[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3590.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3590.wml	2016-06-01 10:45:12.000000000 +0500
+++ russian/security/2016/dsa-3590.wml	2016-06-01 13:14:40.105847252 +0500
@@ -1,147 +1,148 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1667";>CVE-2016-1667</a>
 
- -    <p>Mariusz Mylinski discovered a cross-origin bypass.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?илинÑ?ки обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?овмеÑ?Ñ?нÑ?Ñ? иÑ?Ñ?оÑ?ников.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1668";>CVE-2016-1668</a>
 
- -    <p>Mariusz Mylinski discovered a cross-origin bypass in bindings to v8.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?илинÑ?ки обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?овмеÑ?Ñ?нÑ?Ñ? иÑ?Ñ?оÑ?ников в пÑ?ивÑ?зкаÑ? к v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1669";>CVE-2016-1669</a>
 
- -    <p>Choongwoo Han discovered a buffer overflow in the v8 javascript
- -    library.</p></li>
+    <p>ЧÑ?нгвÑ? ХанÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1670";>CVE-2016-1670</a>
 
- -    <p>A race condition was found that could cause the renderer process
- -    to reuse ids that should have been unique.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено Ñ?оÑ?Ñ?оÑ?ние гонки, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к повÑ?оÑ?номÑ? иÑ?полÑ?зованиÑ?
+    пÑ?оÑ?еÑ?Ñ?ом оÑ?Ñ?иÑ?овки иденÑ?иÑ?икаÑ?оÑ?ов, коÑ?оÑ?Ñ?е должнÑ? бÑ?Ñ?Ñ? Ñ?никалÑ?нÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1672";>CVE-2016-1672</a>
 
- -    <p>Mariusz Mylinski discovered a cross-origin bypass in extension
- -    bindings.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?илинÑ?ки обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?овмеÑ?Ñ?нÑ?Ñ? иÑ?Ñ?оÑ?ников в пÑ?ивÑ?зкаÑ?
+    Ñ?аÑ?Ñ?иÑ?ений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1673";>CVE-2016-1673</a>
 
- -    <p>Mariusz Mylinski discovered a cross-origin bypass in Blink/Webkit.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?илинÑ?ки обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?овмеÑ?Ñ?нÑ?Ñ? иÑ?Ñ?оÑ?ников в Blink/Webkit.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1674";>CVE-2016-1674</a>
 
- -    <p>Mariusz Mylinski discovered another cross-origin bypass in extension
- -    bindings.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?илинÑ?ки обнаÑ?Ñ?жил еÑ?Ñ? один Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?овмеÑ?Ñ?нÑ?Ñ? иÑ?Ñ?оÑ?ников в пÑ?ивÑ?зкаÑ?
+    Ñ?аÑ?Ñ?иÑ?ений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1675";>CVE-2016-1675</a>
 
- -    <p>Mariusz Mylinski discovered another cross-origin bypass in
+    <p>Ð?аÑ?иÑ?Ñ? Ð?илинÑ?ки обнаÑ?Ñ?жил еÑ?Ñ? один Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?овмеÑ?Ñ?нÑ?Ñ? иÑ?Ñ?оÑ?ников в
     Blink/Webkit.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1676";>CVE-2016-1676</a>
 
- -    <p>Rob Wu discovered a cross-origin bypass in extension bindings.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?овмеÑ?Ñ?нÑ?Ñ? иÑ?Ñ?оÑ?ников в пÑ?ивÑ?зкаÑ? Ñ?аÑ?Ñ?иÑ?ений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1677";>CVE-2016-1677</a>
 
- -    <p>Guang Gong discovered a type confusion issue in the v8 javascript
- -    library.</p></li>
+    <p>Ð?Ñ?ан Ð?Ñ?н обнаÑ?Ñ?жил пÑ?облемÑ? Ñ?ипизаÑ?ии в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1678";>CVE-2016-1678</a>
 
- -    <p>Christian Holler discovered an overflow issue in the v8 javascript
- -    library.</p></li>
+    <p>Ð?Ñ?иÑ?Ñ?иан ХоллеÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1679";>CVE-2016-1679</a>
 
- -    <p>Rob Wu discovered a use-after-free issue in the bindings to v8.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в пÑ?ивÑ?зкаÑ? к v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1680";>CVE-2016-1680</a>
 
- -    <p>Atte Kettunen discovered a use-after-free issue in the skia library.</p></li>
+    <p>Ð?Ñ?Ñ?е Ð?еÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в библиоÑ?еке skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1681";>CVE-2016-1681</a>
 
- -    <p>Aleksandar Nikolic discovered an overflow issue in the pdfium
- -    library.</p></li>
+    <p>Ð?лекÑ?андÑ? Ð?иколиÑ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в библиоÑ?еке
+    pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1682";>CVE-2016-1682</a>
 
- -    <p>KingstonTime discovered a way to bypass the Content Security Policy.</p></li>
+    <p>KingstonTime обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила безопаÑ?ноÑ?Ñ?и Ñ?одеÑ?жимого.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1683";>CVE-2016-1683</a>
 
- -    <p>Nicolas Gregoire discovered an out-of-bounds write issue in the
- -    libxslt library.</p></li>
+    <p>Ð?иколаÑ? Ð?Ñ?егоÑ?и обнаÑ?Ñ?жил запиÑ?Ñ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в
+    библиоÑ?еке libxslt.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1684";>CVE-2016-1684</a>
 
- -    <p>Nicolas Gregoire discovered an integer overflow issue in the
- -    libxslt library.</p></li>
+    <p>Ð?иколаÑ? Ð?Ñ?егоÑ?и обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в
+    библиоÑ?еке libxslt.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1685";>CVE-2016-1685</a>
 
- -    <p>Ke Liu discovered an out-of-bounds read issue in the pdfium library.</p></li>
+    <p>Ð?Ñ? Ð?Ñ? обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1686";>CVE-2016-1686</a>
 
- -    <p>Ke Liu discovered another out-of-bounds read issue in the pdfium
- -    library.</p></li>
+    <p>Ð?Ñ? Ð?Ñ? обнаÑ?Ñ?жил еÑ?Ñ? одно Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в библиоÑ?еке
+    pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1687";>CVE-2016-1687</a>
 
- -    <p>Rob Wu discovered an information leak in the handling of extensions.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии в коде обÑ?абоÑ?ки Ñ?аÑ?Ñ?иÑ?ений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1688";>CVE-2016-1688</a>
 
- -    <p>Max Korenko discovered an out-of-bounds read issue in the v8
- -    javascript library.</p></li>
+    <p>Ð?акÑ? Ð?оÑ?енко обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1689";>CVE-2016-1689</a>
 
- -    <p>Rob Wu discovered a buffer overflow issue.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1690";>CVE-2016-1690</a>
 
- -    <p>Rob Wu discovered a use-after-free issue.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1691";>CVE-2016-1691</a>
 
- -    <p>Atte Kettunen discovered a buffer overflow issue in the skia library.</p></li>
+    <p>Ð?Ñ?Ñ?е Ð?еÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в библиоÑ?еке skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1692";>CVE-2016-1692</a>
 
- -    <p>Til Jasper Ullrich discovered a cross-origin bypass issue.</p></li>
+    <p>ТилÑ? ЯÑ?пеÑ? УлÑ?Ñ?иÑ? обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?овмеÑ?Ñ?нÑ?Ñ? иÑ?Ñ?оÑ?ников.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1693";>CVE-2016-1693</a>
 
- -    <p>Khalil Zhani discovered that the Software Removal Tool download was
- -    done over an HTTP connection.</p></li>
+    <p>Халил Ð?ани обнаÑ?Ñ?жил, Ñ?Ñ?о загÑ?Ñ?зка Software Removal Tool
+    оÑ?Ñ?Ñ?еÑ?Ñ?влÑ?еÑ?Ñ?Ñ? по Ñ?оединениÑ? HTTP.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1694";>CVE-2016-1694</a>
 
- -    <p>Ryan Lester and Bryant Zadegan discovered that pinned public keys
- -    would be removed when clearing the browser cache.</p></li>
+    <p>Райан Ð?еÑ?Ñ?еÑ? и Ð?Ñ?ианÑ? Ð?адеган обнаÑ?Ñ?жили, Ñ?Ñ?о пÑ?икÑ?епленнÑ?е оÑ?кÑ?Ñ?Ñ?Ñ?е клÑ?Ñ?и
+    Ñ?далÑ?Ñ?Ñ?Ñ?Ñ? пÑ?и оÑ?иÑ?Ñ?ке кеÑ?а бÑ?аÑ?зеÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1695";>CVE-2016-1695</a>
 
- -    <p>The chrome development team found and fixed various issues during
- -    internal auditing.</p></li>
+    <p>Ð?оманда Ñ?азÑ?абоÑ?ки chrome обнаÑ?Ñ?жила и иÑ?пÑ?авила Ñ?азлиÑ?нÑ?е пÑ?облемÑ? в Ñ?оде
+    внÑ?Ñ?Ñ?еннего аÑ?диÑ?а.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 51.0.2704.63-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 51.0.2704.63-1~deb8u1.</p>
 
- -<p>For the testing distribution (stretch), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 51.0.2704.63-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 51.0.2704.63-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=7kqQ
-----END PGP SIGNATURE-----


Reply to: