[DONE] wml://security/2015/dla-{189,237}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-189.wml 2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-189.wml 2016-04-28 02:05:09.270835200 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in libgd2, a graphics library:</p>
+<p>Ð? libgd2, библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? гÑ?аÑ?икой, бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2497">CVE-2014-2497</a>
- - <p>The gdImageCreateFromXpm() function would try to dereference a NULL
- - pointer when reading an XPM file with a special color table. This
- - could allow remote attackers to cause a denial of service (crash) via
- - crafted XPM files.</p></li>
+ <p>ФÑ?нкÑ?иÑ? gdImageCreateFromXpm() пÑ?Ñ?аеÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?
+ пÑ?и Ñ?Ñ?ении Ñ?айла XPM Ñ?о Ñ?пеÑ?иалÑ?ной Ñ?аблиÑ?ей Ñ?веÑ?ов. ÐÑ?о
+ можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ?
+ помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов XPM.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9709">CVE-2014-9709</a>
- - <p>Importing an invalid GIF file using the gdImageCreateFromGif() function
- - would cause a read buffer overflow that could allow remote attackers to
- - cause a denial of service (crash) via crafted GIF files.</p></li>
+ <p>Ð?мпоÑ?Ñ?иÑ?ование некоÑ?Ñ?екÑ?ного Ñ?айла GIF, иÑ?полÑ?зÑ?Ñ? Ñ?Ñ?нкÑ?иÑ? gdImageCreateFromGif(),
+ пÑ?иводиÑ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а Ñ?Ñ?ениÑ?, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+ вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов GIF.</p></li>
</ul>
</define-tag>
- --- english/security/2015/dla-237.wml 2016-04-08 00:21:20.000000000 +0500
+++ russian/security/2015/dla-237.wml 2016-04-28 02:14:02.489320067 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9462">CVE-2014-9462</a>
- - <p>Jesse Hertz of Matasano Security discovered that Mercurial, a
- - distributed version control system, is prone to a command injection
- - vulnerability via a crafted repository name in a clone command.</p></li>
+ <p>Ð?жеÑ?Ñ?и Ð?еÑ?Ñ? из Matasano Security обнаÑ?Ñ?жил, Ñ?Ñ?о Mercurial, Ñ?аÑ?пÑ?еделÑ?ннаÑ?
+ Ñ?иÑ?Ñ?ема Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми, Ñ?Ñ?звима к инÑ?екÑ?ии команд
+ Ñ?еÑ?ез Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное имÑ? Ñ?епозиÑ?оÑ?иÑ? в команде clone.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9390">CVE-2014-9390</a>
- - <p>is a security vulnerability that affects mercurial repositories in a
- - case-insensitive filesystem (eg. VFAT or HFS+). It allows for remote
- - code execution of a specially crafted repository. This is less
- - severe for the average Debian installation as they are usually set
- - up with case-sensitive filesystems.</p></li>
+ <p>Ð?мееÑ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?, каÑ?аÑ?Ñ?аÑ?Ñ?Ñ? Ñ?епозиÑ?оÑ?иев mercurial, Ñ?аÑ?положеннÑ?Ñ? на
+ Ñ?айловÑ?Ñ? Ñ?иÑ?Ñ?емаÑ?, неÑ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? к Ñ?егиÑ?Ñ?Ñ?Ñ? (напÑ?., VFAT или HFS+). Ð?на позволÑ?еÑ?
+ Ñ?далÑ?нно вÑ?полнÑ?Ñ?Ñ? код пÑ?и Ñ?абоÑ?е Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м Ñ?епозиÑ?оÑ?ием. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+ менее Ñ?еÑ?Ñ?Ñ?зна длÑ? Ñ?Ñ?едней Ñ?иÑ?Ñ?емÑ? Debian, поÑ?колÑ?кÑ? в ниÑ? обÑ?Ñ?но иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ?
+ Ñ?айловÑ?е Ñ?иÑ?Ñ?емÑ?, Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?е к Ñ?егиÑ?Ñ?Ñ?Ñ?.</p></li>
</ul>
</define-tag>
-----BEGIN PGP SIGNATURE-----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=/BKz
-----END PGP SIGNATURE-----
Reply to: