[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1574.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1574.wml	2017-11-01 10:11:09.875815003 +0500
+++ russian/security/2008/dsa-1574.wml	2018-03-20 17:27:16.574180828 +0500
@@ -1,47 +1,48 @@
 # This shares a lot of text with dsa-1532.wml, dsa-1534.wml, dsa-1535.wml
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Icedove mail
- -client, an unbranded version of the Thunderbird client.  The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? поÑ?Ñ?овом клиенÑ?е Icedove, безбÑ?ендовой веÑ?Ñ?ии Thunderbird, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1233";>CVE-2008-1233</a>
 
- -    <p><q>moz_bug_r_a4</q> discovered that variants of <a href="https://security-tracker.debian.org/tracker/CVE-2007-3738";>CVE-2007-3738</a> and
- -    <a href="https://security-tracker.debian.org/tracker/CVE-2007-5338";>CVE-2007-5338</a> allow the execution of arbitrary code through
+    <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?ожие Ñ? <a href="https://security-tracker.debian.org/tracker/CVE-2007-3738";>CVE-2007-3738</a> и
+    <a href="https://security-tracker.debian.org/tracker/CVE-2007-5338";>CVE-2007-5338</a> Ñ?Ñ?звимоÑ?Ñ?и позволÑ?Ñ?Ñ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ?
     XPCNativeWrapper.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1234";>CVE-2008-1234</a>
 
- -    <p><q>moz_bug_r_a4</q> discovered that insecure handling of event
- -    handlers could lead to cross-site scripting.</p></li>
+    <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о небезопаÑ?наÑ? обÑ?абоÑ?ка обÑ?абоÑ?Ñ?иков Ñ?обÑ?Ñ?ий
+    можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1235";>CVE-2008-1235</a>
- -  
- -    <p>Boris Zbarsky, Johnny Stenback and <q>moz_bug_r_a4</q> discovered
- -    that incorrect principal handling could lead to cross-site
- -    scripting and the execution of arbitrary code.</p></li>
+
+    <p>Ð?оÑ?иÑ? Ð?баÑ?Ñ?кий, Ð?жонни СÑ?енбÑ?к и <q>moz_bug_r_a4</q> обнаÑ?Ñ?жили,
+    Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка Ñ?Ñ?бÑ?екÑ?а заÑ?иÑ?Ñ?нного канала можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ?
+    Ñ?кÑ?ипÑ?ингÑ? и вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1236";>CVE-2008-1236</a>
 
- -    <p>Tom Ferris, Seth Spitzer, Martin Wargers, John Daggett and Mats
- -    Palmgren discovered crashes in the layout engine, which might
- -    allow the execution of arbitrary code.</p></li>
+    <p>Том ФеÑ?Ñ?иÑ?, СеÑ? ШпиÑ?Ñ?еÑ?, Ð?аÑ?Ñ?ин Ð?аÑ?геÑ?Ñ?, Ð?жон Ð?Ñ?джеÑ? и Ð?аÑ?Ñ?
+    Ð?алмгÑ?ен обнаÑ?Ñ?жили аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? в движке Ñ?азмеÑ?ки, коÑ?оÑ?аÑ? можеÑ?
+    пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1237";>CVE-2008-1237</a>
 
- -    <p><q>georgi</q>, <q>tgirmann</q> and Igor Bukanov discovered crashes in the
- -    Javascript engine, which might allow the execution of arbitrary
- -    code.</p></li>
+    <p><q>georgi</q>, <q>tgirmann</q> и Ð?гоÑ?Ñ? Ð?Ñ?канов обнаÑ?Ñ?жили аваÑ?ийнÑ?е оÑ?Ñ?ановки в
+    движке Javascript, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+    код.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.5.0.13+1.5.0.15b.dfsg1+prepatch080417a-0etch1.</p>
 
- -<p>We recommend that you upgrade your icedove packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? icedove.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlqw/jQACgkQXudu4gIW
0qVpnw/9EgeCMlG1WGCtvnTT38IXUO22HUiC7H2z1Zji1afFn/mEdfO+5MNSkrKb
9LVaB17KdNiFbpJb7jZoeARQTEgDSMohYDS8s9WUirl1vL8K9O/YN0fKj3fJk/dA
flWvBtQsJWRyev1Y4OE87aVhR2DDvj6Ow4+Yi4J/LSqtrXlLFnd307QA5ov5z8f5
9RXaKs1xpmL+6rD5WloxMaco8ENEFfroSmqmmYEL6o1VGKjjehtobgkgSvOIstOD
9CM2EWq4igzfJhisn+zmY/NQTZxV5Thd5oPihbaSLK6Bxsr3kKz8iF+3THNzs2Tt
abrv9uod6LQlIqrfXR0/BGILU+vHLXNZfFsPstXXTTmOiTAVf888JEvwFZvbYniY
0f9Ok8Kvvp3NEOCeldVPqi996Sl6oTkEivaOlvRj7paXmY8PBxmLEkPuI6fIaURw
SbknVbXtPuz29rOl0oolMp4WWJG28aAGLo8vNd6D7rqm3n5zj3SHIpeGo9GgPhiy
C/1BqgVLkRQVrG2XgTFz3zGAa134pZFU3s9bZqE5q8IOS+J8e0S11n0K06JeREJW
lbudaVSBudd1sUdGCvyQbQbQoyfXDth2/xVbl2SC33TNFRkUS7r3GcMahmj8riaT
Cf0nxd9N8V+dHpdOD0kIpAVeTaRNrgizfdAc8UOjCKy4/jtPCAA=
=x8LD
-----END PGP SIGNATURE-----


Reply to: