-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- --- english/security/2011/dsa-2296.wml2017-11-01 10:11:10.275841084
+0500
+++ russian/security/2011/dsa-2296.wml 2018-03-13 16:43:23.849651409 +0500
@@ -1,54 +1,55 @@
- -several vulnerabilities
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+неÑколÑко ÑÑзвимоÑÑей
- -Several vulnerabilities have been discovered in Iceweasel, a web browser
- -based on Firefox. The included XULRunner library provides rendering
- -services for several other applications included in Debian.
+Ð Iceweasel, веб-бÑаÑзеÑе на оÑнове Firefox, бÑло
обнаÑÑжено неÑколÑко
+ÑÑзвимоÑÑей. ÐÑ
одÑÑÐ°Ñ Ð² ÑоÑÑав пакеÑе
библиоÑека XULRunner пÑедоÑÑавлÑеÑ
+возможноÑÑи оÑÑиÑовки неÑколÑким дÑÑгим
пÑиложениÑм, вÑ
одÑÑим в ÑоÑÑав Debian.
https://security-tracker.debian.org/tracker/CVE-2011-0084;>CVE-2011-0084
- - regenrecht discovered that incorrect pointer handling in the SVG
- - processing code could lead to the execution of arbitrary code.
+ regenrecht обнаÑÑжил, ÑÑо непÑавилÑнаÑ
ÑабоÑа Ñ ÑказаÑелÑми в код длÑ
+ обÑабоÑки SVG Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº
вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода.
https://security-tracker.debian.org/tracker/CVE-2011-2378;>CVE-2011-2378
- - regenrecht discovered that incorrect memory management in DOM
- - processing could lead to the execution of arbitrary code.
+ regenrecht обнаÑÑжил, ÑÑо непÑавилÑное
ÑпÑавление памÑÑÑÑ Ð² коде длÑ
+ обÑабоÑки DOM Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº
вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода.
https://security-tracker.debian.org/tracker/CVE-2011-2981;>CVE-2011-2981
- - moz_bug_r_a_4 discovered a Chrome privilege escalation
- - vulnerability in the event handler code.
+ moz_bug_r_a_4 обнаÑÑжил повÑÑение
пÑивилегий Chrome
+ в коде обÑабоÑки ÑобÑÑий.
https://security-tracker.debian.org/tracker/CVE-2011-2982;>CVE-2011-2982
- - Gary Kwong, Igor Bukanov, Nils and Bob Clary discovered memory
- - corruption bugs, which may lead to the execution of arbitrary
code.
+ ÐаÑи Ðвон, ÐгоÑÑ ÐÑканов, ÐилÑÑ Ð¸ Ðоб
ÐлÑÑи обнаÑÑжили оÑибки Ñ Ð¿Ð¾Ð²Ñеждением
+ ÑодеÑжимого памÑÑи, коÑоÑÑе могÑÑ
пÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного
кода.
https://security-tracker.debian.org/tracker/CVE-2011-2983;>CVE-2011-2983
- - shutdown discovered an information leak in the handling of
+ shutdown обнаÑÑжил ÑÑеÑÐºÑ Ð¸Ð½ÑоÑмаÑии в
коде обÑабоÑки
RegExp.input.
https://security-tracker.debian.org/tracker/CVE-2011-2984;>CVE-2011-2984
- - moz_bug_r_a4 discovered a Chrome privilege escalation
- - vulnerability.
+ moz_bug_r_a4 обнаÑÑжил повÑÑение
пÑивилегий
+ Chrome.
- -For the oldstable distribution (lenny), this problem has been fixed in
- -version 1.9.0.19-13 of the xulrunner source package.
+РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (lenny) ÑÑа
пÑоблема бÑла иÑпÑавлена в
+веÑÑии 1.9.0.19-13 пакеÑа Ñ Ð¸ÑÑ
однÑм кодом
xulrunner.
- -For the stable distribution (squeeze), this problem has been fixed in
- -version 3.5.16-9.
+Ð ÑÑабилÑном вÑпÑÑке (squeeze) ÑÑа пÑоблема
бÑла иÑпÑавлена в
+веÑÑии 3.5.16-9.
- -For the unstable distribution (sid), this problem has been fixed in
- -version 6.0-1
+РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑа пÑоблема
бÑла иÑпÑавлена в
+веÑÑии 6.0-1
- -We recommend that you upgrade your iceweasel packages.
+РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ iceweasel.
# do not modify the following line
-BEGIN PGP SIGNATURE-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