[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-2{211,192,341}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2192.wml	2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2192.wml	2016-07-09 19:00:27.881317437 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities were discovered in the Chromium browser.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð? бÑ?аÑ?зеÑ?е Chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0779";>CVE-2011-0779</a>
 
- -  <p>Google Chrome before 9.0.597.84 does not properly handle a missing key in an
- -  extension, which allows remote attackers to cause a denial of service
- -  (application crash) via a crafted extension.</p></li>
+  <p>Google Chrome до веÑ?Ñ?ии 9.0.597.84 непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие клÑ?Ñ?а в
+  Ñ?аÑ?Ñ?иÑ?ении, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+  (аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?аÑ?Ñ?иÑ?ениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1290";>CVE-2011-1290</a>
 
- -  <p>Integer overflow in WebKit allows remote attackers to execute arbitrary code
- -  via unknown vectors, as demonstrated by Vincenzo Iozzo, Willem Pinckaers, and
- -  Ralf-Philipp Weinmann during a Pwn2Own competition at CanSecWest 2011.</p></li>
+  <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в WebKit позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код
+  Ñ?еÑ?ез неизвеÑ?Ñ?нÑ?е векÑ?оÑ?Ñ?, Ñ?Ñ?о бÑ?ло пÑ?одемонÑ?Ñ?Ñ?иÑ?овано Ð?инÑ?енÑ?о Ð?оÑ?Ñ?о, УилÑ?емом Ð?инкеÑ?Ñ?ом и
+  РалÑ?Ñ?ом-Филиппом Ð?айнманом во вÑ?емÑ? Pwn2Own на конÑ?еÑ?енÑ?ии CanSecWest 2011.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 6.0.472.63~r59945-5+squeeze4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 6.0.472.63~r59945-5+squeeze4.</p>
 
- -<p>For the testing distribution (wheezy), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 10.0.648.133~r77742-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 10.0.648.133~r77742-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2211.wml	2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2211.wml	2016-07-09 18:56:38.157851220 +0500
@@ -1,27 +1,28 @@
- -<define-tag description>missing input sanitising</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?</define-tag>
 <define-tag moreinfo>
- -<p>Ricardo Narvaja discovered that missing input sanitising in VLC, a
- -multimedia player and streamer, could lead to the execution of arbitrary
- -code if a user is tricked into opening a malformed media file.</p>
- -
- -<p>This update also provides updated packages for oldstable (lenny) for
- -vulnerabilities, which have already been addressed in Debian stable
- -(squeeze), either during the freeze or in <a href="dsa-2159">DSA-2159</a>
+<p>РикаÑ?до Ð?аÑ?вайа обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в VLC,
+пÑ?оигÑ?Ñ?ваÑ?еле мÑ?лÑ?Ñ?имедиа и пÑ?огÑ?амме длÑ? поÑ?окового веÑ?аниÑ?, можеÑ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли жеÑ?Ñ?ва оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл.</p>
+
+<p>Ð?Ñ?оме Ñ?ого, данное обновление пÑ?едоÑ?Ñ?авлÑ?еÑ? обновлÑ?ннÑ?е пакеÑ? длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (lenny),
+длÑ? коÑ?оÑ?ого иÑ?пÑ?авленÑ? Ñ?же иÑ?пÑ?авленнÑ?е в Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке Debian
+(squeeze) пÑ?облемÑ? <a href="dsa-2159">DSA-2159</a>
 (<a href="https://security-tracker.debian.org/tracker/CVE-2010-0522";>CVE-2010-0522</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2010-1441";>CVE-2010-1441</a>,
- -<a href="https://security-tracker.debian.org/tracker/CVE-2010-1442";>CVE-2010-1442</a> and
+<a href="https://security-tracker.debian.org/tracker/CVE-2010-1442";>CVE-2010-1442</a> и
 <a href="https://security-tracker.debian.org/tracker/CVE-2011-0531";>CVE-2011-0531</a>).</p>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 0.8.6.h-4+lenny3.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.8.6.h-4+lenny3.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 1.1.3-1squeeze4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.1.3-1squeeze4.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 1.1.8-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.1.8-1.</p>
 
- -<p>We recommend that you upgrade your vlc packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? vlc.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2341.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2341.wml	2016-07-09 19:03:53.823223475 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Iceweasel, a web browser
- -based on Firefox. The included XULRunner library provides rendering
- -services for several other applications included in Debian.</p>
+<p>Ð? Iceweasel, веб-бÑ?аÑ?зеÑ?е на оÑ?нове Firefox, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?клÑ?Ñ?Ñ?ннаÑ? в Ñ?оÑ?Ñ?ав пакеÑ?а библиоÑ?ека XULRunner
+пÑ?едоÑ?Ñ?авлÑ?еÑ? возможноÑ?Ñ?и оÑ?Ñ?иÑ?овки длÑ? некоÑ?оÑ?Ñ?Ñ? дÑ?Ñ?гиÑ? пÑ?иложений в Debian.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3647";>CVE-2011-3647</a>
 
- -   <p><q>moz_bug_r_a4</q> discovered a privilege escalation vulnerability in
- -   addon handling.</p></li>
+   <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил повÑ?Ñ?ение пÑ?ивилегий в
+   коде обÑ?абоÑ?ки дополнений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3648";>CVE-2011-3648</a>
 
- -   <p>Yosuke Hasegawa discovered that incorrect handling of Shift-JIS
- -   encodings could lead to cross-site scripting.</p></li>
+   <p>Ð?оÑ?Ñ?ке ХаÑ?егава обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка кодиÑ?овок Shift-JIS
+   можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3650";>CVE-2011-3650</a>
 
- -   <p>Marc Schoenefeld discovered that profiling the JavaScript code
- -   could lead to memory corruption.</p></li>
+   <p>Ð?аÑ?к ШÑ?неÑ?елÑ?д обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?оÑ?илиÑ?ование кода JavaScript
+   можеÑ? пÑ?иводиÑ?Ñ? к повÑ?еждениÑ? Ñ?одеÑ?жимого памÑ?Ñ?и.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.9.0.19-15 of the xulrunner source package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.9.0.19-15 пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом xulrunner.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 3.5.16-11.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.5.16-11.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 8.0-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.0-1.</p>
 
- -<p>We recommend that you upgrade your iceweasel packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceweasel.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=s08w
-----END PGP SIGNATURE-----


Reply to: