-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2011/dsa-2313.wml 2017-11-01 10:11:10.283841606 +0500 +++ russian/security/2011/dsa-2313.wml 2018-03-01 14:58:41.684203169 +0500 @@ -1,54 +1,55 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been found in Iceweasel, a web browser - -based on Firefox:</p> +<p>Ð Iceweasel, веб-бÑаÑзеÑе на оÑнове Firefox, бÑло обнаÑÑжено +неÑколÑко ÑÑзвимоÑÑей:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2372">CVE-2011-2372</a> - - <p>Mariusz Mlynski discovered that websites could open a download - - dialog â which has <q>open</q> as the default action â, while a user - - presses the ENTER key.</p></li> + <p>ÐаÑиÑÑ ÐлинÑкий обнаÑÑжил, ÑÑо веб-ÑайÑÑ Ð¼Ð¾Ð³ÑÑ Ð¾ÑкÑÑваÑÑ Ð´Ð¸Ð°Ð»Ð¾Ð³ загÑÑзки, + в коÑоÑом дейÑÑвием по ÑмолÑÐ°Ð½Ð¸Ñ ÑвлÑеÑÑÑ <q>оÑкÑÑÑÑ</q>, когда полÑзоваÑÐµÐ»Ñ + Ð½Ð°Ð¶Ð¸Ð¼Ð°ÐµÑ ÐºÐ»Ð°Ð²Ð¸ÑÑ ENTER.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2995">CVE-2011-2995</a> - - <p>Benjamin Smedberg, Bob Clary and Jesse Ruderman discovered crashes - - in the rendering engine, which could lead to the execution of - - arbitrary code.</p></li> + <p>Ðенджамин СмедбеÑг, Ðоб ÐлÑÑи и ÐжеÑÑ Ð Ð°Ð´ÐµÑман обнаÑÑжили ÑлÑÑаи аваÑийной + оÑÑановки в движке оÑÑиÑовки, коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ + пÑоизволÑного кода.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2998">CVE-2011-2998</a> - - <p>Mark Kaplan discovered an integer underflow in the JavaScript - - engine, which could lead to the execution of arbitrary code.</p></li> + <p>ÐаÑк Ðаплан обнаÑÑжил оÑÑиÑаÑелÑное пеÑеполнение ÑелÑÑ ÑиÑле в движке + JavaScript, коÑоÑое Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2999">CVE-2011-2999</a> - - <p>Boris Zbarsky discovered that incorrect handling of the - - window.location object could lead to bypasses of the same-origin - - policy.</p></li> + <p>ÐоÑÐ¸Ñ ÐбаÑÑкий обнаÑÑжил, ÑÑо непÑавилÑÐ½Ð°Ñ Ð¾Ð±ÑабоÑка обÑекÑа + window.location Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº Ð¾Ð±Ñ Ð¾Ð´Ñ Ð¿Ñавила одного + иÑÑоÑника.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-3000">CVE-2011-3000</a> - - <p>Ian Graham discovered that multiple Location headers might lead to - - CRLF injection.</p></li> + <p>ÐÑн ÐÑÑÑ Ñм обнаÑÑжил, ÑÑо множеÑÑвеннÑе заголовки Location могÑÑ Ð¿ÑиводиÑÑ Ðº + CRLF-инÑекÑии.</p></li> </ul> - -<p>For the oldstable distribution (lenny), this problem has been fixed in - -version 1.9.0.19-14 of the xulrunner source package. This update also - -marks the compromised DigiNotar root certs as revoked rather then - -untrusted.</p> - - - -<p>For the stable distribution (squeeze), this problem has been fixed - -in version 3.5.16-10. This update also marks the compromised DigiNotar - -root certs as revoked rather then untrusted.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (lenny) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 1.9.0.19-14 пакеÑа Ñ Ð¸ÑÑ Ð¾Ð´Ð½Ñм кодом xulrunner. ÐÑоме Ñого, в данном +обновлении коÑневÑе ÑеÑÑиÑикаÑÑ DigiNotar бÑли оÑмеÑÐµÐ½Ñ ÐºÐ°Ðº оÑозваннÑе, +а не как недовеÑеннÑе.</p> + +<p>Ð ÑÑабилÑном вÑпÑÑке (squeeze) ÑÑа пÑоблема бÑла иÑпÑавлена +в веÑÑии 3.5.16-10. ÐÑоме Ñого, в данном обновлении ÑкомпÑомеÑиÑованнÑе +коÑневÑе ÑеÑÑиÑикаÑÑ DigiNotar бÑли оÑмеÑÐµÐ½Ñ ÐºÐ°Ðº оÑозваннÑе, а не как недовеÑеннÑе.</p> - -<p>For the unstable distribution (sid), this problem has been fixed in - -version 7.0-1.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑа пÑоблема бÑла иÑпÑавлена в +веÑÑии 7.0-1.</p> - -<p>We recommend that you upgrade your iceweasel packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ iceweasel.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlqXztkACgkQXudu4gIW 0qVaFxAAqgvXQqaZ0gh2Int2Hgi7AQs+RmGZciOj1oy4yhtVpB6igMlFJvAQKmeK dI/J0wYKGVJEGpCByRIFALIkK/zQpCDefF0QE4EZv1dUhNI6kDKolK/5u/Ufouyu 6S7EgPR8bMr4nBBBgAPSlFmTe1u2lUBxeodzf1FrTGx7SefsLF0iwxzbXjIttUv6 9qbj9ErB43neVZHLbjtBoOUbvwQssQRglO6JqojQFFTf8/R36t50J4dxHXotd60I ROLbeDiDYhYM5kjhYEsiRG52qPhhUsDvxS6xp0e9JU+5nENefyPVuPgtSb/NNkGg heWUdCZs28dY3qY6ILrZqhz7G+kyEQp/Won/6vTflp+qwK72Gvyo2wwSsF8d7MnS jO4EN74ClPjMIww+TEwyhlIK9G5MnROB8I7e6KnGEAJQaQlw+ICMtkBoi8kfYFKi xdjnmovn0JvcH+TCFksugdukxjxjyTdJUpEQqAQFC9NKVJ5RoT2azQPA5hIF4h+Q 88pHU6QzBlxFbFARWhKYqjx9c90QcqVH9LEswOBlDZhJMY5E/L63xpn8rXYAh9OZ 25eMGPJ+hdo6IR6OyZuEANiraYlJmw+4YoZh6pCCUdXkK7pFeK7CfQdCjGs38PKQ b38VCWkN5FQcD84OAE9R22RDMRbrJGAyPOo3wagwAoG5MHmnqQo= =1uJt -----END PGP SIGNATURE-----