[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2011/dsa-2301.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2301.wml	2017-11-01 10:11:10.275841084 +0500
+++ russian/security/2011/dsa-2301.wml	2018-02-21 17:13:28.443654698 +0500
@@ -1,50 +1,51 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Rails, the Ruby web
- -application framework. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? Rails, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е веб-пÑ?иложений на Ñ?зÑ?ке Ruby, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4214";>CVE-2009-4214</a>
 
- -    <p>A cross-site scripting (XSS) vulnerability had been found in the
- -    strip_tags function. An attacker may inject non-printable characters
- -    that certain browsers will then evaluate. This vulnerability only
- -    affects the oldstable distribution (lenny).</p></li>
+    <p>Ð?бнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в Ñ?Ñ?нкÑ?ии
+    strip_tags. Ð?лоÑ?мÑ?Ñ?ленник можеÑ? ввеÑ?Ñ?и непеÑ?аÑ?нÑ?е Ñ?имволÑ?,
+    коÑ?оÑ?Ñ?е бÑ?дÑ?Ñ? обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? некоÑ?оÑ?Ñ?ми бÑ?аÑ?зеÑ?ами. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ?
+    Ñ?олÑ?ко пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (lenny).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2930";>CVE-2011-2930</a>
 
- -    <p>A SQL injection vulnerability had been found in the quote_table_name
- -    method that could allow malicious users to inject arbitrary SQL into a
- -    query.</p></li>
+    <p>Ð?Ñ?ла обнаÑ?Ñ?жена SQL-инÑ?екÑ?иÑ? в меÑ?оде quote_table_name,
+    позволÑ?Ñ?Ñ?аÑ? злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? SQL в
+    запÑ?оÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2931";>CVE-2011-2931</a>
 
- -    <p>A cross-site scripting (XSS) vulnerability had been found in the
- -    strip_tags  helper. An parsing error can be exploited by an attacker,
- -    who can confuse the parser and may inject HTML tags into the output
- -    document.</p></li>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) во вÑ?помогаÑ?елÑ?ной Ñ?Ñ?нкÑ?ии
+    strip_tags. Ð?Ñ?ибка гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленником,
+    коÑ?оÑ?Ñ?й можеÑ? вÑ?зваÑ?Ñ? непÑ?авилÑ?нÑ?Ñ? Ñ?абоÑ?Ñ? Ñ?инÑ?акÑ?иÑ?еÑ?кого анализаÑ?оÑ?а и ввеÑ?Ñ?и
+    Ñ?еги HTML в Ñ?езÑ?лÑ?Ñ?иÑ?Ñ?Ñ?Ñ?ий докÑ?менÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3186";>CVE-2011-3186</a>
 
- -    <p>A newline (CRLF) injection vulnerability had been found in
- -    response.rb. This vulnerability allows an attacker to inject arbitrary
- -    HTTP headers and conduct HTTP response splitting attacks via the
- -    Content-Type header.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено введение новой Ñ?Ñ?Ñ?оки (CRLF) в
+    response.rb. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ? вводиÑ?Ñ? пÑ?оизволÑ?нÑ?е
+    заголовки HTTP и вÑ?полнÑ?Ñ?Ñ? аÑ?аки по Ñ?азделениÑ? HTTP-оÑ?веÑ?ов Ñ? помоÑ?Ñ?Ñ?
+    заголовка Content-Type.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 2.1.0-7+lenny2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.1.0-7+lenny2.</p>
 
- -<p>For the stable distribution (squeeze), this problem has been fixed in
- -version 2.3.5-1.2+squeeze2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.3.5-1.2+squeeze2.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 2.3.14.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.3.14.</p>
 
- -<p>We recommend that you upgrade your rails packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? rails.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=rkov
-----END PGP SIGNATURE-----


Reply to: