[DONE] wml://{security/2012/dsa-2459.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2012/dsa-2459.wml 2017-11-01 10:11:10.339845257 +0500
+++ russian/security/2012/dsa-2459.wml 2018-02-13 13:01:37.193752034 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Quagga, a routing
- -daemon.</p>
+<p>Ð? Quagga, Ñ?лÑ?жбе маÑ?Ñ?Ñ?Ñ?Ñ?изаÑ?ии, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0249">CVE-2012-0249</a>
- - <p>A buffer overflow in the ospf_ls_upd_list_lsa function in the
- - OSPFv2 implementation allows remote attackers to cause a
- - denial of service (assertion failure and daemon exit) via a
- - Link State Update (aka LS Update) packet that is smaller than
- - the length specified in its header.</p></li>
+ <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии ospf_ls_upd_list_lsa в Ñ?еализаÑ?ии
+ OSPFv2 позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в
+ обÑ?лÑ?живании (оÑ?ибка Ñ?Ñ?веÑ?ждениÑ? и вÑ?Ñ?од Ñ?лÑ?жбÑ?) Ñ? помоÑ?Ñ?Ñ? пакеÑ?а
+ Link State Update (Ñ?акже извеÑ?Ñ?ного как LS Update) менÑ?Ñ?его Ñ?азмеÑ?а, Ñ?ем
+ Ñ?Ñ?о Ñ?казанно в его заголовке.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0250">CVE-2012-0250</a>
- - <p>A buffer overflow in the OSPFv2 implementation allows remote
- - attackers to cause a denial of service (daemon crash) via a
- - Link State Update (aka LS Update) packet containing a
- - network-LSA link-state advertisement for which the
- - data-structure length is smaller than the value in the Length
- - header field.</p></li>
+ <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?еализаÑ?ии OSPFv2 позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+ вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?лÑ?жбÑ?) Ñ? помоÑ?Ñ?Ñ?
+ пакеÑ?а Link State Update (Ñ?акже извеÑ?Ñ?ного как LS Update), Ñ?одеÑ?жаÑ?его
+ обÑ?Ñ?вление Ñ?оÑ?Ñ?оÑ?ниÑ? канала Ñ?еÑ?Ñ?-LSA, длÑ? коÑ?оÑ?ого длина Ñ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ?
+ даннÑ?Ñ? менÑ?Ñ?е знаÑ?ениÑ?, Ñ?казанного в поле Length
+ заголовка.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0255">CVE-2012-0255</a>
- - <p>The BGP implementation does not properly use message buffers
- - for OPEN messages, which allows remote attackers impersonating
- - a configured BGP peer to cause a denial of service (assertion
- - failure and daemon exit) via a message associated with a
- - malformed AS4 capability.</p></li>
+ <p>РеализаÑ?иÑ? BGP непÑ?авилÑ?но иÑ?полÑ?зÑ?еÑ? бÑ?Ñ?еÑ?Ñ? Ñ?ообÑ?ений длÑ?
+ Ñ?ообÑ?ений OPEN, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?даваÑ?Ñ? Ñ?ебÑ? за
+ наÑ?Ñ?Ñ?оеннÑ?й BGP-Ñ?зел Ñ? Ñ?елÑ?Ñ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (оÑ?ибка
+ Ñ?Ñ?веÑ?ждениÑ? и вÑ?Ñ?од Ñ?лÑ?жбÑ?) Ñ? помоÑ?Ñ?Ñ? Ñ?ообÑ?ениÑ?, Ñ?вÑ?занного Ñ?о
+ Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованной Ñ?аÑ?акÑ?еÑ?иÑ?Ñ?икой AS4.</p></li>
</ul>
- -<p>This security update upgrades the quagga package to the most recent
- -upstream release. This release includes other corrections, such as
- -hardening against unknown BGP path attributes.</p>
+<p>Ð? данном обновлении безопаÑ?ноÑ?Ñ?и пакеÑ? quagga бÑ?л обновлÑ?н до наиболее Ñ?вежего
+вÑ?пÑ?Ñ?ка оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки. ÐÑ?оÑ? вÑ?пÑ?Ñ?к вклÑ?Ñ?аеÑ? в Ñ?ебÑ? и дÑ?Ñ?гие иÑ?пÑ?авлениÑ?, Ñ?акие
+как Ñ?лÑ?Ñ?Ñ?ение безопаÑ?ноÑ?Ñ?и аÑ?Ñ?ибÑ?Ñ?ов пÑ?Ñ?и BGP.</p>
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 0.99.20.1-0+squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.99.20.1-0+squeeze2.</p>
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 0.99.20.1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 0.99.20.1-1.</p>
- -<p>We recommend that you upgrade your quagga packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? quagga.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=sKEc
-----END PGP SIGNATURE-----
Reply to: