доÑ?Ñ?Ñ?пÑ? за пÑ?еделÑ? вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и. </p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3948";>CVE-2007-3948</a>
- -  <p>connections.c in lighttpd before 1.4.16 might accept more connections 
- -  than the configured maximum, which allows remote attackers to cause a
- -  denial of service (failed assertion) via a large number of connection
- -  attempts.</p></li>
+  <p>connections.c в lighttpd до веÑ?Ñ?ии 1.4.16 можеÑ? пÑ?инÑ?Ñ?Ñ? болÑ?Ñ?е Ñ?оединений,
+  Ñ?ем вÑ?бÑ?аннÑ?й в наÑ?Ñ?Ñ?ойкаÑ? макÑ?имÑ?м, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ?
+  оÑ?каз в обÑ?лÑ?живании (оÑ?ибка Ñ?Ñ?веÑ?ждениÑ?) Ñ? помоÑ?Ñ?Ñ? болÑ?Ñ?ого Ñ?иÑ?ла попÑ?Ñ?ок
+  Ñ?оединениÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.4.13-4etch9.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.13-4etch9.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.4.18-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.18-2.</p>
 
- -<p>We recommend that you upgrade your lighttpd package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? lighttpd.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=u6/y
-----END PGP SIGNATURE-----


Reply to: