[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{548,453}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2453.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2453.wml	2016-09-21 17:32:00.940467633 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Gajim, a feature-rich
- -Jabber client.  The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Gajim, полноÑ?Ñ?нкÑ?ионалÑ?ном Jabber-клиенÑ?е, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1987";>CVE-2012-1987</a>
 
- -    <p>Gajim is not properly sanitizing input before passing it to shell
- -    commands.  An attacker can use this flaw to execute arbitrary code
- -    on behalf of the victim if the user e.g. clicks on a specially crafted
- -    URL in an instant message.</p></li>
+    <p>Gajim непÑ?авилÑ?но вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? вÑ?однÑ?Ñ? даннÑ?Ñ? до пеÑ?едаÑ?и иÑ? командам
+    командной оболоÑ?ки.  Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода
+    оÑ? лиÑ?а жеÑ?Ñ?вÑ? пÑ?и Ñ?Ñ?ловии, Ñ?Ñ?о полÑ?зоваÑ?елÑ?, напÑ?имеÑ?, кликаеÑ? на Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й
+    URL в мгновенном Ñ?ообÑ?ении.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2093";>CVE-2012-2093</a>
 
- -    <p>Gajim is using predictable temporary files in an insecure manner when
- -    converting instant messages containing LaTeX to images.  A local
- -    attacker can use this flaw to conduct symlink attacks and overwrite
- -    files the victim has write access to.</p></li>
+    <p>Gajim иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? пÑ?едÑ?казÑ?емÑ?е вÑ?еменнÑ?е Ñ?айлÑ? небезопаÑ?нÑ?м Ñ?поÑ?обом пÑ?и
+    пÑ?еобÑ?азовании мгновеннÑ?Ñ? Ñ?ообÑ?ений, Ñ?одеÑ?жаÑ?иÑ? код LaTeX в изобÑ?ажениÑ?.  Ð?окалÑ?нÑ?й
+    злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?полнениÑ? аÑ?аки Ñ?еÑ?ез Ñ?имволÑ?нÑ?е Ñ?Ñ?Ñ?лки и пеÑ?езапиÑ?и
+    Ñ?айлов, к коÑ?оÑ?Ñ?м жеÑ?Ñ?ва имееÑ? доÑ?Ñ?Ñ?п Ñ? пÑ?авами на запиÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-2086";>CVE-2012-2086</a>
 
- -    <p>Gajim is not properly sanitizing input when logging conversations
- -    which results in the possibility to conduct SQL injection attacks.</p></li>
+    <p>Gajim непÑ?авилÑ?но вÑ?полнÑ?еÑ? оÑ?иÑ?Ñ?кÑ? вÑ?однÑ?Ñ? даннÑ?Ñ? пÑ?и ведении жÑ?Ñ?нала обÑ?ениÑ?,
+    Ñ?Ñ?о пÑ?иводиÑ? к возможноÑ?Ñ?и вÑ?полнениÑ? SQL-инÑ?екÑ?ии.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 0.13.4-3+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.13.4-3+squeeze3.</p>
 
- -<p>For the testing distribution (wheezy), this problem has been fixed in
- -version 0.15-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.15-1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 0.15-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.15-1.</p>
 
- -<p>We recommend that you upgrade your gajim packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gajim.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2548.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2548.wml	2016-09-21 17:25:51.158512861 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Tor, an online privacy
- -tool.</p>
+<p>Ð? Tor, инÑ?Ñ?Ñ?Ñ?менÑ?е длÑ? обеÑ?пеÑ?ениÑ? пÑ?иваÑ?ноÑ?Ñ?и онлайн, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3518";>CVE-2012-3518</a>
 
- -  <p>Avoid an uninitialised memory read when reading a vote or consensus
- -  document that has an unrecognized flavour name. This could lead to
- -  a remote crash, resulting in denial of service.</p></li>
+  <p>Ð?Ñ?едоÑ?вÑ?аÑ?ение Ñ?Ñ?ениÑ? неиниÑ?иализиÑ?ованной памÑ?Ñ?и пÑ?и Ñ?Ñ?ении голоÑ?а или докÑ?менÑ?а
+  конÑ?енÑ?Ñ?Ñ?а, имеÑ?Ñ?его неÑ?аÑ?познанное имÑ? Ñ?азновидноÑ?Ñ?и. ЭÑ?о можеÑ? пÑ?иводиÑ?Ñ? к
+  Ñ?далÑ?нной аваÑ?ийной оÑ?Ñ?ановке, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3519";>CVE-2012-3519</a>
 
- -  <p>Try to leak less information about what relays a client is choosing to
- -  a side-channel attacker.</p></li>
+  <p>Ð?опÑ?Ñ?ка Ñ?Ñ?еÑ?ки неболÑ?Ñ?ого колиÑ?еÑ?Ñ?ва инÑ?оÑ?маÑ?ии о Ñ?ом, какие акÑ?ивнÑ?е Ñ?злÑ?
+  вÑ?биÑ?аеÑ? клиенÑ?, Ñ?еÑ?ез Ñ?Ñ?оÑ?онний канал.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4419";>CVE-2012-4419</a>
 
- -  <p>By providing specially crafted date strings to a victim tor instance,
- -  an attacker can cause it to run into an assertion and shut down.</p></li>
+  <p>Ð?еÑ?едаваÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?Ñ?Ñ?ок Ñ? даÑ?ами жеÑ?Ñ?ве,
+  злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зваÑ?Ñ? Ñ?Ñ?абаÑ?Ñ?вание Ñ?Ñ?веÑ?ждениÑ? и завеÑ?Ñ?ение Ñ?абоÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>Additionally the update to stable includes the following fixes:
- -  when waiting for a client to renegotiate, don't allow it to add any
- -  bytes to the input buffer. This fixes a potential DoS issue
- -[<a href="https://trac.torproject.org/projects/tor/ticket/5934";>tor-5934</a>, 
+<p>Ð?Ñ?оме Ñ?ого, данное обновление Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка вклÑ?Ñ?аеÑ? в Ñ?ебÑ? Ñ?ледÑ?Ñ?Ñ?ие иÑ?пÑ?авлениÑ?:
+  не добавлÑ?Ñ?Ñ? какие-либо байÑ?Ñ? во вÑ?одной бÑ?Ñ?еÑ? в Ñ?оде ожидании клиенÑ?а Ñ? Ñ?елÑ?Ñ?
+  повÑ?оÑ?ного Ñ?оглаÑ?ованиÑ?. ЭÑ?о иÑ?пÑ?авлÑ?еÑ? поÑ?енÑ?иалÑ?нÑ?й оÑ?каз в обÑ?лÑ?живании
+[<a href="https://trac.torproject.org/projects/tor/ticket/5934";>tor-5934</a>,
 <a href="https://trac.torproject.org/projects/tor/ticket/6007";>tor-6007</a>].
 </p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 0.2.2.39-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.2.2.39-1.</p>
 
- -<p>For the unstable distribution, these problems have been fixed in version
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 0.2.3.22-rc-1.</p>
 
- -<p>We recommend that you upgrade your tor packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? tor.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX4n3EAAoJEF7nbuICFtKlBFAP/AveIv2aUhtr8qB2aeQjmaBe
LUbvfMw/+e2vcITXP3unuS3H8H3NiHse5VSKQsLyw8KDigj00iP7V75gRUdrK811
2tPukdC2wOAcKp3gS0OnI4pgTyBnSTdhrxEQe2k5VSPOB8EnwtZepjtmW/ANXBHX
kziqzmF5/pM6y32A4Y4Z8BJJ0vr6jd/CqWeflyQhSLqdS5ChoVib77qwdklbpgHa
kA43g9+wDLlvtJ6ds/mXdlaGoanpJjDkbFVUZmkfOrUh685mYcvlf3oN/CDpBGqi
lybHHoFLovGl0bcK82fYiMYGQXJVc+Y2vQXyvhHSG3vi18YBhWgFEbCCngW5/VUd
XO7H4oNGiZ9Xju/QAA6GSpsFL8uc7qkxoyzoHaJRsq1Vl5GqMbAGqBfnW+S2B1Hr
/IHdh2Mbc5OhX/NMPqO6FoxBoSdYyMDcFwmHN7pki6ksaSlcS6quod8aVVIlSTLx
rKWLqXp7wEMdiW6sq5ePse1yJDHXqWTSR3SK4txdTtjs6BJMA3V2gUND0qkTnux/
S3mR355eX1Rxh9yRzjtAmcw9yOKRjM3vqWdDLq23y9VLOXS6+fpomP7HhHP81o9d
5daLlJHlQSbhc+E9r24v5q3JIH9y6KDvAsAxp/U5L5JXyCW8J00DO5m4JcaGTEX7
WRVajrqtZecgoGDUusOY
=EH7y
-----END PGP SIGNATURE-----


Reply to: