[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-15{5,8}1.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1551.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1551.wml	2016-10-29 23:01:19.865982009 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the interpreter for the
- -Python language. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е Ñ?зÑ?ка Python бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2052";>CVE-2007-2052</a>
 
- -    <p>Piotr Engelking discovered that the strxfrm() function of the locale
- -    module miscalculates the length of an internal buffer, which may
- -    result in a minor information disclosure.</p></li>
+    <p>Ð?иоÑ?Ñ? ЭнгелÑ?кин обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? strxfrm() из модÑ?лÑ?
+    locale непÑ?авилÑ?но вÑ?Ñ?иÑ?лÑ?еÑ? длинÑ? внÑ?Ñ?Ñ?еннего бÑ?Ñ?еÑ?а, Ñ?Ñ?о можеÑ?
+    пÑ?иводиÑ?Ñ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? вÑ?оÑ?оÑ?Ñ?епенной инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4965";>CVE-2007-4965</a>
 
- -    <p>It was discovered that several integer overflows in the imageop
- -    module may lead to the execution of arbitrary code, if a user is
- -    tricked into processing malformed images. This issue is also
- -    tracked as <a href="https://security-tracker.debian.org/tracker/CVE-2008-1679";>CVE-2008-1679</a> due to an initially incomplete patch.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о неÑ?колÑ?ко пеÑ?еполнений Ñ?елÑ?Ñ? Ñ?иÑ?ел в модÑ?ле imageop
+    могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае, еÑ?ли полÑ?зоваÑ?елÑ?
+    запÑ?Ñ?каеÑ? обÑ?абоÑ?кÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? изобÑ?ажений. Также Ñ?Ñ?а пÑ?облема
+    имееÑ? иденÑ?иÑ?икаÑ?оÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2008-1679";>CVE-2008-1679</a> в Ñ?вÑ?зи Ñ? неполнÑ?м иÑ?пÑ?авлением, пÑ?едÑ?Ñ?авленнÑ?м Ñ?анее.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1721";>CVE-2008-1721</a>
- - 
- -    <p>Justin Ferguson discovered that a buffer overflow in the zlib
- -    module may lead to the execution of arbitrary code.</p></li>
+
+    <p>Ð?жаÑ?Ñ?ин ФеÑ?гÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в модÑ?ле zlib
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1887";>CVE-2008-1887</a>
 
- -    <p>Justin Ferguson discovered that insufficient input validation in
- -    PyString_FromStringAndSize() may lead to the execution of arbitrary
- -    code.</p></li>
+    <p>Ð?жаÑ?Ñ?ин ФеÑ?гÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка вÑ?однÑ?Ñ? даннÑ?Ñ? в
+    PyString_FromStringAndSize() можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.4.4-3+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.4-3+etch1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.4.5-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.5-2.</p>
 
- -<p>We recommend that you upgrade your python2.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? python2.4.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1581.wml	2014-04-30 13:16:15.000000000 +0600
+++ russian/security/2008/dsa-1581.wml	2016-10-29 23:14:27.314598044 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in GNUTLS, an
- -implementation of the SSL/TLS protocol suite.</p>
+<p>Ð? GNUTLS, Ñ?еализаÑ?ии набоÑ?а пÑ?оÑ?околов SSL/TLS, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
- -<p>NOTE: The libgnutls13 package, which provides the GNUTLS library, does
- -not contain logic to automatically restart potentially affected
- -services.  You must restart affected services manually (mainly Exim,
- -using <q>/etc/init.d/exim4 restart</q>) after applying the update, to make
- -the changes fully effective.  Alternatively, you can reboot the system.</p>
+<p>Ð?Ð?Ð?Ð?Ð?Ð?Ð?Ð?: пакеÑ? libgnutls13, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ий библиоÑ?екÑ? GNUTLS,
+не Ñ?одеÑ?жиÑ? логики длÑ? авÑ?омаÑ?иÑ?еÑ?кого пеÑ?езапÑ?Ñ?ка поÑ?енÑ?иалÑ?но заÑ?Ñ?онÑ?Ñ?Ñ?Ñ?
+Ñ?лÑ?жб.  Ð?ам Ñ?ледÑ?еÑ? пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ? Ñ?акие Ñ?лÑ?жбÑ? вÑ?Ñ?Ñ?нÑ?Ñ? (главнÑ?м обÑ?азом Exim,
+иÑ?полÑ?зÑ?Ñ? командÑ? <q>/etc/init.d/exim4 restart</q>) поÑ?ле пÑ?именениÑ? данного обновлениÑ? длÑ?
+Ñ?ого, Ñ?Ñ?обÑ? изменениÑ? вÑ?Ñ?Ñ?пили в Ñ?илÑ?.  Ð?ибо вÑ? можеÑ?е пеÑ?езагÑ?Ñ?зиÑ?Ñ? Ñ?иÑ?Ñ?емÑ?.</p>
 
- -<p>The Common Vulnerabilities and Exposures project identifies the following 
- -problems:</p>
+<p>Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1948";>CVE-2008-1948</a>
 
- -    <p>A pre-authentication heap overflow involving oversized session
- -    resumption data may lead to arbitrary code execution.</p></li>
+    <p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и на Ñ?Ñ?апе пÑ?едваÑ?иÑ?елÑ?но аÑ?Ñ?енÑ?иÑ?икаÑ?ии из-за Ñ?Ñ?езмеÑ?ного Ñ?азмеÑ?
+    даннÑ?Ñ? длÑ? возобновлениÑ? Ñ?еÑ?Ñ?ии можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1949";>CVE-2008-1949</a>
 
- -    <p>Repeated client hellos may result in a pre-authentication denial of
- -    service condition due to a null pointer dereference.</p></li>
+    <p>Ð?овÑ?оÑ?Ñ?Ñ?Ñ?иеÑ?Ñ? hello-Ñ?ообÑ?ениÑ? оÑ? клиенÑ?а могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании на Ñ?Ñ?апе пÑ?едваÑ?иÑ?елÑ?ной
+    аÑ?Ñ?енÑ?иÑ?икаÑ?ии из-за Ñ?азÑ?менованиÑ? null-Ñ?казаÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1950";>CVE-2008-1950</a>
 
- -    <p>Decoding cipher padding with an invalid record length may cause GNUTLS
- -    to read memory beyond the end of the received record, leading to a
- -    pre-authentication denial of service condition.</p></li>
+    <p>Ð?екодиÑ?ование заполнениÑ? Ñ?иÑ?Ñ?оÑ?екÑ?Ñ?а Ñ? непÑ?авилÑ?ной длиной запиÑ?и можеÑ? пÑ?иводиÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о GNUTLS
+    вÑ?полниÑ? Ñ?Ñ?ение бÑ?Ñ?еÑ?а памÑ?Ñ?и за пÑ?еделами конÑ?а полÑ?Ñ?енной запиÑ?и, Ñ?Ñ?о пÑ?иводиÑ? к
+    оÑ?казÑ? в обÑ?лÑ?живании на Ñ?Ñ?апе пÑ?едваÑ?иÑ?елÑ?ной аÑ?Ñ?енÑ?иÑ?икаÑ?ии.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.4.4-3+etch1.  (Builds for the arm architecture are currently
- -not available and will be released later.)</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.4-3+etch1.  (СбоÑ?ки длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? arm в наÑ?Ñ?оÑ?Ñ?ее вÑ?емÑ?
+недоÑ?Ñ?Ñ?пнÑ? и бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?енÑ? позже.)</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon. </p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже. </p>
 
- -<p>We recommend that you upgrade your GNUTLS packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? GNUTLS.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJYFOcIAAoJEF7nbuICFtKl7bwP+gIQdUEXkZD93gQUjUpmytkB
yY2AxBsNyuWND5H4yk5gDxsNRq5lKDiOg8AlHA+AOhzjPgSY0n4d+v9iEAOjV5C7
vZR4cmob42mIU1lerT1oKz2Hb4oAfp5qg0CQCQZxUCypmcan0Hq28jsXrhEfUvBA
8KAp6sFgvEQEPWXH0LgbUJi9/LTUgW1fzAb+BlkgiqY6lHGtwbh4dzkMzXsLci8Z
Q/jilnTDbdw1vSlUdWXi+hKHyoBiJQZaE7b4nZAX4J5NCYd+S+2lzI4/KqQ5+5/9
ihgpbidvdmPlK7vQIGVwNPRnRPFkKjq+U1SVQ9ZXKVwu9CuVlUEY95F+Jk5FRukN
SpN1J2GguOsgGvyhyTPagJKkH3cemZZeQNRVx8gIgknZWS4AcMliEV3cCSdit70G
In3cgxt+eM4nQcdPdVSsD+H8Gu3d1ku4aK7FNQqJpsp3/P55ciNvd3mpI8+E9FKB
tyQ9aHrozJyc4IEXUCPltiRl8uArdWhs0AL7Fe8XpsUsXxrHrG74qbKfVDuI/KFN
DLxUr+RerEIEKDcx19o8Qtu/q2d74BUhfukgLSJE+NNNln2yFmQbzGzIiNbh85IS
M5TdzjbYwI5Y4JSI5IVi+kr1eqA7Bd0BmYFCqEHXwVSYqlyQXX5lTN3/qc3JO+BD
SPdPHAtt23xmDHM86oJ5
=1B/+
-----END PGP SIGNATURE-----


Reply to: