[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{356,210}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-210.wml	2016-04-07 03:47:55.000000000 +0500
+++ russian/security/2015/dla-210.wml	2016-05-03 12:57:21.483300271 +0500
@@ -1,20 +1,21 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>This update fixes multiple security issues in the Qt library.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и в библиоÑ?еке Qt.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-0254";>CVE-2013-0254</a>
 
- -    <p>The QSharedMemory class uses weak permissions (world-readable and
- -    world-writable) for shared memory segments, which allows local users
- -    to read sensitive information or modify critical program data, as
- -    demonstrated by reading a pixmap being sent to an X server.</p></li>
+    <p>Ð?лаÑ?Ñ? QSharedMemory иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? Ñ?лабÑ?е пÑ?ава доÑ?Ñ?Ñ?па (доÑ?Ñ?Ñ?п длÑ? Ñ?Ñ?ениÑ? и запиÑ?и
+    длÑ? вÑ?еÑ? полÑ?зоваÑ?елей) длÑ? Ñ?егменÑ?ов Ñ?азделÑ?емой памÑ?Ñ?и, Ñ?Ñ?о позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м
+    Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? или изменÑ?Ñ?Ñ? кÑ?иÑ?иÑ?еÑ?кие даннÑ?е пÑ?огÑ?аммÑ?, Ñ?Ñ?о
+    демонÑ?Ñ?Ñ?иÑ?Ñ?еÑ?Ñ?Ñ? Ñ?Ñ?ением пикÑ?елÑ?нÑ?Ñ? изобÑ?ажений, оÑ?пÑ?авлÑ?емÑ?Ñ? X-Ñ?еÑ?веÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-0295";>CVE-2015-0295</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2015-1858";>CVE-2015-1858</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2015-1859";>CVE-2015-1859</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2015-1860";>CVE-2015-1860</a>
 
- -    <p>Denial of service (via segmentation faults) through crafted
- -    images (BMP, GIF, ICO).</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании (Ñ?еÑ?ез оÑ?ибки Ñ?егменÑ?иÑ?ованиÑ?) пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но
+    Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? изобÑ?ажений (BMP, GIF, ICO).</p></li>
 
 </ul>
 </define-tag>
- --- english/security/2015/dla-356.wml	2016-04-08 00:21:20.000000000 +0500
+++ russian/security/2015/dla-356.wml	2016-05-03 12:54:25.796707383 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9496";>CVE-2014-9496</a>
 
- -    <p>The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows
- -    attackers to have unspecified impact via vectors related to a (1) map
- -    offset or (2) rsrc marker, which triggers an out-of-bounds read.</p></li>
+    <p>ФÑ?нкÑ?иÑ? sd2_parse_rsrc_fork в sd2.c в libsndfile позволÑ?еÑ?
+    злоÑ?мÑ?Ñ?ленникам оказÑ?ваÑ?Ñ? неопÑ?еделÑ?нное влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ? Ñ?еÑ?ез векÑ?оÑ?Ñ?, Ñ?вÑ?заннÑ?е Ñ? (1) оÑ?обÑ?ажением
+    Ñ?меÑ?ениÑ? или (2) rsrc-маÑ?кеÑ?ом, коÑ?оÑ?Ñ?е вÑ?зÑ?ваÑ?Ñ? Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9756";>CVE-2014-9756</a>
 
- -    <p>The psf_fwrite function in file_io.c in libsndfile allows attackers to
- -    cause a denial of service (divide-by-zero error and application crash)
- -    via unspecified vectors related to the headindex variable.</p></li>
+    <p>ФÑ?нкÑ?иÑ? psf_fwrite function в file_io.c в libsndfile позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникам
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (оÑ?ибка пÑ?и делении на нолÑ? и аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?)
+    Ñ?еÑ?ез неопÑ?еделÑ?ннÑ?е векÑ?оÑ?Ñ?, Ñ?вÑ?заннÑ?е Ñ? пеÑ?еменной headindex.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7805";>CVE-2015-7805</a>
 
- -    <p>Heap-based buffer overflow in libsndfile 1.0.25 allows remote
- -    attackers to have unspecified impact via the headindex value in the
- -    header in an AIFF file.</p></li>
+    <p>Ð?еÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в libsndfile веÑ?Ñ?ии 1.0.25 позволÑ?еÑ? Ñ?далÑ?ннÑ?м
+    злоÑ?мÑ?Ñ?ленникам оказÑ?ваÑ?Ñ? неопÑ?еделÑ?нное влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ? Ñ?еÑ?ез пеÑ?еменнÑ?Ñ? headindex в
+    заголовке Ñ?айла в Ñ?оÑ?маÑ?е AIFF.</p></li>
 
 </ul>
 </define-tag>
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXKFnkAAoJEF7nbuICFtKl97oQAK60XRS2pH795eQdwTJQUX3V
O2gvxenaKxlEcwcc3L/Qp9VJS3oBhz+nfwEN+HH6mfadQP9KrtSsbc2WutdKrnyZ
PYGkg7M+4HDh0ZFu27Krg5hK8/Y+ek8SNwbBcyRz8gip7fdahlbtgjjZk8pXUpDe
Yb6PGBo8X0zve2gSIcI6oXtoc21o483AKkT8LuKEbPSxDYZt1dMd5AQ1dfdIZHhi
Fv4XxAT1FN5X/VQ+eiYAhthOx4KqJXVKpv4yjaFcUGKfNItBgczQYZvZ25c+BjqJ
3ng0GDSSNqsMx4SiaCjp5yYg80hky8NWRgn9fwNr7/wRNyUBiR/7cF7JgZpwurEm
qiW/AHtrpJcwNWOxEVWCRvEvX2EBmZYcVTA8GHru6ix2T1Ojd9VzYfKE54AWP5nn
ofOeHYwOh8b4U4zDnRt/3mj73RJKsqW6+6MnQafEBt8+y6GRxllBYy8WOXOv/Uh1
TYvjlin1K1mXpEe0GvpKE85yYy3ccbJ0OdSbZkSrXLISW3Cxrc3+rEXV/Jk2zOu7
QGdSRkWYHkp+zYRzTLp7NUJQnlBmWMk4NcvrRXieqXNpFYHVjgYb6R5peVW8CVE5
WUiMcuI6hCjBdFBYZQwrpJdn1oGfkZG9G78a7mDv3WI7PYqEkNM55V797eo93f/K
T/Wfq7lQ5gKPdP94lH2a
=Q70A
-----END PGP SIGNATURE-----


Reply to: