[DONE] wml://security/2006/dsa-1{039,089,212}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2006/dsa-1039.wml 2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1039.wml 2016-08-13 14:19:42.393508627 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in blender, a very fast
- -and versatile 3D modeller/renderer. The Common Vulnerabilities and
- -Exposures Project identifies the following problems:</p>
+<p>Ð? blender, оÑ?енÑ? бÑ?Ñ?Ñ?Ñ?ой и гибкой пÑ?огÑ?амме длÑ? моделиÑ?ованиÑ?
+и оÑ?Ñ?иÑ?овки 3D гÑ?аÑ?ики, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-3302">CVE-2005-3302</a>
- - <p>Joxean Koret discovered that due to missing input validation a
- - provided script is vulnerable to arbitrary command execution.</p></li>
+ <p>ХокÑ?еан Ð?оÑ?енÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о из-за оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?виÑ? пÑ?овеÑ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?
+ пÑ?едоÑ?Ñ?авленнÑ?й Ñ?Ñ?енаÑ?ий Ñ?Ñ?звим к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ? команд.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4470">CVE-2005-4470</a>
- - <p>Damian Put discovered a buffer overflow that allows remote
- - attackers to cause a denial of service and possibly execute
- - arbitrary code.</p></li>
+ <p>Ð?амиан Ð?Ñ?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а, коÑ?оÑ?ое позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+ злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ?
+ пÑ?оизволÑ?нÑ?й код.</p></li>
</ul>
- -<p>The old stable distribution (woody) is not affected by this problem.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (woody) не подвеÑ?жен Ñ?Ñ?ой пÑ?облеме.</p>
- -<p>For the stable distribution (sarge) this problem has been fixed in
- -version 2.36-1sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.36-1sarge1.</p>
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 2.40-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.40-1.</p>
- -<p>We recommend that you upgrade your blender package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? blender.</p>
</define-tag>
# do not modify the following line
- --- english/security/2006/dsa-1089.wml 2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1089.wml 2016-08-13 14:23:09.867077838 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several problems have been discovered in freeradius, a
- -high-performance and highly configurable RADIUS server. The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? freeradius, вÑ?Ñ?окопÑ?оизводиÑ?елÑ?ном и гибко наÑ?Ñ?Ñ?аиваемом
+RADIUS-Ñ?еÑ?веÑ?е, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко пÑ?облем. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2005-4744">CVE-2005-4744</a>
- - <p>SuSE researchers have discovered several off-by-one errors may
- - allow remote attackers to cause a denial of service and possibly
- - execute arbitrary code.</p></li>
+ <p>Ð?Ñ?Ñ?ледоваÑ?ели из SuSE обнаÑ?Ñ?жили, Ñ?Ñ?о неÑ?колÑ?ко оÑ?ибок на единиÑ?Ñ? могÑ?Ñ?
+ позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?но
+ вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1354">CVE-2006-1354</a>
- - <p>Due to insufficient input validation it is possible for a remote
- - attacker to bypass authentication or cause a denial of service.</p></li>
+ <p>Ð?з-за недоÑ?Ñ?аÑ?оÑ?ной пÑ?овеÑ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? Ñ?далÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник
+ можеÑ? обойÑ?и аÑ?Ñ?енÑ?иÑ?икаÑ?иÑ? или вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
</ul>
- -<p>The old stable distribution (woody) does not contain this package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) Ñ?Ñ?оÑ? пакеÑ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
- -<p>For the stable distribution (sarge) this problem has been fixed in
- -version 1.0.2-4sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.2-4sarge1.</p>
- -<p>For the unstable distribution (sid) this problem has been fixed in
- -version 1.1.0-1.2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.1.0-1.2.</p>
- -<p>We recommend that you upgrade your freeradius package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? freeradius.</p>
</define-tag>
# do not modify the following line
- --- english/security/2006/dsa-1212.wml 2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1212.wml 2016-08-13 14:27:39.171592123 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>Denial of service</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
<define-tag moreinfo>
- -<p>Two denial of service problems have been found in the OpenSSH
- -server. The Common Vulnerabilities and Exposures project identifies the
- -following vulnerabilities:</p>
+<p>Ð? Ñ?еÑ?веÑ?е OpenSSH бÑ?ли обнаÑ?Ñ?женÑ? два оÑ?каза
+в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие Ñ?Ñ?звимоÑ?Ñ?и:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4924">CVE-2006-4924</a>
- - <p>The sshd support for ssh protocol version 1 does not properly
- - handle duplicate incoming blocks. This could allow a remote
- - attacker to cause sshd to consume significant CPU resources
- - leading to a denial of service.</p></li>
+ <p>Ð?оддеÑ?жка sshd пÑ?оÑ?окола ssh веÑ?Ñ?ии 1 непÑ?авилÑ?но
+ обÑ?абаÑ?Ñ?ваеÑ? дÑ?блиÑ?Ñ?Ñ?Ñ?ие вÑ?одÑ?Ñ?ие блоки. ÐÑ?о можеÑ? позволиÑ?Ñ? Ñ?далÑ?нномÑ?
+ злоÑ?мÑ?Ñ?ленникÑ? вÑ?зваÑ?Ñ? Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?, коÑ?оÑ?ое
+ пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5051">CVE-2006-5051</a>
- - <p>A signal handler race condition could potentially allow a remote
- - attacker to crash sshd and could theoretically lead to the
- - ability to execute arbitrary code.</p></li>
+ <p>СоÑ?Ñ?оÑ?ние гонки в обÑ?абоÑ?Ñ?ике Ñ?игналов поÑ?енÑ?иалÑ?но можеÑ? позволиÑ?Ñ? Ñ?далÑ?нномÑ?
+ злоÑ?мÑ?Ñ?ленникÑ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? sshd, и Ñ?еоÑ?еÑ?иÑ?еÑ?ки можеÑ?
+ позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
</ul>
- -<p>For the stable distribution (sarge), these problems have been fixed in
- -version 1:3.8.1p1-8.sarge.6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:3.8.1p1-8.sarge.6.</p>
- -<p>For the unstable and testing distributions, these problems have been
- -fixed in version 1:4.3p2-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном и Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1:4.3p2-4.</p>
- -<p>We recommend that you upgrade your openssh package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? openssh.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=6wod
-----END PGP SIGNATURE-----
Reply to: