[DONE] wml://security/2006/dsa-11{8,1}1.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2006/dsa-1111.wml 2006-07-31 14:18:14.000000000 +0600
+++ russian/security/2006/dsa-1111.wml 2016-10-02 23:43:50.745726333 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>race condition</define-tag>
+#use wml::debian::translation-check translation="1.6" maintainer="Lev Lamberov"
+<define-tag description>Ñ?оÑ?Ñ?оÑ?ние гонки</define-tag>
<define-tag moreinfo>
- -<p>It was discovered that a race condition in the process filesystem can lead
- -to privilege escalation.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?оÑ?Ñ?оÑ?ние гонки в Ñ?айловой Ñ?иÑ?Ñ?еме procfs можеÑ? пÑ?иводиÑ?Ñ?
+к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p>
- -<p>The following matrix explains which kernel version for which architecture
- -fixes the problem mentioned above:</p>
+<p>СледÑ?Ñ?Ñ?аÑ? Ñ?аблиÑ?а показÑ?ваеÑ?, в какой веÑ?Ñ?ии Ñ?дÑ?а и длÑ? какой аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ?
+бÑ?ла иÑ?пÑ?авлена Ñ?казаннаÑ? вÑ?Ñ?е пÑ?облема:</p>
<div class="centerdiv"><table cellspacing="0" cellpadding="2">
<tr><th> </th><th>Debian 3.1 (sarge)</th></tr>
- -<tr><td>Source </td><td>2.6.8-16sarge4</td></tr>
- -<tr><td>Alpha architecture </td><td>2.6.8-16sarge4</td></tr>
- -<tr><td>AMD64 architecture </td><td>2.6.8-16sarge4</td></tr>
- -<tr><td>Intel IA-32 architecture</td><td>2.6.8-16sarge4</td></tr>
- -<tr><td>Intel IA-64 architecture</td><td>2.6.8-14sarge4</td></tr>
- -<tr><td>PowerPC architecture </td><td>2.6.8-12sarge4</td></tr>
- -<tr><td>Sun Sparc architecture </td><td>2.6.8-15sarge4</td></tr>
+<tr><td>Ð?Ñ?Ñ?однÑ?й код </td><td>2.6.8-16sarge4</td></tr>
+<tr><td>Ð?Ñ?Ñ?иÑ?екÑ?Ñ?Ñ?а Alpha </td><td>2.6.8-16sarge4</td></tr>
+<tr><td>Ð?Ñ?Ñ?иÑ?екÑ?Ñ?Ñ?а AMD64 </td><td>2.6.8-16sarge4</td></tr>
+<tr><td>Ð?Ñ?Ñ?иÑ?екÑ?Ñ?Ñ?а Intel IA-32</td><td>2.6.8-16sarge4</td></tr>
+<tr><td>Ð?Ñ?Ñ?иÑ?екÑ?Ñ?Ñ?а Intel IA-64</td><td>2.6.8-14sarge4</td></tr>
+<tr><td>Ð?Ñ?Ñ?иÑ?екÑ?Ñ?Ñ?а PowerPC </td><td>2.6.8-12sarge4</td></tr>
+<tr><td>Ð?Ñ?Ñ?иÑ?екÑ?Ñ?Ñ?а Sun Sparc </td><td>2.6.8-15sarge4</td></tr>
<tr><td>IBM S/390 </td><td>2.6.8-5sarge4</td></tr>
<tr><td>Motorola 680x0 </td><td>2.6.8-4sarge4</td></tr>
<tr><td>HP Precision </td><td>2.6.8-6sarge3</td></tr>
<tr><td>FAI </td><td>1.9.1sarge3</td></tr>
</table></div>
- -<p>The initial advisory lacked builds for the IBM S/390, Motorola 680x0 and HP
- -Precision architectures, which are now provided. Also, the kernels for the
- -FAI installer have been updated.</p>
+<p>Ð? изнаÑ?алÑ?ной Ñ?екомендаÑ?ии оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вовали Ñ?боÑ?ки длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? IBM S/390, Motorola 680x0 и HP
+Precision, коÑ?оÑ?Ñ?е Ñ?епеÑ?Ñ? доÑ?Ñ?Ñ?пнÑ?. Ð?Ñ?оме Ñ?ого, бÑ?ли обновленÑ? Ñ?дÑ?а длÑ?
+пÑ?огÑ?аммÑ? Ñ?Ñ?Ñ?ановки FAI.</p>
- -<p>We recommend that you upgrade your kernel package immediately and reboot
- -the machine. If you have built a custom kernel from the kernel source
- -package, you will need to rebuild to take advantage of these fixes.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? как можно Ñ?коÑ?ее обновиÑ?Ñ? пакеÑ? Ñ? Ñ?дÑ?ом и пеÑ?езагÑ?Ñ?зиÑ?Ñ?
+маÑ?инÑ?. Ð?Ñ?ли вÑ? Ñ?обÑ?али Ñ?обÑ?Ñ?венное Ñ?дÑ?о из пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом
+Ñ?дÑ?а, Ñ?о вам Ñ?ледÑ?еÑ? Ñ?обÑ?аÑ?Ñ? Ñ?дÑ?о заново, в Ñ?Ñ?ом Ñ?лÑ?Ñ?ае вÑ? бÑ?деÑ?е полÑ?Ñ?иÑ?е иÑ?пÑ?авлениÑ?.</p>
</define-tag>
# do not modify the following line
- --- english/security/2006/dsa-1181.wml 2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1181.wml 2016-10-02 23:37:49.781404678 +0500
@@ -1,45 +1,46 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Tavis Ormandy from the Google Security Team discovered several
- -vulnerabilities in gzip, the GNU compression utility. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>ТÑ?виÑ? Ð?Ñ?манди из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей в gzip, Ñ?Ñ?илиÑ?е длÑ? Ñ?жаÑ?иÑ? оÑ? GNU. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
- -
+
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4334">CVE-2006-4334</a>
- - <p>A null pointer dereference may lead to denial of service if gzip is
- - used in an automated manner.</p></li>
+ <p>РазÑ?менование null-Ñ?казаÑ?елÑ? можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании в Ñ?лÑ?Ñ?ае
+ авÑ?омаÑ?иÑ?еÑ?кого иÑ?полÑ?зованиÑ? gzip.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4335">CVE-2006-4335</a>
- - <p>Missing boundary checks may lead to stack modification, allowing
- - execution of arbitrary code.</p></li>
+ <p>Ð?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ок гÑ?аниÑ? маÑ?Ñ?ива можеÑ? пÑ?иводиÑ?Ñ? к изменениÑ? Ñ?Ñ?ека, Ñ?Ñ?о позволÑ?еÑ?
+ вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4336">CVE-2006-4336</a>
- - <p>A buffer underflow in the pack support code may lead to execution of
- - arbitrary code.</p></li>
+ <p>Ð?Ñ?Ñ?иÑ?аÑ?елÑ?ное пеÑ?еполнение бÑ?Ñ?еÑ?а в коде поддеÑ?жки pack можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+ пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4337">CVE-2006-4337</a>
- - <p>A buffer underflow in the LZH support code may lead to execution of
- - arbitrary code.</p></li>
+ <p>Ð?Ñ?Ñ?иÑ?аÑ?елÑ?ное пеÑ?еполнение бÑ?Ñ?еÑ?а в коде поддеÑ?жки LZH можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+ пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4338">CVE-2006-4338</a>
- - <p>An infinite loop may lead to denial of service if gzip is used in
- - an automated manner.</p></li>
+ <p>Ð?еÑ?конеÑ?нÑ?й Ñ?икл можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании в Ñ?лÑ?Ñ?ае
+ авÑ?омаÑ?иÑ?еÑ?кого иÑ?полÑ?зованиÑ? gzip.</p></li>
</ul>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 1.3.5-10sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.5-10sarge2.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.3.5-15.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.5-15.</p>
- -<p>We recommend that you upgrade your gzip package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? gzip.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=Z5uk
-----END PGP SIGNATURE-----
Reply to: