[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-24{35,00}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2400.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2400.wml	2016-09-21 18:00:02.597572231 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Iceweasel, a web browser
- -based on Firefox. The included XULRunner library provides rendering
- -services for several other applications included in Debian.</p>
+<p>Ð? Iceweasel, веб-бÑ?аÑ?зеÑ?е на оÑ?нове Firefox, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. СодеÑ?жаÑ?аÑ?Ñ?Ñ? в пакеÑ?е библиоÑ?ека XULRunner пÑ?едоÑ?Ñ?авлÑ?еÑ? возможноÑ?Ñ?и
+оÑ?Ñ?иÑ?овки длÑ? неÑ?колÑ?киÑ? дÑ?Ñ?гиÑ? пÑ?иложений из Debian.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3670";>CVE-2011-3670</a>
 
- -   <p>Gregory Fleischer discovered that IPv6 URLs were incorrectly parsed,
- -   resulting in potential information disclosure.</p></li>
+   <p>Ð?Ñ?егоÑ?и ФлÑ?йÑ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? URL IPv6 вÑ?полнÑ?еÑ?Ñ?Ñ? непÑ?авилÑ?но,
+   Ñ?Ñ?о пÑ?иводиÑ? к поÑ?енÑ?иалÑ?номÑ? Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0442";>CVE-2012-0442</a>
 
- -   <p>Jesse Ruderman and Bob Clary discovered memory corruption bugs, which
- -   may lead to the execution of arbitrary code.</p></li>
+   <p>Ð?жеÑ?Ñ? РадеÑ?ман и Ð?об Ð?лÑ?Ñ?и обнаÑ?Ñ?жили оÑ?ибки Ñ? повÑ?еждением Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е
+   могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0444";>CVE-2012-0444</a>
 
- -   <p><q>regenrecht</q> discovered that missing input sanitising in the Ogg Vorbis
- -   parser may lead to the execution of arbitrary code.</p></li>
+   <p><q>regenrecht</q> обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого
+   Ñ?азбоÑ?а Ogg Vorbis можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0449";>CVE-2012-0449</a>
 
- -   <p>Nicolas Gregoire and Aki Helin discovered that missing input
- -   sanitising in XSLT processing may lead to the execution of arbitrary
- -   code.</p></li>
+   <p>Ð?иколаÑ? Ð?Ñ?егоÑ?и и Ð?ки Хелин обнаÑ?Ñ?жили, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ?
+   даннÑ?Ñ? в коде обÑ?абоÑ?ки XSLT можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного
+   кода.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.9.0.19-13 of the xulrunner source package.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.9.0.19-13 пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом xulrunner.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 3.5.16-12.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.5.16-12.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 10.0-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 10.0-1.</p>
 
- -<p>We recommend that you upgrade your iceweasel packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceweasel.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2435.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2435.wml	2016-09-21 17:55:00.032371375 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been identified in Gnash, the GNU Flash
- -player.</p>
+<p>Ð? Gnash, пÑ?оигÑ?Ñ?ваÑ?еле Flash оÑ? GNU, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1175";>CVE-2012-1175</a>
 
- -  <p>Tielei Wang from Georgia Tech Information Security Center discovered a
- -  vulnerability in GNU Gnash which is caused due to an integer overflow
- -  error and can be exploited to cause a heap-based buffer overflow by
- -  tricking a user into opening a specially crafted SWF file.</p></li>
+  <p>ТелÑ?й Ð?ан из Georgia Tech Information Security Center обнаÑ?Ñ?жил
+  Ñ?Ñ?звимоÑ?Ñ?Ñ? в GNU Gnash, коÑ?оÑ?аÑ? возникаеÑ? из-за пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел
+  и можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? вÑ?зова пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и пÑ?и Ñ?Ñ?ловии, Ñ?Ñ?о
+  полÑ?зоваÑ?елÑ? оÑ?кÑ?Ñ?ваеÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й SWF-Ñ?айл.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-4328";>CVE-2011-4328</a>
 
- -  <p>Alexander Kurtz discovered an unsafe management of HTTP cookies. Cookie
- -  files are stored under /tmp and have predictable names, and the vulnerability
- -  allows a local attacker to overwrite arbitrary files the users has
- -  write permissions for, and are also world-readable which may cause
- -  information leak.</p></li>
+  <p>Ð?лекÑ?андеÑ? Ð?Ñ?Ñ?Ñ? обнаÑ?Ñ?жил небезопаÑ?нÑ?Ñ? Ñ?абоÑ?Ñ? Ñ? HTTP-кÑ?ки. ФайлÑ?
+  кÑ?ки Ñ?оÑ?Ñ?анÑ?Ñ?Ñ?Ñ?Ñ? в /tmp и имеÑ?Ñ? пÑ?едÑ?казÑ?емÑ?е имена, Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+  позволÑ?еÑ? локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? пеÑ?езапиÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ?, к коÑ?оÑ?Ñ?м полÑ?зоваÑ?елÑ?
+  имееÑ? доÑ?Ñ?Ñ?п Ñ? пÑ?авами на запиÑ?Ñ?, Ñ?акже Ñ?айлÑ? кÑ?ки оÑ?кÑ?Ñ?Ñ?Ñ? длÑ? Ñ?Ñ?ениÑ? вÑ?ем полÑ?зоваÑ?елÑ?м,
+  Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-4337";>CVE-2010-4337</a>
 
- -  <p>Jakub Wilk discovered an unsafe management of temporary files during the
- -  build process. Files are stored under /tmp and have predictable names, and the
- -  vulnerability allows a local attacker to overwrite arbitrary files
- -  the users has write permissions for.</p></li>
+  <p>ЯкÑ?б Ð?илк обнаÑ?Ñ?жил небезопаÑ?нÑ?Ñ? Ñ?абоÑ?Ñ? Ñ? вÑ?еменнÑ?ми Ñ?айлами в Ñ?оде
+  пÑ?оÑ?еÑ?Ñ?а Ñ?боÑ?ки. ФайлÑ? Ñ?оÑ?Ñ?анÑ?Ñ?Ñ?Ñ?Ñ? в /tmp и имеÑ?Ñ? пÑ?едÑ?казÑ?емÑ?е имена, Ñ?Ñ?а
+  Ñ?Ñ?звимоÑ?Ñ?Ñ? позволÑ?еÑ? локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? пеÑ?езапиÑ?Ñ?ваÑ?Ñ? пÑ?оизволÑ?нÑ?е
+  Ñ?айлÑ?, к коÑ?оÑ?Ñ?м полÑ?зоваÑ?елÑ? имееÑ? доÑ?Ñ?Ñ?п Ñ? пÑ?авами на запиÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 0.8.8-5+squeeze1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.8.8-5+squeeze1.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 0.8.10-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.8.10-5.</p>
 
- -<p>We recommend that you upgrade your gnash packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? gnash.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=S8gm
-----END PGP SIGNATURE-----


Reply to: