[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-34{79,86}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3479.wml	2016-02-22 11:44:58.000000000 +0500
+++ russian/security/2016/dsa-3479.wml	2016-02-22 23:14:04.148900981 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been found in the Graphite font rendering
- -engine which might result in denial of service or the execution of
- -arbitrary code if a malformed font file is processed.</p>
+<p>Ð? движке оÑ?Ñ?иÑ?овки Ñ?Ñ?иÑ?Ñ?ов Graphite бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е
+Ñ?Ñ?звимоÑ?Ñ?и, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или вÑ?полнениÑ?
+пÑ?оизволÑ?ного кода в Ñ?лÑ?Ñ?ае обÑ?абоÑ?ки Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?айла Ñ?Ñ?иÑ?Ñ?ов.</p>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 1.3.5-1~deb7u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.3.5-1~deb7u1.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.3.5-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.5-1~deb8u1.</p>
 
- -<p>For the testing distribution (stretch), these problems have been fixed
- -in version 1.3.5-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.3.5-1.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 1.3.5-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.3.5-1.</p>
 
- -<p>We recommend that you upgrade your graphite2 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? graphite2.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3486.wml	2016-02-22 11:45:30.000000000 +0500
+++ russian/security/2016/dsa-3486.wml	2016-02-22 23:19:26.657020378 +0500
@@ -1,55 +1,56 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1622";>CVE-2016-1622</a>
 
- -    <p>It was discovered that a maliciously crafted extension could bypass
- -    the Same Origin Policy.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?аÑ?Ñ?иÑ?ение, Ñ?озданное злоÑ?мÑ?Ñ?ленником, можеÑ? обойÑ?и
+    пÑ?авило одного иÑ?Ñ?оÑ?ника.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1623";>CVE-2016-1623</a>
 
- -    <p>Mariusz Mlynski discovered a way to bypass the Same Origin Policy.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?ки обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила одного иÑ?Ñ?оÑ?ника.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1624";>CVE-2016-1624</a>
 
- -    <p>lukezli discovered a buffer overflow issue in the Brotli library.</p></li>
+    <p>lukezli обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в библиоÑ?еке Brotli.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1625";>CVE-2016-1625</a>
 
- -    <p>Jann Horn discovered a way to cause the Chrome Instant feature to
- -    navigate to unintended destinations.</p></li>
+    <p>Ян ХоÑ?н обнаÑ?Ñ?жил Ñ?поÑ?об, пÑ?и помоÑ?и коÑ?оÑ?ого можно заÑ?Ñ?авиÑ?Ñ? Chrome Instant
+    пеÑ?ейÑ?и по адÑ?еÑ?Ñ?, коÑ?оÑ?Ñ?й не подÑ?азÑ?мевалÑ?Ñ? полÑ?зоваÑ?елем.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1626";>CVE-2016-1626</a>
 
- -    <p>An out-of-bounds read issue was discovered in the openjpeg library.</p></li>
+    <p>Ð? библиоÑ?еке openjpeg бÑ?ло обнаÑ?Ñ?жено Ñ?Ñ?ение за гÑ?аниÑ?ами вÑ?деленной облаÑ?Ñ?и памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1627";>CVE-2016-1627</a>
 
- -    <p>It was discovered that the Developer Tools did not validate URLs.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Developer Tools не вÑ?полнÑ?Ñ?Ñ? пÑ?овеÑ?кÑ? URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1628";>CVE-2016-1628</a>
 
- -    <p>An out-of-bounds read issue was discovered in the pdfium library.</p></li>
+    <p>Ð? библиоÑ?еке pdfium бÑ?ло обнаÑ?Ñ?жено Ñ?Ñ?ение за гÑ?аниÑ?ами вÑ?деленной облаÑ?Ñ?и памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1629";>CVE-2016-1629</a>
 
- -    <p>A way to bypass the Same Origin Policy was discovered in Blink/WebKit,
- -    along with a way to escape the chromium sandbox.</p></li>
+    <p>Ð? Blink/WebKit бÑ?л обнаÑ?Ñ?жен Ñ?поÑ?об обÑ?ода пÑ?авила одного иÑ?Ñ?оÑ?ника,
+    а Ñ?акже Ñ?поÑ?об вÑ?Ñ?ода из пеÑ?оÑ?ниÑ?Ñ? chromium.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 48.0.2564.116-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 48.0.2564.116-1~deb8u1.</p>
 
- -<p>For the testing distribution (stretch), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 48.0.2564.116-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 48.0.2564.116-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=7hN7
-----END PGP SIGNATURE-----


Reply to: