-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2012/dsa-2459.wml 2017-11-01 10:11:10.339845257 +0500 +++ russian/security/2012/dsa-2459.wml 2018-02-13 13:01:37.193752034 +0500 @@ -1,48 +1,49 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in Quagga, a routing - -daemon.</p> +<p>Ð Quagga, ÑлÑжбе маÑÑÑÑÑизаÑии, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей.</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0249">CVE-2012-0249</a> - - <p>A buffer overflow in the ospf_ls_upd_list_lsa function in the - - OSPFv2 implementation allows remote attackers to cause a - - denial of service (assertion failure and daemon exit) via a - - Link State Update (aka LS Update) packet that is smaller than - - the length specified in its header.</p></li> + <p>ÐеÑеполнение бÑÑеÑа в ÑÑнкÑии ospf_ls_upd_list_lsa в ÑеализаÑии + OSPFv2 позволÑÐµÑ ÑдалÑннÑм злоÑмÑÑленникам вÑзÑваÑÑ Ð¾Ñказ в + обÑлÑживании (оÑибка ÑÑвеÑÐ¶Ð´ÐµÐ½Ð¸Ñ Ð¸ вÑÑ Ð¾Ð´ ÑлÑжбÑ) Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð¿Ð°ÐºÐµÑа + Link State Update (Ñакже извеÑÑного как LS Update) менÑÑего ÑазмеÑа, Ñем + ÑÑо Ñказанно в его заголовке.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0250">CVE-2012-0250</a> - - <p>A buffer overflow in the OSPFv2 implementation allows remote - - attackers to cause a denial of service (daemon crash) via a - - Link State Update (aka LS Update) packet containing a - - network-LSA link-state advertisement for which the - - data-structure length is smaller than the value in the Length - - header field.</p></li> + <p>ÐеÑеполнение бÑÑеÑа в ÑеализаÑии OSPFv2 позволÑÐµÑ ÑдалÑннÑм злоÑмÑÑленникам + вÑзÑваÑÑ Ð¾Ñказ в обÑлÑживании (аваÑÐ¸Ð¹Ð½Ð°Ñ Ð¾ÑÑановка ÑлÑжбÑ) Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ + пакеÑа Link State Update (Ñакже извеÑÑного как LS Update), ÑодеÑжаÑего + обÑÑвление ÑоÑÑоÑÐ½Ð¸Ñ ÐºÐ°Ð½Ð°Ð»Ð° ÑеÑÑ-LSA, Ð´Ð»Ñ ÐºÐ¾ÑоÑого длина ÑÑÑÑкÑÑÑÑ + даннÑÑ Ð¼ÐµÐ½ÑÑе знаÑениÑ, Ñказанного в поле Length + заголовка.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0255">CVE-2012-0255</a> - - <p>The BGP implementation does not properly use message buffers - - for OPEN messages, which allows remote attackers impersonating - - a configured BGP peer to cause a denial of service (assertion - - failure and daemon exit) via a message associated with a - - malformed AS4 capability.</p></li> + <p>РеализаÑÐ¸Ñ BGP непÑавилÑно иÑполÑзÑÐµÑ Ð±ÑÑеÑÑ ÑообÑений Ð´Ð»Ñ + ÑообÑений OPEN, ÑÑо позволÑÐµÑ ÑдалÑннÑм злоÑмÑÑленникам вÑдаваÑÑ ÑÐµÐ±Ñ Ð·Ð° + наÑÑÑоеннÑй BGP-Ñзел Ñ ÑелÑÑ Ð²Ñзова оÑказа в обÑлÑживании (оÑибка + ÑÑвеÑÐ¶Ð´ÐµÐ½Ð¸Ñ Ð¸ вÑÑ Ð¾Ð´ ÑлÑжбÑ) Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑообÑениÑ, ÑвÑзанного Ñо + ÑпеÑиалÑно ÑÑоÑмиÑованной Ñ Ð°ÑакÑеÑиÑÑикой AS4.</p></li> </ul> - -<p>This security update upgrades the quagga package to the most recent - -upstream release. This release includes other corrections, such as - -hardening against unknown BGP path attributes.</p> +<p>Рданном обновлении безопаÑноÑÑи Ð¿Ð°ÐºÐµÑ quagga бÑл обновлÑн до наиболее Ñвежего +вÑпÑÑка оÑновной веÑки ÑазÑабоÑки. ÐÑÐ¾Ñ Ð²ÑпÑÑк вклÑÑÐ°ÐµÑ Ð² ÑÐµÐ±Ñ Ð¸ дÑÑгие иÑпÑавлениÑ, Ñакие +как ÑлÑÑÑение безопаÑноÑÑи аÑÑибÑÑов пÑÑи BGP.</p> - -<p>For the stable distribution (squeeze), these problems have been fixed - -in version 0.99.20.1-0+squeeze2.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (squeeze) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ +в веÑÑии 0.99.20.1-0+squeeze2.</p> - -<p>For the testing distribution (wheezy) and the unstable distribution - -(sid), these problems have been fixed in version 0.99.20.1-1.</p> +<p>Ð ÑеÑÑиÑÑемом (wheezy) и неÑÑабилÑном (sid) вÑпÑÑÐºÐ°Ñ +ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² веÑÑии 0.99.20.1-1.</p> - -<p>We recommend that you upgrade your quagga packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ quagga.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlqCm2cACgkQXudu4gIW 0qXzLg/9HY6PjN98n1axYSb+5PO7OmSKYTlCQ5n5cOUwh9IQg8Pb7rRt6PtCBslw jMriSBzG/dGGhbDAILiO20G8MWkXtQx2Bq+Tamyvoexe893CK960iWEPJyGaOguE ci8IwGgzVVHDxNlBnX6t5yKgPyNYSTlJhFQM536w5EOpDIBDOYvhaUCwxF2c/lnM OWzrUepyUbrcECs7NtmGD+0JyTdG0Z7B9ouESY3MZaMYP8VY776iEHbdtvbQBVqc P8BJeQXCCCMeLVQqiGtcprEVZCLHFLyeZjxUMYveTzQEOiQQyE7cRzCpGhZMAJ4I ly9IVR45ZVwoSO0Tx55kSNeLHUVo2VHQmg/NWNwBkoCQLvCGGgC8Vj085cauW/Aq 5HIyfa6DCpEg/a3NOXeSGwojmhm5HVGY18UCFJRhp7S/IO7XXcqolqN0qUcvg635 0+bY+kqYbVbv0XZWFjXl7eYJUMvNif692lDFURCf9KDUptA2eG7MdR/UwbrJTasP tzapY48a9+KxDuB3RZ1xRaU5zc+FIWX0mY77Re6mMHqlvrj56aZUTlV6HvylCoz/ n6Ydy2vYFztTetGmcmhZ/WtkpiX/d20JmXWG5XrKAwuaLIGTgsb+LNnpn3TnHOAv TOwp1JqiTN4/0GvoXrFzbm0kXuJcyCkpmpo820NzkPXekuAoEQI= =sKEc -----END PGP SIGNATURE-----