-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2011/dsa-2317.wml 2017-11-01 10:11:10.283841606 +0500 +++ russian/security/2011/dsa-2317.wml 2018-02-04 13:58:23.592297671 +0500 @@ -1,51 +1,52 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2372">CVE-2011-2372</a> - - <p>Mariusz Mlynski discovered that websites could open a download - - dialog â which has <q>open</q> as the default action â, while a user - - presses the ENTER key.</p></li> + <p>ÐаÑиÑÑ ÐлинÑкий обнаÑÑжил, ÑÑо веб-ÑайÑÑ Ð¼Ð¾Ð³ÑÑ Ð¾ÑкÑÑваÑÑ Ð´Ð¸Ð°Ð»Ð¾Ð³Ð¾Ð²Ð¾Ðµ окно + загÑÑзки, в коÑоÑом по ÑмолÑÐ°Ð½Ð¸Ñ Ð²ÑбÑано дейÑÑвие <q>оÑкÑÑÑÑ</q>, в Ñо вÑÐµÐ¼Ñ ÐºÐ°Ðº полÑзоваÑÐµÐ»Ñ + Ð½Ð°Ð¶Ð¸Ð¼Ð°ÐµÑ ÐºÐ»Ð°Ð²Ð¸ÑÑ ENTER.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2995">CVE-2011-2995</a> - - <p>Benjamin Smedberg, Bob Clary and Jesse Ruderman discovered crashes - - in the rendering engine, which could lead to the execution of - - arbitrary code.</p></li> + <p>Ðенджамин СмедбеÑг, Ðоб ÐлÑÑи и ÐÐ¶ÐµÑ Ð Ð°Ð´ÐµÑман обнаÑÑжили ÑлÑÑаи аваÑийной оÑÑановки + в движке оÑÑиÑовки, коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ + пÑоизволÑного кода.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2998">CVE-2011-2998</a> - - <p>Mark Kaplan discovered an integer underflow in the JavaScript - - engine, which could lead to the execution of arbitrary code.</p></li> + <p>ÐаÑк Ðаплан обнаÑÑжил оÑÑиÑаÑелÑное пеÑеполнение ÑелÑÑ ÑиÑел в движке + JavaScript, коÑоÑое Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2999">CVE-2011-2999</a> - - <p>Boris Zbarsky discovered that incorrect handling of the - - window.location object could lead to bypasses of the same-origin - - policy.</p></li> + <p>ÐоÑÐ¸Ñ ÐбаÑÑкий обнаÑÑжил, ÑÑо непÑавилÑÐ½Ð°Ñ Ð¾Ð±ÑабоÑка обÑекÑа + window.location Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº Ð¾Ð±Ñ Ð¾Ð´Ñ Ð¿Ñавила одного + иÑÑоÑника.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3000">CVE-2011-3000</a> - - <p>Ian Graham discovered that multiple Location headers might lead to - - CRLF injection.</p></li> + <p>ÐÑн ÐÑÑÑ Ñм обнаÑÑжил, ÑÑо множеÑÑвеннÑе заголовки Location могÑÑ Ð¿ÑиводиÑÑ Ðº + CRLF-инÑекÑии.</p></li> </ul> - -<p>As indicated in the Lenny (oldstable) release notes, security support for - -the Icedove packages in the oldstable needed to be stopped before the end - -of the regular Lenny security maintenance life cycle. - -You are strongly encouraged to upgrade to stable or switch to a different - -mail client.</p> +<p>Ðак бÑло Ñанее Ñказано в инÑоÑмаÑии о вÑпÑÑке Lenny (пÑедÑдÑÑий ÑÑабилÑнÑй вÑпÑÑк), поддеÑжка +безопаÑноÑÑи пакеÑов Icedove должна бÑÑÑ Ð¿ÑекÑаÑена до оконÑÐ°Ð½Ð¸Ñ +обÑÑного жизненного Ñикла поддеÑжки безопаÑноÑÑи Lenny. +ÐаÑÑоÑÑелÑно ÑекомендÑеÑÑÑ Ð²ÑполниÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ðµ до ÑÑабилÑного вÑпÑÑка, либо пеÑейÑи +на иÑполÑзование дÑÑгого поÑÑового клиенÑа.</p> - -<p>For the stable distribution (squeeze), this problem has been fixed in - -version 3.0.11-1+squeeze5.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (squeeze) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 3.0.11-1+squeeze5.</p> - -<p>For the unstable distribution (sid), this problem has been fixed in - -version 3.1.15-1.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 3.1.15-1.</p> - -<p>We recommend that you upgrade your icedove packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ icedove.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlp2yzUACgkQXudu4gIW 0qXRlA//fGOv4nBUuSv4l0GW7h5yK7uRdPhcdlz1SUQa7eqVl+Aen1ziW7mG2rZF svH2g6G2arFDceKeIoMg0TfuPwmU3AGtyM7rSeUhl3H/2i8Dwkt92knQmMcb0vjq ce+fJHFiw9t2h8kG2zwvwJ22V8ERmub5l6vj7flSqzUgxXopVeJHSE5Zi2amrh2h sBHgZVnNxAcvm5rjMzdil/NnjUhi60/VuYGmYNJAYi8RGNQmvtSGuhiAfoRqlz+k 8sfL/3fU5W/aW+GdXovt3N+0rzI60pCkHIESR4l6fo4Z2euqRH1EMckGuLSmc26i ddJot6CjntFH7pm5AvVkq0fV4zBpGTTJddbovZnAOudHE8kzgbMjyDCzPs0iCYDb TXI9muPut6Zx020i3etOS/h0xDAC9C4GdhtrAu7bIJOZxGqGzuPnW2vJVf3dDu2b weiBza9S4nUhS9zeIISUVvMaN/BFblLGMeKwGdV4s2T1XV0808i8XeU70rtG5c/P X+opjYBfGb9rw9+whEn7WqtSoIumevPkC4IHfe/dV6ixPQFFgveb9JGza4pjCSkX UXRuqqbPiNgc56jjB4sSoXztuy0xPNU/+JTQvWpXBuILiSpUaHprwiV66vGmwPH1 9nOPMLR1M9g5DoG33GXOQxqhFrXbj7bZmW1PyAosTRJo5NmolUg= =uMvl -----END PGP SIGNATURE-----