[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2015/dla-{189,237}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2015/dla-189.wml	2016-04-07 03:10:34.000000000 +0500
+++ russian/security/2015/dla-189.wml	2016-04-28 02:05:09.270835200 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in libgd2, a graphics library:</p>
+<p>Ð? libgd2, библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? гÑ?аÑ?икой, бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-2497";>CVE-2014-2497</a>
 
- -    <p>The gdImageCreateFromXpm() function would try to dereference a NULL
- -    pointer when reading an XPM file with a special color table. This
- -    could allow remote attackers to cause a denial of service (crash) via
- -    crafted XPM files.</p></li>
+    <p>ФÑ?нкÑ?иÑ? gdImageCreateFromXpm() пÑ?Ñ?аеÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?
+    пÑ?и Ñ?Ñ?ении Ñ?айла XPM Ñ?о Ñ?пеÑ?иалÑ?ной Ñ?аблиÑ?ей Ñ?веÑ?ов. ЭÑ?о
+    можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ?
+    помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов XPM.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9709";>CVE-2014-9709</a>
 
- -    <p>Importing an invalid GIF file using the gdImageCreateFromGif() function
- -    would cause a read buffer overflow that could allow remote attackers to
- -    cause a denial of service (crash) via crafted GIF files.</p></li>
+    <p>Ð?мпоÑ?Ñ?иÑ?ование некоÑ?Ñ?екÑ?ного Ñ?айла GIF, иÑ?полÑ?зÑ?Ñ? Ñ?Ñ?нкÑ?иÑ? gdImageCreateFromGif(),
+    пÑ?иводиÑ? к пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а Ñ?Ñ?ениÑ?, Ñ?Ñ?о позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам
+    вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов GIF.</p></li>
 
 </ul>
 </define-tag>
- --- english/security/2015/dla-237.wml	2016-04-08 00:21:20.000000000 +0500
+++ russian/security/2015/dla-237.wml	2016-04-28 02:14:02.489320067 +0500
@@ -1,21 +1,22 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9462";>CVE-2014-9462</a>
 
- -    <p>Jesse Hertz of Matasano Security discovered that Mercurial, a
- -    distributed version control system, is prone to a command injection
- -    vulnerability via a crafted repository name in a clone command.</p></li>
+    <p>Ð?жеÑ?Ñ?и Ð?еÑ?Ñ? из Matasano Security обнаÑ?Ñ?жил, Ñ?Ñ?о Mercurial, Ñ?аÑ?пÑ?еделÑ?ннаÑ?
+    Ñ?иÑ?Ñ?ема Ñ?пÑ?авлениÑ? веÑ?Ñ?иÑ?ми, Ñ?Ñ?звима к инÑ?екÑ?ии команд
+    Ñ?еÑ?ез Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное имÑ? Ñ?епозиÑ?оÑ?иÑ? в команде clone.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9390";>CVE-2014-9390</a>
 
- -    <p>is a security vulnerability that affects mercurial repositories in a
- -    case-insensitive filesystem (eg. VFAT or HFS+).  It allows for remote
- -    code execution of a specially crafted repository.  This is less
- -    severe for the average Debian installation as they are usually set
- -    up with case-sensitive filesystems.</p></li>
+    <p>Ð?мееÑ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?, каÑ?аÑ?Ñ?аÑ?Ñ?Ñ? Ñ?епозиÑ?оÑ?иев mercurial, Ñ?аÑ?положеннÑ?Ñ? на
+    Ñ?айловÑ?Ñ? Ñ?иÑ?Ñ?емаÑ?, неÑ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? к Ñ?егиÑ?Ñ?Ñ?Ñ? (напÑ?., VFAT или HFS+).  Ð?на позволÑ?еÑ?
+    Ñ?далÑ?нно вÑ?полнÑ?Ñ?Ñ? код пÑ?и Ñ?абоÑ?е Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м Ñ?епозиÑ?оÑ?ием.  ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ?
+    менее Ñ?еÑ?Ñ?Ñ?зна длÑ? Ñ?Ñ?едней Ñ?иÑ?Ñ?емÑ? Debian, поÑ?колÑ?кÑ? в ниÑ? обÑ?Ñ?но иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ?
+    Ñ?айловÑ?е Ñ?иÑ?Ñ?емÑ?, Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?е к Ñ?егиÑ?Ñ?Ñ?Ñ?.</p></li>
 
 </ul>
 </define-tag>
-----BEGIN PGP SIGNATURE-----
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=/BKz
-----END PGP SIGNATURE-----


Reply to: