[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3985.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3985.wml	2017-09-28 18:16:33.000000000 +0500
+++ russian/security/2017/dsa-3985.wml	2017-09-28 18:24:29.228610361 +0500
@@ -1,74 +1,75 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5111";>CVE-2017-5111</a>
 
- -    <p>Luat Nguyen discovered a use-after-free issue in the pdfium library.</p></li>
+    <p>Ð?Ñ?аÑ? Ð?гÑ?ен обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5112";>CVE-2017-5112</a>
 
- -    <p>Tobias Klein discovered a buffer overflow issue in the webgl
- -    library.</p></li>
+    <p>ТобиаÑ? Ð?лÑ?йн обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в библиоÑ?еке
+    webgl.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5113";>CVE-2017-5113</a>
 
- -    <p>A buffer overflow issue was discovered in the skia library.</p></li>
+    <p>Ð? библиоÑ?еке skia бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение бÑ?Ñ?еÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5114";>CVE-2017-5114</a>
 
- -    <p>Ke Liu discovered a memory issue in the pdfium library.</p></li>
+    <p>Ð?е Ð?Ñ? обнаÑ?Ñ?жил пÑ?облемÑ? Ñ? обÑ?абоÑ?кой памÑ?Ñ?и в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5115";>CVE-2017-5115</a>
 
- -    <p>Marco Giovannini discovered a type confusion issue in the v8
- -    javascript library.</p></li>
+    <p>Ð?аÑ?ко Ð?жованнини обнаÑ?Ñ?жил Ñ?меÑ?ение Ñ?ипов в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5116";>CVE-2017-5116</a>
 
- -    <p>Guang Gong discovered a type confusion issue in the v8 javascript
- -    library.</p></li>
+    <p>Ð?Ñ?ан Ð?Ñ?н обнаÑ?Ñ?жил Ñ?меÑ?ение Ñ?ипов в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5117";>CVE-2017-5117</a>
 
- -    <p>Tobias Klein discovered an uninitialized value in the skia library.</p></li>
+    <p>ТобиаÑ? Ð?лÑ?йн обнаÑ?Ñ?жил неиниÑ?иализиÑ?ованное знаÑ?ение в библиоÑ?еке skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5118";>CVE-2017-5118</a>
 
- -    <p>WenXu Wu discovered a way to bypass the Content Security Policy.</p></li>
+    <p>Ð?Ñ?нÑ?СÑ?й Ð?Ñ? обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила безопаÑ?ноÑ?Ñ?и Ñ?одеÑ?жимого.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5119";>CVE-2017-5119</a>
 
- -    <p>Another uninitialized value was discovered in the skia library.</p></li>
+    <p>Ð? библиоÑ?еке skia бÑ?ло обнаÑ?Ñ?жено еÑ?Ñ? одно неиниÑ?иализиÑ?ованное знаÑ?ение.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5120";>CVE-2017-5120</a>
 
- -    <p>Xiaoyin Liu discovered a way downgrade HTTPS connections during
- -    redirection.</p></li>
+    <p>СÑ?оинÑ? Ð?Ñ? обнаÑ?Ñ?жил Ñ?поÑ?об Ñ?низиÑ?Ñ? безопаÑ?ноÑ?Ñ?Ñ? HTTPS-Ñ?оединений в Ñ?оде
+    пеÑ?енапÑ?авлениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5121";>CVE-2017-5121</a>
 
- -    <p>Jordan Rabet discovered an out-of-bounds memory access in the v8
- -    javascript library.</p></li>
+    <p>Ð?жоÑ?дан РÑ?беÑ? обнаÑ?Ñ?жил доÑ?Ñ?Ñ?п за пÑ?еделÑ? вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5122";>CVE-2017-5122</a>
 
- -    <p>Choongwoo Han discovered an out-of-bounds memory access in the v8
- -    javascript library.</p></li>
+    <p>ЧоÑ?вÑ? ХанÑ? обнаÑ?Ñ?жил доÑ?Ñ?Ñ?п за пÑ?еделÑ? вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в javascript-библиоÑ?еке
+    v8.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 61.0.3163.100-1~deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 61.0.3163.100-1~deb9u1.</p>
 
- -<p>For the testing distribution (buster), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (buster) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 61.0.3163.100-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 61.0.3163.100-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=8soj
-----END PGP SIGNATURE-----


Reply to: