[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{445,437,513}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2437.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2437.wml	2016-08-23 23:59:21.111705740 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Icedove, an unbranded
- -version of the Thunderbird mail/news client.</p>
+<p>Ð? Icedove, безбÑ?ендовой веÑ?Ñ?ии поÑ?Ñ?ового/новоÑ?Ñ?ного клиенÑ?а
+Thunderbird, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0455";>CVE-2012-0455</a>
 
- -   <p>Soroush Dalili discovered that a cross-site scripting countermeasure
- -   related to Javascript URLs could be bypassed.</p></li>
+   <p>СоÑ?оÑ?Ñ? Ð?алили обнаÑ?Ñ?жил, Ñ?Ñ?о меÑ?Ñ? пÑ?оÑ?иводейÑ?Ñ?виÑ? межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?,
+   Ñ?вÑ?заннÑ?е Ñ? URL Javascript, можно обойÑ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0456";>CVE-2012-0456</a>
 
- -   <p>Atte Kettunen discovered an out of bounds read in the SVG Filters,
- -   resulting in memory disclosure.</p></li>
+   <p>Ð?Ñ?Ñ?е Ð?еÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?илÑ?Ñ?Ñ?аÑ? SVG,
+   Ñ?Ñ?о пÑ?иводиÑ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? Ñ?одеÑ?жимого памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0458";>CVE-2012-0458</a>
 
- -   <p>Mariusz Mlynski discovered that privileges could be escalated through
- -   a Javascript URL as the home page.</p></li>
+   <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ? помоÑ?Ñ?Ñ? URL Javascript в каÑ?еÑ?Ñ?ве домаÑ?ней
+   Ñ?Ñ?Ñ?аниÑ?Ñ? можно повÑ?Ñ?иÑ?Ñ? пÑ?ивилегии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0461";>CVE-2012-0461</a>
 
- -   <p>Bob Clary discovered memory corruption bugs, which may lead to the
- -   execution of arbitrary code.</p></li>
+   <p>Ð?об Ð?лÑ?Ñ?и обнаÑ?Ñ?жил оÑ?ибки, Ñ?вÑ?заннÑ?е Ñ? повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ?
+   к вÑ?полнениÑ? пÑ?оизводного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 3.0.11-1+squeeze8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.0.11-1+squeeze8.</p>
 
- -<p>For the unstable distribution (sid), this problem will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2445.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2445.wml	2016-08-23 23:15:27.280551977 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the TYPO3 web
- -content management framework:</p>
+<p>Ð? TYPO3, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е Ñ?пÑ?авлениÑ? веб-Ñ?одеÑ?жимÑ?м, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1606";>CVE-2012-1606</a>
 
- -	<p>Failing to properly HTML-encode user input in several places,
- -	the TYPO3 backend is susceptible to Cross-Site Scripting. A
- -	valid backend user is required to exploit these
- -	vulnerabilities.</p></li>
+	<p>Ð?з-за невозможноÑ?Ñ?и коÑ?Ñ?екÑ?но закодиÑ?оваÑ?Ñ? в виде HTML полÑ?зоваÑ?елÑ?Ñ?кие вÑ?однÑ?е
+	даннÑ?е в Ñ?Ñ?де меÑ?Ñ? пÑ?едполагаеÑ?Ñ?Ñ?, Ñ?Ñ?о движок TYPO3 Ñ?Ñ?звим к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.
+	Ð?лÑ? иÑ?полÑ?зованиÑ? Ñ?Ñ?иÑ? Ñ?Ñ?звимоÑ?Ñ?ей злоÑ?мÑ?Ñ?ленник должен бÑ?Ñ?Ñ? коÑ?Ñ?екÑ?нÑ?м
+        полÑ?зоваÑ?елем движка.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1607";>CVE-2012-1607</a>
 
- -	<p>Accessing a CLI Script directly with a browser may disclose
- -	the database name used for the TYPO3 installation.</p></li>
+	<p>Ð?Ñ?инÑ?Ñ?ие CLI-Ñ?Ñ?енаÑ?иÑ? напÑ?Ñ?мÑ?Ñ? в бÑ?аÑ?зеÑ?е можеÑ? пÑ?ивеÑ?Ñ?и к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ?
+	базÑ? даннÑ?Ñ? имÑ?н, иÑ?полÑ?зованнÑ?Ñ? длÑ? Ñ?Ñ?Ñ?ановки TYPO3.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1608";>CVE-2012-1608</a>
 
- -	<p>By not removing non printable characters, the API method
- -	t3lib_div::RemoveXSS() fails to filter specially crafted HTML
- -	injections, thus is susceptible to Cross-Site Scripting.</p></li>
+	<p>Ð?з-за Ñ?ого, Ñ?Ñ?о API-меÑ?од t3lib_div::RemoveXSS() не Ñ?далÑ?еÑ? непеÑ?аÑ?нÑ?е
+        Ñ?имволÑ?, он не можеÑ? оÑ?Ñ?илÑ?Ñ?Ñ?оваÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й код HTML,
+	Ñ?Ñ?о делаеÑ? его Ñ?Ñ?звимÑ?м к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 4.3.9+dfsg1-1+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.3.9+dfsg1-1+squeeze3.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 4.5.14+dfsg1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 4.5.14+dfsg1-1.</p>
 
- -<p>We recommend that you upgrade your typo3-src packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? typo3-src.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2513.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2513.wml	2016-08-24 00:03:54.282543271 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in the Iceape internet suite,
- -an unbranded version of Seamonkey:</p>
+<p>Ð? Iceape, набоÑ?е Ð?нÑ?еÑ?неÑ?-пÑ?огÑ?амм, безбÑ?ендовой веÑ?Ñ?ии Seamonkey, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1948";>CVE-2012-1948</a>
 
- -    <p>Benoit Jacob, Jesse Ruderman, Christian Holler, and Bill McCloskey
- -    identified several memory safety problems that may lead to the execution of 
- -    arbitrary code.</p></li>
+    <p>Ð?енÑ?а Якоб, Ð?жеÑ?Ñ? РÑ?деÑ?ман, Ð?Ñ?иÑ?Ñ?иан ХоллеÑ? и Ð?илл Ð?акклаÑ?ки
+    обнаÑ?Ñ?жили неÑ?колÑ?ко пÑ?облем, Ñ?вÑ?заннÑ?Ñ? Ñ? Ñ?елоÑ?Ñ?ноÑ?Ñ?Ñ?Ñ? Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1954";>CVE-2012-1954</a>
 
- -    <p>Abhishek Arya discovered a use-after-free problem in 
- -    nsDocument::AdoptNode that may lead to the execution of arbitrary 
- -    code.</p></li>
+    <p>Ð?бÑ?иÑ?ек Ð?Ñ?Ñ?Ñ? обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в
+    nsDocument::AdoptNode, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1967";>CVE-2012-1967</a>
 
- -    <p><q>moz_bug_r_a4</q> discovered that in certain cases, javascript: URLs 
- -    can be executed so that scripts can escape the JavaScript sandbox and run
- -    with elevated privileges.  This can lead to arbitrary code 
- -    execution.</p></li>
+    <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о в опÑ?еделÑ?ннÑ?Ñ? Ñ?лÑ?Ñ?аÑ?Ñ? URL вида javascript:
+    можно вÑ?полниÑ?Ñ? Ñ?ак, Ñ?Ñ?о Ñ?Ñ?енаÑ?ии Ñ?могÑ?Ñ? вÑ?йÑ?и из пеÑ?оÑ?ниÑ?Ñ? JavaScript, и бÑ?дÑ?Ñ? запÑ?Ñ?енÑ?
+    Ñ? повÑ?Ñ?еннÑ?ми пÑ?ивилегиÑ?ми.  ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+    кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.0.11-14.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.11-14.</p>
 
- -<p>For the unstable (sid) and testing (wheezy) distribution, this problem
- -will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном (sid) и Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а пÑ?облема
+бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your iceape packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceape.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=VBIb
-----END PGP SIGNATURE-----


Reply to: