[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1673.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1673.wml	2017-11-01 10:11:09.931818654 +0500
+++ russian/security/2008/dsa-1673.wml	2018-03-12 12:11:37.867322822 +0500
@@ -1,54 +1,55 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in network traffic
- -analyzer Wireshark. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Wireshark, пÑ?огÑ?амме длÑ? анализа Ñ?еÑ?евого Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3137";>CVE-2008-3137</a>
 
- -    <p>The GSM SMS dissector is vulnerable to denial of service.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ? GSM SMS Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3138";>CVE-2008-3138</a>
 
- -    <p>The PANA and KISMET dissectors are vulnerable to denial of service.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ?Ñ? PANA и KISMET Ñ?Ñ?звимÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3141";>CVE-2008-3141</a>
 
- -    <p>The RMI dissector could disclose system memory.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ? RMI можеÑ? Ñ?аÑ?кÑ?Ñ?ваÑ?Ñ? Ñ?одеÑ?жимое Ñ?иÑ?Ñ?емной памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3145";>CVE-2008-3145</a>
 
- -    <p>The packet reassembling module is vulnerable to denial of service.</p></li>
+    <p>Ð?одÑ?лÑ? пеÑ?еÑ?Ñ?анÑ?лиÑ?ованиÑ? пакеÑ?ов Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3933";>CVE-2008-3933</a>
 
- -    <p>The zlib uncompression module is vulnerable to denial of service.</p></li>
+    <p>Ð?одÑ?лÑ? Ñ?аÑ?паковки zlib Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4683";>CVE-2008-4683</a>
 
- -    <p>The Bluetooth ACL dissector is vulnerable to denial of service.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ? Bluetooth ACL Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4684";>CVE-2008-4684</a>
 
- -    <p>The PRP and MATE dissectors are vulnerable to denial of service.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ?Ñ? PRP и MATE Ñ?Ñ?звимÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4685";>CVE-2008-4685</a>
 
- -    <p>The Q931 dissector is vulnerable to denial of service.</p></li>
+    <p>Ð?иÑ?Ñ?екÑ?оÑ? Q931 Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 0.99.4-5.etch.3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.99.4-5.etch.3.</p>
 
- -<p>For the upcoming stable distribution (lenny), these problems have been
- -fixed in version 1.0.2-3+lenny2.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 1.0.2-3+lenny2.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your wireshark packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wireshark.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=nu/8
-----END PGP SIGNATURE-----


Reply to: