[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2018/dsa-4237.wml



--- ../../english/security/2018/dsa-4237.wml	2018-07-01 10:49:00.655193429 +0500
+++ 2018/dsa-4237.wml	2018-07-02 19:13:02.790570124 +0500
@@ -1,143 +1,144 @@
-<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="38064b8fd0bc72aee5667310770c1e8a7cc78720" mindelta="1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the chromium web browser.</p>
+<p>Ð? веб-бÑ?аÑ?зеÑ?е chromium бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6118";>CVE-2018-6118</a>
 
-    <p>Ned Williamson discovered a use-after-free issue.</p></li>
+    <p>Ð?Ñ?д УилÑ?Ñ?мÑ?он обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6120";>CVE-2018-6120</a>
 
-    <p>Zhou Aiting discovered a buffer overflow issue in the pdfium library.</p></li>
+    <p>ЧжоÑ? Ð?йÑ?ин обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6121";>CVE-2018-6121</a>
 
-    <p>It was discovered that malicious extensions could escalate privileges.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о вÑ?едоноÑ?нÑ?е Ñ?аÑ?Ñ?иÑ?ениÑ? могÑ?Ñ? повÑ?Ñ?аÑ?Ñ? Ñ?вои пÑ?ивилегии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6122";>CVE-2018-6122</a>
 
-    <p>A type confusion issue was discovered in the v8 javascript library.</p></li>
+    <p>Ð? javascript-библиоÑ?еке v8 бÑ?ла обнаÑ?Ñ?жена пÑ?Ñ?аниÑ?а Ñ?ипов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6123";>CVE-2018-6123</a>
 
-    <p>Looben Yang discovered a use-after-free issue.</p></li>
+    <p>Ð?Ñ?бÑ?нÑ? Ян обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6124";>CVE-2018-6124</a>
 
-    <p>Guang Gong discovered a type confusion issue.</p></li>
+    <p>Ð?Ñ?ан Ð?Ñ?н обнаÑ?Ñ?жил пÑ?Ñ?аниÑ?Ñ? Ñ?ипов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6125";>CVE-2018-6125</a>
 
-    <p>Yubico discovered that the WebUSB implementation was too permissive.</p></li>
+    <p>СоÑ?Ñ?Ñ?дники Yubico обнаÑ?Ñ?жили, Ñ?Ñ?о Ñ?еализаÑ?иÑ? WebUSB Ñ?лиÑ?ком пеÑ?миÑ?Ñ?ивна.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6126";>CVE-2018-6126</a>
 
-    <p>Ivan Fratric discovered a buffer overflow issue in the skia library.</p></li>
+    <p>Ð?йван ФÑ?аÑ?Ñ?ик обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в библиоÑ?еке skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6127";>CVE-2018-6127</a>
 
-    <p>Looben Yang discovered a use-after-free issue.</p></li>
+    <p>Ð?Ñ?бÑ?нÑ? Ян обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6129";>CVE-2018-6129</a>
 
-    <p>Natalie Silvanovich discovered an out-of-bounds read issue in WebRTC.</p></li>
+    <p>Ð?аÑ?али СилÑ?вановиÑ? обнаÑ?Ñ?жила Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в WebRTC.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6130";>CVE-2018-6130</a>
 
-    <p>Natalie Silvanovich discovered an out-of-bounds read issue in WebRTC.</p></li>
+    <p>Ð?аÑ?али СилÑ?вановиÑ? обнаÑ?Ñ?жила Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в WebRTC.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6131";>CVE-2018-6131</a>
 
-    <p>Natalie Silvanovich discovered an error in WebAssembly.</p></li>
+    <p>Ð?аÑ?али СилÑ?вановиÑ? обнаÑ?Ñ?жила оÑ?ибкÑ? в WebAssembly.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6132";>CVE-2018-6132</a>
 
-    <p>Ronald E. Crane discovered an uninitialized memory issue.</p></li>
+    <p>РоналÑ?д Ð?Ñ?Ñ?йн обнаÑ?Ñ?жил пÑ?облемÑ? Ñ? неиниÑ?иализиÑ?ованной памÑ?Ñ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6133";>CVE-2018-6133</a>
 
-    <p>Khalil Zhani discovered a URL spoofing issue.</p></li>
+    <p>Халил Ð?ани обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки URL.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6134";>CVE-2018-6134</a>
 
-    <p>Jun Kokatsu discovered a way to bypass the Referrer Policy.</p></li>
+    <p>ЦзÑ?нÑ? Ð?окаÑ?Ñ?Ñ? обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода пÑ?авила Ñ?казаÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6135";>CVE-2018-6135</a>
 
-    <p>Jasper Rebane discovered a user interface spoofing issue.</p></li>
+    <p>Ð?жаÑ?пеÑ? РебÑ?йн обнаÑ?Ñ?жил возможноÑ?Ñ?Ñ? подделки инÑ?еÑ?Ñ?ейÑ?а полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6136";>CVE-2018-6136</a>
 
-    <p>Peter Wong discovered an out-of-bounds read issue in the v8 javascript
-    library.</p></li>
+    <p>Ð?еÑ?еÑ? Ð?онг обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6137";>CVE-2018-6137</a>
 
-    <p>Michael Smith discovered an information leak.</p></li>
+    <p>Ð?айкл СмиÑ? обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6138";>CVE-2018-6138</a>
 
-    <p>François Lajeunesse-Robert discovered that the extensions policy was
-    too permissive.</p></li>
+    <p>ФÑ?анÑ?Ñ?а Ð?ажене-РобеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?авила Ñ?аÑ?Ñ?иÑ?ений Ñ?лиÑ?ком
+    пеÑ?миÑ?Ñ?ивнÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6139";>CVE-2018-6139</a>
 
-    <p>Rob Wu discovered a way to bypass restrictions in the debugger extension.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода огÑ?аниÑ?ений в Ñ?аÑ?Ñ?иÑ?ении оÑ?ладки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6140";>CVE-2018-6140</a>
 
-    <p>Rob Wu discovered a way to bypass restrictions in the debugger extension.</p></li>
+    <p>Роб Ð?Ñ? обнаÑ?Ñ?жил Ñ?поÑ?об обÑ?ода огÑ?аниÑ?ений в Ñ?аÑ?Ñ?иÑ?ении оÑ?ладки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6141";>CVE-2018-6141</a>
 
-    <p>Yangkang discovered a buffer overflow issue in the skia library.</p></li>
+    <p>Yangkang обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в библиоÑ?еке skia.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6142";>CVE-2018-6142</a>
 
-    <p>Choongwoo Han discovered an out-of-bounds read in the v8 javascript
-    library.</p></li>
+    <p>ЧÑ?нÑ?вÑ? Хан обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6143";>CVE-2018-6143</a>
 
-    <p>Guang Gong discovered an out-of-bounds read in the v8 javascript library.</p></li>
+    <p>Ð?Ñ?ан Ð?Ñ?н обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в javascript-библиоÑ?еке
+    v8.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6144";>CVE-2018-6144</a>
 
-    <p>pdknsk discovered an out-of-bounds read in the pdfium library.</p></li>
+    <p>pdknsk обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и библиоÑ?еке pdfium.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6145";>CVE-2018-6145</a>
 
-    <p>Masato Kinugawa discovered an error in the MathML implementation.</p></li>
+    <p>Ð?аÑ?аÑ?о Ð?инÑ?нава обнаÑ?Ñ?жил оÑ?ибкÑ? в Ñ?еализаÑ?ии MathML.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6147";>CVE-2018-6147</a>
 
-    <p>Michail Pishchagin discovered an error in password entry fields.</p></li>
+    <p>Ð?иÑ?аил Ð?иÑ?агин обнаÑ?Ñ?жил оÑ?ибкÑ? в полÑ?Ñ? ввода паÑ?олÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6148";>CVE-2018-6148</a>
 
-    <p>MichaÅ? Bentkowski discovered that the Content Security Policy header
-    was handled incorrectly.</p></li>
+    <p>Ð?иÑ?ал Ð?енÑ?ковÑ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о заголовок пÑ?авила безопаÑ?ноÑ?Ñ?и Ñ?одеÑ?жимого
+    обÑ?абаÑ?Ñ?ваеÑ?Ñ?Ñ? непÑ?авилÑ?но.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6149";>CVE-2018-6149</a>
 
-    <p>Yu Zhou and Jundong Xie discovered an out-of-bounds write issue in the
-    v8 javascript library.</p></li>
+    <p>Юй ЧжоÑ? и ЦзÑ?нÑ?дÑ?н Се обнаÑ?Ñ?жили запиÑ?Ñ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в
+    javascript-библиоÑ?еке v8.</p></li>
 
 </ul>
 
-<p>For the stable distribution (stretch), these problems have been fixed in
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
 version 67.0.3396.87-1~deb9u1.</p>
 
-<p>We recommend that you upgrade your chromium-browser packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? chromium-browser.</p>
 
-<p>For the detailed security status of chromium-browser please refer to
-its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и chromium-browser можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
 <a href="https://security-tracker.debian.org/tracker/chromium-browser";>\
 https://security-tracker.debian.org/tracker/chromium-browser</a></p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2018/dsa-4237.data"
-# $Id: $


Reply to: