[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{406,563}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2406.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2406.wml	2016-09-21 17:39:12.402304341 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Icedove, Debian's
- -variant of the Mozilla Thunderbird code base.</p>
+<p>Ð? Icedove, ваÑ?ианÑ?е кодовой базÑ? Mozilla Thunderbird длÑ? Debian, бÑ?ло
+обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3670";>CVE-2011-3670</a>
 
- -    <p>Icedove does not not properly enforce the IPv6 literal address
- -    syntax, which allows remote attackers to obtain sensitive
- -    information by making XMLHttpRequest calls through a proxy and
- -    reading the error messages.</p></li>
+    <p>Icedove непÑ?авилÑ?но пÑ?овеÑ?Ñ?еÑ? Ñ?инÑ?акÑ?иÑ? лиÑ?еÑ?алÑ?ного адÑ?еÑ?а IPv6,
+    Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам полÑ?Ñ?аÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ?
+    инÑ?оÑ?маÑ?иÑ?, вÑ?полнÑ?Ñ? вÑ?зовÑ? XMLHttpRequest Ñ?еÑ?ез пÑ?окÑ?и и
+    Ñ?Ñ?иÑ?Ñ?ваÑ? Ñ?ообÑ?ениÑ? об оÑ?ибкаÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0442";>CVE-2012-0442</a>
 
- -    <p>Memory corruption bugs could cause Icedove to crash or
- -    possibly execute arbitrary code.</p></li>
+    <p>Ð?Ñ?ибки Ñ? повÑ?еждением Ñ?одеÑ?жимого памÑ?Ñ?и пÑ?иводÑ?Ñ? к аваÑ?ийнÑ?м оÑ?Ñ?ановкам Icedove
+    или возможномÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0444";>CVE-2012-0444</a>
 
- -    <p>Icedove does not properly initialize nsChildView data
- -    structures, which allows remote attackers to cause a denial of
- -    service (memory corruption and application crash) or possibly
- -    execute arbitrary code via a crafted Ogg Vorbis file.</p></li>
+    <p>Icedove непÑ?авилÑ?но иниÑ?иализиÑ?Ñ?еÑ? Ñ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?Ñ? даннÑ?Ñ? nsChildView,
+    Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в
+    обÑ?лÑ?живании (повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и и аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) или поÑ?енÑ?иалÑ?но
+    вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла в Ñ?оÑ?маÑ?е Ogg Vorbis.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0449";>CVE-2012-0449</a>
 
- -    <p>Icedove allows remote attackers to cause a denial of service
- -    (memory corruption and application crash) or possibly execute
- -    arbitrary code via a malformed XSLT stylesheet that is
- -    embedded in a document.</p></li>
+    <p>Icedove позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+    (повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и и аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?) или поÑ?енÑ?иалÑ?но вÑ?полнÑ?Ñ?Ñ?
+    пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ? некоÑ?Ñ?екÑ?ного Ñ?Ñ?илевого Ñ?айла XSLT, вÑ?Ñ?Ñ?оенного в
+    докÑ?менÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 3.0.11-1+squeeze7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.0.11-1+squeeze7.</p>
 
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2563.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2563.wml	2016-09-21 17:45:04.489295433 +0500
@@ -1,45 +1,46 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were found in ViewVC, a web interface for CVS
- -and Subversion repositories.</p>
+<p>Ð? ViewVC, веб-инÑ?еÑ?Ñ?ейÑ?е длÑ? Ñ?епозиÑ?оÑ?иев CVS и Subversion, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-5024";>CVE-2009-5024</a>
 <p>
- -Remote attackers can bypass the cvsdb row_limit
- -configuration setting, and consequently conduct resource-consumption
- -attacks via the limit parameter.</p></li>
+УдалÑ?ннÑ?е злоÑ?мÑ?Ñ?ленники могÑ?Ñ? обÑ?одиÑ?Ñ? паÑ?амеÑ?Ñ? наÑ?Ñ?Ñ?ойки cvsdb row_limit
+и, Ñ?ледоваÑ?елÑ?но, вÑ?полнÑ?Ñ?Ñ? аÑ?аки по Ñ?Ñ?езмеÑ?номÑ? поÑ?Ñ?еблениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов
+Ñ? помоÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?а limit.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3356";>CVE-2012-3356</a>
 <p>
- -The remote Subversion views functionality does not properly
- -perform authorization, which allows remote attackers to bypass intended
- -access restrictions.</p></li>
+ФÑ?нкÑ?ионалÑ?ноÑ?Ñ?Ñ? Ñ?далÑ?нного пÑ?оÑ?моÑ?Ñ?а Subversion непÑ?авилÑ?но вÑ?полнÑ?еÑ?
+авÑ?оÑ?изаÑ?иÑ?, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам обÑ?одиÑ?Ñ?
+огÑ?аниÑ?ениÑ? доÑ?Ñ?Ñ?па.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3357";>CVE-2012-3357</a>
 <p>
- -The Subversion revision view does not properly handle log
- -messages when a readable path is copied from an unreadable path, which
- -allows remote attackers to obtain sensitive information.</p></li>
+Ð?Ñ?оÑ?моÑ?Ñ? Ñ?едакÑ?ий Subversion непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?ообÑ?ениÑ?
+жÑ?Ñ?нала в Ñ?лÑ?Ñ?ае, еÑ?ли пÑ?Ñ?Ñ?, оÑ?кÑ?Ñ?Ñ?Ñ?й длÑ? Ñ?Ñ?ениÑ?, копиÑ?Ñ?еÑ?Ñ?Ñ? из пÑ?Ñ?и, закÑ?Ñ?Ñ?ого длÑ? Ñ?Ñ?ениÑ?, Ñ?Ñ?о
+позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам полÑ?Ñ?аÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-4533";>CVE-2012-4533</a>
 <p>
- -<q>function name</q> lines returned by diff are not properly
- -escaped, allowing attackers with commit access to perform cross site
- -scripting.</p></li>
+СÑ?Ñ?оки <q>function name</q>, возвÑ?аÑ?аемÑ?е diff, Ñ?кÑ?аниÑ?Ñ?Ñ?Ñ?Ñ?Ñ?
+непÑ?авилÑ?но, Ñ?Ñ?о позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам Ñ? пÑ?авом коммиÑ?а вÑ?полнÑ?Ñ?Ñ? аÑ?аки
+по пÑ?инÑ?ипÑ? межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 1.1.5-1.1+squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.5-1.1+squeeze2.</p>
 
- -<p>For the testing distribution (wheezy), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.1.5-1.4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.1.5-1.4.</p>
 
- -<p>We recommend that you upgrade your viewvc packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? viewvc.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX4oDUAAoJEF7nbuICFtKlgP0P/3eT9i4FiH3uUFvd4AmYfjjd
6e2yP9eOGWehKn6j9GU3L+WQTVDqFcLWHogm5qSnPZeeXK6rINsIz3kOoDRGrnUj
rBlsWQVkAKD8xyN2lMHEY/pGw2D1Ox8vqMPD9dkotOeepGYuHoPpb4QsxkIl1cKz
fJv3UlqhLlHQsUqnVZeOCoflK9YPnh5TUNwsqKgUtXGzNZ5zigZy1iRHbnRQKhr2
YONgGKJ9+meUk1FE7WHnk5/hyMgDUD9fdg+v7I24AaP/x5zerkDbBLDaTE348o9U
TLtfc9RMrKPjy8SD6otkrkS591Hb6fN+bhvN615IFcBxIxhKCxhmMtrjutUQaX22
9IcJ3HWjcx+/yJrQJ0igi7rPmlGK2hVE/o03iuJoQBPbIePrgiFDIf2uNw2mSSyn
JGb5dcpfQ06GCqP3OKbwTpBYQqBgrhmJYQr6ZonCsfQo7p8mR+pVYgEFm092TBBS
a+zwznXHjfxeDf5mkwo+Q3lWfe4HGifXb3o5jT+C1pHpLrioIDBpcGf4AJi17OUO
PtvGMLbfadc862/R/rk/xjxZRKKoosTb3ecrgoxF7c91EVdAExr0CWwKgWPNHrX9
bAV3INu3Shi5b70lPAWnLhqVDPMNhLyGF6pjNapDWeh6LdbtIrFq8K4UKVaR7QLh
HIkxIq6ll7s2/Gw6+Iff
=4ZNU
-----END PGP SIGNATURE-----


Reply to: