[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1691.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1691.wml	2017-11-01 10:11:09.939819175 +0500
+++ russian/security/2008/dsa-1691.wml	2018-02-20 14:01:09.553731541 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several remote vulnerabilities have been discovered in Moodle, an online
- -course management system. The following issues are addressed in this
- -update, ranging from cross site scripting to remote code execution.</p>
+<p>Ð? Moodle, Ñ?иÑ?Ñ?еме онлайн Ñ?пÑ?авлениÑ? кÑ?Ñ?Ñ?ами, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð? данном обновлении бÑ?ли иÑ?пÑ?авленÑ? пÑ?облемÑ?,
+наÑ?инаÑ? оÑ? межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга и заканÑ?иваÑ? Ñ?далÑ?ннÑ?м вÑ?полнением кода.</p>
 
- -<p>Various cross site scripting issues in the Moodle codebase
+<p>РазлиÑ?нÑ?е Ñ?лÑ?Ñ?аи межÑ?айÑ?ового Ñ?кÑ?ипÑ?инга в кодовой базе Moodle
 (<a href="https://security-tracker.debian.org/tracker/CVE-2008-3326";>CVE-2008-3326</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2008-3325";>CVE-2008-3325</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2007-3555";>CVE-2007-3555</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2008-5432";>CVE-2008-5432</a>,
 MSA-08-0021, MDL-8849, MDL-12793, MDL-11414, MDL-14806,
 MDL-10276).</p>
 
- -<p>Various cross site request forgery issues in the Moodle codebase
+<p>РазлиÑ?нÑ?е Ñ?лÑ?Ñ?аи подделки межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов в кодовой базе Moodle
 (<a href="https://security-tracker.debian.org/tracker/CVE-2008-3325";>CVE-2008-3325</a>, MSA-08-0023).</p>
 
- -<p>Privilege escalation bugs in the Moodle codebase (MSA-08-0001, MDL-7755).</p>
+<p>Ð?овÑ?Ñ?ение пÑ?ивилегий в кодовой базе Moodle (MSA-08-0001, MDL-7755).</p>
 
- -<p>SQL injection issue in the hotpot module (MSA-08-0010).</p>
+<p>SQL-инÑ?екÑ?иÑ? в модÑ?ле hotpot (MSA-08-0010).</p>
 
- -<p>An embedded copy of Smarty had several vulnerabilities
+<p>Ð?Ñ?Ñ?Ñ?оеннаÑ? копиÑ? Smarty Ñ?одеÑ?жиÑ? неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей
 (<a href="https://security-tracker.debian.org/tracker/CVE-2008-4811";>CVE-2008-4811</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2008-4810";>CVE-2008-4810</a>).
- -An embedded copy of Snoopy was vulnerable to cross site scripting
+Ð?Ñ?Ñ?Ñ?оеннаÑ? копиÑ? Snoopy Ñ?Ñ?звима к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?
 (<a href="https://security-tracker.debian.org/tracker/CVE-2008-4796";>CVE-2008-4796</a>).
- -An embedded copy of Kses was vulnerable to cross site scripting
+Ð?Ñ?Ñ?Ñ?оеннаÑ? копиÑ? Kses Ñ?Ñ?звима к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?
 (<a href="https://security-tracker.debian.org/tracker/CVE-2008-1502";>CVE-2008-1502</a>).</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.6.3-2+etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.6.3-2+etch1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.8.2.dfsg-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.8.2.dfsg-2.</p>
 
- -<p>We recommend that you upgrade your moodle (1.6.3-2+etch1) package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? moodle (1.6.3-2+etch1).</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=e+zb
-----END PGP SIGNATURE-----


Reply to: