-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- --- english/security/2016/dsa-3479.wml2016-02-22 11:44:58.0
+0500
+++ russian/security/2016/dsa-3479.wml 2016-02-22 23:14:04.148900981 +0500
@@ -1,22 +1,23 @@
- -security update
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+обновление
безопаÑноÑÑи
- -Multiple vulnerabilities have been found in the Graphite font rendering
- -engine which might result in denial of service or the execution of
- -arbitrary code if a malformed font file is processed.
+Рдвижке оÑÑиÑовки ÑÑиÑÑов Graphite бÑли
обнаÑÑÐ¶ÐµÐ½Ñ Ð¼Ð½Ð¾Ð³Ð¾ÑиÑленнÑе
+ÑÑзвимоÑÑи, коÑоÑÑе могÑÑ Ð¿ÑиводиÑÑ Ðº
оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании или вÑполнениÑ
+пÑоизволÑного кода в ÑлÑÑае обÑабоÑки
ÑпеÑиалÑно ÑÑоÑмиÑованного Ñайла
ÑÑиÑÑов.
- -For the oldstable distribution (wheezy), these problems have been fixed
- -in version 1.3.5-1~deb7u1.
+РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (wheezy) ÑÑи
пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑавленÑ
+в веÑÑии 1.3.5-1~deb7u1.
- -For the stable distribution (jessie), these problems have been fixed in
- -version 1.3.5-1~deb8u1.
+Ð ÑÑабилÑном вÑпÑÑке (jessie) ÑÑи пÑоблемÑ
бÑли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð²
+веÑÑии 1.3.5-1~deb8u1.
- -For the testing distribution (stretch), these problems have been fixed
- -in version 1.3.5-1.
+Ð ÑеÑÑиÑÑемом вÑпÑÑке (stretch) ÑÑи пÑоблемÑ
бÑли иÑпÑавленÑ
+в веÑÑии 1.3.5-1.
- -For the unstable distribution (sid), these problems have been fixed in
- -version 1.3.5-1.
+РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑоблемÑ
бÑли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð²
+веÑÑии 1.3.5-1.
- -We recommend that you upgrade your graphite2 packages.
+РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ graphite2.
# do not modify the following line
- --- english/security/2016/dsa-3486.wml2016-02-22 11:45:30.0
+0500
+++ russian/security/2016/dsa-3486.wml 2016-02-22 23:19:26.657020378 +0500
@@ -1,55 +1,56 @@
- -security update
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+обновление
безопаÑноÑÑи
- -Several vulnerabilities have been discovered in the chromium web
browser.
+Рвеб-бÑаÑзеÑе chromium бÑло обнаÑÑжено
неÑколÑко ÑÑзвимоÑÑей.
https://security-tracker.debian.org/tracker/CVE-2016-1622;>CVE-2016-1622
- -It was discovered that a maliciously crafted extension could bypass
- -the Same Origin Policy.
+ÐÑло обнаÑÑжено, ÑÑо ÑаÑÑиÑение,
Ñозданное злоÑмÑÑленником, Ð¼Ð¾Ð¶ÐµÑ Ð¾Ð±Ð¾Ð¹Ñи
+пÑавило одного иÑÑоÑника.
https://security-tracker.debian.org/tracker/CVE-2016-1623;>CVE-2016-1623
- -Mariusz Mlynski discovered a way to bypass the Same Origin
Policy.
+ÐаÑиÑÑ ÐлинÑки обнаÑÑжил ÑпоÑоб обÑ
ода пÑавила одного иÑÑоÑника.
https://security-tracker.debian.org/tracker/CVE-2016-1624;>CVE-2016-1624
- -lukezli discovered a buffer overflow issue in the Brotli
library.
+lukezli обнаÑÑжил пеÑеполнение бÑÑеÑа в
библиоÑеке Brotli.
https://security-tracker.debian.org/tracker/CVE-2016-1625;>CVE-2016-1625
- -Jann Horn discovered a way to cause the Chrome Instant feature to
- -navigate to unintended destinations.
+Ян ХоÑн обнаÑÑжил ÑпоÑоб, пÑи помоÑи
коÑоÑого можно заÑÑавиÑÑ Chrome Instant
+пеÑейÑи по адÑеÑÑ, коÑоÑÑй не
подÑазÑмевалÑÑ Ð¿Ð¾Ð»ÑзоваÑелем.
https://security-tracker.debian.org/tracker/CVE-2016-1626;>CVE-2016-1626
- -An out-of-bounds read issue was discovered in the openjpeg
library.
+РбиблиоÑеке openjpeg бÑло обнаÑÑжено
ÑÑение за гÑаниÑами вÑделенной облаÑÑи
памÑÑи.
https://security-tracker.debian.org/tracker/CVE-2016-1627;>CVE-2016-1627
- -It was discovered that the Developer Tools did not validate
URLs.
+ÐÑло обнаÑÑжено, ÑÑо Developer Tools не
вÑполнÑÑÑ Ð¿ÑовеÑÐºÑ URL.
https://security-tracker.debian.org/tracker/CVE-2016-1628;>CVE-2016-1628
- -An out-of-bounds read issue was discovered in the pdfium
library.
+РбиблиоÑеке pdfium бÑло обнаÑÑжено
ÑÑение за гÑаниÑами вÑделенной облаÑÑи
памÑÑи.
https://security-tracker.debian.org/tracker/CVE-2016-1629;>CVE-2016-1629
- -A way to bypass the Same