[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2006/dsa-1125.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2006/dsa-1125.wml	2014-04-30 13:16:09.000000000 +0600
+++ russian/security/2006/dsa-1125.wml	2016-11-07 17:00:47.620248872 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>The Drupal update in DSA 1125 contained a regression. This update corrects
- -this flaw. For completeness, the original advisory text below:</p>
+<p>Ð?бновление Drupal в DSA 1125 Ñ?одеÑ?жиÑ? Ñ?егÑ?еÑ?Ñ?иÑ?. Ð?анное обновление иÑ?пÑ?авлÑ?еÑ?
+Ñ?Ñ?Ñ? пÑ?облемÑ?. Ð?лÑ? полноÑ?Ñ? ниже пÑ?иводиÑ?Ñ?Ñ? Ñ?екÑ?Ñ? изнаÑ?алÑ?ной Ñ?екомендаÑ?ии:</p>
 
- -<p>Several remote vulnerabilities have been discovered in the Drupal web site
- -platform, which may lead to the execution of arbitrary web script. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? Drupal, плаÑ?Ñ?оÑ?ме веб-Ñ?айÑ?ов, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного веб-Ñ?Ñ?енаÑ?иÑ?.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2742";>CVE-2006-2742</a>
 
- -    <p>A SQL injection vulnerability has been discovered in the "count" and
- -    "from" variables of the database interface.</p></li>
+    <p>Ð?Ñ?ла обнаÑ?Ñ?жена SQL-инÑ?екÑ?иÑ? в пеÑ?еменнÑ?Ñ? "count" и "from"
+    инÑ?еÑ?Ñ?ейÑ?а баз даннÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2743";>CVE-2006-2743</a>
 
- -    <p>Multiple file extensions were handled incorrectly if Drupal ran on
- -    Apache with mod_mime enabled.</p></li>
+    <p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?аÑ?Ñ?иÑ?ениÑ? Ñ?айлов обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но в Ñ?лÑ?Ñ?ае, еÑ?ли Drupal запÑ?Ñ?ен
+    под Apache Ñ? вклÑ?Ñ?Ñ?ннÑ?м модÑ?лем mod_mime.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2831";>CVE-2006-2831</a>
 
- -    <p>A variation of <a href="https://security-tracker.debian.org/tracker/CVE-2006-2743";>CVE-2006-2743</a> was addressed as well.</p></li>
+    <p>Ð?Ñ?л иÑ?пÑ?авлен ваÑ?ианÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2006-2743";>CVE-2006-2743</a>.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2832";>CVE-2006-2832</a>
 
- -    <p>A Cross-Site-Scripting vulnerability in the upload module has been
- -    discovered.</p></li>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в модÑ?ле
+    upload.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-2833";>CVE-2006-2833</a>
 
- -    <p>A Cross-Site-Scripting vulnerability in the taxonomy module has been
- -    discovered.</p></li>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг в модÑ?ле
+    taxonomy.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (sarge) these problems have been fixed in
- -version 4.5.3-6.1sarge2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.5.3-6.1sarge2.</p>
 
- -<p>For the unstable distribution (sid) these problems have been fixed in
- -version 4.5.8-1.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.5.8-1.1.</p>
 
- -<p>We recommend that you upgrade your drupal packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? drupal.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=grd8
-----END PGP SIGNATURE-----


Reply to: