[DONE] wml://{security/2017/dsa-3783.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2017/dsa-3783.wml 2017-02-09 10:17:29.000000000 +0500
+++ russian/security/2017/dsa-3783.wml 2017-02-09 10:22:57.821720849 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Several issues have been discovered in PHP, a widely-used open source
- -general-purpose scripting language.</p>
+<p>Ð? PHP, Ñ?иÑ?око иÑ?полÑ?зÑ?емом Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев обÑ?его назнаÑ?ениÑ? Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м
+иÑ?Ñ?однÑ?м кодом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10158">CVE-2016-10158</a>
- - <p>Loading a TIFF or JPEG malicious file can lead to a Denial-of-Service
- - attack when the EXIF header is being parsed.</p></li>
+ <p>Ð?агÑ?Ñ?зка вÑ?едоноÑ?ного Ñ?айла TIFF или JPEG можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании,
+ коÑ?оÑ?Ñ?й возникаеÑ? пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а EXIF-заголовка.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10159">CVE-2016-10159</a>
- - <p>Loading a malicious phar archive can cause an extensive memory
- - allocation, leading to a Denial-of-Service attack on 32 bit
- - computers.</p></li>
+ <p>Ð?агÑ?Ñ?зка вÑ?едоноÑ?ного phar-аÑ?Ñ?ива можеÑ? вÑ?зÑ?ваÑ?Ñ? вÑ?деление Ñ?Ñ?езмеÑ?ного
+ обÑ?Ñ?ма памÑ?Ñ?и, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании на 32-биÑ?нÑ?Ñ?
+ компÑ?Ñ?Ñ?еÑ?аÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10160">CVE-2016-10160</a>
- - <p>An attacker might remotely execute arbitrary code using a malicious
- - phar archive. This is the consequence of an off-by-one memory
- - corruption.</p></li>
+ <p>Ð?лоÑ?мÑ?Ñ?ленник можеÑ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код, иÑ?полÑ?зÑ?Ñ? вÑ?едоноÑ?нÑ?й
+ phar-аÑ?Ñ?ив. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? Ñ?влÑ?еÑ?Ñ?Ñ? Ñ?ледÑ?Ñ?вием повÑ?еждениÑ? Ñ?одеÑ?жимого
+ памÑ?Ñ?и из-за оÑ?ибки на единиÑ?Ñ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10161">CVE-2016-10161</a>
- - <p>An attacker with control of the unserialize() function argument can
- - cause an out-of-bounce read. This could lead to a Denial-of-Service
- - attack or a remote code execution.</p></li>
+ <p>Ð?лоÑ?мÑ?Ñ?ленник, имеÑ?Ñ?ий конÑ?Ñ?олÑ? над аÑ?гÑ?менÑ?ом Ñ?Ñ?нкÑ?ии unserialize(), можеÑ?
+ вÑ?зÑ?ваÑ?Ñ? Ñ?Ñ?ение за пÑ?еделами вÑ?деленной памÑ?Ñ?и. ÐÑ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании
+ или Ñ?далÑ?нномÑ? вÑ?полнениÑ? кода.</p></li>
</ul>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 5.6.30+dfsg-0+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.6.30+dfsg-0+deb8u1.</p>
- -<p>We recommend that you upgrade your php5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php5.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=yVfE
-----END PGP SIGNATURE-----
Reply to: