[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dsa-350{7,8}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3507.wml	2016-03-06 20:45:59.000000000 +0500
+++ russian/security/2016/dsa-3507.wml	2016-03-06 21:00:48.564125889 +0500
@@ -1,83 +1,84 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8126";>CVE-2015-8126</a>
 
- -    <p>Joerg Bornemann discovered multiple buffer overflow issues in the
- -    libpng library.</p></li>
+    <p>Ð?оÑ?г Ð?оÑ?неман обнаÑ?Ñ?жил многоÑ?иÑ?леннÑ?е пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в
+    библиоÑ?еке libpng.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1630";>CVE-2016-1630</a>
 
- -    <p>Mariusz Mlynski discovered a way to bypass the Same Origin Policy
- -    in Blink/Webkit.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?ки обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила одного иÑ?Ñ?оÑ?ника
+    в Blink/Webkit.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1631";>CVE-2016-1631</a>
 
- -    <p>Mariusz Mlynski discovered a way to bypass the Same Origin Policy
- -    in the Pepper Plugin API.</p></li>
+    <p>Ð?аÑ?иÑ?Ñ? Ð?линÑ?ки обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила одного иÑ?Ñ?оÑ?ника
+    в API дополнениÑ? Pepper.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1632";>CVE-2016-1632</a>
 
- -    <p>A bad cast was discovered.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жен непÑ?авилÑ?ное пÑ?иведение Ñ?ипов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1633";>CVE-2016-1633</a>
 
- -    <p>cloudfuzzer discovered a use-after-free issue in Blink/Webkit.</p></li>
+    <p>cloudfuzzer обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Blink/Webkit.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1634";>CVE-2016-1634</a>
 
- -    <p>cloudfuzzer discovered a use-after-free issue in Blink/Webkit.</p></li>
+    <p>cloudfuzzer обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Blink/Webkit.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1635";>CVE-2016-1635</a>
 
- -    <p>Rob Wu discovered a use-after-free issue in Blink/Webkit.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Blink/Webkit.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1636";>CVE-2016-1636</a>
 
- -    <p>A way to bypass SubResource Integrity validation was discovered.</p></li>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен Ñ?поÑ?об обÑ?ода пÑ?овеÑ?ки Ñ?елоÑ?Ñ?ноÑ?Ñ?и подÑ?инÑ?нного Ñ?еÑ?Ñ?Ñ?Ñ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1637";>CVE-2016-1637</a>
 
- -    <p>Keve Nagy discovered an information leak in the skia library.</p></li>
+    <p>Ð?ив Ð?аги обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии в библиоÑ?еке skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1638";>CVE-2016-1638</a>
 
- -    <p>Rob Wu discovered a WebAPI bypass issue.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил пÑ?облемÑ? Ñ? обÑ?одом WebAPI.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1639";>CVE-2016-1639</a>
 
- -    <p>Khalil Zhani discovered a use-after-free issue in the WebRTC
- -    implementation.</p></li>
+    <p>Халил Ð?ани обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Ñ?еализаÑ?ии
+    WebRTC.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1640";>CVE-2016-1640</a>
 
- -    <p>Luan Herrera discovered an issue with the Extensions user interface.</p></li>
+    <p>Ð?Ñ?ан ХеÑ?Ñ?еÑ?а обнаÑ?Ñ?жил пÑ?облемÑ? и полÑ?зоваÑ?елÑ?Ñ?ким инÑ?еÑ?Ñ?ейÑ?ов Ñ?аÑ?Ñ?иÑ?ений.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1641";>CVE-2016-1641</a>
 
- -    <p>Atte Kettunen discovered a use-after-free issue in the handling of
- -    favorite icons.</p></li>
+    <p>Ð?Ñ?Ñ?е Ð?еÑ?Ñ?Ñ?нен обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в коде
+    обÑ?абоÑ?ки избÑ?аннÑ?Ñ? иконок.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1642";>CVE-2016-1642</a>
 
- -    <p>The chrome 49 development team found and fixed various issues
- -    during internal auditing.  Also multiple issues were fixed in
- -    the v8 javascript library, version 4.9.385.26.</p></li>
+    <p>Ð?оманда Ñ?азÑ?абоÑ?ки chrome 49 обнаÑ?Ñ?жила и иÑ?пÑ?авила Ñ?азлиÑ?нÑ?е пÑ?облемÑ?
+    в Ñ?оде пÑ?оведениÑ? внÑ?Ñ?Ñ?еннего аÑ?диÑ?а.  Ð?Ñ?оме Ñ?ого, многоÑ?иÑ?леннÑ?е пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+    javascript-библиоÑ?еке v8 веÑ?Ñ?ии 4.9.385.26.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 49.0.2623.75-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 49.0.2623.75-1~deb8u1.</p>
 
- -<p>For the testing distribution (stretch), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 49.0.2623.75-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 49.0.2623.75-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dsa-3508.wml	2016-03-06 20:38:07.000000000 +0500
+++ russian/security/2016/dsa-3508.wml	2016-03-06 21:27:03.527548471 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in JasPer, a library for
- -manipulating JPEG-2000 files. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? JasPer, библиоÑ?еке длÑ? Ñ?абоÑ?Ñ? Ñ? Ñ?айлами JPEG-2000, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-1577";>CVE-2016-1577</a>
 
- -    <p>Jacob Baines discovered a double-free flaw in the
- -    jas_iccattrval_destroy function. A remote attacker could exploit
- -    this flaw to cause an application using the JasPer library to crash,
- -    or potentially, to execute arbitrary code with the privileges of the
- -    user running the application.</p></li>
+    <p>Якоб Ð?аинеÑ? обнаÑ?Ñ?жил двойное оÑ?вобождение памÑ?Ñ?и в
+    Ñ?Ñ?нкÑ?ии jas_iccattrval_destroy. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+    Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки пÑ?иложениÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?его библиоÑ?екÑ? JasPer,
+    либо поÑ?енÑ?иалÑ?но вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код Ñ? пÑ?авами
+    полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?его Ñ?Ñ?о пÑ?иложение.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2089";>CVE-2016-2089</a>
 
- -    <p>The Qihoo 360 Codesafe Team discovered a NULL pointer dereference
- -    flaw within the jas_matrix_clip function. A remote attacker could
- -    exploit this flaw to cause an application using the JasPer library
- -    to crash, resulting in a denial-of-service.</p></li>
+    <p>Ð?оманда безопаÑ?ноÑ?Ñ?и Qihoo 360 обнаÑ?Ñ?жила Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ?
+    в Ñ?Ñ?нкÑ?ии jas_matrix_clip. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки пÑ?иложениÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?его
+    библиоÑ?екÑ? JasPer, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2116";>CVE-2016-2116</a>
 
- -    <p>Tyler Hicks discovered a memory leak flaw in the
- -    jas_iccprof_createfrombuf function. A remote attacker could exploit
- -    this flaw to cause the JasPer library to consume memory, resulting
- -    in a denial-of-service.</p></li>
+    <p>ТайлеÑ? ХикÑ? обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? памÑ?Ñ?и в
+    Ñ?Ñ?нкÑ?ии jas_iccprof_createfrombuf. УдалÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+    Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? Ñ?ак, Ñ?Ñ?обÑ? библиоÑ?ека JasPer иÑ?полÑ?зовала вÑ?Ñ? памÑ?Ñ?Ñ?, Ñ?Ñ?о пÑ?иводиÑ?
+    к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 1.900.1-13+deb7u4.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.900.1-13+deb7u4.</p>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.900.1-debian1-2.4+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.900.1-debian1-2.4+deb8u1.</p>
 
- -<p>We recommend that you upgrade your jasper packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? jasper.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJW3FpbAAoJEF7nbuICFtKlpyAP/Rffn/FlGKGSeFllIpzLgyUo
8+gdOnK6mSohfZAB3CGAH4Ihmo+XrPgiTzFkXaQGkuGG+AUoHsxjo3BwPZGMCyvp
dT27hdQ6N8ORAFhPiEwke9glGnmy52yoLTucc/x0ojbHubnXKu5PkcV5DakTAzzE
4xISb9SSi4VaSDDAhv7Z72b3dUgp/2iKWFEh677xwkmLDYDajABMkCHgYpZRU0kR
kgqDCAsdDHteZi9i9YMseN7OPF0g6FNpKRziavivcpLsE6lj1PjdPJ0lMnVNcA/j
QcerZZUEpvTdjo0SmMTBPdHhxgUanF+rCbeDoNmiUiA2vj3zZR42FHPu9f5c8P8l
F08ET8IKYraoGfOscu9N0VQZMvOdQ8v9iPPZ9JQtNV85+/OFJtEgzEG8MxVvxtW0
se7NKAqXlFeB3HaaDrNO9et45TvNrsq69MQgbPybMQ59oZm7r6C5hoV5uhO7vunY
UD8m+Yi/LBHb6ImIQCQv0S63fWtolJBxag/UnHqIBN+TB3DCYdA6t5eSyHOVlOSd
A4Jv/fJAaNKkDIBZw2UpxgD5LMvPz7r6gO2RGNjgY6IjP6KM5KFLGE9TjJ9f3d0B
I5k6vVzdf1/l5MwD6xhshZlUsmSYo3vMdOekVbinPSLTCRDJoOjOEzXQkezZlV7p
0USiyZ/+mT4P7d0ZfFpE
=rVsy
-----END PGP SIGNATURE-----


Reply to: