[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2018/dsa-408{0,1}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2018/dsa-4080.wml	2018-01-09 11:52:50.000000000 +0500
+++ russian/security/2018/dsa-4080.wml	2018-01-09 17:52:39.554241199 +0500
@@ -1,45 +1,46 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were found in PHP, a widely-used open source
- -general purpose scripting language:</p>
+<p>Ð? PHP, Ñ?иÑ?око иÑ?полÑ?зÑ?емом Ñ?зÑ?ке обÑ?его назнаÑ?ениÑ? Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м иÑ?Ñ?однÑ?м
+кодом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11144";>CVE-2017-11144</a>
 
- -    <p>Denial of service in openssl extension due to incorrect return value
- -    check of OpenSSL sealing function</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в Ñ?аÑ?Ñ?иÑ?ении openssl из-за некоÑ?Ñ?екÑ?ной пÑ?овеÑ?ки возвÑ?аÑ?аемого
+    знаÑ?ениÑ? Ñ?Ñ?нкÑ?ии Ñ?иÑ?Ñ?ованиÑ? OpenSSL</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11145";>CVE-2017-11145</a>
 
- -    <p>Out-of-bounds read in wddx_deserialize()</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии wddx_deserialize()</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11628";>CVE-2017-11628</a>
 
- -    <p>Buffer overflow in PHP INI parsing API</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в API длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а INI</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12932";>CVE-2017-12932</a> /
     <a href="https://security-tracker.debian.org/tracker/CVE-2017-12934";>CVE-2017-12934</a>
 
- -    <p>Use-after-frees during unserialisation</p></li>
+    <p>Ð?Ñ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Ñ?оде деÑ?еÑ?иализаÑ?ии</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12933";>CVE-2017-12933</a>
 
- -    <p>Buffer overread in finish_nested_data()</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии finish_nested_data()</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16642";>CVE-2017-16642</a>
 
- -    <p>Out-of-bounds read in timelib_meridian()</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии timelib_meridian()</p></li>
 
 </ul>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 7.0.27-0+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7.0.27-0+deb9u1.</p>
 
- -<p>We recommend that you upgrade your php7.0 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php7.0.</p>
 
- -<p>For the detailed security status of php7.0 please refer to
- -its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и php7.0 можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
 <a href="https://security-tracker.debian.org/tracker/php7.0";>\
 https://security-tracker.debian.org/tracker/php7.0</a></p>
 </define-tag>
- --- english/security/2018/dsa-4081.wml	2018-01-09 11:50:04.000000000 +0500
+++ russian/security/2018/dsa-4081.wml	2018-01-09 17:55:57.591790360 +0500
@@ -1,48 +1,49 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were found in PHP, a widely-used open source
- -general purpose scripting language:</p>
+<p>Ð? PHP, Ñ?иÑ?око иÑ?полÑ?зÑ?емом Ñ?зÑ?ке обÑ?его назнаÑ?ениÑ? Ñ? оÑ?кÑ?Ñ?Ñ?Ñ?м иÑ?Ñ?однÑ?м
+кодом, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11142";>CVE-2017-11142</a>
 
- -    <p>Denial of service via overly long form variables</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за Ñ?лиÑ?ком длиннÑ?Ñ? пеÑ?еменнÑ?Ñ? Ñ?оÑ?м</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11143";>CVE-2017-11143</a>
 
- -    <p>Invalid free() in wddx_deserialize()</p></li>
+    <p>Ð?екоÑ?Ñ?екÑ?ное иÑ?полÑ?зование Ñ?Ñ?нкÑ?ии free() в wddx_deserialize()</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11144";>CVE-2017-11144</a>
 
- -    <p>Denial of service in openssl extension due to incorrect return value
- -    check of OpenSSL sealing function.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании в Ñ?аÑ?Ñ?иÑ?ении openssl из-за некоÑ?Ñ?екÑ?ной пÑ?овеÑ?ки возвÑ?аÑ?аемого
+    знаÑ?ениÑ? Ñ?Ñ?нкÑ?ии Ñ?иÑ?Ñ?ованиÑ? OpenSSL</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11145";>CVE-2017-11145</a>
 
- -    <p>Out-of-bounds read in wddx_deserialize()</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии wddx_deserialize()</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11628";>CVE-2017-11628</a>
 
- -    <p>Buffer overflow in PHP INI parsing API</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в API длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а INI</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12933";>CVE-2017-12933</a>
 
- -    <p>Buffer overread in finish_nested_data()</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии finish_nested_data()</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-16642";>CVE-2017-16642</a>
 
- -    <p>Out-of-bounds read in timelib_meridian()</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии timelib_meridian()</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 5.6.33+dfsg-0+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 5.6.33+dfsg-0+deb8u1.</p>
 
- -<p>We recommend that you upgrade your php5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php5.</p>
 
- -<p>For the detailed security status of php5 please refer to
- -its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и php5 можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
 <a href="https://security-tracker.debian.org/tracker/php5";>\
 https://security-tracker.debian.org/tracker/php5</a></p>
 </define-tag>
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlpUu+QACgkQXudu4gIW
0qWimg/9E6f3mogv/69gnVTbRESNNskG1dItnblncGYMisqQivsVwZcxWmkunnlt
2owXsz5e7f/M/4U8v2te6Ss2CsCFg8epK/PU5d6Mmk4KVt2N9KOuL61FYfolZSkM
LD9SlydMtDmXoVRrptCQHjtgVk+MKrg7FHUhp2haHWPV7Qe3qMo7PEJH/FLHUO2O
cgpkVpCakU2vqOLMRnpBBavePl6ij7HnhPZ/J3LxlIeUnFNXiqmhEeE+nWF/sIrB
thheraRO1CcxK2drR/Aos96oc7jF7YSfC7jCYS9Eq5W54skGScmGHmXjFPzYftgo
GRNZzoFtgr1QHLItA+9U8ewr2L5yYoYUcZiKufDkEM3nZpob9oynyhe2D6sTJnun
B9T8SU4wKlOW2pYC1zt5UQnwl+aPptat7BDXgUPmT1NgwngpS9TC11qO4ivihEX/
d5je+82Cj0bRnZvhS/ogHv382bLTsCajNg4OMNAdgoAi6DxSzP+ZuauybUFicYeB
+zZNgKa3OKhPO8y1tMbkQQAS6CefNKEzkIRclqBnXK92ov5nWfBha4jAsSsPt+9X
uYP6AVk6mDFZLaO2Jv++grsk5lwIOsS1c2IHPzrPZBc8VDmPciYIhCVrlhh64M6I
P2Glt/NZZQvezmu11YkTCmq+x9QYBkh4DzX3HGQ67xw8Ydm63hY=
=gc3S
-----END PGP SIGNATURE-----


Reply to: