[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-1997.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- ../../english/security/2010/dsa-1997.wml	2017-11-01 10:11:10.139832216 +0500
+++ 2010/dsa-1997.wml	2018-03-30 13:53:17.049886598 +0500
@@ -1,54 +1,54 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" mindelta="1"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the MySQL
- -database server.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? Ñ?еÑ?веÑ?е баз даннÑ?Ñ? MySQL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4019";>CVE-2009-4019</a>
 
- -<p>Domas Mituzas discovered that mysqld does not properly handle errors during
- -execution of certain SELECT statements with subqueries, and does not preserve
- -certain null_value flags during execution of statements that use the
- -GeomFromWKB function, which allows remote authenticated users to cause a
- -denial of service (daemon crash) via a crafted statement.</p></li>
+<p>Ð?омаÑ? Ð?иÑ?Ñ?заÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о mysqld непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? оÑ?ибки в Ñ?оде вÑ?полнениÑ?
+опÑ?еделÑ?ннÑ?Ñ? Ñ?Ñ?веÑ?ждений SELECT Ñ? подзапÑ?оÑ?ами, а Ñ?акже не Ñ?оÑ?Ñ?анÑ?еÑ? опÑ?еделÑ?ннÑ?е Ñ?лаги
+null_value во вÑ?емÑ? вÑ?полнениÑ? Ñ?Ñ?веÑ?ждений, иÑ?полÑ?зÑ?Ñ?Ñ?иÑ? Ñ?Ñ?нкÑ?иÑ? GeomFromWKB, Ñ?Ñ?о
+позволÑ?еÑ? Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+(аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?лÑ?жбÑ?) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?Ñ?веÑ?ждениÑ?.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4030";>CVE-2009-4030</a>
 
- -<p>Sergei Golubchik discovered that MySQL allows local users to bypass certain
- -privilege checks by calling CREATE TABLE on a MyISAM table with modified
- -DATA DIRECTORY or INDEX DIRECTORY arguments that are originally associated
- -with pathnames without symlinks, and that can point to tables created at
- -a future time at which a pathname is modified to contain a symlink to a
- -subdirectory of the MySQL data home directory.</p></li>
+<p>СеÑ?гей Ð?олÑ?бÑ?ик обнаÑ?Ñ?жил, Ñ?Ñ?о MySQL позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м обÑ?одиÑ?Ñ? опÑ?еделÑ?ннÑ?е
+пÑ?овеÑ?ки пÑ?ав доÑ?Ñ?Ñ?па пÑ?Ñ?Ñ?м вÑ?зова CREATE TABLE Ñ? Ñ?аблиÑ?ей MyISAM, Ñ?одеÑ?жаÑ?ей изменÑ?ннÑ?е
+аÑ?гÑ?менÑ?Ñ? DATA DIRECTORY или INDEX DIRECTORY, коÑ?оÑ?Ñ?е изнаÑ?алÑ?но Ñ?вÑ?зÑ?ваÑ?Ñ?Ñ?Ñ?
+Ñ? именами пÑ?Ñ?ей без Ñ?имволÑ?нÑ?Ñ? Ñ?Ñ?Ñ?лок и коÑ?оÑ?Ñ?е могÑ?Ñ? Ñ?казÑ?ваÑ?Ñ? на Ñ?аблиÑ?Ñ?, Ñ?озданнÑ?е
+в бÑ?дÑ?Ñ?ем, когда имÑ? пÑ?Ñ?и Ñ?же Ñ?одеÑ?жиÑ? Ñ?имволÑ?нÑ?Ñ? Ñ?Ñ?Ñ?лкÑ? на
+подкаÑ?алог домаÑ?него каÑ?алога даннÑ?Ñ? MySQL.</p></li>
 
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4484";>CVE-2009-4484</a>
 
- -<p>Multiple stack-based buffer overflows in the CertDecoder::GetName function
- -in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld, allow
- -remote attackers to execute arbitrary code or cause a denial of service
- -(memory corruption and daemon crash) by establishing an SSL connection and
- -sending an X.509 client certificate with a crafted name field.</p></li>
+<p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?Ñ?ековÑ?е пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии CertDecoder::GetName
+в src/asn.cpp в TaoCrypt в yaSSL до веÑ?Ñ?ии 1.9.9, иÑ?полÑ?зÑ?емой в mysqld, позволÑ?Ñ?Ñ?
+Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код или вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+(повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и и аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?лÑ?жбÑ?) пÑ?Ñ?Ñ?м Ñ?Ñ?Ñ?ановлениÑ? SSL-Ñ?оединениÑ? и
+оÑ?пÑ?авки клиенÑ?Ñ?кого Ñ?еÑ?Ñ?иÑ?икаÑ?а X.509 Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м полем имени.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (etch), these problems have been fixed in
- -version 5.0.32-7etch12</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.0.32-7etch12</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 5.0.51a-24+lenny3</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.0.51a-24+lenny3</p>
 
- -<p>The testing (squeeze) and unstable (sid) distribution do not contain
- -mysql-dfsg-5 anymore.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? пакеÑ?
+mysql-dfsg-5 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ?.</p>
 
- -<p>We recommend that you upgrade your mysql-dfsg-5.0 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mysql-dfsg-5.0.</p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2010/dsa-1997.data"
- -# $Id: dsa-1997.wml,v 1.3 2014/04/30 07:16:22 pabs Exp $
-----BEGIN PGP SIGNATURE-----
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=1b1n
-----END PGP SIGNATURE-----


Reply to: