[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-4020.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-4020.wml	2017-11-07 10:48:53.000000000 +0500
+++ russian/security/2017/dsa-4020.wml	2017-11-07 17:35:50.078545788 +0500
@@ -1,116 +1,117 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
- -<p>In addition, this message serves as an annoucment that security support for
- -chromium in the oldstable release (jessie), Debian 8, is now discontinued.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное Ñ?ообÑ?ение Ñ?лÑ?жиÑ? длÑ? Ñ?ого, Ñ?Ñ?обÑ? Ñ?ообÑ?иÑ?Ñ?, Ñ?Ñ?о поддеÑ?жка безопаÑ?ноÑ?Ñ?и
+длÑ? chromium в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie), Debian 8, пÑ?екÑ?аÑ?ена.</p>
 
- -<p>Debian 8 chromium users that desire continued security updates are strongly
- -encouraged to upgrade now to the current stable release (stretch), Debian 9.</p>
+<p>Ð?олÑ?зоваÑ?елÑ?м chromium, иÑ?полÑ?зÑ?Ñ?Ñ?им Debian 8 и желаÑ?Ñ?им полÑ?Ñ?аÑ?Ñ? обновлениÑ? безопаÑ?ноÑ?Ñ?и, наÑ?Ñ?оÑ?Ñ?елÑ?но
+Ñ?екомендÑ?еÑ?Ñ?Ñ? вÑ?полниÑ?Ñ? обновление до Ñ?екÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (stretch), Debian 9.</p>
 
- -<p>An alternative is to switch to the firefox browser, which will continue to
- -receive security updates in jessie for some time.</p>
+<p>Ð? каÑ?еÑ?Ñ?ве алÑ?Ñ?еÑ?наÑ?ивÑ? можно пеÑ?ейÑ?и на иÑ?полÑ?зование бÑ?аÑ?зеÑ?а firefox, коÑ?оÑ?Ñ?й еÑ?Ñ? бÑ?деÑ?
+некоÑ?оÑ?ое вÑ?емÑ? полÑ?Ñ?аÑ?Ñ? обновлениÑ? в вÑ?пÑ?Ñ?ке jessie.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5124";>CVE-2017-5124</a>
 
- -    <p>A cross-site scripting issue was discovered in MHTML.</p></li>
+    <p>Ð? MHTML бÑ?л обнаÑ?Ñ?жен межÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5125";>CVE-2017-5125</a>
 
- -    <p>A heap overflow issue was discovered in the skia library.</p></li>
+    <p>Ð? библиоÑ?еке skia бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5126";>CVE-2017-5126</a>
 
- -    <p>Luat Nguyen discovered a use-after-free issue in the pdfium library.</p></li>
+    <p>Ð?Ñ?аÑ? Ð?гÑ?иен обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5127";>CVE-2017-5127</a>
 
- -    <p>Luat Nguyen discovered another use-after-free issue in the pdfium
- -    library.</p></li>
+    <p>Ð?Ñ?аÑ? Ð?гÑ?иен обнаÑ?Ñ?жил еÑ?Ñ? одно иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в
+    библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5128";>CVE-2017-5128</a>
 
- -    <p>Omair discovered a heap overflow issue in the WebGL implementation.</p></li>
+    <p>Omair обнаÑ?Ñ?жил пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и в Ñ?еализаÑ?ии WebGL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5129";>CVE-2017-5129</a>
 
- -    <p>Omair discovered a use-after-free issue in the WebAudio implementation.</p></li>
+    <p>Omair обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в Ñ?еализаÑ?ии WebAudio.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5131";>CVE-2017-5131</a>
 
- -    <p>An out-of-bounds write issue was discovered in the skia library.</p></li>
+    <p>Ð? библиоÑ?еке skia бÑ?ла обнаÑ?Ñ?жена запиÑ?Ñ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5132";>CVE-2017-5132</a>
 
- -    <p>Guarav Dewan discovered an error in the WebAssembly implementation.</p></li>
+    <p>Ð?Ñ?аÑ?ав Ð?еÑ?ан обнаÑ?Ñ?жил оÑ?ибкÑ? в Ñ?еализаÑ?ии WebAssembly.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5133";>CVE-2017-5133</a>
 
- -    <p>Aleksandar Nikolic discovered an out-of-bounds write issue in the skia
- -    library.</p></li>
+    <p>Ð?лекÑ?андаÑ? Ð?иколиÑ? обнаÑ?Ñ?жил запиÑ?Ñ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в
+    библиоÑ?еке skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15386";>CVE-2017-15386</a>
 
- -    <p>WenXu Wu discovered a user interface spoofing issue.</p></li>
+    <p>Ð?енСÑ?й Ð?Ñ? обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки инÑ?еÑ?Ñ?ейÑ?а полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15387";>CVE-2017-15387</a>
 
- -    <p>Jun Kokatsu discovered a way to bypass the content security policy.</p></li>
+    <p>Ð?жÑ?н Ð?окаÑ?Ñ?Ñ? обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила безопаÑ?ноÑ?Ñ?и Ñ?одеÑ?жимого.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15388";>CVE-2017-15388</a>
 
- -    <p>Kushal Arvind Shah discovered an out-of-bounds read issue in the skia
- -    library.</p></li>
+    <p>Ð?Ñ?Ñ?ал Ð?Ñ?винд ШаÑ? обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в библиоÑ?еке
+    skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15389";>CVE-2017-15389</a>
 
- -    <p>xisigr discovered a URL spoofing issue.</p></li>
+    <p>xisigr обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15390";>CVE-2017-15390</a>
 
- -    <p>Haosheng Wang discovered a URL spoofing issue.</p></li>
+    <p>ХаоÑ?ен Ð?ан обнаÑ?Ñ?жил Ñ?поÑ?об подделки URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15391";>CVE-2017-15391</a>
 
- -    <p>Joao Lucas Melo Brasio discovered a way for an extension to bypass its
- -    limitations.</p></li>
+    <p>Хоа Ð?Ñ?каÑ? Ð?ело Ð?Ñ?азио обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода огÑ?аниÑ?ений
+    Ñ?аÑ?Ñ?иÑ?ениÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15392";>CVE-2017-15392</a>
 
- -    <p>Xiaoyin Liu discovered an error the implementation of registry keys.</p></li>
+    <p>СÑ?оинÑ? Ð?Ñ? обнаÑ?Ñ?жил оÑ?ибкÑ? в Ñ?еализаÑ?ии клÑ?Ñ?ей Ñ?егиÑ?Ñ?Ñ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15393";>CVE-2017-15393</a>
 
- -    <p>Svyat Mitin discovered an issue in the devtools.</p></li>
+    <p>СвÑ?Ñ? Ð?иÑ?ин обнаÑ?Ñ?жил пÑ?облемÑ? в инÑ?Ñ?Ñ?Ñ?менÑ?ами Ñ?азÑ?абоÑ?Ñ?ика.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15394";>CVE-2017-15394</a>
 
- -    <p>Sam discovered a URL spoofing issue.</p></li>
+    <p>Sam обнаÑ?Ñ?жил Ñ?поÑ?об подделки URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15395";>CVE-2017-15395</a>
 
- -    <p>Johannes Bergman discovered a null pointer dereference issue.</p></li>
+    <p>Ð?оÑ?аннеÑ? Ð?еÑ?гман обнаÑ?Ñ?жил Ñ?азÑ?менование null-Ñ?казаÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15396";>CVE-2017-15396</a>
 
- -    <p>Yuan Deng discovered a stack overflow issue in the v8 javascript library.</p></li>
+    <p>ЮанÑ? Ð?Ñ?н обнаÑ?Ñ?жил пеÑ?еполнение Ñ?Ñ?ека в javascript-библиоÑ?еке v8.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), security support for chromium has
- -been discontinued.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) поддеÑ?жка безопаÑ?ноÑ?Ñ?и длÑ? пакеÑ?а chromium
+бÑ?ла пÑ?екÑ?аÑ?ена.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 62.0.3202.75-1~deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 62.0.3202.75-1~deb9u1.</p>
 
- -<p>For the testing distribution (buster), these problems will be fixed soon.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом вÑ?пÑ?Ñ?ке (buster) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 62.0.3202.75-1.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 62.0.3202.75-1.</p>
 
- -<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Gkun
-----END PGP SIGNATURE-----


Reply to: