[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-{2093,1991,1980}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-1980.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1980.wml	2016-08-26 00:49:16.618032476 +0500
@@ -1,30 +1,31 @@
- -<define-tag description>integer underflow/denial of service</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?иÑ?аÑ?елÑ?ное пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел/оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
 
- -<p>David Leadbeater discovered an integer underflow that could be triggered
- -via the LINKS command and can lead to a denial of service or the
- -execution of arbitrary code (<a href="https://security-tracker.debian.org/tracker/CVE-2009-4016";>CVE-2009-4016</a>). This issue affects both,
- -ircd-hybrid and ircd-ratbox.</p>
+<p>Ð?Ñ?вид Ð?идбиÑ?еÑ? обнаÑ?Ñ?жил оÑ?Ñ?иÑ?аÑ?елÑ?ное пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел, коÑ?оÑ?ое можно вÑ?зваÑ?Ñ?
+Ñ? помоÑ?Ñ?Ñ? командÑ? LINKS, и коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода (<a href="https://security-tracker.debian.org/tracker/CVE-2009-4016";>CVE-2009-4016</a>). Ð?аннаÑ? пÑ?облема каÑ?аеÑ?Ñ?Ñ?
+и ircd-hybrid, и ircd-ratbox.</p>
 
- -<p>It was discovered that the ratbox IRC server is prone to a denial of
- -service attack via the HELP command. The ircd-hybrid package is not
- -vulnerable to this issue (<a href="https://security-tracker.debian.org/tracker/CVE-2010-0300";>CVE-2010-0300</a>).</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о IRC-Ñ?еÑ?веÑ? ratbox Ñ?Ñ?звим к оÑ?казÑ? в
+обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? командÑ? HELP. Ð?акеÑ? ircd-hybrid не подвеÑ?жен
+Ñ?Ñ?ой пÑ?облеме (<a href="https://security-tracker.debian.org/tracker/CVE-2010-0300";>CVE-2010-0300</a>).</p>
 
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 1:7.2.2.dfsg.2-4+lenny1 of the ircd-hybrid package and in
- -version 2.2.8.dfsg-2+lenny1 of ircd-ratbox.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:7.2.2.dfsg.2-4+lenny1 пакеÑ?а ircd-hybrid и в
+веÑ?Ñ?ии 2.2.8.dfsg-2+lenny1 пакеÑ?а ircd-ratbox.</p>
 
- -<p>Due to a bug in the archive software it was not possible to release the
- -fix for the oldstable distribution (etch) simultaneously. The packages
- -will be released as version 7.2.2.dfsg.2-3+etch1 once they become
- -available.</p>
+<p>Ð?з-за оÑ?ибки в Ð?Ð? аÑ?Ñ?ива вÑ?пÑ?Ñ?Ñ?иÑ?Ñ? одновÑ?еменно иÑ?пÑ?авление длÑ? пÑ?едÑ?дÑ?Ñ?его
+Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (etch) не пÑ?едÑ?Ñ?авлÑ?еÑ? возможнÑ?м. Ð?акеÑ?Ñ?
+бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ? Ñ? веÑ?Ñ?ией 7.2.2.dfsg.2-3+etch1 по меÑ?е иÑ?
+доÑ?Ñ?Ñ?пноÑ?Ñ?и.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), this problem will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
 
- -<p>We recommend that you upgrade your ircd-hybrid/ircd-ratbox packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ircd-hybrid/ircd-ratbox.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-1991.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1991.wml	2016-08-26 00:44:46.623614311 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>Two denial of service vulnerabilities have been discovered in
- -squid and squid3, a web proxy. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? squid и squid3, веб-пÑ?окÑ?и, бÑ?ли обнаÑ?Ñ?женÑ? два оÑ?каза в
+обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2855";>CVE-2009-2855</a>
 
- -<p>Bastian Blank discovered that it is possible to cause a denial of
- -service via a crafted auth header with certain comma delimiters.</p></li>
+<p>Ð?аÑ?Ñ?иан Ð?ланк обнаÑ?Ñ?жил, Ñ?Ñ?о можно вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного заголовка auth Ñ? опÑ?еделÑ?ннÑ?ми Ñ?азделиÑ?елÑ?ми в виде запÑ?Ñ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0308";>CVE-2010-0308</a>
 
- -<p>Tomas Hoger discovered that it is possible to cause a denial of service
- -via invalid DNS header-only packets.</p></li>
+<p>ТомаÑ? ХогеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о можно вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+Ñ? помоÑ?Ñ?Ñ? некоÑ?Ñ?екÑ?нÑ?Ñ? DNS-пакеÑ?ов, Ñ?одеÑ?жаÑ?иÑ? Ñ?олÑ?ко заголовки.</p></li>
 
 </ul>
 
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.7.STABLE3-4.1lenny1 of the squid package and version
- -3.0.STABLE8-3+lenny3 of the squid3 package.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.7.STABLE3-4.1lenny1 пакеÑ?а squid и в веÑ?Ñ?ии
+3.0.STABLE8-3+lenny3 пакеÑ?а squid3.</p>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed in
- -version 2.6.5-6etch5 of the squid package and version 3.0.PRE5-5+etch2
- -of the squid3 package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.5-6etch5 пакеÑ?а squid и в веÑ?Ñ?ии 3.0.PRE5-5+etch2
+пакеÑ?а squid3.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution
- -(sid), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
 
- -<p>We recommend that you upgrade your squid/squid3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? squid/squid3.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2093.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2093.wml	2016-08-26 00:41:09.332793611 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two security issues have been discovered in Ghostscript, the GPL
- -PostScript/PDF interpreter. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Ghostscript, инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е PostScript/PDF, вÑ?пÑ?Ñ?енном под лиÑ?ензией GPL,
+бÑ?ли обнаÑ?Ñ?женÑ? две пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 
 <ul>
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4897";>CVE-2009-4897</a>
 
- -  <p>A buffer overflow was discovered that allows remote attackers to
- -  execute arbitrary code or cause a denial of service via a crafted PDF
- -  document containing a long name.</p></li>
+  <p>Ð?Ñ?ло обнаÑ?Ñ?жено пеÑ?еполнение бÑ?Ñ?еÑ?а, позволÑ?Ñ?Ñ?ее Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+  вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код или вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+  докÑ?менÑ?а в Ñ?оÑ?маÑ?е PDF, имеÑ?Ñ?его длинное имÑ?.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1628";>CVE-2010-1628</a>
 
- -  <p>Dan Rosenberg discovered that ghostscript incorrectly handled certain
- -  recursive Postscript files. An attacker could execute arbitrary code
- -  via a PostScript file containing unlimited recursive procedure
- -  invocations, which trigger memory corruption in the stack of the
- -  interpreter.</p></li>
+  <p>Ð?Ñ?н РозенбеÑ?г обнаÑ?Ñ?жил, Ñ?Ñ?о ghostscript непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? опÑ?еделÑ?ннÑ?е
+  Ñ?екÑ?Ñ?Ñ?ивнÑ?е Ñ?айлÑ? Postscript. Ð?лоÑ?мÑ?Ñ?ленник можеÑ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код
+  Ñ? помоÑ?Ñ?Ñ? Ñ?айла PostScript, Ñ?одеÑ?жаÑ?его неогÑ?аниÑ?еннÑ?е вÑ?зовÑ? Ñ?екÑ?Ñ?Ñ?ивной пÑ?оÑ?едÑ?Ñ?Ñ?,
+  Ñ?Ñ?о пÑ?иводиÑ? к повÑ?еждениÑ? Ñ?одеÑ?жимого памÑ?Ñ?и в Ñ?Ñ?еке
+  инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?а.</p></li>
 
 </ul>
 
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 8.62.dfsg.1-3.2lenny5</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 8.62.dfsg.1-3.2lenny5</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution (sid),
- -these problems have been fixed in version 8.71~dfsg2-4</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 8.71~dfsg2-4</p>
 
- -<p>We recommend that you upgrade your ghostscript package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? ghostscript.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=LQrT
-----END PGP SIGNATURE-----


Reply to: