-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2008/dsa-1541.wml 2014-04-30 13:16:15.000000000 +0600 +++ russian/security/2008/dsa-1541.wml 2016-09-21 01:29:42.608298573 +0500 @@ -1,43 +1,44 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several remote vulnerabilities have been discovered in OpenLDAP, a - -free implementation of the Lightweight Directory Access Protocol. The - -Common Vulnerabilities and Exposures project identifies the following - -problems:</p> +<p>Ð OpenLDAP, Ñвободной ÑеализаÑии Lightweight Directory Access Protocol, +бÑло обнаÑÑжено неÑколÑко ÑдалÑннÑÑ ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ +Common Vulnerabilities and Exposures опÑеделÑÐµÑ ÑледÑÑÑие +пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5707">CVE-2007-5707</a> - - <p>Thomas Sesselmann discovered that slapd could be crashed by a - - malformed modify requests.</p></li> - - + <p>Ð¢Ð¾Ð¼Ð°Ñ Ð¡ÐµÑÑелÑман обнаÑÑжил, ÑÑо slapd Ð¼Ð¾Ð¶ÐµÑ Ð°Ð²Ð°Ñийно завеÑÑиÑÑ ÑÐ²Ð¾Ñ ÑабоÑÑ + пÑи полÑÑении некоÑÑекÑнÑÑ Ð·Ð°Ð¿ÑоÑов на изменение.</p></li> + <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-5708">CVE-2007-5708</a> - - <p>Toby Blade discovered that incorrect memory handling in slapo-pcache - - could lead to denial of service through crafted search requests.</p></li> + <p>Тоби ÐлÑйд обнаÑÑжил, ÑÑо непÑавилÑÐ½Ð°Ñ ÑабоÑа Ñ Ð¿Ð°Ð¼ÑÑÑÑ Ð² slapo-pcache + Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании из-за ÑпеÑиалÑно ÑÑоÑмиÑованнÑÑ Ð¿Ð¾Ð¸ÑковÑÑ Ð·Ð°Ð¿ÑоÑов.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6698">CVE-2007-6698</a> - - <p>It was discovered that a programming error in the interface to the - - BDB storage backend could lead to denial of service through - - crafted modify requests.</p></li> + <p>ÐÑло обнаÑÑжено, ÑÑо оÑибка пÑогÑаммиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð² инÑеÑÑейÑе Ð´Ð»Ñ + движка BDB-Ñ ÑанилиÑа Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании пÑи полÑÑении + ÑпеÑиалÑно ÑÑоÑмиÑованнÑÑ Ð·Ð°Ð¿ÑоÑов на изменение.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0658">CVE-2008-0658</a> - - <p>It was discovered that a programming error in the interface to the - - BDB storage backend could lead to denial of service through - - crafted modrdn requests.</p></li> + <p>ÐÑло обнаÑÑжено, ÑÑо оÑибка пÑогÑаммиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð² инÑеÑÑейÑе Ð´Ð»Ñ + движка BDB-Ñ ÑанилиÑа Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании пÑи полÑÑении + ÑпеÑиалÑно ÑÑоÑмиÑованнÑÑ modrdn-запÑоÑов.</p></li> </ul> - -<p>For the stable distribution (etch), these problems have been fixed in - -version 2.3.30-5+etch1.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 2.3.30-5+etch1.</p> - -<p>For the unstable distribution (sid), these problems have been fixed in - -version 2.4.7-6.1.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 2.4.7-6.1.</p> - -<p>We recommend that you upgrade your openldap2.3 packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ openldap2.3.</p> </define-tag> # do not modify the following line - --- english/security/2008/dsa-1663.wml 2014-04-30 13:16:16.000000000 +0600 +++ russian/security/2008/dsa-1663.wml 2016-09-21 01:24:29.490926673 +0500 @@ -1,40 +1,41 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in NET SNMP, a suite of - -Simple Network Management Protocol applications. The Common - -Vulnerabilities and Exposures project identifies the following problems:</p> +<p>Ð NET SNMP, набоÑе пÑиложений SNMP, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ Common +Vulnerabilities and Exposures опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0960">CVE-2008-0960</a> - - - - <p>Wes Hardaker reported that the SNMPv3 HMAC verification relies on - - the client to specify the HMAC length, which allows spoofing of - - authenticated SNMPv3 packets.</p></li> - - + + <p>ÐÐµÑ Ð¥Ð°ÑÐ´Ð°ÐºÐµÑ ÑообÑил, ÑÑо HMAC-пÑовеÑка SNMPv3 полагаеÑÑÑ Ð½Ð° + клиенÑа в плане опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð´Ð»Ð¸Ð½Ñ HMAC, ÑÑо позволÑÐµÑ Ð¿Ð¾Ð´Ð´ÐµÐ»ÑваÑÑ + аÑÑеÑиÑиÑиÑованнÑе SNMPv3-пакеÑÑ.</p></li> + <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-2292">CVE-2008-2292</a> - - - - <p>John Kortink reported a buffer overflow in the __snprint_value - - function in snmp_get causing a denial of service and potentially - - allowing the execution of arbitrary code via a large OCTETSTRING - - in an attribute value pair (AVP).</p></li> - - + + <p>Ðжон ÐоÑÑинк ÑообÑил о пеÑеполнении бÑÑеÑа в ÑÑнкÑии __snprint_value + в snmp_get, вÑзÑваÑÑем оÑказ в обÑлÑживании и поÑенÑиалÑно позволÑÑÑем + вÑполнÑÑÑ Ð¿ÑоизволÑнÑй код Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð±Ð¾Ð»ÑÑого знаÑÐµÐ½Ð¸Ñ OCTETSTRING + в Ð¿Ð°ÐºÐµÑ Ð·Ð½Ð°Ñений аÑÑибÑÑа (AVP).</p></li> + <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-4309">CVE-2008-4309</a> - - <p>It was reported that an integer overflow in the - - netsnmp_create_subtree_cache function in agent/snmp_agent.c allows - - remote attackers to cause a denial of service attack via a crafted - - SNMP GETBULK request.</p></li> + <p>ÐÑло ÑообÑено, ÑÑо пеÑеполнение ÑелÑÑ ÑиÑел в + ÑÑнкÑии netsnmp_create_subtree_cache в agent/snmp_agent.c позволÑÐµÑ + ÑдалÑннÑм злоÑмÑÑленникам вÑзÑваÑÑ Ð¾Ñказ в обÑлÑживании Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑпеÑиалÑно ÑÑоÑмиÑованного + SNMP GETBULK-запÑоÑа.</p></li> </ul> - -<p>For the stable distribution (etch), these problems has been fixed in - -version 5.2.3-7etch4.</p> - - - -<p>For the testing distribution (lenny) and unstable distribution (sid) - -these problems have been fixed in version 5.4.1~dfsg-11.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 5.2.3-7etch4.</p> + +<p>Ð ÑеÑÑиÑÑемом (lenny) и неÑÑабилÑном (sid) вÑпÑÑÐºÐ°Ñ +ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² веÑÑии 5.4.1~dfsg-11.</p> - -<p>We recommend that you upgrade your net-snmp package.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑ net-snmp.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJX4Zw5AAoJEF7nbuICFtKlwr4P/03q8C5kNpu82pjJ6ZQ/JXle a/3voIf2rvSOCJheBED127YcwOsBDCmraQfiF4J7dTajfgjxs4xCVw9pQd6xv53q xfEXKj4tM1Go1mpYosoR7Dz0uIouAVO+RIQ2uYFMO2dNBjUq+eLMTx4CdxxPHNfL K0sDpxWDOvSl5X5gzV0DBQ1FmN0G8zWAvy8mlHvN4W2Fk/vbgfgPN2lihA1TUu64 nfA/PjxU1QhEGQ7XJIq4S2bLzn1kAc6vPRyNEkiLA6p1m0ZvkyGYWG421fWwxfOM skOKAhXWT1gbo6RLraMb3EjhlLipY0irrSIj7ejfvqcB0mitkGq7cjTKIZx1ByBT a1Yuzu/wEZFgOjXr4CTrGcHDpW5iGUgALaaaVcbokelazVbl9rzTGEPG3i7hxJCv y1JdUbRN3DCL8FTQqKmcHAgp8BK7Y/IyKMYXLfI4AQRLaa1r+dWs3y5DMj01D/WY twiO0msstYXbZhNAmpCkBurisWutQGyL9+ZiFPCvP52YF3AJcv2hy3DqIvpvSKSQ dUwMLpTc+ESuFpf4q9ZYN7ZD5nWRXkgXWVaxoWtLK9WL+olqR5/zqeqMAqjBPyco KE8e5D++Jywqlq5vR7vTLh+0fvUKiLUS/4/RufnUqGGRVxqc9zvc/EwvB817jffq chxdYB3Vn62R/QIragxL =D38D -----END PGP SIGNATURE-----