-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2012/dsa-2507.wml 2017-11-01 10:11:10.355846301 +0500 +++ russian/security/2012/dsa-2507.wml 2018-03-23 10:50:24.183733299 +0500 @@ -1,56 +1,57 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in OpenJDK, an - -implementation of the Oracle Java platform.</p> +<p>Ð OpenJDK, ÑеализаÑии плаÑÑоÑÐ¼Ñ Oracle Java, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей.</p> <ul> - -<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1711">CVE-2012-1711</a> +<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1711">CVE-2012-1711</a> <a href="https://security-tracker.debian.org/tracker/CVE-2012-1719">CVE-2012-1719</a> - - <p>Multiple errors in the CORBA implementation could lead to - - breakouts of the Java sandbox.</p></li> + <p>ÐногоÑиÑленнÑе оÑибки в ÑеализаÑии CORBA могÑÑ Ð¿ÑиводиÑÑ Ðº + вÑÑ Ð¾Ð´Ñ Ð¸Ð· пеÑоÑниÑÑ Java.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1713">CVE-2012-1713</a> - - <p>Missing input sanitising in the font manager could lead to - - the execution of arbitrary code.</p></li> + <p>ÐÑÑÑÑÑÑвие оÑиÑÑки Ð²Ñ Ð¾Ð´Ð½ÑÑ Ð´Ð°Ð½Ð½ÑÑ Ð² менеджеÑе ÑÑиÑÑов Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº + вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1716">CVE-2012-1716</a> - - <p>The SynthLookAndFeel Swing class could be abused to break - - out of the Java sandbox.</p></li> + <p>ÐлаÑÑ SynthLookAndFeel Swing Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¸ÑполÑзован Ð´Ð»Ñ Ð²ÑÑ Ð¾Ð´Ð° + из пеÑоÑниÑÑ Java.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1717">CVE-2012-1717</a> - - <p>Several temporary files were created insecurely, resulting in - - local information disclosure.</p></li> + <p>ÐеÑколÑко вÑеменнÑÑ Ñайлов ÑоздаÑÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑм обÑазом, ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº + локалÑÐ½Ð¾Ð¼Ñ ÑаÑкÑÑÑÐ¸Ñ Ð¸Ð½ÑоÑмаÑии.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1718">CVE-2012-1718</a> - - <p>Certificate revocation lists were incorrectly implemented.</p></li> + <p>СпиÑки оÑзÑва ÑеÑÑиÑикаÑов ÑÐµÐ°Ð»Ð¸Ð·Ð¾Ð²Ð°Ð½Ñ Ð½ÐµÐ¿ÑавилÑно.</p></li> - -<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1723">CVE-2012-1723</a> +<li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1723">CVE-2012-1723</a> <a href="https://security-tracker.debian.org/tracker/CVE-2012-1725">CVE-2012-1725</a> - - <p>Validation errors in the bytecode verifier of the Hotspot VM - - could lead to breakouts of the Java sandbox.</p></li> + <p>ÐÑибки пÑовеÑки в коде Ð´Ð»Ñ Ð¿ÑовеÑки байÑ-кода в виÑÑÑалÑной маÑине Hotspot + могÑÑ Ð¿ÑиводиÑÑ Ðº вÑÑ Ð¾Ð´Ñ Ð¸Ð· пеÑоÑниÑÑ Java.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2012-1724">CVE-2012-1724</a> - - <p>Missing input sanitising in the XML parser could lead to denial - - of service through an infinite loop.</p></li> + <p>ÐÑÑÑÑÑÑвие оÑиÑÑки Ð²Ñ Ð¾Ð´Ð½ÑÑ Ð´Ð°Ð½Ð½ÑÑ Ð² коде Ð´Ð»Ñ Ð³ÑаммаÑиÑеÑкого ÑазбоÑа XML Ð¼Ð¾Ð¶ÐµÑ + пÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании из-за беÑконеÑного Ñикла.</p></li> </ul> - -<p>For the stable distribution (squeeze), this problem has been fixed in - -version 6b18-1.8.13-0+squeeze2.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (squeeze) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 6b18-1.8.13-0+squeeze2.</p> - -<p>For the unstable distribution (sid), this problem has been fixed in - -version 6b24-1.11.3-1.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 6b24-1.11.3-1.</p> - -<p>We recommend that you upgrade your openjdk-6 packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ openjdk-6.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlq0lagACgkQXudu4gIW 0qWQBxAAoFsVI0xPTHlsVDm483Yoe1cLSPqx5JjYeYHQsJ2aUKDq4nRJGosle8wZ vISCd4R/Z5WHmdehv9yJkDAOSj8j7syg0VZtssfc3Wi61Lq8klEkOi6w23rKdeyW PTqFgoud8bIsfvKbR2HkgZR71cIxSrVH7kK5dXYMQ11BaqRhtniuiOR/1ok3tb49 GOibeJaOqBt+PmAekywl25souT4XJclUgCQyiLypfOOnw104Au3t+ozgffJ+BVZk 4kmd++LWmSVBhBA0bQcTElQ7lNMJwsPdccJKzXwnJ7CjiKylZ6vACJs32b+DKnmP /EgzDEXAnLL2qWskgHYg09tor75zLsICBY6b9b3J9LcfXzOxAhmjEOE1kox2GbQF tX7JHPPTjVH8BLURJf3hPaVCHISGNrZ7oe7NzJJL+C0p2Ub452450uTvJ3akIMBw BFwpBIPAu57PtlE+1mr/uucETbwu2F7cfpMsM6aiWLCqpTb+cWb8+lFD4WK/tcl7 kwB7fo3vXR7dfGohz8b1O8h63px/WW0bWOHhbACSR2UJRtMZE8lks3Sy1VyWbF4Y 9E9dqRB8tUeZRMpanJ8dA70F+5VVQRfn2NQV8Vb7oZCw5ycV1nZSN2N6sQ86ssQz vIHW7jaC7LK65v15oeKMB79W4Qx1NXat/dlEjzsyI8DIP7t8n0U= =0CXm -----END PGP SIGNATURE-----