[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2018/dsa-4151.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- ../../english/security/2018/dsa-4151.wml	2018-03-27 01:34:26.000000000 +0500
+++ 2018/dsa-4151.wml	2018-03-27 10:50:43.593304020 +0500
@@ -1,28 +1,29 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" mindelta="1"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Bas van Schaik and Kevin Backhouse discovered a stack-based buffer
- -overflow vulnerability in librelp, a library providing reliable event
- -logging over the network, triggered while checking x509 certificates
- -from a peer. A remote attacker able to connect to rsyslog can take
- -advantage of this flaw for remote code execution by sending a specially
- -crafted x509 certificate.</p>
+<p>Ð?аÑ? ван Шаик и Ð?евин Ð?Ñ?кÑ?аÑ?Ñ? обнаÑ?Ñ?жили пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?еке
+в librelp, библиоÑ?еке, пÑ?едоÑ?Ñ?авлÑ?Ñ?Ñ?ей надÑ?жное жÑ?Ñ?налиÑ?ование Ñ?обÑ?Ñ?ий
+по Ñ?еÑ?и, коÑ?оÑ?Ñ?й возникаеÑ? в Ñ?оде пÑ?овеÑ?ки Ñ?еÑ?Ñ?иÑ?икаÑ?ов x509, полÑ?Ñ?еннÑ?Ñ?
+оÑ? одноÑ?ангового Ñ?зла Ñ?еÑ?и. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник, Ñ?поÑ?обнÑ?й подклÑ?Ñ?аÑ?Ñ?Ñ?Ñ?
+к rsyslog, можеÑ? иÑ?полÑ?зоваÑ?Ñ? даннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? Ñ?далÑ?нного вÑ?полнениÑ?
+кода пÑ?Ñ?Ñ?м оÑ?пÑ?авки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?еÑ?Ñ?иÑ?икаÑ?а x509.</p>
 
- -<p>Details can be found in the upstream advisory:
+<p>Ð?одÑ?обноÑ?Ñ?и можно найÑ?и в Ñ?екомендаÑ?ии оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки:
 <a href="https://www.rsyslog.com/cve-2018-1000140/";>https://www.rsyslog.com/cve-2018-1000140/</a></p>
 
- -<p>For the oldstable distribution (jessie), this problem has been fixed
- -in version 1.2.7-2+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 1.2.7-2+deb8u1.</p>
 
- -<p>For the stable distribution (stretch), this problem has been fixed in
- -version 1.2.12-1+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.2.12-1+deb9u1.</p>
 
- -<p>We recommend that you upgrade your librelp packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? librelp.</p>
 
- -<p>For the detailed security status of librelp please refer to its security
- -tracker page at:
- -<a href="https://security-tracker.debian.org/tracker/librelp";>https://security-tracker.debian.org/tracker/librelp</a></p>
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и librelp можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/librelp";>\
+https://security-tracker.debian.org/tracker/librelp</a></p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2018/dsa-4151.data"
- -# $Id: dsa-4151.wml,v 1.2 2018/03/26 20:34:26 carnil Exp $
-----BEGIN PGP SIGNATURE-----
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=iqU8
-----END PGP SIGNATURE-----


Reply to: