[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2011/dsa-2{337,190}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2190.wml	2014-04-30 13:16:24.000000000 +0600
+++ russian/security/2011/dsa-2190.wml	2016-09-05 23:07:48.865226457 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Two XSS bugs and one potential information disclosure issue were discovered
- -in WordPress, a weblog manager.
- -The Common Vulnerabilities and Exposures project identifies the
- -following problems:</p>
+<p>Ð?ве XSS-оÑ?ибки и одна поÑ?енÑ?иалÑ?наÑ? пÑ?облема Ñ? Ñ?аÑ?кÑ?Ñ?Ñ?ием инÑ?оÑ?маÑ?ии бÑ?ли обнаÑ?Ñ?женÑ?
+в WordPress, менеджеÑ?е блога.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0700";>CVE-2011-0700</a>
 
- -  <p>Input passed via the post title when performing a <q>Quick Edit</q> or 
- -  <q>Bulk Edit</q> action and via the <q>post_status</q>, <q>comment_status</q>, 
- -  and <q>ping_status</q> parameters is not properly sanitised before being used.
- -  Certain input passed via tags in the tags meta-box is not properly sanitised
- -  before being returned to the user.</p></li>
+  <p>Ð?Ñ?однÑ?е даннÑ?е, пеÑ?еданнÑ?е Ñ?еÑ?ез заголовок Ñ?ообÑ?ениÑ? в моменÑ? вÑ?полнениÑ? дейÑ?Ñ?вий <q>Quick Edit</q> или
+  <q>Bulk Edit</q>, а Ñ?акже Ñ?еÑ?ез паÑ?амеÑ?Ñ?Ñ? <q>post_status</q>, <q>comment_status</q>
+  и <q>ping_status</q>, непÑ?авилÑ?но оÑ?иÑ?аÑ?Ñ?Ñ?Ñ? до моменÑ?а иÑ? иÑ?полÑ?зованиÑ?.
+  Ð?пÑ?еделÑ?ннÑ?е вÑ?однÑ?е даннÑ?е, пеÑ?еданнÑ?е Ñ?еÑ?ез Ñ?еги в меÑ?аполе Ñ?егов, оÑ?иÑ?аÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но
+  до иÑ? возвÑ?аÑ?а полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0701";>CVE-2011-0701</a>
 
- -  <p>WordPress incorrectly enforces user access restrictions when accessing posts
- -  via the media uploader and can be exploited to disclose the contents
- -  of e.g. private or draft posts.</p></li>
+  <p>WordPress некоÑ?Ñ?екÑ?но Ñ?Ñ?Ñ?анавливаеÑ? полÑ?зоваÑ?елÑ?Ñ?кие огÑ?аниÑ?ениÑ? доÑ?Ñ?Ñ?па пÑ?и обÑ?аÑ?ении к
+  Ñ?ообÑ?ениÑ?м Ñ?еÑ?ез загÑ?Ñ?зÑ?ик медиа, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? Ñ?одеÑ?жимого,
+  напÑ?имеÑ?, закÑ?Ñ?Ñ?Ñ?Ñ? или Ñ?еÑ?новÑ?Ñ? Ñ?ообÑ?ений.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (lenny) is not affected by these problems.</p>
+<p>Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (lenny) не подвеÑ?жен Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 3.0.5+dfsg-0+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.5+dfsg-0+squeeze1.</p>
 
- -<p>For the testing distribution (wheezy), and the unstable distribution (sid),
- -these problems have been fixed in version 3.0.5+dfsg-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.0.5+dfsg-1.</p>
 
- -<p>We recommend that you upgrade your wordpress packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? wordpress.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2011/dsa-2337.wml	2014-04-30 13:16:25.000000000 +0600
+++ russian/security/2011/dsa-2337.wml	2016-09-05 23:00:34.293608103 +0500
@@ -1,37 +1,38 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in the Xen virtual machine
- -hypervisor.</p>
+<p>Ð? Xen, гипеÑ?визоÑ?е виÑ?Ñ?Ñ?алÑ?нÑ?Ñ? маÑ?ин, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1166";>CVE-2011-1166</a>
 
- -  <p>A 64-bit guest can get one of its vCPUs into non-kernel
- -  mode without first providing a valid non-kernel pagetable,
- -  thereby locking up the host system.</p></li>
+  <p>64-биÑ?нÑ?е гоÑ?Ñ?евÑ?е Ñ?иÑ?Ñ?емÑ? могÑ?Ñ? пеÑ?евеÑ?Ñ?и один из Ñ?воиÑ? виÑ?Ñ?Ñ?алÑ?нÑ?Ñ? ЦÐ? в не-Ñ?деÑ?нÑ?й
+  Ñ?ежим без пÑ?едоÑ?Ñ?авлениÑ? коÑ?Ñ?екÑ?ной не-Ñ?деÑ?ной Ñ?аблиÑ?Ñ? Ñ?Ñ?Ñ?аниÑ?,
+  Ñ?Ñ?о пÑ?иводиÑ? к завиÑ?аниÑ? оÑ?новной Ñ?иÑ?Ñ?емÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1583";>CVE-2011-1583</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2011-3262";>CVE-2011-3262</a>
 
- -  <p>Local users can cause a denial of service and possibly execute
- -  arbitrary code via a crafted paravirtualised guest kernel image.</p></li>
+  <p>Ð?окалÑ?нÑ?е полÑ?зоваÑ?ели могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании и возможное вÑ?полнение
+  пÑ?оизволÑ?ного кода Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного обÑ?аза Ñ?дÑ?а паÑ?авиÑ?Ñ?Ñ?ализиÑ?ованной гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1898";>CVE-2011-1898</a>
 
- -  <p>When using PCI passthrough on Intel VT-d chipsets that do not
- -  have interrupt remapping, guest OS users can gain host OS
- -  privileges by writing to the interrupt injection registers.</p></li>
+  <p>Ð?Ñ?и иÑ?полÑ?зовании пÑ?обÑ?оÑ?а PCI на набоÑ?аÑ? микÑ?оÑ?Ñ?ем Intel VT-d, не имеÑ?Ñ?иÑ?
+  пеÑ?еÑ?аÑ?пÑ?еделениÑ? пÑ?еÑ?Ñ?ваний, полÑ?зоваÑ?ели гоÑ?Ñ?евой Ð?С могÑ?Ñ? полÑ?Ñ?иÑ?Ñ? пÑ?ава
+  оÑ?новной Ð?С пÑ?Ñ?Ñ?м запиÑ?и в Ñ?егиÑ?Ñ?Ñ?Ñ? ввода пÑ?еÑ?Ñ?ваний.</p></li>
 
 </ul>
 
- -<p>The oldstable distribution (lenny) contains a different version of Xen
- -not affected by these problems.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) имееÑ?Ñ?Ñ? дÑ?Ñ?гаÑ? веÑ?Ñ?иÑ? Xen,
+коÑ?оÑ?аÑ? не подвеÑ?жена Ñ?Ñ?им пÑ?облемам.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 4.0.1-4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 4.0.1-4.</p>
 
- -<p>For the testing (wheezy) and unstable distribution (sid), this problem
- -has been fixed in version 4.1.1-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (wheezy) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а пÑ?облема
+бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 4.1.1-1.</p>
 
 <p>We recommend that you upgrade your xen packages.</p>
 </define-tag>
-----BEGIN PGP SIGNATURE-----
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=2tMa
-----END PGP SIGNATURE-----


Reply to: