[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3810.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3810.wml	2017-03-16 10:44:27.000000000 +0500
+++ russian/security/2017/dsa-3810.wml	2017-03-16 23:50:44.688146988 +0500
@@ -1,94 +1,95 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5029";>CVE-2017-5029</a>
 
- -    <p>Holger Fuhrmannek discovered an integer overflow issue in the libxslt
- -    library.</p></li>
+    <p>ХолгеÑ? ФÑ?Ñ?маннек обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в библиоÑ?еке
+    libxslt.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5030";>CVE-2017-5030</a>
 
- -    <p>Brendon Tiszka discovered a memory corruption issue in the v8 javascript
- -    library.</p></li>
+    <p>Ð?Ñ?ендон ТиÑ?ка обнаÑ?Ñ?жил повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5031";>CVE-2017-5031</a>
 
- -    <p>Looben Yang discovered a use-after-free issue in the ANGLE library.</p></li>
+    <p>Ð?Ñ?бен Ян обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в библиоÑ?еке ANGLE.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5032";>CVE-2017-5032</a>
 
- -    <p>Ashfaq Ansari discovered an out-of-bounds write in the pdfium library.</p></li>
+    <p>Ð?Ñ?Ñ?ак Ð?нÑ?аÑ?и обнаÑ?Ñ?жил запиÑ?Ñ? за пÑ?еделами вÑ?деленной памÑ?Ñ?и в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5033";>CVE-2017-5033</a>
 
- -    <p>Nicolai Grødum discovered a way to bypass the Content Security Policy.</p></li>
+    <p>Ð?иколай Ð?Ñ?одÑ?м обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила безопаÑ?ноÑ?Ñ?и Ñ?одеÑ?жимого.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5034";>CVE-2017-5034</a>
 
- -    <p>Ke Liu discovered an integer overflow issue in the pdfium library.</p></li>
+    <p>Ð?е Ð?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5035";>CVE-2017-5035</a>
 
- -    <p>Enzo Aguado discovered an issue with the omnibox.</p></li>
+    <p>Энзо Ð?гÑ?адо обнаÑ?Ñ?жил пÑ?облемÑ? Ñ? omnibox.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5036";>CVE-2017-5036</a>
 
- -    <p>A use-after-free issue was discovered in the pdfium library.</p></li>
+    <p>Ð?Ñ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и бÑ?ло обнаÑ?Ñ?жено в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5037";>CVE-2017-5037</a>
 
- -    <p>Yongke Wang discovered multiple out-of-bounds write issues.</p></li>
+    <p>Ð?онгке Ð?ан обнаÑ?Ñ?жил многоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи запиÑ?и за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5038";>CVE-2017-5038</a>
 
- -    <p>A use-after-free issue was discovered in the guest view.</p></li>
+    <p>Ð?Ñ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и бÑ?ло обнаÑ?Ñ?жено в гоÑ?Ñ?евом окне.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5039";>CVE-2017-5039</a>
 
- -    <p>jinmo123 discovered a use-after-free issue in the pdfium library.</p></li>
+    <p>jinmo123 обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5040";>CVE-2017-5040</a>
 
- -    <p>Choongwoo Han discovered an information disclosure issue in the v8
- -    javascript library.</p></li>
+    <p>ЧÑ?нвÑ? ХанÑ? обнаÑ?Ñ?жил Ñ?аÑ?кÑ?Ñ?Ñ?ие инÑ?оÑ?маÑ?ии в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5041";>CVE-2017-5041</a>
 
- -    <p>Jordi Chancel discovered an address spoofing issue.</p></li>
+    <p>Ð?жоÑ?ди ЧанÑ?ел обнаÑ?Ñ?жил пÑ?облемÑ?, пÑ?иводÑ?Ñ?Ñ?Ñ? к подделке адÑ?еÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5042";>CVE-2017-5042</a>
 
- -    <p>Mike Ruddy discovered incorrect handling of cookies.</p></li>
+    <p>Ð?айк РÑ?ди обнаÑ?Ñ?жил непÑ?авилÑ?нÑ?Ñ? обÑ?абоÑ?кÑ? кÑ?ки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5043";>CVE-2017-5043</a>
 
- -    <p>Another use-after-free issue was discovered in the guest view.</p></li>
+    <p>Ð?Ñ?Ñ? одно иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и бÑ?ло обнаÑ?Ñ?жено в гоÑ?Ñ?евом окне.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5044";>CVE-2017-5044</a>
 
- -    <p>Kushal Arvind Shah discovered a heap overflow issue in the skia
- -    library.</p></li>
+    <p>Ð?Ñ?Ñ?ал Ð?Ñ?вин ШаÑ? обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в библиоÑ?еке
+    skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5045";>CVE-2017-5045</a>
 
- -    <p>Dhaval Kapil discovered an information disclosure issue.</p></li>
+    <p>Ð?Ñ?авал Ð?апил обнаÑ?Ñ?жил Ñ?аÑ?кÑ?Ñ?Ñ?ие инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5046";>CVE-2017-5046</a>
 
- -    <p>Masato Kinugawa discovered an information disclosure issue.</p></li>
+    <p>Ð?аÑ?аÑ?о Ð?ингава обнаÑ?Ñ?жил Ñ?аÑ?кÑ?Ñ?Ñ?ие инÑ?оÑ?маÑ?ии.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 57.0.2987.98-1~deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 57.0.2987.98-1~deb8u1.</p>
 
- -<p>For the upcoming stable (stretch) and unstable (sid) distributions, these
- -problems have been fixed in version 57.0.2987.98-1.</p>
+<p>Ð? гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?и
+пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 57.0.2987.98-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=C2RY
-----END PGP SIGNATURE-----


Reply to: