[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1535.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1535.wml	2017-11-01 10:11:09.855813700 +0500
+++ russian/security/2008/dsa-1535.wml	2018-03-20 17:43:51.619311383 +0500
@@ -1,76 +1,77 @@
 # This shares a lot of text with dsa-1532.wml, dsa-1534.wml, dsa-1574.wml
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.7" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in the Iceweasel
- -web browser, an unbranded version of the Firefox browser. The Common
- -Vulnerabilities and Exposures project identifies the following problems:</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е Iceweasel, безбÑ?ендовой веÑ?Ñ?ии бÑ?аÑ?зеÑ?а Firefox,
+бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-4879";>CVE-2007-4879</a>
 
- -    <p>Peter Brodersen and Alexander Klink discovered that the
- -    autoselection of SSL client certificates could lead to users
- -    being tracked, resulting in a loss of privacy.</p></li>
+    <p>Ð?еÑ?еÑ? Ð?Ñ?одеÑ?Ñ?ен и Ð?лекÑ?андеÑ? Ð?линк обнаÑ?Ñ?жили, Ñ?Ñ?о
+    авÑ?омаÑ?иÑ?еÑ?кий вÑ?боÑ? клиенÑ?Ñ?киÑ? SSL-Ñ?еÑ?Ñ?иÑ?икаÑ?ов можеÑ? пÑ?иводиÑ?Ñ? к оÑ?Ñ?леживаниÑ?
+    полÑ?зоваÑ?елей, Ñ?Ñ?о пÑ?иводиÑ? к поÑ?еÑ?и пÑ?иваÑ?ноÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1233";>CVE-2008-1233</a>
 
- -    <p><q>moz_bug_r_a4</q> discovered that variants of <a href="https://security-tracker.debian.org/tracker/CVE-2007-3738";>CVE-2007-3738</a> and
- -    <a href="https://security-tracker.debian.org/tracker/CVE-2007-5338";>CVE-2007-5338</a> allow the execution of arbitrary code through
+    <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?ожие Ñ? <a href="https://security-tracker.debian.org/tracker/CVE-2007-3738";>CVE-2007-3738</a> и
+    <a href="https://security-tracker.debian.org/tracker/CVE-2007-5338";>CVE-2007-5338</a> Ñ?Ñ?звимоÑ?Ñ?и позволÑ?Ñ?Ñ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? помоÑ?Ñ?Ñ?
     XPCNativeWrapper.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1234";>CVE-2008-1234</a>
 
- -    <p><q>moz_bug_r_a4</q> discovered that insecure handling of event
- -    handlers could lead to cross-site scripting.</p></li>
+    <p><q>moz_bug_r_a4</q> обнаÑ?Ñ?жил, Ñ?Ñ?о небезопаÑ?наÑ? обÑ?абоÑ?ка обÑ?абоÑ?Ñ?иков Ñ?обÑ?Ñ?ий
+    можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ? Ñ?кÑ?ипÑ?ингÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1235";>CVE-2008-1235</a>
- -  
- -    <p>Boris Zbarsky, Johnny Stenback and <q>moz_bug_r_a4</q> discovered
- -    that incorrect principal handling could lead to cross-site
- -    scripting and the execution of arbitrary code.</p></li>
+
+    <p>Ð?оÑ?иÑ? Ð?баÑ?Ñ?кий, Ð?жонни СÑ?енбÑ?к и <q>moz_bug_r_a4</q> обнаÑ?Ñ?жили,
+    Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка Ñ?Ñ?бÑ?екÑ?а заÑ?иÑ?Ñ?нного канала можеÑ? пÑ?иводиÑ?Ñ? к межÑ?айÑ?овомÑ?
+    Ñ?кÑ?ипÑ?ингÑ? и вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1236";>CVE-2008-1236</a>
 
- -    <p>Tom Ferris, Seth Spitzer, Martin Wargers, John Daggett and Mats
- -    Palmgren discovered crashes in the layout engine, which might
- -    allow the execution of arbitrary code.</p></li>
+    <p>Том ФеÑ?Ñ?иÑ?, СеÑ? ШпиÑ?Ñ?еÑ?, Ð?аÑ?Ñ?ин Ð?аÑ?геÑ?Ñ?, Ð?жон Ð?Ñ?джеÑ? и Ð?аÑ?Ñ?
+    Ð?алмгÑ?ен обнаÑ?Ñ?жили аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? в движке Ñ?азмеÑ?ки, коÑ?оÑ?аÑ? можеÑ?
+    пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1237";>CVE-2008-1237</a>
 
- -    <p><q>georgi</q>, <q>tgirmann</q> and Igor Bukanov discovered crashes in the
- -    Javascript engine, which might allow the execution of arbitrary
- -    code.</p></li>
+    <p><q>georgi</q>, <q>tgirmann</q> и Ð?гоÑ?Ñ? Ð?Ñ?канов обнаÑ?Ñ?жили аваÑ?ийнÑ?е оÑ?Ñ?ановки в
+    движке Javascript, коÑ?оÑ?Ñ?е могÑ?Ñ? позволиÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+    код.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1238";>CVE-2008-1238</a>
 
- -    <p>Gregory Fleischer discovered that HTTP Referrer headers were
- -    handled incorrectly in combination with URLs containing Basic
- -    Authentication credentials with empty usernames, resulting
- -    in potential Cross-Site Request Forgery attacks.</p></li>
+    <p>Ð?Ñ?егоÑ?и ФлÑ?йÑ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о HTTP-заголовки Referrer обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ?
+    непÑ?авилÑ?но в Ñ?лÑ?Ñ?ае иÑ?полÑ?зованиÑ? URL, Ñ?одеÑ?жаÑ?иÑ? даннÑ?е Ñ?Ñ?Ñ?Ñ?ной запиÑ?и Basic
+    Authentication Ñ? пÑ?Ñ?Ñ?Ñ?м именем полÑ?зоваÑ?елÑ?, Ñ?Ñ?о пÑ?иводиÑ?
+    к поÑ?енÑ?иалÑ?ной подделке межÑ?айÑ?овÑ?Ñ? запÑ?оÑ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1240";>CVE-2008-1240</a>
 
- -    <p>Gregory Fleischer discovered that web content fetched through
- -    the jar: protocol can use Java to connect to arbitrary ports.
- -    This is only an issue in combination with the non-free Java
- -    plugin.</p></li>
+    <p>Ð?Ñ?егоÑ?и ФлÑ?йÑ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о веб-Ñ?одеÑ?жимое загÑ?Ñ?жаеÑ?Ñ?Ñ? Ñ?еÑ?ез
+    jar, пÑ?оÑ?окол можеÑ? иÑ?полÑ?зоваÑ?Ñ? Java длÑ? подклÑ?Ñ?ениÑ? к пÑ?оизволÑ?нÑ?м поÑ?Ñ?ам.
+    ЭÑ?о Ñ?влÑ?еÑ?Ñ?Ñ? пÑ?облемой Ñ?олÑ?ко пÑ?и иÑ?полÑ?зовании неÑ?вободного подклÑ?Ñ?аемого
+    дополнениÑ? Java.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1241";>CVE-2008-1241</a>
 
- -    <p>Chris Thomas discovered that background tabs could generate
- -    XUL popups overlaying the current tab, resulting in potential
- -    spoofing attacks.</p></li>
+    <p>Ð?Ñ?иÑ? ТомаÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?оновÑ?е вкладки могÑ?Ñ? Ñ?оздаваÑ?Ñ?
+    вÑ?плÑ?ваÑ?Ñ?ие XUL-окна, пеÑ?екÑ?Ñ?ваÑ?Ñ?ие Ñ?екÑ?Ñ?Ñ?Ñ? вкладкÑ?, Ñ?Ñ?о пÑ?иводиÑ? к поÑ?енÑ?иалÑ?нÑ?м
+    аÑ?акам по подделке Ñ?одеÑ?жимого.</p></li>
 
 </ul>
 
- -<p>The Mozilla products from the old stable distribution (sarge) are no
- -longer supported.</p>
+<p>Ð?Ñ?одÑ?кÑ?Ñ? Mozilla в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) более
+не поддеÑ?живаÑ?Ñ?Ñ?Ñ?.</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.0.0.13-0etch1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии  2.0.0.13-0etch1.</p>
 
- -<p>We recommend that you upgrade your iceweasel packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? iceweasel.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=s7IA
-----END PGP SIGNATURE-----


Reply to: