[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3750.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3750.wml	2016-12-31 16:45:59.000000000 +0500
+++ russian/security/2016/dsa-3750.wml	2016-12-31 16:54:00.856384271 +0500
@@ -1,23 +1,24 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Dawid Golunski discovered that PHPMailer, a popular library to send
- -email from PHP applications, allowed a remote attacker to execute
- -code if they were able to provide a crafted Sender address.</p>
+<p>Ð?авид Ð?олÑ?нÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о PHPMailer, попÑ?лÑ?Ñ?наÑ? библиоÑ?ека длÑ? оÑ?пÑ?авки
+Ñ?ообÑ?ений Ñ?лекÑ?Ñ?онной поÑ?Ñ?Ñ? из пÑ?иложений на Ñ?зÑ?ке PHP, позволÑ?еÑ? Ñ?далÑ?нномÑ? злоÑ?мÑ?Ñ?ленникÑ?
+вÑ?полнÑ?Ñ?Ñ? код в Ñ?лÑ?Ñ?ае, еÑ?ли он можеÑ? пеÑ?едаÑ?Ñ? пÑ?иложениÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й адÑ?еÑ? в поле Sender.</p>
 
- -<p>Note that for this issue also <a href="https://security-tracker.debian.org/tracker/CVE-2016-10045";>
- -CVE-2016-10045</a> was assigned, which is a regression in the original patch
- -proposed for <a href="https://security-tracker.debian.org/tracker/CVE-2016-10033";>
- -CVE-2016-10033</a>. Because the origial patch was not applied in Debian,
- -Debian was not vulnerable to <a href="https://security-tracker.debian.org/tracker/CVE-2016-10045";>
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?а пÑ?облема Ñ?акже полÑ?Ñ?ила иденÑ?иÑ?икаÑ?оÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2016-10045";>
+CVE-2016-10045</a>, и Ñ?влÑ?еÑ?Ñ?Ñ? Ñ?егÑ?еÑ?Ñ?ией в изнаÑ?алÑ?ной заплаÑ?е,
+пÑ?едложенной длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2016-10033";>
+CVE-2016-10033</a>. Ð?оÑ?колÑ?кÑ? изнаÑ?алÑ?наÑ? заплаÑ?а не бÑ?ла пÑ?именена в Debian,
+веÑ?Ñ?иÑ? в Debian не подвеÑ?жена Ñ?Ñ?звимоÑ?Ñ?и <a href="https://security-tracker.debian.org/tracker/CVE-2016-10045";>
 CVE-2016-10045</a>.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 5.2.9+dfsg-2+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.2.9+dfsg-2+deb8u2.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 5.2.14+dfsg-2.1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 5.2.14+dfsg-2.1.</p>
 
- -<p>We recommend that you upgrade your libphp-phpmailer packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libphp-phpmailer.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=OytU
-----END PGP SIGNATURE-----


Reply to: