-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2017/dsa-3925.wml 2017-08-05 06:57:00.000000000 +0500 +++ russian/security/2017/dsa-3925.wml 2017-08-05 11:16:31.310362793 +0500 @@ -1,31 +1,32 @@ - -<define-tag description>security update</define-tag> +#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи</define-tag> <define-tag moreinfo> - -<p>Multiple vulnerabilities were found in qemu, a fast processor emulator:</p> +<p>Ð qemu, бÑÑÑÑом ÑмÑлÑÑоÑе пÑоÑеÑÑоÑа, бÑли обнаÑÑÐ¶ÐµÐ½Ñ Ð¼Ð½Ð¾Ð³Ð¾ÑиÑленнÑе ÑÑзвимоÑÑи:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9524">CVE-2017-9524</a> - - <p>Denial of service in qemu-nbd server</p></li> + <p>ÐÑказ в обÑлÑживании в ÑеÑвеÑе qemu-nbd</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10806">CVE-2017-10806</a> - - <p>Buffer overflow in USB redirector</p></li> + <p>ÐеÑеполнение бÑÑеÑа в коде пеÑенапÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ USB</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11334">CVE-2017-11334</a> - - <p>Out-of-band memory access in DMA operations</p></li> + <p>ÐоÑÑÑп за пÑÐµÐ´ÐµÐ»Ñ Ð²Ñделенного бÑÑеÑа памÑÑи пÑи вÑполнении опеÑаÑий DMA</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11434">CVE-2017-11434</a> - - <p>Out-of-band memory access in SLIRP/DHCP</p></li> + <p>ÐоÑÑÑп за пÑÐµÐ´ÐµÐ»Ñ Ð²Ñделенного бÑÑеÑа памÑÑи в коде SLIRP/DHCP</p></li> </ul> - -<p>For the stable distribution (stretch), these problems have been fixed in - -version 1:2.8+dfsg-6+deb9u2.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (stretch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 1:2.8+dfsg-6+deb9u2.</p> - -<p>We recommend that you upgrade your qemu packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ qemu.</p> </define-tag> # do not modify the following line - --- english/security/2017/dsa-3926.wml 2017-08-05 06:57:30.000000000 +0500 +++ russian/security/2017/dsa-3926.wml 2017-08-05 11:31:42.930841968 +0500 @@ -1,112 +1,113 @@ - -<define-tag description>security update</define-tag> +#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in the chromium web browser.</p> +<p>Рвеб-бÑаÑзеÑе chromium бÑло обнаÑÑжено неÑколÑко ÑÑзвимоÑÑей.</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5087">CVE-2017-5087</a> - - <p>Ned Williamson discovered a way to escape the sandbox.</p></li> + <p>ÐÑд УилÑÑмÑон обнаÑÑжил ÑпоÑоб вÑÑ Ð¾Ð´Ð° из пеÑоÑниÑÑ.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5088">CVE-2017-5088</a> - - <p>Xiling Gong discovered an out-of-bounds read issue in the v8 javascript - - library.</p></li> + <p>Силин ÐÑн обнаÑÑжил ÑÑение за пÑеделами вÑделенного бÑÑеÑа в javascript-библиоÑеке + v8.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5089">CVE-2017-5089</a> - - <p>Michal Bentkowski discovered a spoofing issue.</p></li> + <p>ÐÐ¸Ñ Ð°Ð» ÐенÑковÑкий обнаÑÑжил имиÑаÑÐ¸Ñ ÑоединениÑ.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5091">CVE-2017-5091</a> - - <p>Ned Williamson discovered a use-after-free issue in IndexedDB.</p></li> + <p>ÐÑд УилÑÑмÑон обнаÑÑжил иÑполÑзование ÑказаÑелей поÑле оÑÐ²Ð¾Ð±Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ Ð¿Ð°Ð¼ÑÑи в IndexedDB.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5092">CVE-2017-5092</a> - - <p>Yu Zhou discovered a use-after-free issue in PPAPI.</p></li> + <p>Юй Ð§Ð¶Ð¾Ñ Ð¾Ð±Ð½Ð°ÑÑжил иÑполÑзование ÑказаÑелей поÑле оÑÐ²Ð¾Ð±Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ Ð¿Ð°Ð¼ÑÑи в PPAPI.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5093">CVE-2017-5093</a> - - <p>Luan Herrera discovered a user interface spoofing issue.</p></li> + <p>ÐÑан ÐеÑÑеÑа обнаÑÑжил Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÑ Ð¿Ð¾Ð»ÑзоваÑелÑÑкого инÑеÑÑейÑа.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5094">CVE-2017-5094</a> - - <p>A type confusion issue was discovered in extensions.</p></li> + <p>Ð ÑаÑÑиÑениÑÑ Ð±Ñла обнаÑÑжена пÑоблема Ñо ÑмеÑением Ñипов.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5095">CVE-2017-5095</a> - - <p>An out-of-bounds write issue was discovered in the pdfium library.</p></li> + <p>РбиблиоÑеке pdfium бÑла обнаÑÑжена запиÑÑ Ð·Ð° пÑеделами вÑделенного бÑÑеÑа памÑÑи.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5097">CVE-2017-5097</a> - - <p>An out-of-bounds read issue was discovered in the skia library.</p></li> + <p>РбиблиоÑеке skia бÑло обнаÑÑжено ÑÑение за пÑеделами вÑделенного бÑÑеÑа памÑÑи.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5098">CVE-2017-5098</a> - - <p>Jihoon Kim discover a use-after-free issue in the v8 javascript library.</p></li> + <p>Ð¦Ð·Ð¸Ñ Ð¾Ð½ Ðим обнаÑÑжил иÑполÑзование ÑказаÑелей поÑле оÑÐ²Ð¾Ð±Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ Ð¿Ð°Ð¼ÑÑи в javascript-библиоÑеке v8.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5099">CVE-2017-5099</a> - - <p>Yuan Deng discovered an out-of-bounds write issue in PPAPI.</p></li> + <p>Ð®Ð°Ð½Ñ ÐÑн обнаÑÑжил запиÑÑ Ð·Ð° пÑеделами вÑделенного бÑÑеÑа памÑÑи в PPAPI.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5100">CVE-2017-5100</a> - - <p>A use-after-free issue was discovered in Chrome Apps.</p></li> + <p>Ð Chrome Apps бÑло обнаÑÑжено иÑполÑзование ÑказаÑелей поÑле оÑÐ²Ð¾Ð±Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ Ð¿Ð°Ð¼ÑÑи.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5101">CVE-2017-5101</a> - - <p>Luan Herrera discovered a URL spoofing issue.</p></li> + <p>ÐÑан ÐеÑÑеÑа обнаÑÑжил возможноÑÑÑ Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÐ¸ URL.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5102">CVE-2017-5102</a> - - <p>An uninitialized variable was discovered in the skia library.</p></li> + <p>РбиблиоÑеке skia бÑла обнаÑÑжена неиниÑиализиÑÐ¾Ð²Ð°Ð½Ð½Ð°Ñ Ð¿ÐµÑеменнаÑ.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5103">CVE-2017-5103</a> - - <p>Another uninitialized variable was discovered in the skia library.</p></li> + <p>РбиблиоÑеке skia бÑла обнаÑÑжен еÑÑ Ð¾Ð´Ð½Ð° неиниÑиализиÑÐ¾Ð²Ð°Ð½Ð½Ð°Ñ Ð¿ÐµÑеменнаÑ.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5104">CVE-2017-5104</a> - - <p>Khalil Zhani discovered a user interface spoofing issue.</p></li> + <p>Халил Ðани обнаÑÑжил возможноÑÑÑ Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÐ¸ полÑзоваÑелÑÑкого инÑеÑÑейÑа.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5105">CVE-2017-5105</a> - - <p>Rayyan Bijoora discovered a URL spoofing issue.</p></li> + <p>РайÑн ÐиджÑÑа обнаÑÑжил возможноÑÑÑ Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÐ¸ URL.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5106">CVE-2017-5106</a> - - <p>Jack Zac discovered a URL spoofing issue.</p></li> + <p>Ðжек Ðак обнаÑÑжил возможноÑÑÑ Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÐ¸ URL.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5107">CVE-2017-5107</a> - - <p>David Kohlbrenner discovered an information leak in SVG file handling.</p></li> + <p>ÐÑвид ÐолÑбÑÐµÐ½Ð½ÐµÑ Ð¾Ð±Ð½Ð°ÑÑжил ÑÑеÑÐºÑ Ð¸Ð½ÑоÑмаÑии в коде обÑабоÑки SVG-Ñайлов.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5108">CVE-2017-5108</a> - - <p>Guang Gong discovered a type confusion issue in the pdfium library.</p></li> + <p>ÐÑан ÐÑн обнаÑÑжил ÑмеÑение Ñипов в библиоÑеке pdfium.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5109">CVE-2017-5109</a> - - <p>Jose Maria Acuna Morgado discovered a user interface spoofing issue.</p></li> + <p>ХоÑе ÐаÑÐ¸Ñ ÐкÑна ÐоÑгадо обнаÑÑжил возможноÑÑÑ Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÐ¸ полÑзоваÑелÑÑкого инÑеÑÑейÑа.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5110">CVE-2017-5110</a> - - <p>xisigr discovered a way to spoof the payments dialog.</p></li> + <p>xisigr обнаÑÑжил ÑпоÑоб подделки диалоговÑÑ Ð¾ÐºÐ¾Ð½ оплаÑÑ.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7000">CVE-2017-7000</a> - - <p>Chaitin Security Research Lab discovered an information disclosure - - issue in the sqlite library.</p></li> + <p>СоÑÑÑдники Chaitin Security Research Lab обнаÑÑжили ÑаÑкÑÑÑие инÑоÑмаÑии + в библиоÑеке sqlite.</p></li> </ul> - -<p>For the stable distribution (stretch), these problems have been fixed in - -version 60.0.3112.78-1~deb9u1.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (stretch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 60.0.3112.78-1~deb9u1.</p> - -<p>For the unstable distribution (sid), these problems have been fixed in - -version 60.0.3112.78-1 or earlier versions.</p> +<p>РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 60.0.3112.78-1 или более ÑÐ°Ð½Ð½Ð¸Ñ .</p> - -<p>We recommend that you upgrade your chromium-browser packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ chromium-browser.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlmFZlIACgkQXudu4gIW 0qXiZg//aegvYoENvynX7s+bYtXasnyEqpgjKsgFmOa2V/evdAvOIHMNOY8UnCYI wrhp/u0LeN9FsP6TFaVwnQiJseltVKSlJyviVT+1Ioudw95kjJw0HO8AKUJ/89hG vv1P0kXcGikUdI8IVggBGcEZZgsn05ijEuaE+6iK+aCubeedzq9smxCJzkkM0vuL Wju3dhTAwWB2uC8CWDIYn8pAabAYMnl0K0Be6hRdHglDt3V6pFB+j04ZAJq8XjSQ 1bvpk/9uJlkgOj4GJgKlOBdv07sNmdsFI75WE2mf9tAyje63wcgXbynf75HSA3mg /lphot0nhnJ3C3oOYohHRABrA0Mq9FBHdo9JX1SdUSeO8SP5kobWhpL2InlwxN38 qIpdCdzaQdtIQ/mMQB7Nq6Wxt1R8ipCSsYYH144IbXgE9ZqGBC27WARiidU1FJIT 2aJ0l/CLJyooiBDRStepK6XxJnfamviliSObDhKvjG2no0p5YHDMieaXY58+Nz4s GiAwu1wq/YQjjo/8PSaKyjdqdzF3IsS7w/Cb+D9uuVYq0VDFNWb7MfbRP2n26Iw7 qbWCoE5/n8+3J1KskdTMmk1+u4iKFSALBduDdbrfmz9THN04mcv5bJPtax6jipK+ 3GPvd5GtzH+inZxPkCEAJSO2PtagaEYjV6ItfOFraB/wKOe4rgM= =kT7a -----END PGP SIGNATURE-----