[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2012/dsa-2457.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2012/dsa-2457.wml	2017-11-01 10:11:10.339845257 +0500
+++ russian/security/2012/dsa-2457.wml	2018-02-08 09:01:34.778671062 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been discovered in Iceweasel, a web
- -browser based on Firefox. The included XULRunner library provides
- -rendering services for several other applications included in Debian.</p>
+<p>Ð? Iceweasel, веб-бÑ?аÑ?зеÑ?е на оÑ?нове Firefox, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?одÑ?Ñ?аÑ? в его Ñ?оÑ?Ñ?ав библиоÑ?ека XULRunner пÑ?едоÑ?Ñ?авлÑ?еÑ?
+возможноÑ?Ñ?и оÑ?Ñ?иÑ?овки длÑ? неÑ?колÑ?киÑ? пÑ?иложений, вклÑ?Ñ?Ñ?ннÑ?Ñ? в Debian.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0467";>CVE-2012-0467</a>
 
- -   <p>Bob Clary, Christian Holler, Brian Hackett, Bobby Holley, Gary
- -   Kwong, Hilary Hall, Honza Bambas, Jesse Ruderman, Julian Seward,
- -   and Olli Pettay discovered memory corruption bugs, which may lead
- -   to the execution of arbitrary code.</p></li>
+   <p>Ð?об Ð?лÑ?Ñ?и, Ð?Ñ?иÑ?Ñ?иан ХолеÑ?, Ð?Ñ?айан Ð¥Ñ?кеÑ?, Ð?обби Холи, Ð?Ñ?Ñ?и
+   Ð?вон, ХилаÑ?и Хол, Хонза Ð?амбаÑ?, Ð?жеÑ? РадеÑ?ман, Ð?жÑ?лиан СÑ?Ñ?аÑ?д
+   и Ð?лли Ð?еÑ?ай обнаÑ?Ñ?жили оÑ?ибки, Ñ?вÑ?заннÑ?е Ñ? повÑ?еждением Ñ?одеÑ?жимого памÑ?Ñ?и, коÑ?оÑ?Ñ?е
+   могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0470";>CVE-2012-0470</a>
 
- -   <p>Atte Kettunen discovered that a memory corruption bug in
- -   gfxImageSurface may lead to the execution of arbitrary code.</p></li>
+   <p>Ð?Ñ?Ñ?е Ð?еÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?ибки, Ñ?вÑ?заннÑ?е Ñ? повÑ?еждением Ñ?одеÑ?жимого памÑ?Ñ?и
+   в gfxImageSurface могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0471";>CVE-2012-0471</a>
 
- -   <p>Anne van Kesteren discovered that incorrect multibyte character
- -   encoding may lead to cross-site scripting.</p></li>
+   <p>Ð?нне ван Ð?еÑ?Ñ?еÑ?ен обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?ное кодиÑ?ование многобайÑ?овÑ?Ñ?
+   Ñ?имволов можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0477";>CVE-2012-0477</a>
 
- -   <p>Masato Kinugawa discovered that incorrect encoding of
- -   Korean and Chinese character sets may lead to cross-site scripting.</p></li>
+   <p>Ð?аÑ?аÑ?о Ð?инÑ?гава обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?ное кодиÑ?ование коÑ?ейÑ?кого и киÑ?айÑ?кого
+   набоÑ?ов Ñ?имволов можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-0479";>CVE-2012-0479</a>
 
- -   <p>Jeroen van der Gun discovered a spoofing vulnerability in the
- -   presentation of Atom and RSS feeds over HTTPS.</p></li>
+   <p>Ð?еÑ?Ñ?н ван деÑ? Ð?Ñ?н обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки адÑ?еÑ?ной Ñ?Ñ?Ñ?оки в
+   пÑ?едÑ?Ñ?авлении ленÑ? Atom и RSS Ñ?еÑ?ез HTTPS.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 3.5.16-15.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 3.5.16-15.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 10.0.4esr-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 10.0.4esr-1.</p>
 
- -<p>For the experimental distribution, this problem will be fixed soon.</p>
+<p>Ð? Ñ?кÑ?пеÑ?именÑ?алÑ?ном вÑ?пÑ?Ñ?ке Ñ?Ñ?а пÑ?облема бÑ?деÑ? иÑ?пÑ?авлена позже.</p>
 
 
 <p>We recommend that you upgrade your iceweasel packages.</p>
-----BEGIN PGP SIGNATURE-----
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=l+8q
-----END PGP SIGNATURE-----


Reply to: