[DONE] wml://security/2014/dla-{97,67,88,91}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2014/dla-67.wml 2016-04-09 01:32:21.000000000 +0500
+++ russian/security/2014/dla-67.wml 2016-06-27 21:30:26.657020408 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3538">CVE-2014-3538</a>
- - <p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2013-7345">CVE-2013-7345</a> did not
- - sufficiently address the problem. A remote attacker could still
- - cause a denial of service (CPU consumption) via a specially-crafted
- - input file that triggers backtracking during processing of an awk
- - regular expression rule.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о изнаÑ?алÑ?ное иÑ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2013-7345">CVE-2013-7345</a> недоÑ?Ñ?аÑ?оÑ?но
+ Ñ?еÑ?аеÑ? Ñ?казаннÑ?Ñ? пÑ?облемÑ?. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник вÑ?Ñ? еÑ?Ñ? можеÑ?
+ вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного
+ вÑ?одного Ñ?айла, вÑ?зÑ?ваÑ?Ñ?его пеÑ?ебоÑ? Ñ? возвÑ?аÑ?ом в Ñ?оде обÑ?абоÑ?ки пÑ?авила Ñ?егÑ?лÑ?Ñ?нÑ?Ñ?
+ вÑ?Ñ?ажений awk.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3587">CVE-2014-3587</a>
- - <p>It was discovered that the CDF parser of the fileinfo module does
- - not properly process malformed files in the Composite Document File
- - (CDF) format, leading to crashes.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о код длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а CDF в модÑ?ле fileinfo
+ непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? некоÑ?Ñ?екÑ?нÑ?е Ñ?айлÑ? в Ñ?оÑ?маÑ?е Composite Document File
+ (CDF), Ñ?Ñ?о пÑ?иводиÑ? к аваÑ?ийнÑ?м оÑ?Ñ?ановкам.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-3597">CVE-2014-3597</a>
- - <p>It was discovered that the original fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-4049">CVE-2014-4049</a> did not
- - completely address the issue. A malicious server or
- - man-in-the-middle attacker could cause a denial of service (crash)
- - and possibly execute arbitrary code via a crafted DNS TXT record.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о изнаÑ?алÑ?ное иÑ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2014-4049">CVE-2014-4049</a> не полноÑ?Ñ?Ñ?Ñ?
+ Ñ?еÑ?аеÑ? Ñ?казаннÑ?Ñ? пÑ?облемÑ?. Ð?лоÑ?мÑ?Ñ?ленник, Ñ?пÑ?авлÑ?Ñ?Ñ?ий Ñ?еÑ?веÑ?ом или вÑ?полнÑ?Ñ?Ñ?ий
+ аÑ?акÑ? по пÑ?инÑ?ипÑ? Ñ?еловек-в-Ñ?еÑ?едине, можеÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка)
+ и возможное вÑ?полнение пÑ?оизволÑ?ного кода Ñ?еÑ?ез Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? TXT-запиÑ?Ñ? DNS.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-4670">CVE-2014-4670</a>
- - <p>It was discovered that PHP incorrectly handled certain SPL
- - Iterators. A local attacker could use this flaw to cause PHP to
- - crash, resulting in a denial of service.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о PHP непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? опÑ?еделÑ?ннÑ?е иÑ?еÑ?аÑ?оÑ?Ñ?
+ SPL. Ð?окалÑ?нÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки
+ PHP, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in php5 version 5.3.3-7+squeeze22</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е php5 веÑ?Ñ?ии 5.3.3-7+squeeze22</p>
</define-tag>
# do not modify the following line
- --- english/security/2014/dla-88.wml 2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-88.wml 2016-06-27 21:37:49.238704480 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>This update fixes multiple local and remote denial of service and remote code
- -execute problems:</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? многоÑ?иÑ?леннÑ?е локалÑ?нÑ?е и Ñ?далÑ?ннÑ?е оÑ?казÑ? в обÑ?лÑ?живании и пÑ?облемÑ?, Ñ?вÑ?заннÑ?е Ñ?
+Ñ?далÑ?ннÑ?м вÑ?полнением кода:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0188">CVE-2011-0188</a>
- -<p>Properly allocate memory, to prevent arbitrary code execution or application
- -crash. Reported by Drew Yao.</p></li>
+<p>Ð?оÑ?Ñ?екÑ?ное вÑ?деление памÑ?Ñ?и Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода или аваÑ?ийной
+оÑ?Ñ?ановки пÑ?иложениÑ?. Ð?б Ñ?Ñ?звимоÑ?Ñ?и Ñ?ообÑ?ил Ð?Ñ?Ñ? Яо.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2686">CVE-2011-2686</a>
- -<p>Reinitialize the random seed when forking to prevent <a href="https://security-tracker.debian.org/tracker/CVE-2003-0900">CVE-2003-0900</a> like
- -situations.</p></li>
+<p>Ð?овÑ?оÑ?наÑ? иниÑ?иализаÑ?иÑ? Ñ?лÑ?Ñ?айного наÑ?алÑ?ного Ñ?иÑ?ла пÑ?и Ñ?азвеÑ?влении Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? подобнÑ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/CVE-2003-0900">CVE-2003-0900</a> Ñ?иÑ?Ñ?аÑ?ий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2705">CVE-2011-2705</a>
- -<p>Modify PRNG state to prevent random number sequence repeatation at forked
- -child process which has same pid. Reported by Eric Wong.</p></li>
+<p>Ð?зменение Ñ?оÑ?Ñ?оÑ?ниÑ? PRNG Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? повÑ?оÑ?ов поÑ?ледоваÑ?елÑ?ноÑ?Ñ?ей Ñ?лÑ?Ñ?айнÑ?Ñ? Ñ?иÑ?ел в оÑ?веÑ?влÑ?нном
+доÑ?еÑ?нем пÑ?оÑ?еÑ?Ñ?е, имеÑ?Ñ?им Ñ?оÑ? же иденÑ?иÑ?икаÑ?оÑ?. Ð?б Ñ?Ñ?звимоÑ?Ñ?и Ñ?ообÑ?ил ÐÑ?ик Ð?онг.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4815">CVE-2011-4815</a>
- -<p>Fix a problem with predictable hash collisions resulting in denial of service
- -(CPU consumption) attacks. Reported by Alexander Klink and Julian Waelde.</p></li>
+<p>Ð?Ñ?пÑ?авление пÑ?облемÑ? Ñ? пÑ?едÑ?казÑ?емÑ?ми Ñ?Ñ?олкновениÑ?ми Ñ?еÑ?ей, пÑ?иводÑ?Ñ?ими к оÑ?казÑ? в обÑ?лÑ?живании
+(Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ?). Ð? пÑ?облеме Ñ?ообÑ?ил Ð?лекÑ?андÑ? Ð?линк и Ð?жÑ?лиан Ð?илд.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8080">CVE-2014-8080</a>
- -<p>Fix REXML parser to prevent memory consumption denial of service via crafted
- -XML documents. Reported by Willis Vandevanter.</p></li>
+<p>Ð?Ñ?пÑ?авление кода длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а REXML Ñ? Ñ?елÑ?Ñ? пÑ?едоÑ?вÑ?аÑ?ениÑ? оÑ?каза в обÑ?лÑ?живании из-за Ñ?Ñ?езмеÑ?ного поÑ?Ñ?еблениÑ? памÑ?Ñ?и,
+вÑ?зÑ?ваемого Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?ми докÑ?менÑ?ами в Ñ?оÑ?маÑ?е XML. Ð? пÑ?облеме Ñ?ообÑ?ил УиллиÑ? Ð?андеванÑ?еÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8090">CVE-2014-8090</a>
- -<p>Add REXML::Document#document to complement the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2014-8080">CVE-2014-8080</a>.
- -Reported by Tomas Hoger.</p></li>
+<p>Ð?обавление REXML::Document#document к иÑ?пÑ?авлениÑ? длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2014-8080">CVE-2014-8080</a>.
+Ð? пÑ?облеме Ñ?ообÑ?ил ТомаÑ? ХогеÑ?.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in ruby1.8 version 1.8.7.302-2squeeze3</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е ruby1.8 веÑ?Ñ?ии 1.8.7.302-2squeeze3</p>
</define-tag>
# do not modify the following line
- --- english/security/2014/dla-91.wml 2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-91.wml 2016-06-27 21:57:37.206837118 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>This is an upgrade from tomcat 6.0.35 (the version previously available
- -in squeeze) to 6.0.41, the full list of changes between these versions
- -can be see in the upstream changelog, which is available online at
+<p>Ð?анное обновление tomcat Ñ? веÑ?Ñ?ии 6.0.35 (веÑ?Ñ?иÑ?, коÑ?оÑ?аÑ? бÑ?ла Ñ?анее доÑ?Ñ?Ñ?пна
+в squeeze) до веÑ?Ñ?ии 6.0.41, полнÑ?й Ñ?пиÑ?ок изменений междÑ? Ñ?Ñ?ими веÑ?Ñ?иÑ?ми
+можно поÑ?моÑ?Ñ?еÑ?Ñ? в жÑ?Ñ?нале изменений оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки, коÑ?оÑ?аÑ? доÑ?Ñ?Ñ?пна по адÑ?еÑ?Ñ?
<a href="http://tomcat.apache.org/tomcat-6.0-doc/changelog.html">http://tomcat.apache.org/tomcat-6.0-doc/changelog.html</a></p>
- -<p>This update fixes the following security issues previously not available
- -for squeeze:</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и, коÑ?оÑ?Ñ?е Ñ?анее не бÑ?ли иÑ?пÑ?авленÑ?
+в squeeze:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-0033">CVE-2014-0033</a>
- -<p>Prevent remote attackers from conducting session fixation attacks via crafted
- -URLs.</p></li>
+<p>Ð?Ñ?едоÑ?вÑ?аÑ?ение аÑ?ак Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленников по Ñ?икÑ?аÑ?ии Ñ?еÑ?Ñ?ии Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? URL.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4590">CVE-2013-4590</a>
- -<p>Prevent <q>Tomcat internals</q> information leaks.</p></li>
+<p>Ð?Ñ?едоÑ?вÑ?аÑ?ение Ñ?Ñ?еÑ?ек <q>внÑ?Ñ?Ñ?енней инÑ?оÑ?маÑ?ии Tomcat</q>.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4322">CVE-2013-4322</a>
- -<p>Prevent remote attackers from doing denial of service attacks.</p></li>
+<p>Ð?Ñ?едоÑ?вÑ?аÑ?ение аÑ?ак Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленников Ñ? Ñ?елÑ?Ñ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4286">CVE-2013-4286</a>
- -<p>Reject requests with multiple content-length headers or with a content-length
- -header when chunked encoding is being used.</p></li>
+<p>Ð?Ñ?клонение запÑ?оÑ?ов Ñ? множеÑ?Ñ?веннÑ?ми заголовками Ñ? Ñ?казанием длинÑ? Ñ?одеÑ?жимого или Ñ? одним заголовком Ñ?
+Ñ?казанием длинÑ? Ñ?одеÑ?жимого, но пÑ?и иÑ?полÑ?зовании поÑ?Ñ?ионной кодиÑ?овки.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-1571">CVE-2013-1571</a>
- -<p>Avoid <a href="https://security-tracker.debian.org/tracker/CVE-2013-1571">CVE-2013-1571</a> when generating Javadoc.</p></li>
+<p>Ð?збегание <a href="https://security-tracker.debian.org/tracker/CVE-2013-1571">CVE-2013-1571</a> пÑ?и поÑ?ождении Javadoc.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3439">CVE-2012-3439</a>
- -<p>Various improvements to the DIGEST authenticator.</p></li>
+<p>РазлиÑ?нÑ?е Ñ?лÑ?Ñ?Ñ?ениÑ? аÑ?Ñ?енÑ?иÑ?икаÑ?оÑ?Ñ? DIGEST.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in tomcat6 version 6.0.41-2+squeeze5</p>
- -<p>Thanks to Tony Mancill for doing the vast amount of the work for this update!</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е tomcat6 веÑ?Ñ?ии 6.0.41-2+squeeze5</p>
+<p>Ð?лагодаÑ?им Тони Ð?анÑ?илли за болÑ?Ñ?Ñ?Ñ? Ñ?аÑ?Ñ?Ñ? Ñ?абоÑ?Ñ? над Ñ?Ñ?им обновлением!</p>
</define-tag>
# do not modify the following line
- --- english/security/2014/dla-97.wml 2016-04-09 01:32:22.000000000 +0500
+++ russian/security/2014/dla-97.wml 2016-06-27 21:24:51.230418386 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-6656">CVE-2012-6656</a>
- - <p>Fix validation check when converting from ibm930 to utf.
- - When converting IBM930 code with iconv(), if IBM930 code which
- - includes invalid multibyte character <q>0xffff</q> is specified, then
- - iconv() segfaults.</p></li>
+ <p>Ð?Ñ?пÑ?авление пÑ?овеÑ?ки пÑ?и пÑ?еобÑ?азовании из ibm930 в utf.
+ Ð?Ñ?и пÑ?еобÑ?азовании кода IBM930 Ñ? помоÑ?Ñ?Ñ? iconv(), еÑ?ли опÑ?еделÑ?н код IBM930, Ñ?одеÑ?жаÑ?ий
+ некоÑ?Ñ?екÑ?нÑ?й многобайÑ?овÑ?й Ñ?имвол <q>0xffff</q>, Ñ?о
+ Ñ?абоÑ?а iconv() пÑ?еÑ?Ñ?ваеÑ?Ñ?Ñ? Ñ? оÑ?ибкой Ñ?егменÑ?иÑ?ованиÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-6040">CVE-2014-6040</a>
- - <p>Crashes on invalid input in IBM gconv modules [BZ #17325]
- - These changes are based on the fix for BZ #14134 in commit
+ <p>Ð?ваÑ?ийнÑ?е оÑ?Ñ?ановки пÑ?и некоÑ?Ñ?екÑ?нÑ?Ñ? вÑ?однÑ?Ñ? даннÑ?Ñ? в gconv-модÑ?лÑ?Ñ? IBM [BZ #17325]
+ ÐÑ?и изменениÑ? оÑ?новÑ?ваÑ?Ñ?Ñ?Ñ? на иÑ?пÑ?авлении BZ #14134 в коммиÑ?е
6e230d11837f3ae7b375ea69d7905f0d18eb79e5.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-7817">CVE-2014-7817</a>
- - <p>The function wordexp() fails to properly handle the WRDE_NOCMD
- - flag when processing arithmetic inputs in the form of "$((... ``))"
- - where "..." can be anything valid. The backticks in the arithmetic
- - epxression are evaluated by in a shell even if WRDE_NOCMD forbade
- - command substitution. This allows an attacker to attempt to pass
- - dangerous commands via constructs of the above form, and bypass
- - the WRDE_NOCMD flag. This patch fixes this by checking for WRDE_NOCMD
- - in exec_comm(), the only place that can execute a shell. All other
- - checks for WRDE_NOCMD are superfluous and removed.</p></li>
+ <p>ФÑ?нкÑ?иÑ? wordexp() непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?лаг WRDE_NOCMD
+ пÑ?и обÑ?абоÑ?ке аÑ?иÑ?меÑ?иÑ?еÑ?киÑ? вÑ?однÑ?Ñ? даннÑ?Ñ? в виде "$((... ``))",
+ где "..." можеÑ? бÑ?Ñ?Ñ? лÑ?бой коÑ?Ñ?екÑ?ной Ñ?Ñ?Ñ?окой. Ð?бÑ?аÑ?нÑ?е галоÑ?ки в аÑ?иÑ?меÑ?иÑ?еÑ?киÑ?
+ вÑ?Ñ?ажениÑ?Ñ? оÑ?ениваÑ?Ñ?Ñ?Ñ? командной оболоÑ?кой даже в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли WRDE_NOCMD запÑ?еÑ?аеÑ?
+ подÑ?Ñ?ановкÑ? команд. ÐÑ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? попÑ?Ñ?аÑ?Ñ?Ñ?Ñ? пеÑ?едаÑ?Ñ?
+ опаÑ?нÑ?е командÑ? Ñ? помоÑ?Ñ?Ñ? вÑ?Ñ?ажений Ñ?казанного вÑ?Ñ?е вида и обойÑ?и
+ Ñ?лаг WRDE_NOCMD. Ð?аннаÑ? заплаÑ?а иÑ?пÑ?авлÑ?еÑ? Ñ?Ñ?Ñ? пÑ?облемÑ? вклÑ?Ñ?ением пÑ?овеÑ?ки WRDE_NOCMD
+ в Ñ?Ñ?нкÑ?ии exec_comm(), единÑ?Ñ?венном меÑ?Ñ?е, где можеÑ? вÑ?полнÑ?Ñ?Ñ?Ñ?Ñ? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ? команд. Ð?Ñ?е дÑ?Ñ?гие
+ пÑ?овеÑ?ки WRDE_NOCMD излиÑ?ни и бÑ?ли Ñ?даленÑ?.</p></li>
</ul>
- -<p>For Debian 6 <q>Squeeze</q>, these issues have been fixed in eglibc version 2.11.3-4+deb6u2</p>
+<p>Ð? Debian 6 <q>Squeeze</q> Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в пакеÑ?е eglibc веÑ?Ñ?ии 2.11.3-4+deb6u2</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=YLBA
-----END PGP SIGNATURE-----
Reply to: