[DONE] wml://security/2018/dsa-408{0,1}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2018/dsa-4080.wml 2018-01-09 11:52:50.000000000 +0500
+++ russian/security/2018/dsa-4080.wml 2018-01-09 17:52:39.554241199 +0500
@@ -1,45 +1,46 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were found in PHP, a widely-used open source
- -general purpose scripting language:</p>
+<p>Ð? PHP, Ñ?иÑ?око иÑ?полÑ?зÑ?емом Ñ?зÑ?ке обÑ?его назнаÑ?ениÑ? Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м иÑ?Ñ?однÑ?м
+кодом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11144">CVE-2017-11144</a>
- - <p>Denial of service in openssl extension due to incorrect return value
- - check of OpenSSL sealing function</p></li>
+ <p>Ð?Ñ?каз в обÑ?лÑ?живании в Ñ?аÑ?Ñ?иÑ?ении openssl из-за некоÑ?Ñ?екÑ?ной пÑ?овеÑ?ки возвÑ?аÑ?аемого
+ знаÑ?ениÑ? Ñ?Ñ?нкÑ?ии Ñ?иÑ?Ñ?ованиÑ? OpenSSL</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11145">CVE-2017-11145</a>
- - <p>Out-of-bounds read in wddx_deserialize()</p></li>
+ <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии wddx_deserialize()</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11628">CVE-2017-11628</a>
- - <p>Buffer overflow in PHP INI parsing API</p></li>
+ <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в API длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а INI</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12932">CVE-2017-12932</a> /
<a href="https://security-tracker.debian.org/tracker/CVE-2017-12934">CVE-2017-12934</a>
- - <p>Use-after-frees during unserialisation</p></li>
+ <p>Ð?Ñ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Ñ?оде деÑ?еÑ?иализаÑ?ии</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12933">CVE-2017-12933</a>
- - <p>Buffer overread in finish_nested_data()</p></li>
+ <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии finish_nested_data()</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16642">CVE-2017-16642</a>
- - <p>Out-of-bounds read in timelib_meridian()</p></li>
+ <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии timelib_meridian()</p></li>
</ul>
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 7.0.27-0+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7.0.27-0+deb9u1.</p>
- -<p>We recommend that you upgrade your php7.0 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php7.0.</p>
- -<p>For the detailed security status of php7.0 please refer to
- -its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и php7.0 можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
<a href="https://security-tracker.debian.org/tracker/php7.0">\
https://security-tracker.debian.org/tracker/php7.0</a></p>
</define-tag>
- --- english/security/2018/dsa-4081.wml 2018-01-09 11:50:04.000000000 +0500
+++ russian/security/2018/dsa-4081.wml 2018-01-09 17:55:57.591790360 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities were found in PHP, a widely-used open source
- -general purpose scripting language:</p>
+<p>Ð? PHP, Ñ?иÑ?око иÑ?полÑ?зÑ?емом Ñ?зÑ?ке обÑ?его назнаÑ?ениÑ? Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м иÑ?Ñ?однÑ?м
+кодом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11142">CVE-2017-11142</a>
- - <p>Denial of service via overly long form variables</p></li>
+ <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за Ñ?лиÑ?ком длиннÑ?Ñ? пеÑ?еменнÑ?Ñ? Ñ?оÑ?м</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11143">CVE-2017-11143</a>
- - <p>Invalid free() in wddx_deserialize()</p></li>
+ <p>Ð?екоÑ?Ñ?екÑ?ное иÑ?полÑ?зование Ñ?Ñ?нкÑ?ии free() в wddx_deserialize()</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11144">CVE-2017-11144</a>
- - <p>Denial of service in openssl extension due to incorrect return value
- - check of OpenSSL sealing function.</p></li>
+ <p>Ð?Ñ?каз в обÑ?лÑ?живании в Ñ?аÑ?Ñ?иÑ?ении openssl из-за некоÑ?Ñ?екÑ?ной пÑ?овеÑ?ки возвÑ?аÑ?аемого
+ знаÑ?ениÑ? Ñ?Ñ?нкÑ?ии Ñ?иÑ?Ñ?ованиÑ? OpenSSL</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11145">CVE-2017-11145</a>
- - <p>Out-of-bounds read in wddx_deserialize()</p></li>
+ <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии wddx_deserialize()</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11628">CVE-2017-11628</a>
- - <p>Buffer overflow in PHP INI parsing API</p></li>
+ <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в API длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а INI</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12933">CVE-2017-12933</a>
- - <p>Buffer overread in finish_nested_data()</p></li>
+ <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии finish_nested_data()</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16642">CVE-2017-16642</a>
- - <p>Out-of-bounds read in timelib_meridian()</p></li>
+ <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии timelib_meridian()</p></li>
</ul>
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 5.6.33+dfsg-0+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 5.6.33+dfsg-0+deb8u1.</p>
- -<p>We recommend that you upgrade your php5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php5.</p>
- -<p>For the detailed security status of php5 please refer to
- -its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и php5 можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
<a href="https://security-tracker.debian.org/tracker/php5">\
https://security-tracker.debian.org/tracker/php5</a></p>
</define-tag>
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlpUu+QACgkQXudu4gIW
0qWimg/9E6f3mogv/69gnVTbRESNNskG1dItnblncGYMisqQivsVwZcxWmkunnlt
2owXsz5e7f/M/4U8v2te6Ss2CsCFg8epK/PU5d6Mmk4KVt2N9KOuL61FYfolZSkM
LD9SlydMtDmXoVRrptCQHjtgVk+MKrg7FHUhp2haHWPV7Qe3qMo7PEJH/FLHUO2O
cgpkVpCakU2vqOLMRnpBBavePl6ij7HnhPZ/J3LxlIeUnFNXiqmhEeE+nWF/sIrB
thheraRO1CcxK2drR/Aos96oc7jF7YSfC7jCYS9Eq5W54skGScmGHmXjFPzYftgo
GRNZzoFtgr1QHLItA+9U8ewr2L5yYoYUcZiKufDkEM3nZpob9oynyhe2D6sTJnun
B9T8SU4wKlOW2pYC1zt5UQnwl+aPptat7BDXgUPmT1NgwngpS9TC11qO4ivihEX/
d5je+82Cj0bRnZvhS/ogHv382bLTsCajNg4OMNAdgoAi6DxSzP+ZuauybUFicYeB
+zZNgKa3OKhPO8y1tMbkQQAS6CefNKEzkIRclqBnXK92ov5nWfBha4jAsSsPt+9X
uYP6AVk6mDFZLaO2Jv++grsk5lwIOsS1c2IHPzrPZBc8VDmPciYIhCVrlhh64M6I
P2Glt/NZZQvezmu11YkTCmq+x9QYBkh4DzX3HGQ67xw8Ydm63hY=
=gc3S
-----END PGP SIGNATURE-----
Reply to: