[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2007/dsa-1331.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1331.wml	2014-04-30 13:16:12.000000000 +0600
+++ russian/security/2007/dsa-1331.wml	2016-09-24 09:39:44.543085501 +0500
@@ -1,38 +1,39 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in PHP, a
- -server-side, HTML-embedded scripting language, which may lead to the
- -execution of arbitrary code. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? PHP, Ñ?еÑ?веÑ?ном Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев Ñ?о вÑ?Ñ?Ñ?оенной поддеÑ?жкой HTML, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+вÑ?полнениÑ? пÑ?оизволÑ?ного кода. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0207";>CVE-2006-0207</a>
- -    <p>Stefan Esser discovered HTTP response splitting vulnerabilities
- -    in the session extension. This only affects Debian 3.1 (Sarge).</p></li>
+    <p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил Ñ?азделение HTTP-запÑ?оÑ?ов
+    в Ñ?аÑ?Ñ?иÑ?ении session. ЭÑ?а пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian 3.1 (Sarge).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4486";>CVE-2006-4486</a>
- -    <p>Stefan Esser discovered that an integer overflow in memory allocation
- -    routines allows the bypass of memory limit restrictions. This only
- -    affects Debian 3.1 (Sarge) on 64 bit architectures.</p></li>
+    <p>ШÑ?еÑ?ан ЭÑ?Ñ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?Ñ?нкÑ?иÑ?Ñ? вÑ?делениÑ?
+    памÑ?Ñ?и позволÑ?еÑ? обÑ?одиÑ?Ñ? огÑ?аниÑ?ениÑ? по памÑ?Ñ?и. ЭÑ?а пÑ?облема каÑ?аеÑ?Ñ?Ñ?
+    Ñ?олÑ?ко Debian 3.1 (Sarge) на 64-биÑ?нÑ?Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?аÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1864";>CVE-2007-1864</a>
- -    <p>It was discovered that a buffer overflow in the xmlrpc extension
- -    allows the execution of arbitrary code.</p></li>
- -    
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пеÑ?еполнение бÑ?Ñ?еÑ?а в Ñ?аÑ?Ñ?иÑ?ении xmlrpc
+    позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?й код.</p></li>
+
 </ul>
 
- -<p>For the oldstable distribution (sarge) these problems have been fixed
- -in version 4.3.10-22.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4.3.10-22.</p>
 
- -<p>For the stable distribution (etch) these problems have been fixed
- -in version 4.4.4-8+etch4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4.4.4-8+etch4.</p>
 
- -<p>The unstable distribution (sid) no longer contains php4.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) пакеÑ?Ñ? php4 оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?.</p>
 
- -<p>We recommend that you upgrade your PHP packages. Sarge packages for
- -hppa, mips and powerpc are not yet available, due to problems on the
- -build hosts. They will be provided later.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? PHP. Ð?акеÑ?Ñ? длÑ? Sarge длÑ?
+аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? hppa, mips и powerpc пока недоÑ?Ñ?Ñ?пнÑ? из-за пÑ?облем на
+Ñ?боÑ?оÑ?нÑ?Ñ? Ñ?злаÑ?. Ð?ни бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? позже.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=u6Hc
-----END PGP SIGNATURE-----


Reply to: