[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-10{59,24}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1024.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1024.wml	2016-09-09 22:42:48.385754466 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the ClamAV
- -anti-virus toolkit, which may lead to denial of service and potentially
- -to the execution of arbitrary code. The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð? ClamAV, набоÑ?е анÑ?ивиÑ?Ñ?Ñ?нÑ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?ов, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?номÑ?
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1614";>CVE-2006-1614</a>
 
- -    <p>Damian Put discovered an integer overflow in the PE header parser.
- -    This is only exploitable if the ArchiveMaxFileSize option is disabled.</p></li>
+    <p>Ð?амиан Ð?Ñ?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а PE-заголовка.
+    ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?олÑ?ко в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли оÑ?клÑ?Ñ?ена опÑ?иÑ? ArchiveMaxFileSize.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1615";>CVE-2006-1615</a>
 
- -    <p>Format string vulnerabilities in the logging code have been discovered,
- -    which might lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ли обнаÑ?Ñ?женÑ? Ñ?Ñ?звимоÑ?Ñ?и Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки в коде жÑ?Ñ?налиÑ?ованиÑ?,
+    коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-1630";>CVE-2006-1630</a>
- -    
- -    <p>David Luyer discovered, that ClamAV can be tricked into an invalid
- -    memory access in the cli_bitset_set() function, which may lead to
- -    a denial of service.</p></li>
+
+    <p>Ð?Ñ?вид Ð?айеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о ClamAV можеÑ? некоÑ?Ñ?екÑ?но обÑ?аÑ?иÑ?Ñ?Ñ? к памÑ?Ñ?и
+    в Ñ?Ñ?нкÑ?ии cli_bitset_set(), Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+    оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) doesn't contain clamav packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? clamav оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.84-2.sarge.8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.84-2.sarge.8.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.88.1-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.88.1-1.</p>
 
- -<p>We recommend that you upgrade your clamav package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? clamav.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1059.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1059.wml	2016-09-09 22:38:14.144394068 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Konstantin Gavrilenko discovered several vulnerabilities in quagga,
- -the BGP/OSPF/RIP routing daemon.  The Common Vulnerabilities and
- -Exposures project identifies the following problems:</p>
+<p>Ð?онÑ?Ñ?анÑ?ин Ð?авÑ?иленко обнаÑ?Ñ?жил неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей в quagga,
+Ñ?лÑ?жбе маÑ?Ñ?Ñ?Ñ?Ñ?изаÑ?ии BGP/OSPF/RIP.  Ð?Ñ?оекÑ? Common Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2223";>CVE-2006-2223</a>
 
- -    <p>Remote attackers may obtain sensitive information via RIPv1
- -    REQUEST packets even if the quagga has been configured to use MD5
- -    authentication.</p></li>
+    <p>УдалÑ?ннÑ?е злоÑ?мÑ?Ñ?ленники могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? Ñ? помоÑ?Ñ?Ñ? RIPv1-пакеÑ?ов
+    REQUEST даже в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?лÑ?жба quagga наÑ?Ñ?Ñ?оена на иÑ?полÑ?зование
+    MD5-аÑ?Ñ?енÑ?иÑ?икаÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2224";>CVE-2006-2224</a>
 
- -    <p>Remote attackers could inject arbitrary routes using the RIPv1
- -    RESPONSE packet even if the quagga has been configured to use MD5
- -    authentication.</p></li>
+    <p>УдалÑ?ннÑ?е злоÑ?мÑ?Ñ?ленники могÑ?Ñ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?е маÑ?Ñ?Ñ?Ñ?Ñ?Ñ?, иÑ?полÑ?зÑ?Ñ? RIPv1-пакеÑ?
+    RESPONSE даже в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?лÑ?жба quagga наÑ?Ñ?Ñ?оена на иÑ?полÑ?зование
+    MD5-аÑ?Ñ?енÑ?иÑ?икаÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2276";>CVE-2006-2276</a>
 
- -    <p>Fredrik Widell discovered that local users can cause a denial
- -    of service in a certain sh ip bgp command entered in the telnet
- -    interface.</p></li>
+    <p>ФÑ?едÑ?ик Ð?иделÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о локалÑ?нÑ?е полÑ?зоваÑ?ели могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз
+    в обÑ?лÑ?живании в опÑ?еделÑ?нной команде sh ip bgp, введÑ?нной Ñ?еÑ?ез инÑ?еÑ?Ñ?ейÑ?
+    telnet.</p></li>
 
 </ul>
 
- -<p>The old stable distribution (woody) does not contain quagga packages.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (woody) пакеÑ?Ñ? quagga оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.98.3-7.2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.98.3-7.2.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.99.4-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.99.4-1.</p>
 
- -<p>We recommend that you upgrade your quagga package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? quagga.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=/Sa/
-----END PGP SIGNATURE-----


Reply to: