[DONE] wml://{security/2009/dsa-1956.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2009/dsa-1956.wml 2017-11-01 10:11:10.111830390 +0500
+++ russian/security/2009/dsa-1956.wml 2018-03-02 13:23:26.260001846 +0500
@@ -1,52 +1,53 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Xulrunner, a
- -runtime environment for XUL applications, such as the Iceweasel web
- -browser. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? Xulrunner, окÑ?Ñ?жении вÑ?емени иÑ?полнениÑ? длÑ? XUL-пÑ?иложений, Ñ?акиÑ?
+как веб-бÑ?аÑ?зеÑ? Iceweasel, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3986">CVE-2009-3986</a>:
- - <p>David James discovered that the window.opener property allows Chrome
- - privilege escalation.</p></li>
+ <p>Ð?Ñ?вид Ð?жеймÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?войÑ?Ñ?во window.opener позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ?
+ повÑ?Ñ?ение пÑ?ивилегий Chrome.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3985">CVE-2009-3985</a>:
- - <p>Jordi Chanel discovered a spoofing vulnerability of the URL location bar
- - using the document.location property.</p></li>
+ <p>Ð?оÑ?ди ЧанелÑ? обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки Ñ?Ñ?Ñ?оки URL Ñ? помоÑ?Ñ?Ñ?
+ Ñ?войÑ?Ñ?ва document.location.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3984">CVE-2009-3984</a>:
- - <p>Jonathan Morgan discovered that the icon indicating a secure connection
- - could be spoofed through the document.location property.</p></li>
+ <p>Ð?жонаÑ?ан Ð?оÑ?ган обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки иконки Ñ?Ñ?аÑ?Ñ?Ñ?а безопаÑ?ного
+ Ñ?оединениÑ? Ñ? помоÑ?Ñ?Ñ? Ñ?войÑ?Ñ?ва document.location.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3983">CVE-2009-3983</a>:
- - <p>Takehiro Takahashi discovered that the NTLM implementation is vulnerable
- - to reflection attacks.</p></li>
+ <p>ТакеÑ?иÑ?о ТакаÑ?аÑ?и обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? NTLM Ñ?Ñ?звима к
+ аÑ?акам меÑ?одом оÑ?Ñ?ажениÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3981">CVE-2009-3981</a>:
- - <p>Jesse Ruderman discovered a crash in the layout engine, which might allow
- - the execution of arbitrary code.</p></li>
+ <p>Ð?жеÑ?Ñ? РадеÑ?ман обнаÑ?Ñ?жил аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? в движке Ñ?азмеÑ?ки, коÑ?оÑ?аÑ? можеÑ?
+ позволиÑ?Ñ? вÑ?полнение пÑ?оизволÑ?ного кода.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3979">CVE-2009-3979</a>:
- - <p>Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel and Olli Pettay
- - discovered crashes in the layout engine, which might allow the execution
- - of arbitrary code.</p></li>
+ <p>Ð?жеÑ?Ñ? РадеÑ?ман, Ð?жоÑ? СоÑ?еÑ?, Ð?аÑ?Ñ?ейн Ð?аÑ?геÑ?Ñ?, ХоÑ?е Ð?нгел и Ð?лли Ð?еÑ?Ñ?ай
+ обнаÑ?Ñ?жили аваÑ?ийнÑ?е оÑ?Ñ?ановки в движке Ñ?азмеÑ?ки, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полнение
+ пÑ?оизволÑ?ного кода.</p></li>
</ul>
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 1.9.0.16-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.0.16-1.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.9.1.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.1.6-1.</p>
- -<p>We recommend that you upgrade your xulrunner packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xulrunner.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=yAB7
-----END PGP SIGNATURE-----
Reply to: