[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3783.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3783.wml	2017-02-09 10:17:29.000000000 +0500
+++ russian/security/2017/dsa-3783.wml	2017-02-09 10:22:57.821720849 +0500
@@ -1,39 +1,40 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several issues have been discovered in PHP, a widely-used open source
- -general-purpose scripting language.</p>
+<p>Ð? PHP, Ñ?иÑ?око иÑ?полÑ?зÑ?емом Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев обÑ?его назнаÑ?ениÑ? Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м
+иÑ?Ñ?однÑ?м кодом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10158";>CVE-2016-10158</a>
 
- -    <p>Loading a TIFF or JPEG malicious file can lead to a Denial-of-Service
- -    attack when the EXIF header is being parsed.</p></li>
+    <p>Ð?агÑ?Ñ?зка вÑ?едоноÑ?ного Ñ?айла TIFF или JPEG можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании,
+     коÑ?оÑ?Ñ?й возникаеÑ? пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а EXIF-заголовка.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10159";>CVE-2016-10159</a>
 
- -    <p>Loading a malicious phar archive can cause an extensive memory
- -    allocation, leading to a Denial-of-Service attack on 32 bit
- -    computers.</p></li>
+    <p>Ð?агÑ?Ñ?зка вÑ?едоноÑ?ного phar-аÑ?Ñ?ива можеÑ? вÑ?зÑ?ваÑ?Ñ? вÑ?деление Ñ?Ñ?езмеÑ?ного
+    обÑ?Ñ?ма памÑ?Ñ?и, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании на 32-биÑ?нÑ?Ñ?
+    компÑ?Ñ?Ñ?еÑ?аÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10160";>CVE-2016-10160</a>
 
- -    <p>An attacker might remotely execute arbitrary code using a malicious
- -    phar archive. This is the consequence of an off-by-one memory
- -    corruption.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленник можеÑ? вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код, иÑ?полÑ?зÑ?Ñ? вÑ?едоноÑ?нÑ?й
+    phar-аÑ?Ñ?ив. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? Ñ?влÑ?еÑ?Ñ?Ñ? Ñ?ледÑ?Ñ?вием повÑ?еждениÑ? Ñ?одеÑ?жимого
+    памÑ?Ñ?и из-за оÑ?ибки на единиÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-10161";>CVE-2016-10161</a>
 
- -    <p>An attacker with control of the unserialize() function argument can
- -    cause an out-of-bounce read. This could lead to a Denial-of-Service
- -    attack or a remote code execution.</p></li>
+    <p>Ð?лоÑ?мÑ?Ñ?ленник, имеÑ?Ñ?ий конÑ?Ñ?олÑ? над аÑ?гÑ?менÑ?ом Ñ?Ñ?нкÑ?ии unserialize(), можеÑ?
+    вÑ?зÑ?ваÑ?Ñ? Ñ?Ñ?ение за пÑ?еделами вÑ?деленной памÑ?Ñ?и. ЭÑ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании
+    или Ñ?далÑ?нномÑ? вÑ?полнениÑ? кода.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 5.6.30+dfsg-0+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.6.30+dfsg-0+deb8u1.</p>
 
- -<p>We recommend that you upgrade your php5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php5.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=yVfE
-----END PGP SIGNATURE-----


Reply to: