[DONE] wml://security/2018/dsa-4240.wml
--- ../../english/security/2018/dsa-4240.wml 2018-07-06 10:11:19.150648865 +0500
+++ 2018/dsa-4240.wml 2018-07-06 10:20:56.842827532 +0500
@@ -1,48 +1,48 @@
-<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="106284ed210b4894870fc06b0f1886be682e6dfd" mindelta="1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
-<p>Several vulnerabilities were found in PHP, a widely-used open source
-general purpose scripting language:</p>
+<p>Ð? PHP, Ñ?иÑ?око иÑ?полÑ?зÑ?емом Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев обÑ?его назнаÑ?ениÑ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7584">CVE-2018-7584</a>
- <p>Buffer underread in parsing HTTP responses</p></li>
+ <p>Ð?Ñ?Ñ?Ñ?авание в заполнении бÑ?Ñ?еÑ?а пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а оÑ?веÑ?ов HTTP</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10545">CVE-2018-10545</a>
- <p>Dumpable FPM child processes allowed the bypass of opcache access
- controls</p></li>
+ <p>СоÑ?Ñ?анÑ?емÑ?е доÑ?еÑ?ние FPM-пÑ?оÑ?еÑ?Ñ?Ñ? позволÑ?Ñ?Ñ? обÑ?одиÑ? пÑ?овеÑ?кÑ? доÑ?Ñ?Ñ?па
+ opcache</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10546">CVE-2018-10546</a>
- <p>Denial of service via infinite loop in convert.iconv stream filter</p></li>
+ <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за беÑ?конеÑ?ного Ñ?икла в поÑ?оковом Ñ?илÑ?Ñ?Ñ?е convert.iconv</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10547">CVE-2018-10547</a>
- <p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-5712">CVE-2018-5712</a> (shipped in DSA 4080) was incomplete</p></li>
+ <p>Ð?Ñ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2018-5712">CVE-2018-5712</a> (из DSA 4080) неполно</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10548">CVE-2018-10548</a>
- <p>Denial of service via malformed LDAP server responses</p></li>
+ <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? оÑ?веÑ?ов LDAP-Ñ?еÑ?веÑ?а</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10549">CVE-2018-10549</a>
- <p>Out-of-bounds read when parsing malformed JPEG files</p></li>
+ <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов в Ñ?оÑ?маÑ?е JPEG</p></li>
</ul>
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 7.0.30-0+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7.0.30-0+deb9u1.</p>
-<p>We recommend that you upgrade your php7.0 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php7.0.</p>
-<p>For the detailed security status of php7.0 please refer to
-its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и php7.0 можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
<a href="https://security-tracker.debian.org/tracker/php7.0">\
https://security-tracker.debian.org/tracker/php7.0</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2018/dsa-4240.data"
-# $Id: $
Reply to: