[DONE] wml://{security/2016/dsa-3676.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3676.wml 2016-09-25 00:51:55.000000000 +0500
+++ russian/security/2016/dsa-3676.wml 2016-09-25 00:56:46.268691511 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Tuomas Räsänen discovered two vulnerabilities in unADF, a tool to extract
- -files from an Amiga Disk File dump (.adf):</p>
+<p>ТÑ?омаÑ? Ð Ñ?Ñ?Ñ?нен обнаÑ?Ñ?жил две Ñ?Ñ?звимоÑ?Ñ?и в unADF, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? Ñ?аÑ?паковки
+Ñ?айлов из дампа Amiga Disk File (.adf):</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1243">CVE-2016-1243</a>
- - <p>A stack buffer overflow in the function extractTree() might allow an
- - attacker, with control on the content of a ADF file, to execute
- - arbitrary code with the privileges of the program execution.</p></li>
+ <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии extractTree() можеÑ? позволиÑ?Ñ?
+ злоÑ?мÑ?Ñ?ленникÑ?, имеÑ?Ñ?емÑ? конÑ?Ñ?олÑ? над Ñ?одеÑ?жимÑ?м ADF-Ñ?айла, вÑ?полниÑ?Ñ?
+ пÑ?оизволÑ?нÑ?й код Ñ? пÑ?авами пÑ?огÑ?а полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?его пÑ?огÑ?аммÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1244">CVE-2016-1244</a>
- - <p>The unADF extractor creates the path in the destination via a mkdir
- - in a system() call. Since there was no sanitization on the input of
- - the filenames, an attacker can directly inject code in the pathnames
- - of archived directories in an ADF file.</p></li>
+ <p>РаÑ?паковÑ?ик unADF Ñ?оздаÑ?Ñ? пÑ?Ñ?Ñ? в Ñ?елевом каÑ?алоге Ñ? помоÑ?Ñ?Ñ? mkdir
+ в вÑ?зове system(). Ð?оÑ?колÑ?кÑ? оÑ?иÑ?Ñ?ка вÑ?однÑ?Ñ? даннÑ?Ñ? длÑ? имÑ?н Ñ?айлов не
+ вÑ?полнÑ?еÑ?Ñ?Ñ?, злоÑ?мÑ?Ñ?ленник можеÑ? напÑ?Ñ?мÑ?Ñ? вводиÑ?Ñ? код в имена пÑ?Ñ?и
+ зааÑ?Ñ?ивиÑ?ованнÑ?Ñ? каÑ?алогов в ADF-Ñ?айле.</p></li>
</ul>
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 0.7.11a-3+deb7u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 0.7.11a-3+deb7u1.</p>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 0.7.11a-3+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.7.11a-3+deb8u1.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 0.7.11a-4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.7.11a-4.</p>
- -<p>We recommend that you upgrade your unadf packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? unadf.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=OJSX
-----END PGP SIGNATURE-----
Reply to: