[DONE] wml://{security/2016/dsa-3542.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3542.wml 2016-04-05 19:09:49.000000000 +0500
+++ russian/security/2016/dsa-3542.wml 2016-04-05 20:54:00.157730084 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in Mercurial, a distributed
- -version control system. The Common Vulnerabilities and Exposures project
- -identifies the following issues:</p>
+<p>Ð? Mercurial, Ñ?аÑ?пÑ?еделÑ?нной Ñ?иÑ?Ñ?еме Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3068">CVE-2016-3068</a>
- - <p>Blake Burkhart discovered that Mercurial allows URLs for Git
- - subrepositories that could result in arbitrary code execution on
- - clone.</p></li>
+ <p>Ð?лÑ?йк Ð?Ñ?Ñ?Ñ?аÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о Mercurial Ñ?азÑ?еÑ?аеÑ? иÑ?полÑ?зоваÑ?Ñ? длÑ? подÑ?епозиÑ?оÑ?иев
+ Git Ñ?акие URL, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к вÑ?полнениÑ? пÑ?оизволÑ?ного кода пÑ?и
+ вÑ?полнении клониÑ?ованиÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3069">CVE-2016-3069</a>
- - <p>Blake Burkhart discovered that Mercurial allows arbitrary code
- - execution when converting Git repositories with specially
- - crafted names.</p></li>
+ <p>Ð?лÑ?йк Ð?Ñ?Ñ?Ñ?аÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о Mercurial позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й
+ код пÑ?и конвеÑ?Ñ?аÑ?ии Git-Ñ?епозиÑ?оÑ?иев Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?ми
+ именами.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3630">CVE-2016-3630</a>
- - <p>It was discovered that Mercurial does not properly perform bounds-checking
- - in its binary delta decoder, which may be exploitable for
- - remote code execution via clone, push or pull.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Mercurial непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?ки гÑ?аниÑ? бÑ?Ñ?еÑ?ов
+ в коде декодиÑ?ованиÑ? двоиÑ?нÑ?Ñ? делÑ?Ñ?, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ?
+ Ñ?далÑ?нного вÑ?полнениÑ? кода во вÑ?емÑ? клониÑ?ованиÑ?, оÑ?пÑ?авки или загÑ?Ñ?зки.</p></li>
</ul>
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 2.2.2-4+deb7u2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.2.2-4+deb7u2.</p>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 3.1.2-2+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.1.2-2+deb8u2.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 3.7.3-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.7.3-1.</p>
- -<p>We recommend that you upgrade your mercurial packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? mercurial.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=CuuH
-----END PGP SIGNATURE-----
Reply to: