[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2012/dsa-2{464,533}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2464.wml	2014-04-30 13:16:28.000000000 +0600
+++ russian/security/2012/dsa-2464.wml	2016-11-06 16:09:33.974805994 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been discovered in Icedove, an unbranded
- -version of the Thunderbird mail/news client.</p>
+<p>Ð? Icedove, безбÑ?ендовой веÑ?Ñ?ии поÑ?Ñ?ового клиенÑ?а и пÑ?огÑ?аммÑ? Ñ?Ñ?ениÑ? новоÑ?Ñ?ей
+Thunderbird, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0467";>CVE-2012-0467</a>
 
- -   <p>Bob Clary, Christian Holler, Brian Hackett, Bobby Holley, Gary
- -   Kwong, Hilary Hall, Honza Bambas, Jesse Ruderman, Julian Seward,
- -   and Olli Pettay discovered memory corruption bugs, which may lead
- -   to the execution of arbitrary code.</p></li>
+   <p>Ð?об Ð?лÑ?Ñ?и, Ð?Ñ?иÑ?Ñ?оÑ?еÑ? ХоллеÑ?, Ð?Ñ?айан Ð¥Ñ?ккеÑ?, Ð?обби ХоÑ?ли, Ð?Ñ?Ñ?и
+   Ð?вон, ХилаÑ?и Холл, Хонза Ð?амбаÑ?, Ð?жеÑ?Ñ? РÑ?деÑ?ман, Ð?жÑ?лиан СÑ?ваÑ?д
+   и Ð?лли Ð?еÑ?Ñ?ай обнаÑ?Ñ?жили оÑ?ибки Ñ? повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ?
+   к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0470";>CVE-2012-0470</a>
 
- -   <p>Atte Kettunen discovered that a memory corruption bug in
- -   gfxImageSurface may lead to the execution of arbitrary code.</p></li>
+   <p>Ð?Ñ?Ñ?е Ð?еÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?ибка Ñ? повÑ?еждением Ñ?одеÑ?жимого памÑ?Ñ?и в
+   gfxImageSurface можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0471";>CVE-2012-0471</a>
 
- -   <p>Anne van Kesteren discovered that incorrect multibyte character
- -   encoding may lead to cross-site scripting.</p></li>
+   <p>Ð?нне ван Ð?еÑ?Ñ?еÑ?ен обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?Ñ?екÑ?ное многобайÑ?овое кодиÑ?ование
+   можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0477";>CVE-2012-0477</a>
 
- -   <p>Masato Kinugawa discovered that incorrect encoding of
- -   Korean and Chinese character sets may lead to cross-site scripting.</p></li>
+   <p>Ð?аÑ?аÑ?о Ð?ингава обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?Ñ?екÑ?ное кодиÑ?ование
+   коÑ?ейÑ?киÑ? и киÑ?айÑ?киÑ? набоÑ?ов Ñ?имволов можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0479";>CVE-2012-0479</a>
 
- -   <p>Jeroen van der Gun discovered a spoofing vulnerability in the
- -   presentation of Atom and RSS feeds over HTTPS.</p></li>
+   <p>Ð?еÑ?Ñ?н ван деÑ? Ð?Ñ?н обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделÑ?ваниÑ? в пÑ?едÑ?Ñ?авлении
+   новоÑ?Ñ?нÑ?Ñ? ленÑ? Atom и RSS Ñ?еÑ?ез HTTPS.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 3.0.11-1+squeeze10.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.0.11-1+squeeze10.</p>
 
- -<p>For the unstable distribution (sid), this problem will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2012/dsa-2533.wml	2014-04-30 13:16:29.000000000 +0600
+++ russian/security/2012/dsa-2533.wml	2016-11-06 16:19:40.383236758 +0500
@@ -1,46 +1,47 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that Performance Co-Pilot (pcp), a framework for
- -performance monitoring, contains several vulnerabilities.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Performance Co-Pilot (pcp), инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?а длÑ?
+оÑ?Ñ?леживаниÑ? пÑ?оизводиÑ?елÑ?ноÑ?Ñ?и, Ñ?одеÑ?жиÑ? неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3418";>CVE-2012-3418</a>
 
- -	<p>Multiple buffer overflows in the PCP protocol decoders can
- -	cause PCP clients and servers to crash or, potentially,
- -	execute arbitrary code while processing crafted PDUs.</p></li>
+	<p>Ð?ногоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в декодеÑ?аÑ? пÑ?оÑ?окола PCP могÑ?Ñ?
+	вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?е оÑ?Ñ?ановки в клиенÑ?аÑ? и Ñ?еÑ?веÑ?аÑ? PCP или поÑ?енÑ?иалÑ?но пÑ?иводиÑ?Ñ?
+	к вÑ?полнениÑ? пÑ?оизволÑ?ного кода в Ñ?оде обÑ?абоÑ?ки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? PDU.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3419";>CVE-2012-3419</a>
 
- -	<p>The <q>linux</q> PMDA used by the pmcd daemon discloses sensitive
- -	information from the /proc file system to unauthenticated
- -	clients.</p></li>
+	<p>PMDA <q>linux</q>, иÑ?полÑ?зÑ?емÑ?й Ñ?лÑ?жбой pmcd Ñ?аÑ?кÑ?Ñ?ваеÑ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ?
+	инÑ?оÑ?маÑ?иÑ? из Ñ?айловой Ñ?иÑ?Ñ?емÑ? /proc неаÑ?Ñ?енÑ?иÑ?иÑ?иÑ?оÑ?ваннÑ?м
+	клиенÑ?ам.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3420";>CVE-2012-3420</a>
 
- -	<p>Multiple memory leaks processing crafted requests can cause
- -	pmcd to consume large amounts of memory and eventually crash.</p></li>
+	<p>Ð?ногоÑ?иÑ?леннÑ?е Ñ?Ñ?еÑ?ки памÑ?Ñ?и пÑ?и обÑ?абоÑ?ке Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? запÑ?оÑ?ов могÑ?Ñ?
+	пÑ?иводиÑ?Ñ? к Ñ?омÑ?, Ñ?Ñ?о pmcd поÑ?Ñ?еблÑ?еÑ? болÑ?Ñ?ие обÑ?Ñ?мÑ? памÑ?Ñ?и и аваÑ?ийно завеÑ?Ñ?аеÑ? Ñ?воÑ? Ñ?абоÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-3421";>CVE-2012-3421</a>
 
- -	<p>Incorrect event-driven programming allows malicious clients to
- -	prevent other clients from accessing the pmcd daemon.</p></li>
+	<p>Ð?екоÑ?Ñ?екÑ?ное Ñ?обÑ?Ñ?ийно-оÑ?иенÑ?иÑ?ованное пÑ?огÑ?аммиÑ?ование позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам
+	меÑ?аÑ?Ñ? дÑ?Ñ?гим клиенÑ?ам полÑ?Ñ?аÑ?Ñ? доÑ?Ñ?Ñ?п к Ñ?лÑ?жбе pmcd.</p></li>
 
 </ul>
 
- -<p>To address the information disclosure vulnerability, 
- -<a href="https://security-tracker.debian.org/tracker/CVE-2012-3419";>CVE-2012-3419</a>, a
- -new <q>proc</q> PMDA was introduced, which is disabled by default.  If you
- -need access to this information, you need to enable the <q>proc</q> PMDA.</p>
+<p>ЧÑ?обÑ? иÑ?пÑ?авиÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?, Ñ?оÑ?Ñ?оÑ?Ñ?Ñ?Ñ? в Ñ?аÑ?кÑ?Ñ?Ñ?ии инÑ?оÑ?маÑ?ии,
+<a href="https://security-tracker.debian.org/tracker/CVE-2012-3419";>CVE-2012-3419</a>,
+бÑ?л добавлен новÑ?й PMDA длÑ? <q>proc</q>, коÑ?оÑ?Ñ?й по Ñ?молÑ?аниÑ? оÑ?клÑ?Ñ?ен. Ð?Ñ?ли вам
+Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ? доÑ?Ñ?Ñ?п к Ñ?Ñ?ой инÑ?оÑ?маÑ?ии, Ñ?о вам Ñ?ледÑ?еÑ? вклÑ?Ñ?иÑ?Ñ? PMDA длÑ? <q>proc</q>.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 3.3.3-squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.3.3-squeeze2.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 3.6.5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.6.5.</p>
 
- -<p>We recommend that you upgrade your pcp packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? pcp.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJYHxHQAAoJEF7nbuICFtKlldsP/1A+m4XJ1d3hJ6o41jaiCOUk
U5J+4AVWTuoAerXshrykxQuScccQOKstsvWLjiXA8ATQxqzta2rZfJPvH6ew6WAr
FUPDPg6nWgD0ifWtg+fJBKiNCrAOEpBqivdkNsyuH2Ho3MdydI834UqKEbHzkrQZ
QpOPQfaQmj9WjklkVQWPuLaqh9maUXBm6udsDePvn0QlLlDrv+4Q4yTi0Qg2oEgQ
bnY0JsFd5ApenWJb/vh5xjiGq5NJVKINSU9sje7AKY0lKRGxnWWLtN2cWaFS5yag
7K68sNLwGHfCrc6xmyhFOdml5VvRCThdgD/5eocNH3NOXfB12Wp04zssuVYBpoRc
9HWER9KXsbBmcClYRoNUWPUwSWO/5WVB1qgc1aCOwPEhJNYJZR0+oSi/PHqGA3Fq
xJRZ0BfEHPQo5hD+lQpQRl5lOGaTg3T6SYVfB4oGJpOQEaz71e/1iL0dpV5A7Tgv
rooGkEbAoMId/Bgv0K4HwF60DWjpTrQxiu/XAWoxa/RhR2xJmL0bIqTJycB07fUV
90yuzxuStWpmG/DTT17SzqBpZyEOdaZy4/bg3CPTZm92j6e9slU1vedLaHUwo4x1
ys0wP8cfS0q/rE5k87SSl1H3fl3nutF2qBVyIp8/wTH2MLBjshb3NJfsb9k9Movm
SIGl6oYhVII4YfIRgf3M
=Nz3s
-----END PGP SIGNATURE-----


Reply to: