[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3554.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3554.wml	2016-04-22 00:49:57.000000000 +0500
+++ russian/security/2016/dsa-3554.wml	2016-04-22 01:16:09.383268576 +0500
@@ -1,36 +1,37 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? гипеÑ?визоÑ?е Xen бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3158";>CVE-2016-3158</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2016-3159";>CVE-2016-3159</a> (XSA-172)
 
- -    <p>Jan Beulich from SUSE discovered that Xen does not properly handle
- -    writes to the hardware FSW.ES bit when running on AMD64 processors.
- -    A malicious domain can take advantage of this flaw to obtain address
- -    space usage and timing information, about another domain, at a
- -    fairly low rate.</p></li>
+    <p>Ян Ð?ойлиÑ? из SUSE обнаÑ?Ñ?жил, Ñ?Ñ?о Xen непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ?
+    запиÑ?и в биÑ? FSW.ES пÑ?и Ñ?абоÑ?е на пÑ?оÑ?еÑ?Ñ?оÑ?аÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой AMD64.
+    Ð?оÑ?Ñ?еваÑ? Ñ?иÑ?Ñ?ема злоÑ?мÑ?Ñ?ленника можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? полÑ?Ñ?ениÑ?
+    инÑ?оÑ?маÑ?ии об иÑ?полÑ?зовании адÑ?еÑ?ного пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва и инÑ?оÑ?маÑ?ии о
+    Ñ?аймингаÑ? дÑ?Ñ?гой гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-3960";>CVE-2016-3960</a> (XSA-173)
 
- -    <p>Ling Liu and Yihan Lian of the Cloud Security Team, Qihoo 360
- -    discovered an integer overflow in the x86 shadow pagetable code. A
- -    HVM guest using shadow pagetables can cause the host to crash. A PV
- -    guest using shadow pagetables (i.e. being migrated) with PV
- -    superpages enabled (which is not the default) can crash the host, or
- -    corrupt hypervisor memory, potentially leading to privilege
- -    escalation.</p></li>
+    <p>Ð?ин Ð?Ñ? и Ð?Ñ?анÑ? Ð?Ñ?нÑ? из командÑ? облаÑ?ной безопаÑ?ноÑ?Ñ?и Qihoo 360
+    обнаÑ?Ñ?жили пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в коде Ñ?еневой Ñ?аблиÑ?Ñ? пеÑ?еадÑ?еÑ?аÑ?ии Ñ?Ñ?Ñ?аниÑ? длÑ? x86. Ð?оÑ?Ñ?еваÑ?
+    Ñ?иÑ?Ñ?ема HVM, иÑ?полÑ?зÑ?Ñ?Ñ?аÑ? Ñ?еневÑ?е Ñ?аблиÑ?Ñ? пеÑ?еадÑ?еÑ?аÑ?ии, можеÑ? вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? главной
+    Ñ?иÑ?Ñ?емÑ?. Ð?оÑ?Ñ?еваÑ? Ñ?иÑ?Ñ?ема PV, иÑ?полÑ?зÑ?Ñ?Ñ?аÑ? Ñ?еневÑ?е Ñ?аблиÑ?Ñ? пеÑ?еадÑ?еÑ?аÑ?ии (Ñ?о еÑ?Ñ?Ñ?, пеÑ?емеÑ?аемаÑ?) Ñ?
+    вклÑ?Ñ?Ñ?ннÑ?ми Ñ?Ñ?пеÑ?Ñ?аблиÑ?ами PV (Ñ?Ñ?о не иÑ?полÑ?зÑ?еÑ?Ñ?Ñ? по Ñ?молÑ?аниÑ?) можеÑ? вÑ?зваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ?
+    главной Ñ?иÑ?Ñ?емÑ? или повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и гипеÑ?визоÑ?а, Ñ?Ñ?о поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к
+    повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 4.4.1-9+deb8u5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.4.1-9+deb8u5.</p>
 
- -<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=E8VC
-----END PGP SIGNATURE-----


Reply to: