[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2006/dsa-11{89,27}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1127.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1127.wml	2016-11-07 16:30:52.325154980 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Ethereal network
- -sniffer, which may lead to the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? Ethereal, Ñ?еÑ?евом анализаÑ?оÑ?е Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?дÑ?лÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3628";>CVE-2006-3628</a>
 
- -    <p>Ilja van Sprundel discovered that the FW-1 and MQ dissectors are
- -    vulnerable to format string attacks.</p></li>
+    <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о диÑ?Ñ?екÑ?оÑ?Ñ? FW-1 и MQ
+    Ñ?Ñ?звимÑ? к аÑ?акам на Ñ?оÑ?маÑ?нÑ?е Ñ?Ñ?Ñ?оки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3629";>CVE-2006-3629</a>
 
- -    <p>Ilja van Sprundel discovered that the MOUNT dissector is vulnerable
- -    to denial of service through memory exhaustion.</p></li>
+    <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о диÑ?Ñ?екÑ?оÑ? MOUNT Ñ?Ñ?звим
+    к оÑ?казÑ? в обÑ?лÑ?живании из-за иÑ?Ñ?еÑ?паниÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3630";>CVE-2006-3630</a>
 
- -    <p>Ilja van Sprundel discovered off-by-one overflows in the NCP NMAS and
- -    NDPS dissectors.</p></li>
+    <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил оÑ?ибкÑ? на единиÑ?Ñ? в диÑ?Ñ?екÑ?оÑ?аÑ?
+    NCP NMAS и NDPS.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3631";>CVE-2006-3631</a>
 
- -    <p>Ilja van Sprundel discovered a buffer overflow in the NFS dissector.</p></li>
+    <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в диÑ?Ñ?екÑ?оÑ?е NFS.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-3632";>CVE-2006-3632</a>
 
- -    <p>Ilja van Sprundel discovered that the SSH dissector is vulnerable
- -    to denial of service through an infinite loop.</p></li>
+    <p>Ð?лÑ?Ñ? ван ШпÑ?Ñ?делÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о диÑ?Ñ?екÑ?оÑ? SSH Ñ?Ñ?звим
+    к оÑ?казÑ? в обÑ?лÑ?живании из-за беÑ?конеÑ?ного Ñ?икла.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 0.10.10-2sarge6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.10.10-2sarge6.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 0.99.2-1 of wireshark, the sniffer formerly known as ethereal.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.99.2-1 пакеÑ?а wireshark, аналиÑ?оÑ?е, Ñ?анее извеÑ?Ñ?ном как ethereal.</p>
 
- -<p>We recommend that you upgrade your ethereal packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? ethereal.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2006/dsa-1189.wml	2014-04-30 13:16:10.000000000 +0600
+++ russian/security/2006/dsa-1189.wml	2016-11-07 16:25:27.546399688 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in OpenSSH, a free
- -implementation of the Secure Shell protocol, which may lead to denial of
- -service and potentially the execution of arbitrary code. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? OpenSSH, Ñ?вободной Ñ?еализаÑ?ии пÑ?оÑ?окола Secure Shell, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в
+обÑ?лÑ?живании и поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4924";>CVE-2006-4924</a>
 
- -    <p>Tavis Ormandy of the Google Security Team discovered a denial of
- -    service vulnerability in the mitigation code against complexity
- -    attacks, which might lead to increased CPU consumption until a
- -    timeout is triggered. This is only exploitable if support for 
- -    SSH protocol version 1 is enabled.</p></li>
+    <p>ТÑ?виÑ? Ð?Ñ?манди из командÑ? безопаÑ?ноÑ?Ñ?и Google обнаÑ?Ñ?жил оÑ?каз в
+    обÑ?лÑ?живании в коде Ñ?нижениÑ? Ñ?иÑ?ка комплекÑ?нÑ?Ñ? аÑ?ак,
+    коÑ?оÑ?Ñ?й можеÑ? пÑ?иводиÑ?Ñ? к Ñ?велиÑ?ениÑ? поÑ?Ñ?еблениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ? до моменÑ?
+    оконÑ?аниÑ? вÑ?емени ожиданиÑ?. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?олÑ?ко в Ñ?лÑ?Ñ?ае
+    вклÑ?Ñ?ениÑ? поддеÑ?жки пÑ?оÑ?окола SSH веÑ?Ñ?ии 1.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-5051";>CVE-2006-5051</a>
 
- -    <p>Mark Dowd discovered that insecure signal handler usage could
- -    potentially lead to execution of arbitrary code through a double
- -    free. The Debian Security Team doesn't believe the general openssh
- -    package without Kerberos support to be exploitable by this issue.
- -    However, due to the complexity of the underlying code we will
- -    issue an update to rule out all eventualities.</p></li>
+    <p>Ð?аÑ?к Ð?аÑ?д обнаÑ?Ñ?жил, Ñ?Ñ?о иÑ?полÑ?зование обÑ?абоÑ?Ñ?ика небезопаÑ?нÑ?Ñ? Ñ?игналов можеÑ?
+    поÑ?енÑ?иалÑ?но пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода из-за двойного оÑ?вобождениÑ?
+    памÑ?Ñ?и. Ð?оманда безопаÑ?ноÑ?Ñ?и Debian полагаеÑ?, Ñ?Ñ?о пакеÑ? openssh без поддеÑ?жки
+    Kerberos не подвеÑ?жен Ñ?Ñ?ой пÑ?облеме.
+    Тем не менее, в Ñ?вÑ?зи Ñ?о Ñ?ложноÑ?Ñ?Ñ?Ñ? кода планиÑ?Ñ?еÑ?Ñ?Ñ?
+    вÑ?пÑ?Ñ?Ñ?иÑ?Ñ? обновление Ñ? Ñ?елÑ?Ñ? иÑ?клÑ?Ñ?ениÑ? вÑ?еÑ? возможнÑ?Ñ? пÑ?облем.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 3.8.1p1-7sarge1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.8.1p1-7sarge1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.3p2-4 of openssh. openssh-krb5 will soon be converted towards
- -a transitional package against openssh.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.3p2-4 пакеÑ?а openssh. Ð?акеÑ? openssh-krb5 позже Ñ?Ñ?анеÑ?
+пеÑ?еÑ?однÑ?м пакеÑ?ом длÑ? openssh.</p>
 
- -<p>We recommend that you upgrade your openssh-krb5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openssh-krb5.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJYIGXvAAoJEF7nbuICFtKl/kgP/i6A49AbMlMDK0jUs0Ht5csA
L1htJ3LbWzhJyVZQBd04borkg6CgOie7EV7C0pZ92MvwCzIFHqfsURk2U3I0JkRk
osjcGFY9HzESAbtkG6pLaJ5s1wpCP9YozsIIW2iqTedzV+8ly10YPizYaJhOSMLE
3WHR5SbAiB80i+uYGWj2vnmMqqbxzsrzNY+HMpCDoQlebvJznw6zp6eahD/aJ1+q
4jG2RTWYuLRmdg4lATvyurFdhVLPzGLx4mVnRW2RIhQNNugtP+Zl4Z8Q+q/LAZZx
SY6IvWdOLvP+Nn/mrm6s91E4q33BZOvSXxcV+MekDFxput9h7noaMx8rjE7dI/ne
a7yV1iEGfIJM3pW1mQehT9Jb0r1HoEcxf+2MsabqLV//C+Sj/2AniOzWZq9yobfh
E5/CkB64WwyRQztzMWdxBGOxeCt+BVbXSRQyXgNgPxBPWXyRamgRtmzeg5vwhHWY
npfnnaV9FN12j5yPYor4NnFEiGUoVFombS3OcGq72tIKHYXnECoqSjf8wiMVYdaQ
8a8BxAlztsCBQ6I/rFy92KvH+kVNfiAID9VpdCJ5wOitukBJZCAvaMgO5+yyNrwJ
4uqzfxT0ARXojk+Vj6x5BufqowwNnZc0W82f67J0F240JkgB/FF22496w96jElee
VLqmcoQOTkrwAfRwHDel
=sowK
-----END PGP SIGNATURE-----


Reply to: