[DONE] wml://security/2012/dsa-2{445,437,513}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2012/dsa-2437.wml 2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2437.wml 2016-08-23 23:59:21.111705740 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Icedove, an unbranded
- -version of the Thunderbird mail/news client.</p>
+<p>Ð? Icedove, безбÑ?ендовой веÑ?Ñ?ии поÑ?Ñ?ового/новоÑ?Ñ?ного клиенÑ?а
+Thunderbird, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0455">CVE-2012-0455</a>
- - <p>Soroush Dalili discovered that a cross-site scripting countermeasure
- - related to Javascript URLs could be bypassed.</p></li>
+ <p>СоÑ?оÑ?Ñ? Ð?алили обнаÑ?Ñ?жил, Ñ?Ñ?о меÑ?Ñ? пÑ?оÑ?иводейÑ?Ñ?виÑ? межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?,
+ Ñ?вÑ?заннÑ?е Ñ? URL Javascript, можно обойÑ?и.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0456">CVE-2012-0456</a>
- - <p>Atte Kettunen discovered an out of bounds read in the SVG Filters,
- - resulting in memory disclosure.</p></li>
+ <p>Ð?Ñ?Ñ?е Ð?еÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?илÑ?Ñ?Ñ?аÑ? SVG,
+ Ñ?Ñ?о пÑ?иводиÑ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? Ñ?одеÑ?жимого памÑ?Ñ?и.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0458">CVE-2012-0458</a>
- - <p>Mariusz Mlynski discovered that privileges could be escalated through
- - a Javascript URL as the home page.</p></li>
+ <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ? помоÑ?Ñ?Ñ? URL Javascript в каÑ?еÑ?Ñ?ве домаÑ?ней
+ Ñ?Ñ?Ñ?аниÑ?Ñ? можно повÑ?Ñ?иÑ?Ñ? пÑ?ивилегии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0461">CVE-2012-0461</a>
- - <p>Bob Clary discovered memory corruption bugs, which may lead to the
- - execution of arbitrary code.</p></li>
+ <p>Ð?об Ð?лÑ?Ñ?и обнаÑ?Ñ?жил оÑ?ибки, Ñ?вÑ?заннÑ?е Ñ? повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ?
+ к вÑ?полнениÑ? пÑ?оизводного кода.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 3.0.11-1+squeeze8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.0.11-1+squeeze8.</p>
- -<p>For the unstable distribution (sid), this problem will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
</define-tag>
# do not modify the following line
- --- english/security/2012/dsa-2445.wml 2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2445.wml 2016-08-23 23:15:27.280551977 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the TYPO3 web
- -content management framework:</p>
+<p>Ð? TYPO3, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е Ñ?пÑ?авлениÑ? веб-Ñ?одеÑ?жимÑ?м, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1606">CVE-2012-1606</a>
- - <p>Failing to properly HTML-encode user input in several places,
- - the TYPO3 backend is susceptible to Cross-Site Scripting. A
- - valid backend user is required to exploit these
- - vulnerabilities.</p></li>
+ <p>Ð?з-за невозможноÑ?Ñ?и коÑ?Ñ?екÑ?но закодиÑ?оваÑ?Ñ? в виде HTML полÑ?зоваÑ?елÑ?Ñ?кие вÑ?однÑ?е
+ даннÑ?е в Ñ?Ñ?де меÑ?Ñ? пÑ?едполагаеÑ?Ñ?Ñ?, Ñ?Ñ?о движок TYPO3 Ñ?Ñ?звим к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.
+ Ð?лÑ? иÑ?полÑ?зованиÑ? Ñ?Ñ?иÑ? Ñ?Ñ?звимоÑ?Ñ?ей злоÑ?мÑ?Ñ?ленник должен бÑ?Ñ?Ñ? коÑ?Ñ?екÑ?нÑ?м
+ полÑ?зоваÑ?елем движка.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1607">CVE-2012-1607</a>
- - <p>Accessing a CLI Script directly with a browser may disclose
- - the database name used for the TYPO3 installation.</p></li>
+ <p>Ð?Ñ?инÑ?Ñ?ие CLI-Ñ?Ñ?енаÑ?иÑ? напÑ?Ñ?мÑ?Ñ? в бÑ?аÑ?зеÑ?е можеÑ? пÑ?ивеÑ?Ñ?и к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ?
+ базÑ? даннÑ?Ñ? имÑ?н, иÑ?полÑ?зованнÑ?Ñ? длÑ? Ñ?Ñ?Ñ?ановки TYPO3.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1608">CVE-2012-1608</a>
- - <p>By not removing non printable characters, the API method
- - t3lib_div::RemoveXSS() fails to filter specially crafted HTML
- - injections, thus is susceptible to Cross-Site Scripting.</p></li>
+ <p>Ð?з-за Ñ?ого, Ñ?Ñ?о API-меÑ?од t3lib_div::RemoveXSS() не Ñ?далÑ?еÑ? непеÑ?аÑ?нÑ?е
+ Ñ?имволÑ?, он не можеÑ? оÑ?Ñ?илÑ?Ñ?Ñ?оваÑ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й код HTML,
+ Ñ?Ñ?о делаеÑ? его Ñ?Ñ?звимÑ?м к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 4.3.9+dfsg1-1+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.3.9+dfsg1-1+squeeze3.</p>
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 4.5.14+dfsg1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 4.5.14+dfsg1-1.</p>
- -<p>We recommend that you upgrade your typo3-src packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? typo3-src.</p>
</define-tag>
# do not modify the following line
- --- english/security/2012/dsa-2513.wml 2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2513.wml 2016-08-24 00:03:54.282543271 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been found in the Iceape internet suite,
- -an unbranded version of Seamonkey:</p>
+<p>Ð? Iceape, набоÑ?е Ð?нÑ?еÑ?неÑ?-пÑ?огÑ?амм, безбÑ?ендовой веÑ?Ñ?ии Seamonkey, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1948">CVE-2012-1948</a>
- - <p>Benoit Jacob, Jesse Ruderman, Christian Holler, and Bill McCloskey
- - identified several memory safety problems that may lead to the execution of
- - arbitrary code.</p></li>
+ <p>Ð?енÑ?а Якоб, Ð?жеÑ?Ñ? Ð Ñ?деÑ?ман, Ð?Ñ?иÑ?Ñ?иан ХоллеÑ? и Ð?илл Ð?акклаÑ?ки
+ обнаÑ?Ñ?жили неÑ?колÑ?ко пÑ?облем, Ñ?вÑ?заннÑ?Ñ? Ñ? Ñ?елоÑ?Ñ?ноÑ?Ñ?Ñ?Ñ? Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+ пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1954">CVE-2012-1954</a>
- - <p>Abhishek Arya discovered a use-after-free problem in
- - nsDocument::AdoptNode that may lead to the execution of arbitrary
- - code.</p></li>
+ <p>Ð?бÑ?иÑ?ек Ð?Ñ?Ñ?Ñ? обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в
+ nsDocument::AdoptNode, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+ кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1967">CVE-2012-1967</a>
- - <p><q>moz_bug_r_a4</q> discovered that in certain cases, javascript: URLs
- - can be executed so that scripts can escape the JavaScript sandbox and run
- - with elevated privileges. This can lead to arbitrary code
- - execution.</p></li>
+ <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о в опÑ?еделÑ?ннÑ?Ñ? Ñ?лÑ?Ñ?аÑ?Ñ? URL вида javascript:
+ можно вÑ?полниÑ?Ñ? Ñ?ак, Ñ?Ñ?о Ñ?Ñ?енаÑ?ии Ñ?могÑ?Ñ? вÑ?йÑ?и из пеÑ?оÑ?ниÑ?Ñ? JavaScript, и бÑ?дÑ?Ñ? запÑ?Ñ?енÑ?
+ Ñ? повÑ?Ñ?еннÑ?ми пÑ?ивилегиÑ?ми. ÐÑ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+ кода.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.0.11-14.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.11-14.</p>
- -<p>For the unstable (sid) and testing (wheezy) distribution, this problem
- -will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном (sid) и Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а пÑ?облема
+бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
- -<p>We recommend that you upgrade your iceape packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceape.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=VBIb
-----END PGP SIGNATURE-----
Reply to: