[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2014/dla-{97,67,88,91}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2014/dla-67.wml	2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-67.wml	2016-06-27 21:30:26.657020408 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3538";>CVE-2014-3538</a>
 
- -    <p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2013-7345";>CVE-2013-7345</a> did not
- -    sufficiently address the problem. A remote attacker could still
- -    cause a denial of service (CPU consumption) via a specially-crafted
- -    input file that triggers backtracking during processing of an awk
- -    regular expression rule.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о изнаÑ?алÑ?ное иÑ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2013-7345";>CVE-2013-7345</a> недоÑ?Ñ?аÑ?оÑ?но
+    Ñ?еÑ?аеÑ? Ñ?казаннÑ?Ñ? пÑ?облемÑ?. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник вÑ?Ñ? еÑ?Ñ? можеÑ?
+    вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+    вÑ?одного Ñ?айла, вÑ?зÑ?ваÑ?Ñ?его пеÑ?ебоÑ? Ñ? возвÑ?аÑ?ом в Ñ?оде обÑ?абоÑ?ки пÑ?авила Ñ?егÑ?лÑ?Ñ?нÑ?Ñ?
+    вÑ?Ñ?ажений awk.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3587";>CVE-2014-3587</a>
 
- -    <p>It was discovered that the CDF parser of the fileinfo module does
- -    not properly process malformed files in the Composite Document File
- -    (CDF) format, leading to crashes.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о код длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а CDF в модÑ?ле fileinfo
+    непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? некоÑ?Ñ?екÑ?нÑ?е Ñ?айлÑ? в Ñ?оÑ?маÑ?е Composite Document File
+    (CDF), Ñ?Ñ?о пÑ?иводиÑ? к аваÑ?ийнÑ?м оÑ?Ñ?ановкам.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3597";>CVE-2014-3597</a>
 
- -    <p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-4049";>CVE-2014-4049</a> did not
- -    completely address the issue. A malicious server or
- -    man-in-the-middle attacker could cause a denial of service (crash)
- -    and possibly execute arbitrary code via a crafted DNS TXT record.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о изнаÑ?алÑ?ное иÑ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2014-4049";>CVE-2014-4049</a> не полноÑ?Ñ?Ñ?Ñ?
+    Ñ?еÑ?аеÑ? Ñ?казаннÑ?Ñ? пÑ?облемÑ?. Ð?лоÑ?мÑ?Ñ?ленник, Ñ?пÑ?авлÑ?Ñ?Ñ?ий Ñ?еÑ?веÑ?ом или вÑ?полнÑ?Ñ?Ñ?ий
+    аÑ?акÑ? по пÑ?инÑ?ипÑ? Ñ?еловек-в-Ñ?еÑ?едине, можеÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка)
+    и возможное вÑ?полнение пÑ?оизволÑ?ного кода Ñ?еÑ?ез Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? TXT-запиÑ?Ñ? DNS.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4670";>CVE-2014-4670</a>
 
- -    <p>It was discovered that PHP incorrectly handled certain SPL
- -    Iterators. A local attacker could use this flaw to cause PHP to
- -    crash, resulting in a denial of service.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о PHP непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? опÑ?еделÑ?ннÑ?е иÑ?еÑ?аÑ?оÑ?Ñ?
+    SPL. Ð?окалÑ?нÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки
+    PHP, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in php5 version 5.3.3-7+squeeze22</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е php5 веÑ?Ñ?ии 5.3.3-7+squeeze22</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-88.wml	2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-88.wml	2016-06-27 21:37:49.238704480 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>This update fixes multiple local and remote denial of service and remote code
- -execute problems:</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? многоÑ?иÑ?леннÑ?е локалÑ?нÑ?е и Ñ?далÑ?ннÑ?е оÑ?казÑ? в обÑ?лÑ?живании и пÑ?облемÑ?, Ñ?вÑ?заннÑ?е Ñ?
+Ñ?далÑ?ннÑ?м вÑ?полнением кода:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0188";>CVE-2011-0188</a>
 
- -<p>Properly allocate memory, to prevent arbitrary code execution or application
- -crash. Reported by Drew Yao.</p></li>
+<p>Ð?оÑ?Ñ?екÑ?ное вÑ?деление памÑ?Ñ?и Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода или аваÑ?ийной
+оÑ?Ñ?ановки пÑ?иложениÑ?. Ð?б Ñ?Ñ?звимоÑ?Ñ?и Ñ?ообÑ?ил Ð?Ñ?Ñ? Яо.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2686";>CVE-2011-2686</a>
 
- -<p>Reinitialize the random seed when forking to prevent  <a href="https://security-tracker.debian.org/tracker/CVE-2003-0900";>CVE-2003-0900</a> like
- -situations.</p></li>
+<p>Ð?овÑ?оÑ?наÑ? иниÑ?иализаÑ?иÑ? Ñ?лÑ?Ñ?айного наÑ?алÑ?ного Ñ?иÑ?ла пÑ?и Ñ?азвеÑ?влении Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? подобнÑ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/CVE-2003-0900";>CVE-2003-0900</a> Ñ?иÑ?Ñ?аÑ?ий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2705";>CVE-2011-2705</a>
 
- -<p>Modify PRNG state to prevent random number sequence repeatation at forked
- -child process which has same pid. Reported by Eric Wong.</p></li>
+<p>Ð?зменение Ñ?оÑ?Ñ?оÑ?ниÑ? PRNG Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? повÑ?оÑ?ов поÑ?ледоваÑ?елÑ?ноÑ?Ñ?ей Ñ?лÑ?Ñ?айнÑ?Ñ? Ñ?иÑ?ел в оÑ?веÑ?влÑ?нном
+доÑ?еÑ?нем пÑ?оÑ?еÑ?Ñ?е, имеÑ?Ñ?им Ñ?оÑ? же иденÑ?иÑ?икаÑ?оÑ?. Ð?б Ñ?Ñ?звимоÑ?Ñ?и Ñ?ообÑ?ил ЭÑ?ик Ð?онг.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4815";>CVE-2011-4815</a>
 
- -<p>Fix a problem with predictable hash collisions resulting in denial of service
- -(CPU consumption) attacks. Reported by Alexander Klink and Julian Waelde.</p></li>
+<p>Ð?Ñ?пÑ?авление пÑ?облемÑ? Ñ? пÑ?едÑ?казÑ?емÑ?ми Ñ?Ñ?олкновениÑ?ми Ñ?еÑ?ей, пÑ?иводÑ?Ñ?ими к оÑ?казÑ? в обÑ?лÑ?живании
+(Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?). Ð? пÑ?облеме Ñ?ообÑ?ил Ð?лекÑ?андÑ? Ð?линк и Ð?жÑ?лиан Ð?илд.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8080";>CVE-2014-8080</a>
 
- -<p>Fix REXML parser to prevent memory consumption denial of service via crafted
- -XML documents. Reported by Willis Vandevanter.</p></li>
+<p>Ð?Ñ?пÑ?авление кода длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а REXML Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? оÑ?каза в обÑ?лÑ?живании из-за Ñ?Ñ?езмеÑ?ного поÑ?Ñ?еблениÑ? памÑ?Ñ?и,
+вÑ?зÑ?ваемого Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?ми докÑ?менÑ?ами в Ñ?оÑ?маÑ?е XML. Ð? пÑ?облеме Ñ?ообÑ?ил УиллиÑ? Ð?андеванÑ?еÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8090";>CVE-2014-8090</a>
 
- -<p>Add REXML::Document#document to complement the fix for  <a href="https://security-tracker.debian.org/tracker/CVE-2014-8080";>CVE-2014-8080</a>.
- -Reported by Tomas Hoger.</p></li>
+<p>Ð?обавление REXML::Document#document к иÑ?пÑ?авлениÑ? длÑ?  <a href="https://security-tracker.debian.org/tracker/CVE-2014-8080";>CVE-2014-8080</a>.
+Ð? пÑ?облеме Ñ?ообÑ?ил ТомаÑ? ХогеÑ?.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ruby1.8 version 1.8.7.302-2squeeze3</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е ruby1.8 веÑ?Ñ?ии 1.8.7.302-2squeeze3</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-91.wml	2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-91.wml	2016-06-27 21:57:37.206837118 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>This is an upgrade from tomcat 6.0.35 (the version previously available
- -in squeeze) to 6.0.41, the full list of changes between these versions
- -can be see in the upstream changelog, which is available online at
+<p>Ð?анное обновление tomcat Ñ? веÑ?Ñ?ии 6.0.35 (веÑ?Ñ?иÑ?, коÑ?оÑ?аÑ? бÑ?ла Ñ?анее доÑ?Ñ?Ñ?пна
+в squeeze) до веÑ?Ñ?ии 6.0.41, полнÑ?й Ñ?пиÑ?ок изменений междÑ? Ñ?Ñ?ими веÑ?Ñ?иÑ?ми
+можно поÑ?моÑ?Ñ?еÑ?Ñ? в жÑ?Ñ?нале изменений оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки, коÑ?оÑ?аÑ? доÑ?Ñ?Ñ?пна по адÑ?еÑ?Ñ?
 <a href="http://tomcat.apache.org/tomcat-6.0-doc/changelog.html";>http://tomcat.apache.org/tomcat-6.0-doc/changelog.html</a></p>
 
- -<p>This update fixes the following security issues previously not available
- -for squeeze:</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и, коÑ?оÑ?Ñ?е Ñ?анее не бÑ?ли иÑ?пÑ?авленÑ?
+в squeeze:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0033";>CVE-2014-0033</a>
 
- -<p>Prevent remote attackers from conducting session fixation attacks via crafted
- -URLs.</p></li>
+<p>Ð?Ñ?едоÑ?вÑ?аÑ?ение аÑ?ак Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленников по Ñ?икÑ?аÑ?ии Ñ?еÑ?Ñ?ии Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4590";>CVE-2013-4590</a>
 
- -<p>Prevent <q>Tomcat internals</q> information leaks.</p></li>
+<p>Ð?Ñ?едоÑ?вÑ?аÑ?ение Ñ?Ñ?еÑ?ек <q>внÑ?Ñ?Ñ?енней инÑ?оÑ?маÑ?ии Tomcat</q>.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4322";>CVE-2013-4322</a>
 
- -<p>Prevent remote attackers from doing denial of service attacks.</p></li>
+<p>Ð?Ñ?едоÑ?вÑ?аÑ?ение аÑ?ак Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленников Ñ? Ñ?елÑ?Ñ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4286";>CVE-2013-4286</a>
 
- -<p>Reject requests with multiple content-length headers or with a content-length
- -header when chunked encoding is being used.</p></li>
+<p>Ð?Ñ?клонение запÑ?оÑ?ов Ñ? множеÑ?Ñ?веннÑ?ми заголовками Ñ? Ñ?казанием длинÑ? Ñ?одеÑ?жимого или Ñ? одним заголовком Ñ?
+Ñ?казанием длинÑ? Ñ?одеÑ?жимого, но пÑ?и иÑ?полÑ?зовании поÑ?Ñ?ионной кодиÑ?овки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1571";>CVE-2013-1571</a>
 
- -<p>Avoid <a href="https://security-tracker.debian.org/tracker/CVE-2013-1571";>CVE-2013-1571</a> when generating Javadoc.</p></li>
+<p>Ð?збегание <a href="https://security-tracker.debian.org/tracker/CVE-2013-1571";>CVE-2013-1571</a> пÑ?и поÑ?ождении Javadoc.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3439";>CVE-2012-3439</a>
 
- -<p>Various improvements to the DIGEST authenticator.</p></li>
+<p>РазлиÑ?нÑ?е Ñ?лÑ?Ñ?Ñ?ениÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?оÑ?Ñ? DIGEST.</p></li>
 
 </ul>
 
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tomcat6 version 6.0.41-2+squeeze5</p>
- -<p>Thanks to Tony Mancill for doing the vast amount of the work for this update!</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е tomcat6 веÑ?Ñ?ии 6.0.41-2+squeeze5</p>
+<p>Ð?лагодаÑ?им Тони Ð?анÑ?илли за болÑ?Ñ?Ñ?Ñ? Ñ?аÑ?Ñ?Ñ? Ñ?абоÑ?Ñ? над Ñ?Ñ?им обновлением!</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2014/dla-97.wml	2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-97.wml	2016-06-27 21:24:51.230418386 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6656";>CVE-2012-6656</a>
 
- -    <p>Fix validation check when converting from ibm930 to utf.
- -    When converting IBM930 code with iconv(), if IBM930 code which
- -    includes invalid multibyte character <q>0xffff</q> is specified, then
- -    iconv() segfaults.</p></li>
+    <p>Ð?Ñ?пÑ?авление пÑ?овеÑ?ки пÑ?и пÑ?еобÑ?азовании из ibm930 в utf.
+    Ð?Ñ?и пÑ?еобÑ?азовании кода IBM930 Ñ? помоÑ?Ñ?Ñ? iconv(), еÑ?ли опÑ?еделÑ?н код IBM930, Ñ?одеÑ?жаÑ?ий
+    некоÑ?Ñ?екÑ?нÑ?й многобайÑ?овÑ?й Ñ?имвол <q>0xffff</q>, Ñ?о
+    Ñ?абоÑ?а iconv() пÑ?еÑ?Ñ?ваеÑ?Ñ?Ñ? Ñ? оÑ?ибкой Ñ?егменÑ?иÑ?ованиÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6040";>CVE-2014-6040</a>
 
- -    <p>Crashes on invalid input in IBM gconv modules [BZ #17325]
- -    These changes are based on the fix for BZ #14134 in commit
+    <p>Ð?ваÑ?ийнÑ?е оÑ?Ñ?ановки пÑ?и некоÑ?Ñ?екÑ?нÑ?Ñ? вÑ?однÑ?Ñ? даннÑ?Ñ? в gconv-модÑ?лÑ?Ñ? IBM [BZ #17325]
+    ЭÑ?и изменениÑ? оÑ?новÑ?ваÑ?Ñ?Ñ?Ñ? на иÑ?пÑ?авлении BZ #14134 в коммиÑ?е
     6e230d11837f3ae7b375ea69d7905f0d18eb79e5.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7817";>CVE-2014-7817</a>
 
- -    <p>The function wordexp() fails to properly handle the WRDE_NOCMD
- -    flag when processing arithmetic inputs in the form of "$((... ``))"
- -    where "..." can be anything valid. The backticks in the arithmetic
- -    epxression are evaluated by in a shell even if WRDE_NOCMD forbade
- -    command substitution. This allows an attacker to attempt to pass
- -    dangerous commands via constructs of the above form, and bypass
- -    the WRDE_NOCMD flag. This patch fixes this by checking for WRDE_NOCMD
- -    in exec_comm(), the only place that can execute a shell. All other
- -    checks for WRDE_NOCMD are superfluous and removed.</p></li>
+    <p>ФÑ?нкÑ?иÑ? wordexp() непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?лаг WRDE_NOCMD
+    пÑ?и обÑ?абоÑ?ке аÑ?иÑ?меÑ?иÑ?еÑ?киÑ? вÑ?однÑ?Ñ? даннÑ?Ñ? в виде "$((... ``))",
+    где "..." можеÑ? бÑ?Ñ?Ñ? лÑ?бой коÑ?Ñ?екÑ?ной Ñ?Ñ?Ñ?окой. Ð?бÑ?аÑ?нÑ?е галоÑ?ки в аÑ?иÑ?меÑ?иÑ?еÑ?киÑ?
+    вÑ?Ñ?ажениÑ?Ñ? оÑ?ениваÑ?Ñ?Ñ?Ñ? командной оболоÑ?кой даже в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли WRDE_NOCMD запÑ?еÑ?аеÑ?
+    подÑ?Ñ?ановкÑ? команд. ЭÑ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? попÑ?Ñ?аÑ?Ñ?Ñ?Ñ? пеÑ?едаÑ?Ñ?
+    опаÑ?нÑ?е командÑ? Ñ? помоÑ?Ñ?Ñ? вÑ?Ñ?ажений Ñ?казанного вÑ?Ñ?е вида и обойÑ?и
+    Ñ?лаг WRDE_NOCMD. Ð?аннаÑ? заплаÑ?а иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?Ñ? пÑ?облемÑ? вклÑ?Ñ?ением пÑ?овеÑ?ки WRDE_NOCMD
+    в Ñ?Ñ?нкÑ?ии exec_comm(), единÑ?Ñ?венном меÑ?Ñ?е, где можеÑ? вÑ?полнÑ?Ñ?Ñ?Ñ?Ñ? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ? команд. Ð?Ñ?е дÑ?Ñ?гие
+    пÑ?овеÑ?ки WRDE_NOCMD излиÑ?ни и бÑ?ли Ñ?даленÑ?.</p></li>
 
 </ul>
 
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in eglibc version 2.11.3-4+deb6u2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е eglibc веÑ?Ñ?ии 2.11.3-4+deb6u2</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXcVsDAAoJEF7nbuICFtKlqUEP/AmDKsHgQNeUCRO5hD48G94O
ef1Od3v/HLWWOyNNC3Y5gNMtHL9sgCju8dA5WaWHc7+RnQrYCJa+PL80JBpdEMys
mSetaT9uGx/6v4xdTfY5TkwilXZ6GUtB0dvr/oSm+twyWgwPbsOtjNxYoHnFuLOg
dmwxa8KPIM7/TPmlnztvngMzqk53HloK6k6LTE/6NxXJ0NaCLJoTtYch7kVSN/0f
IXrcIPFbvAJhGsi5YubmkvlEIQuTVVKbzry4FhcRX08Lk+G+yK+XKc3gIx+/9THk
MQdpQ3amdJfaBbUI+wT+wBrYYwAIN/pFsAFFfJToZ5VrKJu8vbUyVXN8Nj64xPEs
hCVmK9fo7WkwjAjaUwOKKt/ZnNysodIw7CtZGyfbDVtR7XZ9n3ID9Xm944zaYGey
t222Rr+Kdv/tdH2LI8CZfV0afEqU8OX2k0K8UbR+UFZ1VLlJezNrpxVihewj4Vhw
44cMPzLTkdF7zikXGEh8O9y3vXgX93ZP1ghL5qUUIf8wX4+jsz0eyZFXhUFqS9w4
fTcy+1d4Y/C2Bn/4nEEcFR/MXPadwcc6TMA9juTUuzW/3Di2Yn8R8IK90qXqdlCt
kTv2YIlRPjoaz+Y7FSZfz2zRncCHN+ypChcz/A6uWrrqw1+NjTkbZPGFHA/QVDqM
Ok0rP9VFW97YQ58PavQu
=YLBA
-----END PGP SIGNATURE-----


Reply to: