[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2011/dsa-2266.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2011/dsa-2266.wml	2017-11-01 10:11:10.263840301 +0500
+++ russian/security/2011/dsa-2266.wml	2018-03-10 00:13:39.182413991 +0500
@@ -1,55 +1,56 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several vulnerabilities were discovered in PHP, which could lead to 
- -denial of service or potentially the execution of arbitrary code.</p>
+<p>Ð? PHP бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к
+оÑ?казÑ? в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-2531";>CVE-2010-2531</a>
 
- -   <p>An information leak was found in the var_export() function.</p></li>
+   <p>Ð? Ñ?Ñ?нкÑ?ии var_export() бÑ?ла обнаÑ?Ñ?жен Ñ?Ñ?еÑ?ка инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0421";>CVE-2011-0421</a>
 
- -   <p>The Zip module could crash.</p></li>
+   <p>РабоÑ?а модÑ?лÑ? Zip можеÑ? завеÑ?Ñ?иÑ?Ñ?Ñ?Ñ? аваÑ?ийно.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-0708";>CVE-2011-0708</a>
 
- -   <p>An integer overflow was discovered in the Exif module.</p></li>
+   <p>Ð? модÑ?ле Exif бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1466";>CVE-2011-1466</a>
 
- -   <p>An integer overflow was discovered in the Calendar module.</p></li>
+   <p>Ð? модÑ?ле Calendar бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-1471";>CVE-2011-1471</a>
 
- -   <p>The Zip module was prone to denial of service through malformed
- -   archives.</p></li>
+   <p>Ð?одÑ?лÑ? Zip Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании, возникаÑ?Ñ?емÑ? из-за Ñ?пеÑ?иалÑ?но
+   Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? аÑ?Ñ?ивов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2011-2202";>CVE-2011-2202</a>
 
- -   <p>Path names in form based file uploads (RFC 1867) were incorrectly 
- -   validated.</p></li>
+   <p>Ð?Ñ?овеÑ?ка имÑ?н пÑ?Ñ?ей в загÑ?Ñ?зке Ñ?айлов на оÑ?нове Ñ?оÑ?м (RFC 1867) пÑ?оизводиÑ?Ñ?Ñ?
+   непÑ?авилÑ?но.</p></li>
 
 </ul>
 
- -<p>This update also fixes two bugs, which are not treated as security
- -issues, but fixed nonetheless, see README.Debian.security for details
- -on the scope of security support for PHP 
- -(<a href="https://security-tracker.debian.org/tracker/CVE-2011-0420";>CVE-2011-0420</a>, 
+<p>Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? две оÑ?ибки, коÑ?оÑ?Ñ?е не Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ? пÑ?облемами
+безопаÑ?ноÑ?Ñ?и, но вÑ?Ñ? Ñ?авно иÑ?пÑ?авленÑ?, подÑ?обноÑ?Ñ?и по поводÑ? поддеÑ?жки безопаÑ?ноÑ?Ñ?и PHP
+Ñ?м. в Ñ?айле README.Debian.security
+(<a href="https://security-tracker.debian.org/tracker/CVE-2011-0420";>CVE-2011-0420</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2011-1153";>CVE-2011-1153</a>).</p>
 
- -<p>For the oldstable distribution (lenny), these problems have been fixed in
- -version 5.2.6.dfsg.1-1+lenny12.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.2.6.dfsg.1-1+lenny12.</p>
 
- -<p>For the stable distribution (squeeze), these problems have been fixed in
- -version 5.3.3-7+squeeze3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.3.3-7+squeeze3.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 5.3.6-12.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.3.6-12.</p>
 
- -<p>We recommend that you upgrade your php5 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php5.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=wP/y
-----END PGP SIGNATURE-----


Reply to: