-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2011/dsa-2301.wml 2017-11-01 10:11:10.275841084 +0500 +++ russian/security/2011/dsa-2301.wml 2018-02-21 17:13:28.443654698 +0500 @@ -1,50 +1,51 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in Rails, the Ruby web - -application framework. The Common Vulnerabilities and Exposures project - -identifies the following problems:</p> +<p>Ð Rails, инÑÑаÑÑÑÑкÑÑÑе веб-пÑиложений на ÑзÑке Ruby, бÑло обнаÑÑжено +неÑколÑко ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures +опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-4214">CVE-2009-4214</a> - - <p>A cross-site scripting (XSS) vulnerability had been found in the - - strip_tags function. An attacker may inject non-printable characters - - that certain browsers will then evaluate. This vulnerability only - - affects the oldstable distribution (lenny).</p></li> + <p>ÐбнаÑÑжен межÑайÑовÑй ÑкÑипÑинг (XSS) в ÑÑнкÑии + strip_tags. ÐлоÑмÑÑленник Ð¼Ð¾Ð¶ÐµÑ Ð²Ð²ÐµÑÑи непеÑаÑнÑе ÑимволÑ, + коÑоÑÑе бÑдÑÑ Ð¾Ð±ÑабаÑÑваÑÑÑÑ Ð½ÐµÐºÐ¾ÑоÑÑми бÑаÑзеÑами. ÐÑа ÑÑзвимоÑÑÑ ÐºÐ°ÑаеÑÑÑ + ÑолÑко пÑедÑдÑÑего ÑÑабилÑного вÑпÑÑка (lenny).</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2930">CVE-2011-2930</a> - - <p>A SQL injection vulnerability had been found in the quote_table_name - - method that could allow malicious users to inject arbitrary SQL into a - - query.</p></li> + <p>ÐÑла обнаÑÑжена SQL-инÑекÑÐ¸Ñ Ð² меÑоде quote_table_name, + позволÑÑÑÐ°Ñ Ð·Ð»Ð¾ÑмÑÑленникам вводиÑÑ Ð¿ÑоизволÑнÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ SQL в + запÑоÑ.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2931">CVE-2011-2931</a> - - <p>A cross-site scripting (XSS) vulnerability had been found in the - - strip_tags helper. An parsing error can be exploited by an attacker, - - who can confuse the parser and may inject HTML tags into the output - - document.</p></li> + <p>ÐÑл обнаÑÑжен межÑайÑовÑй ÑкÑипÑинг (XSS) во вÑпомогаÑелÑной ÑÑнкÑии + strip_tags. ÐÑибка гÑаммаÑиÑеÑкого ÑазбоÑа Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполÑзоваÑÑÑÑ Ð·Ð»Ð¾ÑмÑÑленником, + коÑоÑÑй Ð¼Ð¾Ð¶ÐµÑ Ð²ÑзваÑÑ Ð½ÐµÐ¿ÑавилÑнÑÑ ÑабоÑÑ ÑинÑакÑиÑеÑкого анализаÑоÑа и ввеÑÑи + Ñеги HTML в ÑезÑлÑÑиÑÑÑÑий докÑменÑ.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3186">CVE-2011-3186</a> - - <p>A newline (CRLF) injection vulnerability had been found in - - response.rb. This vulnerability allows an attacker to inject arbitrary - - HTTP headers and conduct HTTP response splitting attacks via the - - Content-Type header.</p></li> + <p>ÐÑло обнаÑÑжено введение новой ÑÑÑоки (CRLF) в + response.rb. ÐÑа ÑÑзвимоÑÑÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð·Ð»Ð¾ÑмÑÑÐ»ÐµÐ½Ð½Ð¸ÐºÑ Ð²Ð²Ð¾Ð´Ð¸ÑÑ Ð¿ÑоизволÑнÑе + заголовки HTTP и вÑполнÑÑÑ Ð°Ñаки по ÑÐ°Ð·Ð´ÐµÐ»ÐµÐ½Ð¸Ñ HTTP-оÑвеÑов Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ + заголовка Content-Type.</p></li> </ul> - -<p>For the oldstable distribution (lenny), this problem has been fixed in - -version 2.1.0-7+lenny2.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (lenny) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 2.1.0-7+lenny2.</p> - -<p>For the stable distribution (squeeze), this problem has been fixed in - -version 2.3.5-1.2+squeeze2.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (squeeze) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 2.3.5-1.2+squeeze2.</p> - -<p>For the unstable distribution (sid), this problem has been fixed in - -version 2.3.14.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 2.3.14.</p> - -<p>We recommend that you upgrade your rails packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ rails.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlqNYm0ACgkQXudu4gIW 0qXqMw/+JkRWCrQqnAfrQZoQikKZZYcFrB0Vd6EV7FC4d1QNxT9LsWX019yyc4Qg xMj8W8nY1tKILN7pTT3My1iowagfIuqO3tE3PznIeOXsLC+UlZZwjezwbiYgFf7J 5DPVvN5hbiIaDTjmvKv0uD9pn+CfqiWEqcjfJ4bUzZFLOO8uTxW8u8bPYy7GgRpw iUuRGuncAWtwf51d+5vIwBWGyuNS3ztf42Y7GVtlaBzBvM9/2zXu/hnfO1aQeyRp ztfeHvpMTLYJk7R0o4nlP/8FGwB3fzDNjcW9Chg+tdTWshRxB8GnZfJzks1k7Yhe zvX/lN3cipUrauOmV7wivXxeUSCV5BWhovNjNdheY6PIV24/klLqfzpHIQIP54e3 y9oGKyvLidS5tNd7AhzZp7zU+rV2JAHGXBeHXQiiXGPSV5iorN1aGvZuBXtek3Wr rs8mOCDzn6XpX6BVrz5+IdPN9RsdixPClRPeSqEVc1N0BXh7N6GZ+ZTRQhbv3yMb BtkEOkUPzMrKR1ZGgb5ydPHskIV/oAlAYviQNKdbhgBSh+TawPIe+em5Yt8ocRn3 ZPBTpDjb1ItrgYm6oEX3Qyy9dBIYgZHCVDexwo3geFukwFzUS3V2TJk5mO7SH6Qp T2tFzYy9yKgB6RjJCSvTB7RKkLzXaLf494E7hCL2lHN99PLWAWU= =rkov -----END PGP SIGNATURE-----