[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-1{663,541}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1541.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1541.wml	2016-09-21 01:29:42.608298573 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in OpenLDAP, a
- -free implementation of the Lightweight Directory Access Protocol. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? OpenLDAP, Ñ?вободной Ñ?еализаÑ?ии Lightweight Directory Access Protocol,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5707";>CVE-2007-5707</a>
 
- -    <p>Thomas Sesselmann discovered that slapd could be crashed by a
- -    malformed modify requests.</p></li>
- -  
+    <p>ТомаÑ? СеÑ?Ñ?елÑ?ман обнаÑ?Ñ?жил, Ñ?Ñ?о slapd можеÑ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?воÑ? Ñ?абоÑ?Ñ?
+    пÑ?и полÑ?Ñ?ении некоÑ?Ñ?екÑ?нÑ?Ñ? запÑ?оÑ?ов на изменение.</p></li>
+
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5708";>CVE-2007-5708</a>
 
- -    <p>Toby Blade discovered that incorrect memory handling in slapo-pcache
- -    could lead to denial of service through crafted search requests.</p></li>
+    <p>Тоби Ð?лÑ?йд обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? Ñ?абоÑ?а Ñ? памÑ?Ñ?Ñ?Ñ? в slapo-pcache
+    можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании из-за Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? поиÑ?ковÑ?Ñ? запÑ?оÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6698";>CVE-2007-6698</a>
 
- -    <p>It was discovered that a programming error in the interface to the
- -    BDB storage backend could lead to denial of service through
- -    crafted modify requests.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ? в инÑ?еÑ?Ñ?ейÑ?е длÑ?
+    движка BDB-Ñ?Ñ?анилиÑ?а можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании пÑ?и полÑ?Ñ?ении
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? запÑ?оÑ?ов на изменение.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0658";>CVE-2008-0658</a>
 
- -    <p>It was discovered that a programming error in the interface to the
- -    BDB storage backend could lead to denial of service through
- -    crafted modrdn requests.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ? в инÑ?еÑ?Ñ?ейÑ?е длÑ?
+    движка BDB-Ñ?Ñ?анилиÑ?а можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании пÑ?и полÑ?Ñ?ении
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? modrdn-запÑ?оÑ?ов.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.3.30-5+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.3.30-5+etch1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.4.7-6.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.7-6.1.</p>
 
- -<p>We recommend that you upgrade your openldap2.3 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openldap2.3.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1663.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1663.wml	2016-09-21 01:24:29.490926673 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in NET SNMP, a suite of
- -Simple Network Management Protocol applications. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? NET SNMP, набоÑ?е пÑ?иложений SNMP, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0960";>CVE-2008-0960</a>
- - 
- -    <p>Wes Hardaker reported that the SNMPv3 HMAC verification relies on
- -    the client to specify the HMAC length, which allows spoofing of
- -    authenticated SNMPv3 packets.</p></li>
- - 
+
+    <p>Ð?еÑ? ХаÑ?дакеÑ? Ñ?ообÑ?ил, Ñ?Ñ?о HMAC-пÑ?овеÑ?ка SNMPv3 полагаеÑ?Ñ?Ñ? на
+    клиенÑ?а в плане опÑ?еделениÑ? длинÑ? HMAC, Ñ?Ñ?о позволÑ?еÑ? подделÑ?ваÑ?Ñ?
+    аÑ?Ñ?еÑ?иÑ?иÑ?иÑ?ованнÑ?е SNMPv3-пакеÑ?Ñ?.</p></li>
+
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-2292";>CVE-2008-2292</a>
- - 
- -    <p>John Kortink reported a buffer overflow in the __snprint_value
- -    function in snmp_get causing a denial of service and potentially
- -    allowing the execution of arbitrary code via a large OCTETSTRING 
- -    in an attribute value pair (AVP).</p></li>
- - 
+
+    <p>Ð?жон Ð?оÑ?Ñ?инк Ñ?ообÑ?ил о пеÑ?еполнении бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии __snprint_value
+    в snmp_get, вÑ?зÑ?ваÑ?Ñ?ем оÑ?каз в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?но позволÑ?Ñ?Ñ?ем
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? болÑ?Ñ?ого знаÑ?ениÑ? OCTETSTRING
+    в пакеÑ? знаÑ?ений аÑ?Ñ?ибÑ?Ñ?а (AVP).</p></li>
+
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4309";>CVE-2008-4309</a>
 
- -    <p>It was reported that an integer overflow in the
- -    netsnmp_create_subtree_cache function in agent/snmp_agent.c allows   
- -    remote attackers to cause a denial of service attack via a crafted  
- -    SNMP GETBULK request.</p></li>
+    <p>Ð?Ñ?ло Ñ?ообÑ?ено, Ñ?Ñ?о пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в
+    Ñ?Ñ?нкÑ?ии netsnmp_create_subtree_cache в agent/snmp_agent.c позволÑ?еÑ?
+    Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+    SNMP GETBULK-запÑ?оÑ?а.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems has been fixed in
- -version 5.2.3-7etch4.</p>
- - 
- -<p>For the testing distribution (lenny) and unstable distribution (sid)
- -these problems have been fixed in version 5.4.1~dfsg-11.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.2.3-7etch4.</p>
+
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (lenny) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 5.4.1~dfsg-11.</p>
 
- -<p>We recommend that you upgrade your net-snmp package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? net-snmp.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=D38D
-----END PGP SIGNATURE-----


Reply to: