[DONE] wml://security/2012/dsa-2{418,537,402}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2012/dsa-2402.wml 2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2402.wml 2016-08-28 14:55:09.773188706 +0500
@@ -1,40 +1,41 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been found in the Iceape internet suite, an
- -unbranded version of Seamonkey:</p>
+<p>Ð? набоÑ?е Ð?нÑ?еÑ?неÑ?-инÑ?Ñ?Ñ?Ñ?менÑ?ов Iceape, безбÑ?ендовой веÑ?Ñ?ии Seamonkey,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3670">CVE-2011-3670</a>
- - <p>Gregory Fleischer discovered that IPv6 URLs were incorrectly parsed,
- - resulting in potential information disclosure.</p></li>
+ <p>Ð?Ñ?егоÑ?и ФлÑ?йÑ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? URL IPv6 вÑ?полнÑ?еÑ?Ñ?Ñ?
+ непÑ?авилÑ?но, Ñ?Ñ?о пÑ?иводиÑ? к поÑ?енÑ?иалÑ?номÑ? Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0442">CVE-2012-0442</a>
- - <p>Jesse Ruderman and Bob Clary discovered memory corruption bugs, which
- - may lead to the execution of arbitrary code.</p></li>
+ <p>Ð?жеÑ?Ñ? РадеÑ?ман и Ð?об Ð?лÑ?Ñ?и обнаÑ?Ñ?жили оÑ?ибки, Ñ?вÑ?заннÑ?е Ñ? повÑ?еждением Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е
+ могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0444">CVE-2012-0444</a>
- - <p><q>regenrecht</q> discovered that missing input sanitising in the Ogg Vorbis
- - parser may lead to the execution of arbitrary code.</p></li>
+ <p><q>regenrecht</q> обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого
+ Ñ?азбоÑ?а Ogg Vorbis можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0449">CVE-2012-0449</a>
- - <p>Nicolas Gregoire and Aki Helin discovered that missing input
- - sanitising in XSLT processing may lead to the execution of arbitrary
- - code.</p></li>
+ <p>Ð?иколаÑ? Ð?Ñ?егоÑ? и Ð?ки Хелин обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ?
+ в коде обÑ?абоÑ?ки XSLT можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+ кода.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.0.11-10.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.11-10.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.0.14-10.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.14-10.</p>
- -<p>We recommend that you upgrade your iceape packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceape.</p>
</define-tag>
# do not modify the following line
- --- english/security/2012/dsa-2418.wml 2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2418.wml 2016-08-28 14:45:16.230269600 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several local vulnerabilities have been discovered in PostgreSQL, an
- -object-relational SQL database. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? PostgreSQL, обÑ?екÑ?но-Ñ?елÑ?Ñ?ионной базе даннÑ?Ñ? SQL, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко локалÑ?нÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0866">CVE-2012-0866</a>
- - <p>It was discovered that the permissions of a function called by a
- - trigger are not checked. This could result in privilege escalation.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пÑ?ава Ñ?Ñ?нкÑ?ии, вÑ?званной
+ запÑ?Ñ?каÑ?Ñ?им Ñ?обÑ?Ñ?ием, не пÑ?овеÑ?Ñ?Ñ?Ñ?Ñ?Ñ?. ÐÑ?о можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0867">CVE-2012-0867</a>
- - <p>It was discovered that only the first 32 characters of a host name
- - are checked when validating host names through SSL certificates.
- - This could result in spoofing the connection in limited
- - circumstances.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пÑ?и пÑ?овеÑ?ке имÑ?н Ñ?злов поÑ?Ñ?едÑ?Ñ?вом SSL-Ñ?еÑ?Ñ?иÑ?икаÑ?ов
+ пÑ?овеÑ?Ñ?Ñ?Ñ?Ñ?Ñ? Ñ?олÑ?ко пеÑ?вÑ?е 32 Ñ?имвола.
+ Ð? огÑ?аниÑ?еннÑ?Ñ? Ñ?иÑ?Ñ?аÑ?иÑ?Ñ? Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+ подделке подклÑ?Ñ?ениÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0868">CVE-2012-0868</a>
- - <p>It was discovered that pg_dump did not sanitise object names.
- - This could result in arbitrary SQL command execution if a
- - malformed dump file is opened.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о pg_dump не вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? имÑ?н обÑ?екÑ?ов.
+ ÐÑ?о можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ? SQL-команд в Ñ?лÑ?Ñ?ае
+ оÑ?кÑ?Ñ?Ñ?иÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла дампа.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 8.4.11-0squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.4.11-0squeeze1.</p>
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 8.4.11-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 8.4.11-1.</p>
- -<p>We recommend that you upgrade your postgresql-8.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? postgresql-8.4.</p>
</define-tag>
# do not modify the following line
- --- english/security/2012/dsa-2537.wml 2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2537.wml 2016-08-28 14:50:05.029307183 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in TYPO3, a content management
- -system.</p>
+<p>Ð? TYPO3, Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? Ñ?одеÑ?жимÑ?м, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3527">CVE-2012-3527</a>
- - <p>An insecure call to unserialize in the help system enables
- - arbitrary code execution by authenticated users.</p></li>
+ <p>Ð?ебезопаÑ?нÑ?й вÑ?зов деÑ?еÑ?иализаÑ?ии в Ñ?иÑ?Ñ?еме помоÑ?и позволÑ?еÑ?
+ аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3528">CVE-2012-3528</a>
- - <p>The TYPO3 backend contains several cross-site scripting
- - vulnerabilities.</p></li>
+ <p>Ð?вижок TYPO3 Ñ?одеÑ?жиÑ? неÑ?колÑ?ко Ñ?лÑ?Ñ?аев межÑ?айÑ?ового
+ Ñ?кÑ?ипÑ?инга.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3529">CVE-2012-3529</a>
- - <p>Authenticated users who can access the configuration module
- - can obtain the encryption key, allowing them to escalate their
- - privileges.</p></li>
+ <p>Ð?Ñ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е полÑ?зоваÑ?ели, коÑ?оÑ?Ñ?е могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? доÑ?Ñ?Ñ?п к модÑ?лÑ?
+ наÑ?Ñ?Ñ?ойке, могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? клÑ?Ñ? Ñ?иÑ?Ñ?ованиÑ?, Ñ?Ñ?о позволÑ?еÑ? им повÑ?Ñ?иÑ?Ñ? Ñ?вои
+ пÑ?ивилегии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3530">CVE-2012-3530</a>
- - <p>The RemoveXSS HTML sanitizer did not remove several HTML5
- - JavaScript, thus failing to mitigate the impact of cross-site
- - scripting vulnerabilities.</p></li>
+ <p>RemoveXSS, инÑ?Ñ?Ñ?Ñ?менÑ? длÑ? оÑ?иÑ?Ñ?ки HTML, не Ñ?далÑ?еÑ? некоÑ?оÑ?Ñ?й код HTML5
+ JavaScript, Ñ?Ñ?о не позволÑ?еÑ? Ñ?низиÑ?Ñ? влиÑ?ние межÑ?айÑ?ового
+ Ñ?кÑ?ипÑ?инга.</p></li>
</ul>
- -<p>For the stable distribution (squeeze), these problems have been fixed
- -in version 4.3.9+dfsg1-1+squeeze5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4.3.9+dfsg1-1+squeeze5.</p>
- -<p>For the testing distribution (wheezy) and the unstable distribution
- -(sid), these problems have been fixed in version 4.5.19+dfsg1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 4.5.19+dfsg1-1.</p>
- -<p>We recommend that you upgrade your typo3-src packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? typo3-src.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=TYDg
-----END PGP SIGNATURE-----
Reply to: