[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2009/dsa-1956.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2009/dsa-1956.wml	2017-11-01 10:11:10.111830390 +0500
+++ russian/security/2009/dsa-1956.wml	2018-03-02 13:23:26.260001846 +0500
@@ -1,52 +1,53 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in Xulrunner, a
- -runtime environment for XUL applications, such as the Iceweasel web
- -browser. The Common Vulnerabilities and Exposures project identifies
- -the following problems:</p>
+<p>Ð? Xulrunner, окÑ?Ñ?жении вÑ?емени иÑ?полнениÑ? длÑ? XUL-пÑ?иложений, Ñ?акиÑ?
+как веб-бÑ?аÑ?зеÑ? Iceweasel, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3986";>CVE-2009-3986</a>:
 
- -   <p>David James discovered that the window.opener property allows Chrome
- -   privilege escalation.</p></li>
+   <p>Ð?Ñ?вид Ð?жеймÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?войÑ?Ñ?во window.opener позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ?
+   повÑ?Ñ?ение пÑ?ивилегий Chrome.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3985";>CVE-2009-3985</a>:
 
- -   <p>Jordi Chanel discovered a spoofing vulnerability of the URL location bar 
- -   using the document.location property.</p></li>
+   <p>Ð?оÑ?ди ЧанелÑ? обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки Ñ?Ñ?Ñ?оки URL Ñ? помоÑ?Ñ?Ñ?
+   Ñ?войÑ?Ñ?ва document.location.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3984";>CVE-2009-3984</a>:
 
- -   <p>Jonathan Morgan discovered that the icon indicating a secure connection
- -   could be spoofed through the document.location property.</p></li>
+   <p>Ð?жонаÑ?ан Ð?оÑ?ган обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки иконки Ñ?Ñ?аÑ?Ñ?Ñ?а безопаÑ?ного
+   Ñ?оединениÑ? Ñ? помоÑ?Ñ?Ñ? Ñ?войÑ?Ñ?ва document.location.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3983";>CVE-2009-3983</a>:
 
- -   <p>Takehiro Takahashi discovered that the NTLM implementation is vulnerable
- -   to reflection attacks.</p></li>
+   <p>ТакеÑ?иÑ?о ТакаÑ?аÑ?и обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? NTLM Ñ?Ñ?звима к
+   аÑ?акам меÑ?одом оÑ?Ñ?ажениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3981";>CVE-2009-3981</a>:
 
- -   <p>Jesse Ruderman discovered a crash in the layout engine, which might allow
- -   the execution of arbitrary code.</p></li>
+   <p>Ð?жеÑ?Ñ? РадеÑ?ман обнаÑ?Ñ?жил аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? в движке Ñ?азмеÑ?ки, коÑ?оÑ?аÑ? можеÑ?
+   позволиÑ?Ñ? вÑ?полнение пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3979";>CVE-2009-3979</a>:
 
- -   <p>Jesse Ruderman, Josh Soref, Martijn Wargers, Jose Angel and Olli Pettay
- -   discovered crashes in the layout engine, which might allow the execution
- -   of arbitrary code.</p></li>
+   <p>Ð?жеÑ?Ñ? РадеÑ?ман, Ð?жоÑ? СоÑ?еÑ?, Ð?аÑ?Ñ?ейн Ð?аÑ?геÑ?Ñ?, ХоÑ?е Ð?нгел и Ð?лли Ð?еÑ?Ñ?ай
+   обнаÑ?Ñ?жили аваÑ?ийнÑ?е оÑ?Ñ?ановки в движке Ñ?азмеÑ?ки, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полнение
+   пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in 
- -version 1.9.0.16-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.0.16-1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.9.1.6-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.9.1.6-1.</p>
 
- -<p>We recommend that you upgrade your xulrunner packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xulrunner.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=yAB7
-----END PGP SIGNATURE-----


Reply to: