[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2010/dsa-1979.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-1979.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1979.wml	2016-09-27 11:18:04.117007506 +0500
@@ -1,49 +1,50 @@
- -<define-tag description>multiple vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in lintian,
- -a Debian package checker. The following Common Vulnerabilities and
- -Exposures project ids have been assigned to identify them:</p>
+<p>Ð? lintian, Ñ?Ñ?илиÑ?е длÑ? пÑ?овеÑ?ки пакеÑ?ов Debian, бÑ?ли обнаÑ?Ñ?женÑ?
+многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и. ЭÑ?им Ñ?Ñ?звимоÑ?Ñ?Ñ?м бÑ?ли опÑ?еделенÑ?
+Ñ?ледÑ?Ñ?Ñ?ие иденÑ?иÑ?икаÑ?оÑ?Ñ? CVE:</p>
 
 <ul>
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4013";>CVE-2009-4013</a>: missing control files sanitation
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4013";>CVE-2009-4013</a>: оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки Ñ?айлов control
 
- -    <p>Control field names and values were not sanitised before using them
- -    in certain operations that could lead to directory traversals.</p>
+    <p>Ð?мена полей и знаÑ?ениÑ? в Ñ?айлаÑ? control не оÑ?иÑ?аÑ?Ñ?Ñ?Ñ? до иÑ? иÑ?полÑ?зованиÑ?
+    в опÑ?еделÑ?ннÑ?Ñ? опеÑ?аÑ?иÑ?Ñ?, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к обÑ?одÑ? каÑ?алога.</p>
 
- -    <p>Patch systems' control files were not sanitised before using them
- -    in certain operations that could lead to directory traversals.</p>
+    <p>УпÑ?авлÑ?Ñ?Ñ?ие Ñ?айлÑ? заплаÑ? не оÑ?иÑ?аÑ?Ñ?Ñ?Ñ? до иÑ? иÑ?полÑ?зованиÑ?
+    в опÑ?еделÑ?ннÑ?Ñ? опеÑ?аÑ?иÑ?Ñ?, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к обÑ?одÑ? каÑ?алога.</p>
 
- -    <p>An attacker could exploit these vulnerabilities to overwrite
- -    arbitrary files or disclose system information.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и длÑ? пеÑ?езапиÑ?и
+    пÑ?оизволÑ?нÑ?й Ñ?айлов или Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? Ñ?иÑ?Ñ?емной инÑ?оÑ?маÑ?ии.</p></li>
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4014";>CVE-2009-4014</a>: format string vulnerabilities
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4014";>CVE-2009-4014</a>: Ñ?Ñ?звимоÑ?Ñ?и Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки
 
- -    <p>Multiple check scripts and the Lintian::Schedule module were using
- -    user-provided input as part of the sprintf/printf format string.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?Ñ?енаÑ?ии пÑ?овеÑ?ки и модÑ?лÑ? Lintian::Schedule иÑ?полÑ?зÑ?Ñ?Ñ?
+    пеÑ?едаваемÑ?е полÑ?зоваÑ?елем даннÑ?Ñ? в каÑ?еÑ?Ñ?ве Ñ?аÑ?Ñ?и Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки sprintf/printf.</p></li>
 
- -<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4015";>CVE-2009-4015</a>: arbitrary command execution
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4015";>CVE-2009-4015</a>: вÑ?полнение пÑ?оизволÑ?ной командÑ?
 
- -    <p>File names were not properly escaped when passing them as arguments
- -    to certain commands, allowing the execution of other commands as
- -    pipes or as a set of shell commands.</p></li>
+    <p>Ð?мена Ñ?айлов непÑ?авилÑ?но Ñ?кÑ?аниÑ?Ñ?Ñ?Ñ?Ñ?Ñ? пÑ?и пеÑ?едаÑ?е иÑ? в каÑ?еÑ?Ñ?ве аÑ?гÑ?менÑ?ов
+    опÑ?еделÑ?ннÑ?м командам, Ñ?Ñ?о позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? Ñ?еÑ?ез каналÑ? дÑ?Ñ?гие командÑ?
+    или набоÑ?Ñ? команд командной оболоÑ?ки.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed in
- -version 1.23.28+etch1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.23.28+etch1.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.24.2.1+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.24.2.1+lenny1.</p>
 
- -<p>For the testing distribution (squeeze), these problems will be fixed
- -soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ?
+позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.3.2</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.3.2</p>
 
 
- -<p>We recommend that you upgrade your lintian packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? lintian.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=2RyP
-----END PGP SIGNATURE-----


Reply to: