[DONE] wml://security/2006/dsa-11{89,27}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2006/dsa-1127.wml 2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1127.wml 2016-11-07 16:30:52.325154980 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Ethereal network
- -sniffer, which may lead to the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? Ethereal, Ñ?еÑ?евом анализаÑ?оÑ?е Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?дÑ?лÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3628">CVE-2006-3628</a>
- - <p>Ilja van Sprundel discovered that the FW-1 and MQ dissectors are
- - vulnerable to format string attacks.</p></li>
+ <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о диÑ?Ñ?екÑ?оÑ?Ñ? FW-1 и MQ
+ Ñ?Ñ?звимÑ? к аÑ?акам на Ñ?оÑ?маÑ?нÑ?е Ñ?Ñ?Ñ?оки.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3629">CVE-2006-3629</a>
- - <p>Ilja van Sprundel discovered that the MOUNT dissector is vulnerable
- - to denial of service through memory exhaustion.</p></li>
+ <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о диÑ?Ñ?екÑ?оÑ? MOUNT Ñ?Ñ?звим
+ к оÑ?казÑ? в обÑ?лÑ?живании из-за иÑ?Ñ?еÑ?паниÑ? памÑ?Ñ?и.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3630">CVE-2006-3630</a>
- - <p>Ilja van Sprundel discovered off-by-one overflows in the NCP NMAS and
- - NDPS dissectors.</p></li>
+ <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил оÑ?ибкÑ? на единиÑ?Ñ? в диÑ?Ñ?екÑ?оÑ?аÑ?
+ NCP NMAS и NDPS.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3631">CVE-2006-3631</a>
- - <p>Ilja van Sprundel discovered a buffer overflow in the NFS dissector.</p></li>
+ <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в диÑ?Ñ?екÑ?оÑ?е NFS.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3632">CVE-2006-3632</a>
- - <p>Ilja van Sprundel discovered that the SSH dissector is vulnerable
- - to denial of service through an infinite loop.</p></li>
+ <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о диÑ?Ñ?екÑ?оÑ? SSH Ñ?Ñ?звим
+ к оÑ?казÑ? в обÑ?лÑ?живании из-за беÑ?конеÑ?ного Ñ?икла.</p></li>
</ul>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.10.10-2sarge6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.10.10-2sarge6.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.99.2-1 of wireshark, the sniffer formerly known as ethereal.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.99.2-1 пакеÑ?а wireshark, аналиÑ?оÑ?е, Ñ?анее извеÑ?Ñ?ном как ethereal.</p>
- -<p>We recommend that you upgrade your ethereal packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ethereal.</p>
</define-tag>
# do not modify the following line
- --- english/security/2006/dsa-1189.wml 2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1189.wml 2016-11-07 16:25:27.546399688 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in OpenSSH, a free
- -implementation of the Secure Shell protocol, which may lead to denial of
- -service and potentially the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? OpenSSH, Ñ?вободной Ñ?еализаÑ?ии пÑ?оÑ?окола Secure Shell, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в
+обÑ?лÑ?живании и поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4924">CVE-2006-4924</a>
- - <p>Tavis Ormandy of the Google Security Team discovered a denial of
- - service vulnerability in the mitigation code against complexity
- - attacks, which might lead to increased CPU consumption until a
- - timeout is triggered. This is only exploitable if support for
- - SSH protocol version 1 is enabled.</p></li>
+ <p>ТÑ?виÑ? Ð?Ñ?манди из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил оÑ?каз в
+ обÑ?лÑ?живании в коде Ñ?нижениÑ? Ñ?иÑ?ка комплекÑ?нÑ?Ñ? аÑ?ак,
+ коÑ?оÑ?Ñ?й можеÑ? пÑ?иводиÑ?Ñ? к Ñ?велиÑ?ениÑ? поÑ?Ñ?еблениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ? до моменÑ?
+ оконÑ?аниÑ? вÑ?емени ожиданиÑ?. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?олÑ?ко в Ñ?лÑ?Ñ?ае
+ вклÑ?Ñ?ениÑ? поддеÑ?жки пÑ?оÑ?окола SSH веÑ?Ñ?ии 1.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5051">CVE-2006-5051</a>
- - <p>Mark Dowd discovered that insecure signal handler usage could
- - potentially lead to execution of arbitrary code through a double
- - free. The Debian Security Team doesn't believe the general openssh
- - package without Kerberos support to be exploitable by this issue.
- - However, due to the complexity of the underlying code we will
- - issue an update to rule out all eventualities.</p></li>
+ <p>Ð?аÑ?к Ð?аÑ?д обнаÑ?Ñ?жил, Ñ?Ñ?о иÑ?полÑ?зование обÑ?абоÑ?Ñ?ика небезопаÑ?нÑ?Ñ? Ñ?игналов можеÑ?
+ поÑ?енÑ?иалÑ?но пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода из-за двойного оÑ?вобождениÑ?
+ памÑ?Ñ?и. Ð?оманда безопаÑ?ноÑ?Ñ?и Debian полагаеÑ?, Ñ?Ñ?о пакеÑ? openssh без поддеÑ?жки
+ Kerberos не подвеÑ?жен Ñ?Ñ?ой пÑ?облеме.
+ Тем не менее, в Ñ?вÑ?зи Ñ?о Ñ?ложноÑ?Ñ?Ñ?Ñ? кода планиÑ?Ñ?еÑ?Ñ?Ñ?
+ вÑ?пÑ?Ñ?Ñ?иÑ?Ñ? обновление Ñ? Ñ?елÑ?Ñ? иÑ?клÑ?Ñ?ениÑ? вÑ?еÑ? возможнÑ?Ñ? пÑ?облем.</p></li>
</ul>
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 3.8.1p1-7sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.8.1p1-7sarge1.</p>
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.3p2-4 of openssh. openssh-krb5 will soon be converted towards
- -a transitional package against openssh.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.3p2-4 пакеÑ?а openssh. Ð?акеÑ? openssh-krb5 позже Ñ?Ñ?анеÑ?
+пеÑ?еÑ?однÑ?м пакеÑ?ом длÑ? openssh.</p>
- -<p>We recommend that you upgrade your openssh-krb5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openssh-krb5.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=sowK
-----END PGP SIGNATURE-----
Reply to: