-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2007/dsa-1331.wml 2014-04-30 13:16:12.000000000 +0600 +++ russian/security/2007/dsa-1331.wml 2016-09-24 09:39:44.543085501 +0500 @@ -1,38 +1,39 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several remote vulnerabilities have been discovered in PHP, a - -server-side, HTML-embedded scripting language, which may lead to the - -execution of arbitrary code. The Common Vulnerabilities and Exposures - -project identifies the following problems:</p> +<p>Ð PHP, ÑеÑвеÑном ÑзÑке ÑÑенаÑиев Ñо вÑÑÑоенной поддеÑжкой HTML, бÑло обнаÑÑжено +неÑколÑко ÑдалÑннÑÑ ÑÑзвимоÑÑей, коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ Ðº +вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода. ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures +опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-0207">CVE-2006-0207</a> - - <p>Stefan Esser discovered HTTP response splitting vulnerabilities - - in the session extension. This only affects Debian 3.1 (Sarge).</p></li> + <p>ШÑеÑан ÐÑÑÐµÑ Ð¾Ð±Ð½Ð°ÑÑжил Ñазделение HTTP-запÑоÑов + в ÑаÑÑиÑении session. ÐÑа пÑоблема каÑаеÑÑÑ ÑолÑко Debian 3.1 (Sarge).</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2006-4486">CVE-2006-4486</a> - - <p>Stefan Esser discovered that an integer overflow in memory allocation - - routines allows the bypass of memory limit restrictions. This only - - affects Debian 3.1 (Sarge) on 64 bit architectures.</p></li> + <p>ШÑеÑан ÐÑÑÐµÑ Ð¾Ð±Ð½Ð°ÑÑжил, ÑÑо пеÑеполнение ÑелÑÑ ÑиÑел в ÑÑнкÑиÑÑ Ð²ÑÐ´ÐµÐ»ÐµÐ½Ð¸Ñ + памÑÑи позволÑÐµÑ Ð¾Ð±Ñ Ð¾Ð´Ð¸ÑÑ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ Ð¿Ð¾ памÑÑи. ÐÑа пÑоблема каÑаеÑÑÑ + ÑолÑко Debian 3.1 (Sarge) на 64-биÑнÑÑ Ð°ÑÑ Ð¸ÑекÑÑÑÐ°Ñ .</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1864">CVE-2007-1864</a> - - <p>It was discovered that a buffer overflow in the xmlrpc extension - - allows the execution of arbitrary code.</p></li> - - + <p>ÐÑло обнаÑÑжено, ÑÑо пеÑеполнение бÑÑеÑа в ÑаÑÑиÑении xmlrpc + позволÑÐµÑ Ð²ÑполнÑÑÑ Ð¿ÑоизволÑнÑй код.</p></li> + </ul> - -<p>For the oldstable distribution (sarge) these problems have been fixed - -in version 4.3.10-22.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (sarge) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ +в веÑÑии 4.3.10-22.</p> - -<p>For the stable distribution (etch) these problems have been fixed - -in version 4.4.4-8+etch4.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ +в веÑÑии 4.4.4-8+etch4.</p> - -<p>The unstable distribution (sid) no longer contains php4.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) пакеÑÑ php4 оÑÑÑÑÑÑвÑÑÑ.</p> - -<p>We recommend that you upgrade your PHP packages. Sarge packages for - -hppa, mips and powerpc are not yet available, due to problems on the - -build hosts. They will be provided later.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ PHP. ÐакеÑÑ Ð´Ð»Ñ Sarge Ð´Ð»Ñ +аÑÑ Ð¸ÑекÑÑÑ hppa, mips и powerpc пока недоÑÑÑÐ¿Ð½Ñ Ð¸Ð·-за пÑоблем на +ÑбоÑоÑнÑÑ ÑÐ·Ð»Ð°Ñ . Ðни бÑдÑÑ Ð¿ÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ñ Ð¿Ð¾Ð·Ð¶Ðµ.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJX5gOdAAoJEF7nbuICFtKlYIcP/08Qj5vkwsJpJLgPuO+DEpDl +sggyDao1MbQHsjG11lqpud55Dlx4rTuzVaCgDPP+gbsaqcoHZojLxFZzqZ+9FQ2 siYJuruFT8/elOqHF9dHQISGm6XP4J4kYPubKwgK/FYWXV/DfZN27XtHI3EjAiTL 4xFCc/jcKqs4E8OP+MIta5rwTiE8SESab493l/F3YHxYekQILT2PtJdFAmGv5rHU 7PPzAPwPdTzCjxtRWSx44ywPnbd4x31ldN3KLZL/Tt9wfId1aBzQnc/JBGQYfq3u LHRaTanN4kQ+1570YManTv/LZdCaJodfwBwOd3mAcDP7MuRi1Uy1cAguC/3p+1V+ k+zveaiYJdG//7Ry83ElXTGLMLIfgdPMQyEk5KyhJ1+RVgt9Bm9BSpg83A1o++S5 qusplz9UvmbYHFpu5c5FuYujRVhlNrjiWadZjoLDRYKOgzxeB8dBpEUq4pSnll4R BDG6ga2aJzdCsD86TJR+5Rl1RxHm2k8EdpGN64W7yOXbqirHrmsAocQhpGN6cwsX sqAo64JCc7T6h8iXQXsmAO3oNQSCe/VC8Dr0VL2PrC8X8drjP0+X48pCTTHtzcCi /hYzGtVd+UEo6xB9RFuzBhaccQZgWGU2wwQVf/x4jyvgp1eurAsVnkVXPNTp9m7n zb90fQK6pOzkizNHMq6L =u6Hc -----END PGP SIGNATURE-----