[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{656,638,493}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1493.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1493.wml	2016-08-26 23:51:05.862183692 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>buffer overflows</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Several local/remote vulnerabilities have been discovered in the image
- -loading library for the Simple DirectMedia Layer 1.2. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? библиоÑ?еке загÑ?Ñ?зки изобÑ?ажений длÑ? Simple DirectMedia Layer 1.2 бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко локалÑ?нÑ?Ñ?/Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6697";>CVE-2007-6697</a>
 
- -    <p>Gynvael Coldwind discovered a buffer overflow in GIF image parsing,
- -    which could result in denial of service and potentially the
- -    execution of arbitrary code.</p></li>
+    <p>Ð?инваÑ?лÑ? Ð?олдвайнд обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого
+    Ñ?азбоÑ?а изобÑ?ажений в Ñ?оÑ?маÑ?е GIF, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании
+    и поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0544";>CVE-2008-0544</a>
 
- -    <p>It was discovered that a buffer overflow in IFF ILBM image parsing
- -    could result in denial of service and potentially the execution of
- -    arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?Ñ?а в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а
+    изобÑ?ажений в Ñ?оÑ?маÑ?е IFF ILBM можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании
+    и поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the old stable distribution (sarge), these problems have been fixed
- -in version 1.2.4-1etch1. Due to a copy &amp; paste error <q>etch1</q> was appended
- -to the version number instead of <q>sarge1</q>. Since the update is otherwise
- -technically correct, the update was not rebuilt on the buildd network.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.2.4-1etch1. Ð? Ñ?вÑ?зи Ñ? оÑ?ибкой пÑ?и копиÑ?овании и вÑ?Ñ?авке к веÑ?Ñ?ии пакеÑ?а бÑ?л
+добавлен Ñ?Ñ?Ñ?Ñ?икÑ? <q>etch1</q>, а не <q>sarge1</q>. Ð?оÑ?колÑ?кÑ? в оÑ?Ñ?алÑ?ном обновление
+Ñ?еÑ?ниÑ?еÑ?ки пÑ?авилÑ?но, оно не бÑ?ло Ñ?обÑ?ано заново на Ñ?злаÑ? Ñ?боÑ?оÑ?ной Ñ?еÑ?и.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.2.5-2+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.5-2+etch1.</p>
 
- -<p>We recommend that you upgrade your sdl-image1.2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? sdl-image1.2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1638.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1638.wml	2016-08-26 23:45:19.146118029 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>It has been discovered that the signal handler implementing the login
- -timeout in Debian's version of the OpenSSH server uses functions which
- -are not async-signal-safe, leading to a denial of service
- -vulnerability (<a href="https://security-tracker.debian.org/tracker/CVE-2008-4109";>CVE-2008-4109</a>).</p>
- -
- -<p>The problem was originally corrected in OpenSSH 4.4p1 (<a href="https://security-tracker.debian.org/tracker/CVE-2006-5051";>CVE-2006-5051</a>),
- -but the patch backported to the version released with etch was
- -incorrect.</p>
- -
- -<p>Systems affected by this issue suffer from lots of zombie sshd
- -processes.  Processes stuck with a "[net]" process title have also been
- -observed.  Over time, a sufficient number of processes may accumulate
- -such that further login attempts are impossible.  Presence of these
- -processes does not indicate active exploitation of this vulnerability.
- -It is possible to trigger this denial of service condition by accident.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о обÑ?абоÑ?Ñ?ик Ñ?игналов, Ñ?еализÑ?Ñ?Ñ?ий вÑ?емÑ? ожиданиÑ?
+вÑ?ода в веÑ?Ñ?ии Ñ?еÑ?веÑ?а OpenSSH в Debian, иÑ?полÑ?зÑ?еÑ? Ñ?Ñ?нкÑ?ии, коÑ?оÑ?Ñ?е
+не имеÑ?Ñ? Ñ?войÑ?Ñ?ва async-signal-safe, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании
+(<a href="https://security-tracker.debian.org/tracker/CVE-2008-4109";>CVE-2008-4109</a>).</p>
+
+<p>ЭÑ?а пÑ?облема изнаÑ?алÑ?но бÑ?ла иÑ?пÑ?авлена в OpenSSH 4.4p1 (<a href="https://security-tracker.debian.org/tracker/CVE-2006-5051";>CVE-2006-5051</a>),
+но заплаÑ?а, пеÑ?енеÑ?Ñ?ннаÑ? в веÑ?Ñ?иÑ?, вÑ?пÑ?Ñ?еннÑ?Ñ? в Ñ?оÑ?Ñ?аве etch, бÑ?ла
+непÑ?авилÑ?ной.</p>
+
+<p>СиÑ?Ñ?емÑ?, подвеÑ?женнÑ?е данной пÑ?облеме, Ñ?еÑ?Ñ?Ñ?зно Ñ?Ñ?Ñ?адаÑ?Ñ? оÑ? зомби-пÑ?оÑ?еÑ?Ñ?ов
+sshd.  Ð?Ñ?оÑ?еÑ?Ñ?Ñ? завиÑ?аÑ?Ñ? Ñ? видимÑ?м заголовком пÑ?оÑ?еÑ?Ñ?а
+"[net]".  Со вÑ?еменем можеÑ? накопиÑ?Ñ?Ñ?Ñ? Ñ?акое колиÑ?еÑ?Ñ?во Ñ?акиÑ? пÑ?оÑ?еÑ?Ñ?ов,
+Ñ?Ñ?о далÑ?нейÑ?ие попÑ?Ñ?ки вÑ?ода оказÑ?ваÑ?Ñ?Ñ?Ñ? невозможнÑ?ми.  Ð?Ñ?иÑ?Ñ?Ñ?Ñ?Ñ?вие Ñ?Ñ?иÑ?
+пÑ?оÑ?еÑ?Ñ?ов не Ñ?лÑ?жиÑ? пÑ?изнаком акÑ?ивного иÑ?полÑ?зованиÑ? Ñ?казанной Ñ?Ñ?звимоÑ?Ñ?и.
+СоÑ?Ñ?оÑ?ние оÑ?каза в обÑ?лÑ?живании можеÑ? бÑ?Ñ?Ñ? вÑ?звано и Ñ?лÑ?Ñ?айно.</p>
 
- -<p>For the stable distribution (etch), this problem has been fixed in
- -version 4.3p2-9etch3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.3p2-9etch3.</p>
 
- -<p>For the unstable distribution (sid) and the testing distribution
- -(lenny), this problem has been fixed in version 4.6p1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном (sid) и Ñ?еÑ?Ñ?иÑ?Ñ?емом (lenny) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 4.6p1-1.</p>
 
- -<p>We recommend that you upgrade your openssh packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openssh.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1656.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1656.wml	2016-08-26 23:35:36.121657322 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local vulnerabilities have been discovered in the Common UNIX
- -Printing System. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? cups, обÑ?ей Ñ?иÑ?Ñ?еме пеÑ?аÑ?и UNIX, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко локалÑ?нÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3639";>CVE-2008-3639</a>
 
- -    <p>It was discovered that insufficient bounds checking in the SGI
- -    image filter may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка гÑ?аниÑ? маÑ?Ñ?ива в Ñ?илÑ?Ñ?Ñ?е
+    изобÑ?ажений SGI можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3640";>CVE-2008-3640</a>
 
- -    <p>It was discovered that an integer overflow in the Postscript
- -    conversion tool <q>texttops</q> may lead to the execution of arbitrary
- -    code.</p></li>
+    <p>бÑ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в <q>texttops</qа>, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? пÑ?еобÑ?азованиÑ?
+    Postscript, можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3641";>CVE-2008-3641</a>
 
- -    <p>It was discovered that insufficient bounds checking in the HPGL
- -    filter may lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка гÑ?аниÑ? маÑ?Ñ?ива в Ñ?илÑ?Ñ?Ñ?е HPGL
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.2.7-4etch5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.7-4etch5.</p>
 
- -<p>For the unstable distribution (sid) and the upcoming stable distribution
- -(lenny), these problems have been fixed in version 1.3.8-1lenny2 of
- -the source package cups.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном (sid) и гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (lenny) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.3.8-1lenny2 пакеÑ?а
+Ñ? иÑ?Ñ?однÑ?м кодом cups.</p>
 
- -<p>We recommend that you upgrade your cupsys package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? cupsys.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=ibGb
-----END PGP SIGNATURE-----


Reply to: