[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3555.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3555.wml	2016-04-24 13:52:41.000000000 +0500
+++ russian/security/2016/dsa-3555.wml	2016-04-24 14:06:21.199929203 +0500
@@ -1,49 +1,50 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in imlib2, an image manipulation
- -library.</p>
+<p>Ð? imlib2, библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? изобÑ?ажениÑ?ми, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-5326";>CVE-2011-5326</a>
 
- -    <p>Kevin Ryde discovered that attempting to draw a 2x1 radi ellipse
- -    results in a floating point exception.</p></li>
+    <p>Ð?Ñ?вин Райд обнаÑ?Ñ?жил, Ñ?Ñ?о попÑ?Ñ?ка наÑ?иÑ?оваÑ?Ñ? Ñ?ллипÑ? Ñ?азмеÑ?ом 2x1
+    пÑ?иводиÑ? к возникновениÑ? иÑ?клÑ?Ñ?ениÑ? по Ñ?иÑ?лам Ñ? плаваÑ?Ñ?ей запÑ?Ñ?ой.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9771";>CVE-2014-9771</a>
 
- -    <p>It was discovered that an integer overflow could lead to invalid
- -    memory reads and unreasonably large memory allocations.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?ениÑ? непÑ?авилÑ?нÑ?Ñ?
+    облаÑ?Ñ?ей памÑ?Ñ?и и Ñ?лиÑ?ком болÑ?Ñ?им вÑ?делениÑ?м памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3993";>CVE-2016-3993</a>
 
- -    <p>Yuriy M. Kaminskiy discovered that drawing using coordinates from
- -    an untrusted source could lead to an out-of-bound memory read, which
- -    in turn could result in an application crash.</p></li>
+    <p>ЮÑ?ий Ð?аменÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?иÑ?ование Ñ? кооÑ?динаÑ?ами из
+    недовеÑ?енного иÑ?Ñ?оÑ?ника можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?ениÑ?м за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и, Ñ?Ñ?о
+    в Ñ?воÑ? оÑ?еÑ?едÑ? пÑ?иводиÑ? к аваÑ?ийной оÑ?Ñ?ановке пÑ?иложениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3994";>CVE-2016-3994</a>
 
- -    <p>Jakub Wilk discovered that a malformed image could lead to an
- -    out-of-bound read in the GIF loader, which may result in an
- -    application crash or information leak.</p></li>
+    <p>ЯкÑ?б Ð?илк обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное изобÑ?ажение можеÑ? пÑ?иводиÑ?Ñ?
+    к Ñ?Ñ?ениÑ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в загÑ?Ñ?зÑ?ике GIF, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+    аваÑ?ийной оÑ?Ñ?ановке пÑ?иложениÑ? или Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4024";>CVE-2016-4024</a>
 
- -    <p>Yuriy M. Kaminskiy discovered an integer overflow that could lead to
- -    an insufficient heap allocation and out-of-bound memory write.</p></li>
+    <p>ЮÑ?ий Ð?аменÑ?кий обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ?
+    к недоÑ?Ñ?аÑ?оÑ?номÑ? вÑ?делениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и и запиÑ?и за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 1.4.5-1+deb7u2.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.4.5-1+deb7u2.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.4.6-2+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.6-2+deb8u2.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.4.8-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.4.8-1.</p>
 
- -<p>We recommend that you upgrade your imlib2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? imlib2.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=i38t
-----END PGP SIGNATURE-----


Reply to: