[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2012/dsa-2459.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2459.wml	2017-11-01 10:11:10.339845257 +0500
+++ russian/security/2012/dsa-2459.wml	2018-02-13 13:01:37.193752034 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Quagga, a routing
- -daemon.</p>
+<p>Ð? Quagga, Ñ?лÑ?жбе маÑ?Ñ?Ñ?Ñ?Ñ?изаÑ?ии, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0249";>CVE-2012-0249</a>
 
- -    <p>A buffer overflow in the ospf_ls_upd_list_lsa function in the
- -    OSPFv2 implementation allows remote attackers to cause a
- -    denial of service (assertion failure and daemon exit) via a
- -    Link State Update (aka LS Update) packet that is smaller than
- -    the length specified in its header.</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии ospf_ls_upd_list_lsa в Ñ?еализаÑ?ии
+    OSPFv2 позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в
+    обÑ?лÑ?живании (оÑ?ибка Ñ?Ñ?веÑ?ждениÑ? и вÑ?Ñ?од Ñ?лÑ?жбÑ?) Ñ? помоÑ?Ñ?Ñ? пакеÑ?а
+    Link State Update (Ñ?акже извеÑ?Ñ?ного как LS Update) менÑ?Ñ?его Ñ?азмеÑ?а, Ñ?ем
+    Ñ?Ñ?о Ñ?казанно в его заголовке.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0250";>CVE-2012-0250</a>
 
- -    <p>A buffer overflow in the OSPFv2 implementation allows remote
- -    attackers to cause a denial of service (daemon crash) via a
- -    Link State Update (aka LS Update) packet containing a
- -    network-LSA link-state advertisement for which the
- -    data-structure length is smaller than the value in the Length
- -    header field.</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?еализаÑ?ии OSPFv2 позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?лÑ?жбÑ?) Ñ? помоÑ?Ñ?Ñ?
+    пакеÑ?а Link State Update (Ñ?акже извеÑ?Ñ?ного как LS Update), Ñ?одеÑ?жаÑ?его
+    обÑ?Ñ?вление Ñ?оÑ?Ñ?оÑ?ниÑ? канала Ñ?еÑ?Ñ?-LSA, длÑ? коÑ?оÑ?ого длина Ñ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ?
+    даннÑ?Ñ? менÑ?Ñ?е знаÑ?ениÑ?, Ñ?казанного в поле Length
+    заголовка.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0255";>CVE-2012-0255</a>
 
- -    <p>The BGP implementation does not properly use message buffers
- -    for OPEN messages, which allows remote attackers impersonating
- -    a configured BGP peer to cause a denial of service (assertion
- -    failure and daemon exit) via a message associated with a
- -    malformed AS4 capability.</p></li>
+    <p>РеализаÑ?иÑ? BGP непÑ?авилÑ?но иÑ?полÑ?зÑ?еÑ? бÑ?Ñ?еÑ?Ñ? Ñ?ообÑ?ений длÑ?
+    Ñ?ообÑ?ений OPEN, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?даваÑ?Ñ? Ñ?ебÑ? за
+    наÑ?Ñ?Ñ?оеннÑ?й BGP-Ñ?зел Ñ? Ñ?елÑ?Ñ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (оÑ?ибка
+    Ñ?Ñ?веÑ?ждениÑ? и вÑ?Ñ?од Ñ?лÑ?жбÑ?) Ñ? помоÑ?Ñ?Ñ? Ñ?ообÑ?ениÑ?, Ñ?вÑ?занного Ñ?о
+    Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованной Ñ?аÑ?акÑ?еÑ?иÑ?Ñ?икой AS4.</p></li>
 
 </ul>
 
- -<p>This security update upgrades the quagga package to the most recent
- -upstream release.  This release includes other corrections, such as
- -hardening against unknown BGP path attributes.</p>
+<p>Ð? данном обновлении безопаÑ?ноÑ?Ñ?и пакеÑ? quagga бÑ?л обновлÑ?н до наиболее Ñ?вежего
+вÑ?пÑ?Ñ?ка оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки. ЭÑ?оÑ? вÑ?пÑ?Ñ?к вклÑ?Ñ?аеÑ? в Ñ?ебÑ? и дÑ?Ñ?гие иÑ?пÑ?авлениÑ?, Ñ?акие
+как Ñ?лÑ?Ñ?Ñ?ение безопаÑ?ноÑ?Ñ?и аÑ?Ñ?ибÑ?Ñ?ов пÑ?Ñ?и BGP.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 0.99.20.1-0+squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.99.20.1-0+squeeze2.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 0.99.20.1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 0.99.20.1-1.</p>
 
- -<p>We recommend that you upgrade your quagga packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? quagga.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=sKEc
-----END PGP SIGNATURE-----


Reply to: