[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2009/dsa-1942.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1942.wml	2014-04-30 13:16:19.000000000 +0600
+++ russian/security/2009/dsa-1942.wml	2016-10-22 14:58:44.761184757 +0500
@@ -1,45 +1,47 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Wireshark
- -network traffic analyzer, which may lead to the execution of arbitrary
- -code or denial of service. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Wireshark, пÑ?огÑ?амме длÑ? анализа Ñ?еÑ?евого Ñ?Ñ?аÑ?ика, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+коде или оÑ?казÑ? в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2560";>CVE-2009-2560</a>
 
- -    <p>A NULL pointer dereference was found in the RADIUS dissector.</p></li>
+    <p>Ð? диÑ?Ñ?екÑ?оÑ?е RADIUS бÑ?ло обнаÑ?Ñ?жено Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3550";>CVE-2009-3550</a>
 
- -    <p>A NULL pointer dereference was found in the DCERP/NT dissector.</p></li>
+    <p>Ð? диÑ?Ñ?екÑ?оÑ?е DCERP/NT бÑ?ло обнаÑ?Ñ?жено Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3829";>CVE-2009-3829</a>
 
- -    <p>An integer overflow was discovered in the ERF parser.</p></li>
+    <p>Ð? коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а ERF бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел.</p></li>
 
 </ul>
 
- -<p>This update also includes fixes for three minor issues
+<p>Ð?анное обновление вклÑ?Ñ?аеÑ? в Ñ?ебÑ? иÑ?пÑ?авлениÑ? Ñ?Ñ?Ñ?Ñ? неболÑ?Ñ?иÑ? пÑ?облем
 (<a href="https://security-tracker.debian.org/tracker/CVE-2008-1829";>CVE-2008-1829</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2009-2562";>CVE-2009-2562</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2009-3241";>CVE-2009-3241</a>),
- -which were scheduled for the next stable point update. Also
- -<a href="https://security-tracker.debian.org/tracker/CVE-2009-1268";>CVE-2009-1268</a>
- -was fixed for Etch.  Since this security update was issued prior to the release
- -of the point update, the fixes were included.</p>
+коÑ?оÑ?Ñ?е планиÑ?овалоÑ?Ñ? вклÑ?Ñ?иÑ?Ñ? в Ñ?ледÑ?Ñ?Ñ?Ñ?Ñ? Ñ?едакÑ?иÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка. Ð?Ñ?оме Ñ?ого,
+длÑ? вÑ?пÑ?Ñ?ка Etch бÑ?ло добавлено иÑ?пÑ?авление
+<a href="https://security-tracker.debian.org/tracker/CVE-2009-1268";>CVE-2009-1268</a>.
+Ð?оÑ?колÑ?кÑ? данное обновление безопаÑ?ноÑ?Ñ?и бÑ?ло вÑ?пÑ?Ñ?ено до вÑ?пÑ?Ñ?ка оÑ?еÑ?едной
+Ñ?едакÑ?ии, даннÑ?е иÑ?пÑ?авлениÑ? вклÑ?Ñ?енÑ? в данное обновление.</p>
+
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлен в
+веÑ?Ñ?ии 0.99.4-5.etch.4.</p>
 
- -<p>For the old stable distribution (etch), this problem has been fixed in
- -version 0.99.4-5.etch.4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.2-3+lenny7.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in 
- -version 1.0.2-3+lenny7.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.2.3-1.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 1.2.3-1.</p>
- -
- -<p>We recommend that you upgrade your Wireshark packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? Wireshark.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=xm/b
-----END PGP SIGNATURE-----


Reply to: