[DONE] wml://{security/2016/dsa-3588.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3588.wml 2016-05-30 01:10:31.000000000 +0500
+++ russian/security/2016/dsa-3588.wml 2016-05-30 01:15:14.211878214 +0500
@@ -1,33 +1,34 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Two vulnerabilities were discovered in Symfony, a PHP framework.</p>
+<p>Ð? Symfony, инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е PHP, бÑ?ли обнаÑ?Ñ?женÑ? две Ñ?Ñ?звимоÑ?Ñ?и.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1902">CVE-2016-1902</a>
- - <p>Lander Brandt discovered that the class SecureRandom might generate
- - weak random numbers for cryptographic use under certain settings. If
- - the functions random_bytes() or openssl_random_pseudo_bytes() are not
- - available, the output of SecureRandom should not be consider secure.</p></li>
+ <p>Ð?андеÑ? Ð?Ñ?андÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о клаÑ?Ñ? SecureRandom пÑ?и опÑ?еделÑ?ннÑ?Ñ? наÑ?Ñ?Ñ?ойкаÑ?
+ можеÑ? Ñ?оздаваÑ?Ñ? Ñ?лÑ?Ñ?айнÑ?е Ñ?иÑ?ла, Ñ?влÑ?Ñ?Ñ?иеÑ?Ñ? Ñ?лиÑ?ком Ñ?лабÑ?ми длÑ? Ñ?иÑ?Ñ?ованиÑ?. Ð?Ñ?ли
+ Ñ?Ñ?нкÑ?ии random_bytes() или openssl_random_pseudo_bytes() недоÑ?Ñ?Ñ?пнÑ?,
+ Ñ?о вÑ?вод SecureRandom не можеÑ? Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ? безопаÑ?нÑ?ми.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4423">CVE-2016-4423</a>
- - <p>Marek Alaksa from Citadelo discovered that it is possible to fill up
- - the session storage space by submitting inexistent large usernames.</p></li>
+ <p>Ð?аÑ?ек Ð?лакÑ?а из Citadelo обнаÑ?Ñ?жил, Ñ?Ñ?о можно заполниÑ?Ñ?
+ пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?во Ñ?Ñ?анилиÑ?а Ñ?еÑ?Ñ?ий пÑ?Ñ?Ñ?м пеÑ?едаÑ?и неÑ?Ñ?Ñ?еÑ?Ñ?вÑ?Ñ?Ñ?иÑ? имÑ?н полÑ?зоваÑ?елей болÑ?Ñ?ого Ñ?азмеÑ?а.</p></li>
</ul>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 2.3.21+dfsg-4+deb8u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.3.21+dfsg-4+deb8u3.</p>
- -<p>For the testing distribution (stretch), these problems have been fixed
- -in version 2.8.6+dfsg-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.8.6+dfsg-1.</p>
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2.8.6+dfsg-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.8.6+dfsg-1.</p>
- -<p>We recommend that you upgrade your symfony packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? symfony.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=MXGl
-----END PGP SIGNATURE-----
Reply to: