[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2018/dsa-4172.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- ../../english/security/2018/dsa-4172.wml	2018-04-14 21:01:09.000000000 +0500
+++ 2018/dsa-4172.wml	2018-04-14 23:05:25.942361285 +0500
@@ -1,44 +1,47 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" mindelta="1"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in the implementation of the
- -Perl programming language. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Ñ?еализаÑ?ии Ñ?зÑ?ка пÑ?огÑ?аммиÑ?ованиÑ? Perl бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е
+Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6797";>CVE-2018-6797</a>
 
- -    <p>Brian Carpenter reported that a crafted regular expression
- -    could cause a heap buffer write overflow, with control over the
- -    bytes written.</p></li>
+    <p>Ð?Ñ?айан Ð?аÑ?пенÑ?еÑ? Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное Ñ?егÑ?лÑ?Ñ?ное вÑ?Ñ?ажение
+    можеÑ? вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и Ñ? запиÑ?Ñ?Ñ?, пÑ?иÑ?Ñ?м запиÑ?Ñ?ваемÑ?е байÑ?Ñ?
+    могÑ?Ñ? конÑ?Ñ?олиÑ?оваÑ?Ñ?Ñ?Ñ? злоÑ?мÑ?Ñ?ленником.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6798";>CVE-2018-6798</a>
 
- -    <p>Nguyen Duc Manh reported that matching a crafted locale dependent
- -    regular expression could cause a heap buffer read overflow and
- -    potentially information disclosure.</p></li>
+    <p>Ð?гÑ?иен Ð?Ñ?к Ð?ан Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?Ñ?авнение Ñ? завиÑ?Ñ?Ñ?им оÑ? локали Ñ?егÑ?лÑ?Ñ?нÑ?м
+    вÑ?Ñ?ажением можеÑ? вÑ?зваÑ?Ñ? пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и Ñ? Ñ?Ñ?ением и
+    поÑ?енÑ?иалÑ?ное Ñ?аÑ?кÑ?Ñ?Ñ?ие инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6913";>CVE-2018-6913</a>
 
- -    <p>GwanYeong Kim reported that 'pack()' could cause a heap buffer write
- -    overflow with a large item count.</p></li>
+    <p>Ð?ванÐ?онг Ð?им Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? pack() пÑ?и Ñ?абоÑ?е Ñ? болÑ?Ñ?им Ñ?иÑ?лом
+    Ñ?леменÑ?ов можеÑ? вÑ?зÑ?ваÑ?Ñ? пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и Ñ?
+    запиÑ?Ñ?Ñ?.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 5.20.2-3+deb8u10. The oldstable distribution (jessie) update
- -contains only a fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-6913";>CVE-2018-6913</a>.</p>
- -
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 5.24.1-3+deb9u3.</p>
- -
- -<p>We recommend that you upgrade your perl packages.</p>
- -
- -<p>For the detailed security status of perl please refer to its security
- -tracker page at:
- -<a href="https://security-tracker.debian.org/tracker/perl";>https://security-tracker.debian.org/tracker/perl</a></p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 5.20.2-3+deb8u10. Ð?бновление длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (jessie)
+Ñ?одеÑ?жиÑ? Ñ?олÑ?ко иÑ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2018-6913";>\
+CVE-2018-6913</a>.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 5.24.1-3+deb9u3.</p>
+
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? perl.</p>
+
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и perl можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/perl";>\
+https://security-tracker.debian.org/tracker/perl</a></p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2018/dsa-4172.data"
- -# $Id: dsa-4172.wml,v 1.1 2018/04/14 16:01:09 carnil Exp $
-----BEGIN PGP SIGNATURE-----
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=bSGd
-----END PGP SIGNATURE-----


Reply to: