[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-20{2,5}7.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-2027.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2027.wml	2016-09-30 23:13:56.247853489 +0500
@@ -1,50 +1,51 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Xulrunner, a 
- -runtime environment for XUL applications, such as the Iceweasel web
- -browser. The Common Vulnerabilities and Exposures project identifies 
- -the following problems:</p>
+<p>Ð? Xulrunner, окÑ?Ñ?жении вÑ?емени иÑ?полнениÑ? длÑ? XUL-пÑ?иложений
+(Ñ?акиÑ? как веб-бÑ?аÑ?зеÑ? Iceweasel), бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0174";>CVE-2010-0174</a>
 
- -    <p>Jesse Ruderman and Ehsan Akhgari discovered crashes in the layout
- -    engine, which might allow the execution of arbitrary code.</p></li>
+    <p>Ð?жеÑ?Ñ? РадеÑ?ман и ЭÑ?Ñ?ан Ð?Ñ?гаÑ?и обнаÑ?Ñ?жили аваÑ?ийнÑ?е оÑ?Ñ?ановки в движке
+    Ñ?азмеÑ?Ñ?, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0175";>CVE-2010-0175</a>
 
- -    <p>It was discovered that incorrect memory handling in the XUL event
- -    handler might allow the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о некоÑ?Ñ?екÑ?наÑ? Ñ?абоÑ?а Ñ? памÑ?Ñ?Ñ? в обÑ?абоÑ?Ñ?ике
+    XUL-Ñ?обÑ?Ñ?ий можеÑ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0176";>CVE-2010-0176</a>
 
- -    <p>It was discovered that incorrect memory handling in the XUL event
- -    handler might allow the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о некоÑ?Ñ?екÑ?наÑ? Ñ?абоÑ?а Ñ? памÑ?Ñ?Ñ?Ñ? в обÑ?абоÑ?Ñ?ике
+    XUL-Ñ?обÑ?Ñ?ий можеÑ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0177";>CVE-2010-0177</a>
 
- -    <p>It was discovered that incorrect memory handling in the plugin code
- -    might allow the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о некоÑ?Ñ?екÑ?наÑ? Ñ?абоÑ?а Ñ? памÑ?Ñ?Ñ?Ñ? в коде дополнений
+    можеÑ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0178";>CVE-2010-0178</a>
 
- -    <p>Paul Stone discovered that forced drag-and-drop events could lead to
- -    Chrome privilege escalation.</p></li>
+    <p>Ð?ол СÑ?оÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?инÑ?диÑ?елÑ?нÑ?е Ñ?обÑ?Ñ?иÑ? drag-and-drop могÑ?Ñ? пÑ?иводиÑ?Ñ?
+    к повÑ?Ñ?ениÑ? пÑ?ивилегий Chrome.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0179";>CVE-2010-0179</a>
 
- -    <p>It was discovered that a programming error in the XMLHttpRequestSpy
- -    module could lead to the execution of arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ? в модÑ?ле XMLHttpRequestSpy
+    можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.9.0.19-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.0.19-1.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your xulrunner packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xulrunner.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2057.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2057.wml	2016-09-30 23:23:56.839078012 +0500
@@ -1,54 +1,55 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the MySQL
- -database server.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? Ñ?еÑ?веÑ?е баз даннÑ?Ñ? MySQL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 
 <ul>
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1626";>CVE-2010-1626</a>
 
- -<p>MySQL allows local users to delete the data and index files of another
- -user's MyISAM table via a symlink attack in conjunction with the DROP
- -TABLE command.</p></li>
+<p>MySQL позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м Ñ?далÑ?Ñ?Ñ? даннÑ?е и Ñ?айлÑ? Ñ? индекÑ?ами в Ñ?аблиÑ?е
+MyISAM дÑ?Ñ?гого полÑ?зоваÑ?елÑ? Ñ? помоÑ?Ñ?Ñ? аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки вмеÑ?Ñ?е Ñ? командой
+DROP TABLE.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1848";>CVE-2010-1848</a>
 
- -<p>MySQL failed to check the table name argument of a COM_FIELD_LIST
- -command packet for validity and compliance to acceptable table name
- -standards. This allows an authenticated user with SELECT privileges on
- -one table to obtain the field definitions of any table in all other
- -databases and potentially of other MySQL instances accessible from the
- -server's file system.</p></li>
+<p>MySQL не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? имени Ñ?аблиÑ?Ñ? командного пакеÑ?а COM_FIELD_LIST
+на пÑ?едмеÑ? коÑ?Ñ?екÑ?ноÑ?Ñ?и и Ñ?ооÑ?веÑ?Ñ?Ñ?виÑ? пÑ?инÑ?Ñ?Ñ?м Ñ?Ñ?андаÑ?Ñ?ам имÑ?н
+Ñ?аблиÑ?. ЭÑ?о позволÑ?еÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованномÑ? полÑ?зоваÑ?елÑ? Ñ? пÑ?авами на вÑ?полнение командÑ? SELECT
+длÑ? одной Ñ?аблиÑ?Ñ? полÑ?Ñ?аÑ?Ñ? опÑ?еделениÑ? полей лÑ?бой Ñ?аблиÑ?Ñ? во вÑ?еÑ? дÑ?Ñ?гиÑ?
+базаÑ? даннÑ?Ñ? и поÑ?енÑ?иалÑ?но в дÑ?Ñ?гиÑ? Ñ?кземплÑ?Ñ?аÑ? MySQL, доÑ?Ñ?Ñ?пнÑ?Ñ? из
+Ñ?айловой Ñ?иÑ?Ñ?емÑ? Ñ?еÑ?веÑ?а.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1849";>CVE-2010-1849</a>
 
- -<p>MySQL could be tricked to read packets indefinitely if it received a
- -packet larger than the maximum size of one packet.
- -This results in high CPU usage and thus denial of service conditions.</p></li>
+<p>С помоÑ?Ñ?Ñ? MySQL можно неогÑ?аниÑ?енно Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? пакеÑ?Ñ? в Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?еÑ?веÑ? полÑ?Ñ?аеÑ?
+пакеÑ? болÑ?Ñ?его Ñ?азмеÑ?а, Ñ?ем макÑ?ималÑ?нÑ?й Ñ?азмеÑ? одного пакеÑ?а.
+ЭÑ?о пÑ?иводиÑ? к вÑ?Ñ?окомÑ? поÑ?Ñ?еблениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов ЦÐ? и оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-1850";>CVE-2010-1850</a>
 
- -<p>MySQL was susceptible to a buffer-overflow attack due to a
- -failure to perform bounds checking on the table name argument of a
- -COM_FIELD_LIST command packet. By sending long data for the table
- -name, a buffer is overflown, which could be exploited by an
- -authenticated user to inject malicious code.</p></li>
+<p>Ð?Ñ?едÑ?Ñ?авлÑ?еÑ?Ñ?Ñ?, Ñ?Ñ?о Ñ?еÑ?веÑ? MySQL Ñ?Ñ?звим к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а из-за Ñ?ого, Ñ?Ñ?о
+он не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? гÑ?аниÑ? в имени Ñ?аблиÑ?Ñ? командного пакеÑ?а
+COM_FIELD_LIST. Ð?Ñ?пÑ?авка вмеÑ?Ñ?о имени Ñ?аблиÑ?Ñ? болÑ?Ñ?ого колиÑ?еÑ?Ñ?ва
+даннÑ?Ñ? пÑ?иводиÑ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елем длÑ? введениÑ? вÑ?едоноÑ?ного кода.</p></li>
 
 </ul>
 
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 5.0.51a-24+lenny4</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.0.51a-24+lenny4</p>
 
- -<p>The testing (squeeze) and unstable (sid) distribution do not contain
- -mysql-dfsg-5.0 anymore.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? пакеÑ?
+mysql-dfsg-5.0 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>We recommend that you upgrade your mysql-dfsg-5.0 package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? mysql-dfsg-5.0.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=5XkZ
-----END PGP SIGNATURE-----


Reply to: