-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2008/dsa-1515.wml 2014-04-30 13:16:15.000000000 +0600 +++ russian/security/2008/dsa-1515.wml 2016-08-31 22:00:12.945831954 +0500 @@ -1,30 +1,31 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several remote vulnerabilities have been discovered in libnet-dns-perl. - -The Common Vulnerabilities and Exposures project identifies the - -following problems:</p> - - - -<p>It was discovered that libnet-dns-perl generates very weak transaction - -IDs when sending queries (<a href="https://security-tracker.debian.org/tracker/CVE-2007-3377">CVE-2007-3377</a>). This update switches - -transaction ID generation to the Perl random generator, making - -prediction attacks more difficult.</p> - - - -<p>Compression loops in domain names resulted in an infinite loop in the - -domain name expander written in Perl (<a href="https://security-tracker.debian.org/tracker/CVE-2007-3409">CVE-2007-3409</a>). The Debian - -package uses an expander written in C by default, but this vulnerability - -has been addressed nevertheless.</p> +<p>Ð libnet-dns-perl бÑло обнаÑÑжено неÑколÑко ÑдалÑннÑÑ ÑÑзвимоÑÑей. +ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures опÑеделÑÐµÑ +ÑледÑÑÑие пÑоблемÑ:</p> + +<p>ÐÑло обнаÑÑжено, ÑÑо libnet-dns-perl ÑоздаÑÑ ÑлабÑе иденÑиÑикаÑоÑÑ +ÑÑанзакÑий пÑи оÑпÑавке запÑоÑов (<a href="https://security-tracker.debian.org/tracker/CVE-2007-3377">CVE-2007-3377</a>). Ðанное обновление +пеÑÐµÐ²Ð¾Ð´Ð¸Ñ Ð¿Ð¾Ñождение иденÑиÑикаÑоÑов ÑÑанзакÑий генеÑаÑоÑÑ ÑлÑÑайнÑÑ ÑиÑел Perl, ÑÑо +ÑÑложнÑÐµÑ Ð°Ñаки по пÑедÑказаниÑ.</p> + +<p>Ð¦Ð¸ÐºÐ»Ñ ÑжаÑÐ¸Ñ Ð² доменнÑÑ Ð¸Ð¼ÐµÐ½Ð°Ñ Ð¿ÑиводÑÑ Ðº беÑконеÑÐ½Ð¾Ð¼Ñ ÑÐ¸ÐºÐ»Ñ Ð² +коде ÑаÑкÑÑÑÐ¸Ñ Ð´Ð¾Ð¼ÐµÐ½Ð½ÑÑ Ð¸Ð¼Ñн, напиÑанном на Perl (<a href="https://security-tracker.debian.org/tracker/CVE-2007-3409">CVE-2007-3409</a>). РпакеÑе Debian +по ÑмолÑÐ°Ð½Ð¸Ñ Ð¸ÑполÑзÑеÑÑÑ ÐºÐ¾Ð´ ÑаÑкÑÑÑиÑ, напиÑаннÑй на C, но ÑÑа ÑÑзвимоÑÑÑ +вÑÑ Ñавно иÑпÑавлена.</p> - -<p>Decoding malformed A records could lead to a crash (via an uncaught - -Perl exception) of certain applications using libnet-dns-perl +<p>ÐекодиÑование некоÑÑекÑнÑÑ Ð·Ð°Ð¿Ð¸Ñей A Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº аваÑийной оÑÑановке (из-за непеÑÐµÑ Ð²Ð°Ñенного +иÑклÑÑÐµÐ½Ð¸Ñ Perl) пÑиложений, иÑполÑзÑÑÑÐ¸Ñ libnet-dns-perl (<a href="https://security-tracker.debian.org/tracker/CVE-2007-6341">CVE-2007-6341</a>).</p> - -<p>For the old stable distribution (sarge), these problems have been fixed in - -version 0.48-1sarge1.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (sarge) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 0.48-1sarge1.</p> - -<p>For the stable distribution (etch), these problems have been fixed in - -version 0.59-1etch1.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 0.59-1etch1.</p> - -<p>We recommend that you upgrade your libnet-dns-perl package.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑ libnet-dns-perl.</p> </define-tag> # do not modify the following line - --- english/security/2008/dsa-1592.wml 2014-04-30 13:16:15.000000000 +0600 +++ russian/security/2008/dsa-1592.wml 2016-08-31 21:02:58.379022984 +0500 @@ -1,36 +1,37 @@ - -<define-tag description>heap overflow</define-tag> +#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov" +<define-tag description>пеÑеполнение динамиÑеÑкой памÑÑи</define-tag> <define-tag moreinfo> - -<p>Two vulnerabilities have been discovered in the Linux kernel that may - -lead to a denial of service or arbitrary code execution. The Common - -Vulnerabilities and Exposures project identifies the following - -problems:</p> +<p>Ð ÑдÑе Linux бÑли обнаÑÑÐ¶ÐµÐ½Ñ Ð´Ð²Ðµ ÑÑзвимоÑÑи, коÑоÑÑе могÑÑ +пÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании или вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода. ÐÑÐ¾ÐµÐºÑ Common +Vulnerabilities and Exposures опÑеделÑÐµÑ ÑледÑÑÑие +пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1673">CVE-2008-1673</a> - - <p>Wei Wang from McAfee reported a potential heap overflow in the - - ASN.1 decode code that is used by the SNMP NAT and CIFS - - subsystem. Exploitation of this issue may lead to arbitrary code - - execution. This issue is not believed to be exploitable with the - - pre-built kernel images provided by Debian, but it might be an - - issue for custom images built from the Debian-provided source - - package.</p></li> + <p>ÐÑй Ðан из McAfee ÑообÑил о поÑенÑиалÑном пеÑеполнении динамиÑеÑкой памÑÑи в + коде декодеÑа ASN.1, иÑполÑзÑемом подÑиÑÑемами SNMP NAT и + CIFS. ÐÑполÑзование ÑÑой пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ + пÑоизволÑного кода. ÐÑедÑÑавлÑеÑÑÑ, ÑÑо ÑÑа пÑоблема не Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполÑзоваÑÑÑÑ + на пÑедваÑиÑелÑно ÑобÑаннÑÑ Ð¾Ð±ÑÐ°Ð·Ð°Ñ ÑдÑа, поÑÑавлÑемÑÑ Debian, но она Ð¼Ð¾Ð¶ÐµÑ + бÑÑÑ Ð°ÐºÑÑалÑна Ð´Ð»Ñ ÑобÑÑвеннÑÑ Ð¾Ð±Ñазов, ÑобÑаннÑÑ Ð¸Ð· пÑедоÑÑавлÑемого Debian + пакеÑа Ñ Ð¸ÑÑ Ð¾Ð´Ð½Ñм кодом.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-2358">CVE-2008-2358</a> - - <p>Brandon Edwards of McAfee Avert labs discovered an issue in the - - DCCP subsystem. Due to missing feature length checks it is possible - - to cause an overflow that may result in remote arbitrary code - - execution.</p></li> + <p>ÐÑÑндон ÐдваÑÐ´Ñ Ð¸Ð· лабоÑаÑоÑии McAfee Avert обнаÑÑжил пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð² + подÑиÑÑеме DCCP. Ðз-за оÑÑÑÑÑÑÐ²Ð¸Ñ Ð¿ÑовеÑки Ð´Ð»Ð¸Ð½Ñ Ð¼Ð¾Ð¶Ð½Ð¾ + вÑзваÑÑ Ð¿ÐµÑеполнение, коÑоÑое Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº ÑдалÑÐ½Ð½Ð¾Ð¼Ñ Ð²ÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ + пÑоизволÑного кода.</p></li> </ul> - -<p>For the stable distribution (etch) these problems have been fixed in - -version 2.6.18.dfsg.1-18etch6.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 2.6.18.dfsg.1-18etch6.</p> - -<p>We recommend that you upgrade your linux-2.6, fai-kernels, and - -user-mode-linux packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ linux-2.6, fai-kernels и +user-mode-linux.</p> </define-tag> # do not modify the following line - --- english/security/2008/dsa-1645.wml 2014-04-30 13:16:16.000000000 +0600 +++ russian/security/2008/dsa-1645.wml 2016-08-31 21:13:42.915778813 +0500 @@ -1,36 +1,37 @@ - -<define-tag description>various</define-tag> +#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov" +<define-tag description>Ñазное</define-tag> <define-tag moreinfo> - -<p>Several local/remote vulnerabilities have been discovered in lighttpd, - -a fast webserver with minimal memory footprint. </p> +<p>Ð lighttpd, бÑÑÑÑом веб-ÑеÑвеÑе Ñ Ð¼Ð¸Ð½Ð¸Ð¼Ð°Ð»ÑнÑм поÑÑеблением памÑÑи, бÑло обнаÑÑжено +неÑколÑко локалÑнÑÑ /ÑдалÑннÑÑ ÑÑзвимоÑÑей. </p> - -<p>The Common Vulnerabilities and Exposures project identifies the following - -problems:</p> +<p>ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures опÑеделÑÐµÑ ÑледÑÑÑие +пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4298">CVE-2008-4298</a> - - <p>A memory leak in the http_request_parse function could be used by - - remote attackers to cause lighttpd to consume memory, and cause a - - denial of service attack.</p></li> + <p>УÑеÑка памÑÑи в ÑÑнкÑии http_request_parse Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполÑзоваÑÑÑÑ + ÑдалÑннÑм злоÑмÑÑленниками Ð´Ð»Ñ Ð²Ñзова ÑÑезмеÑного поÑÑÐµÐ±Ð»ÐµÐ½Ð¸Ñ Ð¿Ð°Ð¼ÑÑи lighttpd и + оÑказа в обÑлÑживании.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4359">CVE-2008-4359</a> - - <p>Inconsistant handling of URL patterns could lead to the disclosure - - of resources a server administrator did not anticipate when using - - rewritten URLs.</p></li> - - + <p>ÐепоÑледоваÑелÑÐ½Ð°Ñ Ð¾Ð±ÑабоÑка Ñаблонов URL Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº ÑаÑкÑÑÑÐ¸Ñ + ÑеÑÑÑÑов, коÑоÑое не ожидаеÑÑÑ ÑиÑÑемнÑм админиÑÑÑаÑоÑом пÑи иÑполÑзовании + пеÑезапиÑаннÑÑ URL.</p></li> + <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4360">CVE-2008-4360</a> - - <p>Upon filesystems which don't handle case-insensitive paths differently - - it might be possible that unanticipated resources could be made available - - by mod_userdir.</p></li> + <p>ÐÑи иÑполÑзовании ÑайловÑÑ ÑиÑÑем, коÑоÑÑе не обÑабаÑÑваÑÑ Ð½ÐµÐ·Ð°Ð²Ð¸ÑÑÑие Ð¾Ñ ÑегиÑÑÑа + пÑÑи дÑÑгим ÑпоÑобом, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ mod_userdir можно ÑделаÑÑ + доÑÑÑпнÑм ÑеÑÑÑÑÑ, не пÑедназнаÑеннÑе Ð´Ð»Ñ Ð¾ÑкÑÑÑиÑ.</p></li> </ul> - -<p>For the stable distribution (etch), these problems have been fixed in version +<p>Ð ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² веÑÑии 1.4.13-4etch11.</p> - -<p>For the unstable distribution (sid), these problems will be fixed shortly.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±ÑдÑÑ Ð¸ÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð¿Ð¾Ð·Ð¶Ðµ.</p> - -<p>We recommend that you upgrade your lighttpd package.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑ lighttpd.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJXxw0fAAoJEF7nbuICFtKl+eIP/1zgz3LChVXtbWlhZuFcw8ph BU5KkrvhdJ7MSYu03ebZxbhfMRFrrHjQvvDRPlJY+ItAS0keBvQNIJ0V11UJGCwb X+iwjk9t9IT4ufpE7YYRV67/EtwNBwqRLH/3rnwNqWm/KVqoP0+g9zCITG0CdqW7 byEXCM/v9KtP52/L37WvLRZ1jNnu+BNrWi+HjKpK2zcrxsoCHiEb2KBlxRyEMJzB /cee3sRJ/ho9EaPVmBHTPiAPH8OW01zAYuT33keVPJJQr1XSZOKLAzDxJUzprNqt V9jwbFicErXB/0G1PX/3K62J1AQdt2fU7oJJYUou0LhF9Kdg4DqNd0yAF0a1L5/e pd4Qyh8L8m1wlRm8UXFpOgB+tS7YTo02CLYv9WKNhrqet1uG5ugRnbO+DaLNBDzt 79L3PadRXf55zEIuheesLH9avWXo/YEqxKEJMqxK8W7GBhYbjtwqhjH0XWEZ1FDk Dtwkjh3Q8iHe144MwoxI+sZA+f3zlintk7vrRCJ5UtUvYWKgvEoQuBqAiU87AeJJ oy2fhbXe3vCurjV80bGpT4LLCLsxCkY1GdzZLDZVWVoZXjwZltTmeRKL/qx9Yadt FesZ3e8irc60x7yW8XAa8ZORfoZLpJe9bTIRganOtalWvJOl6j1lSSgavN5mCAN3 UOX7kVQCSHkUGNL171zx =sjfF -----END PGP SIGNATURE-----