[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2018/dsa-4211.wml



--- ../../english/security/2018/dsa-4211.wml	2018-05-26 10:34:20.000000000 +0500
+++ 2018/dsa-4211.wml	2018-05-26 10:41:00.107599687 +0500
@@ -1,27 +1,27 @@
-<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" mindelta="1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
-<p>Gabriel Corona discovered that xdg-utils, a set of tools for desktop
-environment integration, is vulnerable to argument injection attacks. If
-the environment variable BROWSER in the victim host has a "%s" and the
-victim opens a link crafted by an attacker with xdg-open, the malicious
-party could manipulate the parameters used by the browser when opened.
-This manipulation could set, for example, a proxy to which the network
-traffic could be intercepted for that particular execution.</p>
+<p>Ð?абÑ?иÑ?лÑ? Ð?оÑ?она обнаÑ?Ñ?жил, Ñ?Ñ?о xdg-utils, набоÑ? инÑ?Ñ?Ñ?Ñ?менÑ?ов длÑ? инÑ?егÑ?аÑ?ии
+окÑ?Ñ?жениÑ? Ñ?абоÑ?его Ñ?Ñ?ола, Ñ?Ñ?звим к инÑ?екÑ?ии аÑ?гÑ?менÑ?ов. Ð?Ñ?ли пеÑ?еменнаÑ?
+окÑ?Ñ?жениÑ? BROWSER на Ñ?зле жеÑ?Ñ?вÑ? Ñ?одеÑ?жиÑ? <q>%s</q>, а жеÑ?Ñ?ва
+оÑ?кÑ?Ñ?ваеÑ? Ñ?озданнÑ?Ñ? злоÑ?мÑ?Ñ?ленником Ñ?Ñ?Ñ?лкÑ? Ñ? помоÑ?Ñ?Ñ? xdg-open, Ñ?о пÑ?и еÑ? оÑ?кÑ?Ñ?Ñ?ии
+злоÑ?мÑ?Ñ?ленник можеÑ? Ñ?пÑ?авлÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?ами, иÑ?полÑ?зÑ?емÑ?ми бÑ?аÑ?зеÑ?ом.
+Ð? пÑ?имеÑ?Ñ?, злоÑ?мÑ?Ñ?ленник можеÑ? Ñ?Ñ?Ñ?ановиÑ?Ñ? пÑ?окÑ?и, Ñ?еÑ?ез коÑ?оÑ?Ñ?й в Ñ?оде
+Ñ?екÑ?Ñ?его вÑ?полнениÑ? бÑ?аÑ?зеÑ?а бÑ?деÑ? пеÑ?еÑ?ваÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? Ñ?еÑ?евой Ñ?Ñ?аÑ?ик.</p>
 
-<p>For the oldstable distribution (jessie), this problem has been fixed
-in version 1.1.0~rc1+git20111210-7.4+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 1.1.0~rc1+git20111210-7.4+deb8u1.</p>
 
-<p>For the stable distribution (stretch), this problem has been fixed in
-version 1.1.1-1+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.1.1-1+deb9u1.</p>
 
-<p>We recommend that you upgrade your xdg-utils packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xdg-utils.</p>
 
-<p>For the detailed security status of xdg-utils please refer to
-its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и xdg-utils можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
 <a href="https://security-tracker.debian.org/tracker/xdg-utils";>\
 https://security-tracker.debian.org/tracker/xdg-utils</a></p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2018/dsa-4211.data"
-# $Id: dsa-4211.wml,v 1.1 2018/05/26 05:34:20 dogsleg Exp $


Reply to: