[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3596.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3596.wml	2016-06-06 22:07:04.000000000 +0500
+++ russian/security/2016/dsa-3596.wml	2016-06-06 23:24:25.334034183 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in spice, a SPICE protocol
- -client and server library. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? spice, библиоÑ?еке, Ñ?еализÑ?Ñ?Ñ?ей клиенÑ?Ñ?кÑ?Ñ? и Ñ?еÑ?веÑ?нÑ?Ñ? Ñ?аÑ?Ñ?и
+пÑ?оÑ?окола SPICE, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0749";>CVE-2016-0749</a>
 
- -    <p>Jing Zhao of Red Hat discovered a memory allocation flaw, leading to
- -    a heap-based buffer overflow in spice's smartcard interaction. A
- -    user connecting to a guest VM via spice can take advantage of this
- -    flaw to cause a denial-of-service (QEMU process crash), or
- -    potentially to execute arbitrary code on the host with the
- -    privileges of the hosting QEMU process.</p></li>
+    <p>Цзин Чжао из Red Hat обнаÑ?Ñ?жил оÑ?ибкÑ? вÑ?делениÑ? памÑ?Ñ?и, пÑ?иводÑ?Ñ?Ñ?Ñ? к
+    пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и к коде spice длÑ? Ñ?абоÑ?Ñ? Ñ?о Ñ?маÑ?Ñ?каÑ?Ñ?ами. Ð?олÑ?зоваÑ?елÑ?,
+    подклÑ?Ñ?ивÑ?ийÑ?Ñ? к гоÑ?Ñ?евой виÑ?Ñ?Ñ?алÑ?ной маÑ?ине Ñ?еÑ?ез spice, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ?
+    Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?оÑ?еÑ?Ñ?а QEMU) или
+    поÑ?енÑ?иалÑ?ного вÑ?полнениÑ? пÑ?оизволÑ?ного кода в оÑ?новной Ñ?иÑ?Ñ?еме Ñ? пÑ?авами
+    пÑ?оÑ?еÑ?Ñ?а QEMU.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2150";>CVE-2016-2150</a>
 
- -    <p>Frediano Ziglio of Red Hat discovered that a malicious guest inside
- -    a virtual machine can take control of the corresponding QEMU process
- -    in the host using crafted primary surface parameters.</p></li>
+    <p>ФÑ?едиано Ð?иглио из Red Hat обнаÑ?Ñ?жил, Ñ?Ñ?о злоÑ?мÑ?Ñ?ленник, наÑ?одÑ?Ñ?ийÑ?Ñ? в гоÑ?Ñ?евой
+    Ñ?иÑ?Ñ?еме, можеÑ? полÑ?Ñ?иÑ?Ñ? Ñ?пÑ?авление Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?им пÑ?оÑ?еÑ?Ñ?ом QEMU
+    в оÑ?новной Ñ?иÑ?Ñ?еме пÑ?Ñ?Ñ?м иÑ?полÑ?зованиÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? паÑ?амеÑ?Ñ?ов главной плоÑ?коÑ?Ñ?и.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 0.12.5-1+deb8u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 0.12.5-1+deb8u3.</p>
 
- -<p>We recommend that you upgrade your spice packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? spice.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXVb/nAAoJEF7nbuICFtKljrcP/08oBwb8iu1dewnS3vuwFoEV
pIkAAWoRBt4WSkN+2ztxdjhF4hdCJgny9qBT9NuA4Ft2aKa9hv7V8RGHjUWuLbU5
L6CAKc4jmmu1cSziQCC3LYMpsYjkaF4kPlDgUHn9Rd6SkyCn/QQXqa1y9fdOAB+u
vZ+SlXKlNE3BrAMXco6YlYLZdhtJv9zh53ydUtHMvyI69JqwQ/N32VHp1cFq4SnL
79/aR4DzAaTJna+efKrH3TkSBDwHIX/Xax2mqsVr6GRloHnLq8Psq0s5XvFNJOUb
8P/HbIe4Jo4cELbsw1w/yZMI4kkjYqWf/3htUIRx/huaJtxseLa6qMbG+fIfelCP
lVHQ3lnW5+v04IpQUTeunVkhTPdpKYE3Wc4L6581xV2Q+P5kcYzZDtyFkw99azOe
buQZXJXTHBPGqtVfIQ/oab6/a0LsyOZLRwm97TotnG0Onc9Cl6+iWfTrFoMU9d6/
sctZ0sqGG/fS0oIkvKtuxGgcGpCpnWs2iGMpil82vLLioRet7xy1m8A3EuFx8ZjH
S9RxWLSt+jnqLKQhH+SoKwdpIrLP+oN4Y40AzdDCYIjGpBTRZC8z7IiFfICYs+TF
mYmPUV83JK6aSxppGuyflHwIKLypIBl1LMBrWQiAXrjWbjGe0zjF1zhSoJnRFRH3
ceDUYVy98JPvXQBmlWTF
=+urY
-----END PGP SIGNATURE-----


Reply to: