[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2018/dsa-4240.wml



--- ../../english/security/2018/dsa-4240.wml	2018-07-06 10:11:19.150648865 +0500
+++ 2018/dsa-4240.wml	2018-07-06 10:20:56.842827532 +0500
@@ -1,48 +1,48 @@
-<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="106284ed210b4894870fc06b0f1886be682e6dfd" mindelta="1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
-<p>Several vulnerabilities were found in PHP, a widely-used open source
-general purpose scripting language:</p>
+<p>Ð? PHP, Ñ?иÑ?око иÑ?полÑ?зÑ?емом Ñ?зÑ?ке Ñ?Ñ?енаÑ?иев обÑ?его назнаÑ?ениÑ?, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7584";>CVE-2018-7584</a>
 
-    <p>Buffer underread in parsing HTTP responses</p></li>
+    <p>Ð?Ñ?Ñ?Ñ?авание в заполнении бÑ?Ñ?еÑ?а пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а оÑ?веÑ?ов HTTP</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10545";>CVE-2018-10545</a>
 
-    <p>Dumpable FPM child processes allowed the bypass of opcache access
-    controls</p></li>
+    <p>СоÑ?Ñ?анÑ?емÑ?е доÑ?еÑ?ние FPM-пÑ?оÑ?еÑ?Ñ?Ñ? позволÑ?Ñ?Ñ? обÑ?одиÑ? пÑ?овеÑ?кÑ? доÑ?Ñ?Ñ?па
+    opcache</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10546";>CVE-2018-10546</a>
 
-    <p>Denial of service via infinite loop in convert.iconv stream filter</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за беÑ?конеÑ?ного Ñ?икла в поÑ?оковом Ñ?илÑ?Ñ?Ñ?е convert.iconv</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10547";>CVE-2018-10547</a>
 
-    <p>The fix for <a href="https://security-tracker.debian.org/tracker/CVE-2018-5712";>CVE-2018-5712</a> (shipped in DSA 4080) was incomplete</p></li>
+    <p>Ð?Ñ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2018-5712";>CVE-2018-5712</a> (из DSA 4080) неполно</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10548";>CVE-2018-10548</a>
 
-    <p>Denial of service via malformed LDAP server responses</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании из-за Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? оÑ?веÑ?ов LDAP-Ñ?еÑ?веÑ?а</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10549";>CVE-2018-10549</a>
 
-    <p>Out-of-bounds read when parsing malformed JPEG files</p></li>
+    <p>ЧÑ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?айлов в Ñ?оÑ?маÑ?е JPEG</p></li>
 
 </ul>
 
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 7.0.30-0+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 7.0.30-0+deb9u1.</p>
 
-<p>We recommend that you upgrade your php7.0 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? php7.0.</p>
 
-<p>For the detailed security status of php7.0 please refer to
-its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и php7.0 можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
 <a href="https://security-tracker.debian.org/tracker/php7.0";>\
 https://security-tracker.debian.org/tracker/php7.0</a></p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2018/dsa-4240.data"
-# $Id: $


Reply to: