[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2011/dsa-2313.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2313.wml	2017-11-01 10:11:10.283841606 +0500
+++ russian/security/2011/dsa-2313.wml	2018-03-01 14:58:41.684203169 +0500
@@ -1,54 +1,55 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities have been found in Iceweasel, a web browser
- -based on Firefox:</p>
+<p>Ð? Iceweasel, веб-бÑ?аÑ?зеÑ?е на оÑ?нове Firefox, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2372";>CVE-2011-2372</a>
 
- -   <p>Mariusz Mlynski discovered that websites could open a download
- -   dialog â?? which has <q>open</q> as the default action â??, while a user
- -   presses the ENTER key.</p></li>
+   <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о веб-Ñ?айÑ?Ñ? могÑ?Ñ? оÑ?кÑ?Ñ?ваÑ?Ñ? диалог загÑ?Ñ?зки,
+   в коÑ?оÑ?ом дейÑ?Ñ?вием по Ñ?молÑ?аниÑ? Ñ?влÑ?еÑ?Ñ?Ñ? <q>оÑ?кÑ?Ñ?Ñ?Ñ?</q>, когда полÑ?зоваÑ?елÑ?
+   нажимаеÑ? клавиÑ?Ñ? ENTER.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2995";>CVE-2011-2995</a>
 
- -   <p>Benjamin Smedberg, Bob Clary and Jesse Ruderman discovered crashes
- -   in the rendering engine, which could lead to the execution of
- -   arbitrary code.</p></li>
+   <p>Ð?енджамин СмедбеÑ?г, Ð?об Ð?лÑ?Ñ?и и Ð?жеÑ?Ñ? РадеÑ?ман обнаÑ?Ñ?жили Ñ?лÑ?Ñ?аи аваÑ?ийной
+   оÑ?Ñ?ановки в движке оÑ?Ñ?иÑ?овки, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ?
+   пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2998";>CVE-2011-2998</a>
 
- -   <p>Mark Kaplan discovered an integer underflow in the JavaScript
- -   engine, which could lead to the execution of arbitrary code.</p></li>
+   <p>Ð?аÑ?к Ð?аплан обнаÑ?Ñ?жил оÑ?Ñ?иÑ?аÑ?елÑ?ное пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ле в движке
+   JavaScript, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2999";>CVE-2011-2999</a>
 
- -   <p>Boris Zbarsky discovered that incorrect handling of the
- -   window.location object could lead to bypasses of the same-origin
- -   policy.</p></li>
+   <p>Ð?оÑ?иÑ? Ð?баÑ?Ñ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка обÑ?екÑ?а
+   window.location можеÑ? пÑ?иводиÑ?Ñ? к обÑ?одÑ? пÑ?авила одного
+   иÑ?Ñ?оÑ?ника.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3000";>CVE-2011-3000</a>
 
- -   <p>Ian Graham discovered that multiple Location headers might lead to
- -   CRLF injection.</p></li>
+   <p>Ð?Ñ?н Ð?Ñ?Ñ?Ñ?Ñ?м обнаÑ?Ñ?жил, Ñ?Ñ?о множеÑ?Ñ?веннÑ?е заголовки Location могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+   CRLF-инÑ?екÑ?ии.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.9.0.19-14 of the xulrunner source package. This update also
- -marks the compromised DigiNotar root certs as revoked rather then
- -untrusted.</p>
- -
- -<p>For the stable distribution (squeeze), this problem has been fixed
- -in version 3.5.16-10. This update also marks the compromised DigiNotar
- -root certs as revoked rather then untrusted.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.9.0.19-14 пакеÑ?а Ñ? иÑ?Ñ?однÑ?м кодом xulrunner. Ð?Ñ?оме Ñ?ого, в данном
+обновлении коÑ?невÑ?е Ñ?еÑ?Ñ?иÑ?икаÑ?Ñ? DigiNotar бÑ?ли оÑ?меÑ?енÑ? как оÑ?озваннÑ?е,
+а не как недовеÑ?еннÑ?е.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 3.5.16-10. Ð?Ñ?оме Ñ?ого, в данном обновлении Ñ?компÑ?омеÑ?иÑ?ованнÑ?е
+коÑ?невÑ?е Ñ?еÑ?Ñ?иÑ?икаÑ?Ñ? DigiNotar бÑ?ли оÑ?меÑ?енÑ? как оÑ?озваннÑ?е, а не как недовеÑ?еннÑ?е.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 7.0-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 7.0-1.</p>
 
- -<p>We recommend that you upgrade your iceweasel packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceweasel.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=1uJt
-----END PGP SIGNATURE-----


Reply to: