[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3518.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3518.wml	2016-03-16 21:39:34.000000000 +0500
+++ russian/security/2016/dsa-3518.wml	2016-03-16 21:43:06.614978265 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were found in SPIP, a website engine for
- -publishing, resulting in code injection.</p>
+<p>Ð? SPIP, движке веб-Ñ?айÑ?а длÑ? издаÑ?елÑ?Ñ?кой деÑ?Ñ?елÑ?ноÑ?Ñ?и, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е пÑ?иводиÑ?Ñ? к инÑ?екÑ?ии кода.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3153";>CVE-2016-3153</a>
 
- -    <p>g0uZ et sambecks, from team root-me, discovered that arbitrary PHP
- -    code could be injected when adding content.</p></li>
+    <p>g0uZ и sambecks из командÑ? root-me обнаÑ?Ñ?жили, Ñ?Ñ?о пÑ?и добавлении Ñ?одеÑ?жимого
+    можно ввеÑ?Ñ?и пÑ?оизволÑ?нÑ?й код на Ñ?зÑ?ке PHP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3154";>CVE-2016-3154</a>
 
- -    <p>Gilles Vincent discovered that deserializing untrusted content
- -    could result in arbitrary objects injection.</p></li>
+    <p>Ð?илÑ? Ð?инÑ?ен обнаÑ?Ñ?жил, Ñ?Ñ?о деÑ?еÑ?иализаÑ?иÑ? недовеÑ?енного Ñ?одеÑ?жимого можеÑ?
+    пÑ?иводиÑ?Ñ? к инÑ?екÑ?ии пÑ?оизволÑ?нÑ?Ñ? обÑ?екÑ?ов.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 2.1.17-1+deb7u5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2.1.17-1+deb7u5.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 3.0.17-2+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.17-2+deb8u2.</p>
 
- -<p>For the testing (stretch) and unstable (sid) distributions, these
- -problems have been fixed in version 3.0.22-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.0.22-1.</p>
 
- -<p>We recommend that you upgrade your spip packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? spip.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=2LAi
-----END PGP SIGNATURE-----


Reply to: