[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{418,537,402}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2402.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2402.wml	2016-08-28 14:55:09.773188706 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been found in the Iceape internet suite, an
- -unbranded version of Seamonkey:</p>
+<p>Ð? набоÑ?е Ð?нÑ?еÑ?неÑ?-инÑ?Ñ?Ñ?Ñ?менÑ?ов Iceape, безбÑ?ендовой веÑ?Ñ?ии Seamonkey,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3670";>CVE-2011-3670</a>
 
- -   <p>Gregory Fleischer discovered that IPv6 URLs were incorrectly parsed,
- -   resulting in potential information disclosure.</p></li>
+   <p>Ð?Ñ?егоÑ?и ФлÑ?йÑ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? URL IPv6 вÑ?полнÑ?еÑ?Ñ?Ñ?
+   непÑ?авилÑ?но, Ñ?Ñ?о пÑ?иводиÑ? к поÑ?енÑ?иалÑ?номÑ? Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0442";>CVE-2012-0442</a>
 
- -   <p>Jesse Ruderman and Bob Clary discovered memory corruption bugs, which
- -   may lead to the execution of arbitrary code.</p></li>
+   <p>Ð?жеÑ?Ñ? РадеÑ?ман и Ð?об Ð?лÑ?Ñ?и обнаÑ?Ñ?жили оÑ?ибки, Ñ?вÑ?заннÑ?е Ñ? повÑ?еждением Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е
+   могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0444";>CVE-2012-0444</a>
 
- -   <p><q>regenrecht</q> discovered that missing input sanitising in the Ogg Vorbis
- -   parser may lead to the execution of arbitrary code.</p></li>
+   <p><q>regenrecht</q> обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого
+   Ñ?азбоÑ?а Ogg Vorbis можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0449";>CVE-2012-0449</a>
 
- -   <p>Nicolas Gregoire and Aki Helin discovered that missing input
- -   sanitising in XSLT processing may lead to the execution of arbitrary
- -   code.</p></li>
+   <p>Ð?иколаÑ? Ð?Ñ?егоÑ? и Ð?ки Хелин обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?
+   в коде обÑ?абоÑ?ки XSLT можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+   кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.0.11-10.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.11-10.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.0.14-10.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.14-10.</p>
 
- -<p>We recommend that you upgrade your iceape packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceape.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2418.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2418.wml	2016-08-28 14:45:16.230269600 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several local vulnerabilities have been discovered in PostgreSQL, an
- -object-relational SQL database. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? PostgreSQL, обÑ?екÑ?но-Ñ?елÑ?Ñ?ионной базе даннÑ?Ñ? SQL, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко локалÑ?нÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0866";>CVE-2012-0866</a>
 
- -   <p>It was discovered that the permissions of a function called by a
- -   trigger are not checked. This could result in privilege escalation.</p></li>
+   <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пÑ?ава Ñ?Ñ?нкÑ?ии, вÑ?званной
+   запÑ?Ñ?каÑ?Ñ?им Ñ?обÑ?Ñ?ием, не пÑ?овеÑ?Ñ?Ñ?Ñ?Ñ?Ñ?. ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0867";>CVE-2012-0867</a>
 
- -   <p>It was discovered that only the first 32 characters of a host name
- -   are checked when validating host names through SSL certificates.
- -   This could result in spoofing the connection in limited
- -   circumstances.</p></li>
+   <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пÑ?и пÑ?овеÑ?ке имÑ?н Ñ?злов поÑ?Ñ?едÑ?Ñ?вом SSL-Ñ?еÑ?Ñ?иÑ?икаÑ?ов
+   пÑ?овеÑ?Ñ?Ñ?Ñ?Ñ?Ñ? Ñ?олÑ?ко пеÑ?вÑ?е 32 Ñ?имвола.
+   Ð? огÑ?аниÑ?еннÑ?Ñ? Ñ?иÑ?Ñ?аÑ?иÑ?Ñ? Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+   подделке подклÑ?Ñ?ениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0868";>CVE-2012-0868</a>
 
- -   <p>It was discovered that pg_dump did not sanitise object names.
- -   This could result in arbitrary SQL command execution if a
- -   malformed dump file is opened.</p></li>
+   <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о pg_dump не вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? имÑ?н обÑ?екÑ?ов.
+   ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ? SQL-команд в Ñ?лÑ?Ñ?ае
+   оÑ?кÑ?Ñ?Ñ?иÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла дампа.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 8.4.11-0squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.4.11-0squeeze1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 8.4.11-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.4.11-1.</p>
 
- -<p>We recommend that you upgrade your postgresql-8.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-8.4.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2537.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2537.wml	2016-08-28 14:50:05.029307183 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities were discovered in TYPO3, a content management
- -system.</p>
+<p>Ð? TYPO3, Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? Ñ?одеÑ?жимÑ?м, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3527";>CVE-2012-3527</a>
 
- -	<p>An insecure call to unserialize in the help system enables
- -	arbitrary code execution by authenticated users.</p></li>
+	<p>Ð?ебезопаÑ?нÑ?й вÑ?зов деÑ?еÑ?иализаÑ?ии в Ñ?иÑ?Ñ?еме помоÑ?и позволÑ?еÑ?
+	аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3528";>CVE-2012-3528</a>
 
- -	<p>The TYPO3 backend contains several cross-site scripting
- -	vulnerabilities.</p></li>
+	<p>Ð?вижок TYPO3 Ñ?одеÑ?жиÑ? неÑ?колÑ?ко Ñ?лÑ?Ñ?аев межÑ?айÑ?ового
+	Ñ?кÑ?ипÑ?инга.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3529";>CVE-2012-3529</a>
 
- -	<p>Authenticated users who can access the configuration module
- -	can obtain the encryption key, allowing them to escalate their
- -	privileges.</p></li>
+	<p>Ð?Ñ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е полÑ?зоваÑ?ели, коÑ?оÑ?Ñ?е могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? доÑ?Ñ?Ñ?п к модÑ?лÑ?
+	наÑ?Ñ?Ñ?ойке, могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? клÑ?Ñ? Ñ?иÑ?Ñ?ованиÑ?, Ñ?Ñ?о позволÑ?еÑ? им повÑ?Ñ?иÑ?Ñ? Ñ?вои
+	пÑ?ивилегии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3530";>CVE-2012-3530</a>
 
- -	<p>The RemoveXSS HTML sanitizer did not remove several HTML5
- -	JavaScript, thus failing to mitigate the impact of cross-site
- -	scripting vulnerabilities.</p></li>
+	<p>RemoveXSS, инÑ?Ñ?Ñ?Ñ?менÑ? длÑ? оÑ?иÑ?Ñ?ки HTML, не Ñ?далÑ?еÑ? некоÑ?оÑ?Ñ?й код HTML5
+	JavaScript, Ñ?Ñ?о не позволÑ?еÑ? Ñ?низиÑ?Ñ? влиÑ?ние межÑ?айÑ?ового
+	Ñ?кÑ?ипÑ?инга.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 4.3.9+dfsg1-1+squeeze5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4.3.9+dfsg1-1+squeeze5.</p>
 
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 4.5.19+dfsg1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 4.5.19+dfsg1-1.</p>
 
- -<p>We recommend that you upgrade your typo3-src packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? typo3-src.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=TYDg
-----END PGP SIGNATURE-----


Reply to: