[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-{2130,1999}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-1999.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-1999.wml	2016-09-27 11:10:25.929046187 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Xulrunner, a 
- -runtime environment for XUL applications, such as the Iceweasel web
- -browser. The Common Vulnerabilities and Exposures project identifies 
- -the following problems:</p>
+<p>Ð? Xulrunner, окÑ?Ñ?жении вÑ?емени иÑ?полнениÑ? длÑ? XUL-пÑ?иложений (Ñ?акиÑ? как
+веб-бÑ?аÑ?зеÑ? Iceweasel), бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1571";>CVE-2009-1571</a>
 
- -    <p>Alin Rad Pop discovered that incorrect memory handling in the
- -    HTML parser could lead to the execution of arbitrary code.</p></li>
+    <p>Ð?лин Рад Ð?оп обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? Ñ?абоÑ?а Ñ? памÑ?Ñ?Ñ?Ñ? в
+    коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а HTML можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3988";>CVE-2009-3988</a>
 
- -    <p>Hidetake Jo discovered that the same-origin policy can be
- -    bypassed through window.dialogArguments.</p></li>
+    <p>ХидеÑ?аке Ð?о обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?авило одного иÑ?Ñ?оÑ?ника можно
+    обойÑ?и Ñ? помоÑ?Ñ?Ñ? window.dialogArguments.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0159";>CVE-2010-0159</a>
 
- -    <p>Henri Sivonen, Boris Zbarsky, Zack Weinberg, Bob Clary, Martijn
- -    Wargers and Paul Nickerson reported crashes in layout engine,
- -    which might allow the execution of arbitrary code.</p></li>
+    <p>Ð?енÑ?и Сивонен, Ð?оÑ?иÑ? Ð?баÑ?Ñ?кий, Ð?ак Ð?айнбеÑ?г, Ð?об Ð?лÑ?Ñ?и, Ð?аÑ?Ñ?ийн
+    Ð?аÑ?геÑ?Ñ? и Ð?ол Ð?икеÑ?Ñ?он Ñ?ообÑ?или об аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкаÑ? в движке Ñ?азмеÑ?ки,
+    коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0160";>CVE-2010-0160</a>
 
- -    <p>Orlando Barrera II discovered that incorrect memory handling in the
- -    implementation of the web worker API could lead to the execution
- -    of arbitrary code.</p></li>
+    <p>Ð?Ñ?ландо Ð?аÑ?Ñ?еÑ?а II обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? Ñ?абоÑ?а Ñ? памÑ?Ñ?Ñ?Ñ? в
+    Ñ?еализаÑ?ии API web worker можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+    пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0162";>CVE-2010-0162</a>
 
- -    <p>Georgi Guninski discovered that the same origin policy can be
- -    bypassed through specially crafted SVG documents.</p></li>
+    <p>Ð?еоÑ?гий Ð?анинÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?авило одного иÑ?Ñ?оÑ?ника можно
+    обойÑ?и Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? докÑ?менÑ?ов SVG.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.9.0.18-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.0.18-1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.9.1.8-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.1.8-1.</p>
 
- -<p>We recommend that you upgrade your xulrunner packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xulrunner.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2130.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2130.wml	2016-09-27 11:04:52.449962550 +0500
@@ -1,43 +1,44 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in BIND, an
- -implementation of the DNS protocol suite.  The Common Vulnerabilities
- -and Exposures project identifies the following problems:</p>
+<p>Ð? BIND, Ñ?еализаÑ?ии набоÑ?а пÑ?оÑ?околов DNS, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей.  Ð?Ñ?оекÑ? Common Vulnerabilities
+and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3762";>CVE-2010-3762</a>
- -	<p>When DNSSEC validation is enabled, BIND does not properly
- -	handle certain bad signatures if multiple trust anchors exist
- -	for a single zone, which allows remote attackers to cause a
- -	denial of service (server crash) via a DNS query.</p></li>
+	<p>Ð?Ñ?и оÑ?клÑ?Ñ?ении пÑ?овеÑ?ки DNSSEC BIND непÑ?авилÑ?но
+	обÑ?абаÑ?Ñ?ваеÑ? некоÑ?оÑ?Ñ?е плоÑ?ие подпиÑ?и в Ñ?лÑ?Ñ?ае, еÑ?ли длÑ? одной зонÑ? имеÑ?Ñ?Ñ?Ñ? неÑ?колÑ?ко Ñ?оÑ?ек
+	довеÑ?иÑ?, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ?
+	оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?еÑ?веÑ?а) Ñ? помоÑ?Ñ?Ñ? DNS-запÑ?оÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3614";>CVE-2010-3614</a>
- -	<p>BIND does not properly determine the security status of an NS
- -	RRset during a DNSKEY algorithm rollover, which may lead to
- -	zone unavailability during rollovers.</p></li>
+	<p>BIND непÑ?авилÑ?но опÑ?еделÑ?еÑ? Ñ?Ñ?аÑ?Ñ?Ñ? безопаÑ?ноÑ?Ñ?и NS
+	RRset в Ñ?оде вÑ?боÑ?а алгоÑ?иÑ?ма DNSKEY, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+	недоÑ?Ñ?Ñ?пноÑ?Ñ?и зонÑ? во вÑ?емÑ? вÑ?делениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-3613";>CVE-2010-3613</a>
- -	<p>BIND does not properly handle the combination of signed
- -	negative responses and corresponding RRSIG records in the
- -	cache, which allows remote attackers to cause a denial of
- -	service (server crash) via a query for cached data.</p></li>
+	<p>BIND непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? комбинаÑ?иÑ? подпиÑ?аннÑ?Ñ? оÑ?Ñ?иÑ?аÑ?елÑ?нÑ?Ñ?
+	запÑ?оÑ?ов и Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ? запиÑ?ей RRSIG в
+	кеÑ?е, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зÑ?ваÑ?Ñ? оÑ?каз в
+	обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?еÑ?веÑ?а) Ñ? помоÑ?Ñ?Ñ? запÑ?оÑ?а кеÑ?иÑ?ованнÑ?Ñ? даннÑ?Ñ?.</p></li>
 
 </ul>
 
- -<p>In addition, this security update improves compatibility with
- -previously installed versions of the bind9 package.  As a result, it
- -is necessary to initiate the update with "apt-get dist-upgrade"
- -instead of "apt-get update".</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление безопаÑ?ноÑ?Ñ?и Ñ?лÑ?Ñ?Ñ?аеÑ? Ñ?овмеÑ?Ñ?имоÑ?Ñ?Ñ? Ñ?
+Ñ?анее Ñ?Ñ?Ñ?ановленнÑ?ми веÑ?Ñ?иÑ?ми пакеÑ?а bind9.  Ð? Ñ?езÑ?лÑ?Ñ?аÑ?е Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ?
+запÑ?Ñ?Ñ?иÑ?Ñ? обновление Ñ? помоÑ?Ñ?Ñ? командÑ? "apt-get dist-upgrade",
+а не Ñ? помоÑ?Ñ?Ñ? командÑ? "apt-get update".</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1:9.6.ESV.R3+dfsg-0+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1:9.6.ESV.R3+dfsg-0+lenny1.</p>
 
- -<p>For the upcoming stable distribution (squeeze) and the unstable
- -distribution (sid), these problems have been fixed in version
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (squeeze) и неÑ?Ñ?абилÑ?ном (sid)
+вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 1:9.7.2.dfsg.P3-1.</p>
 
- -<p>We recommend that you upgrade your bind9 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? bind9.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=0B5s
-----END PGP SIGNATURE-----


Reply to: