[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3633.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3633.wml	2016-07-28 11:13:26.000000000 +0500
+++ russian/security/2016/dsa-3633.wml	2016-07-28 11:21:02.362364629 +0500
@@ -1,44 +1,45 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? гипеÑ?визоÑ?е Xen бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8338";>CVE-2015-8338</a>
 
- -    <p>Julien Grall discovered that Xen on ARM was susceptible to denial
- -    of service via long running memory operations.</p></li>
+    <p>Ð?Ñ?лÑ?ен Ð?Ñ?алÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Xen на аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?е ARM можеÑ? Ñ?одеÑ?жаÑ?Ñ?
+    оÑ?каз в обÑ?лÑ?живании в Ñ?вÑ?зи Ñ? длиÑ?елÑ?нÑ?ми опеÑ?аÑ?иÑ?ми по Ñ?абоÑ?е Ñ? памÑ?Ñ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4480";>CVE-2016-4480</a>
 
- -    <p>Jan Beulich discovered that incorrect page table handling could
- -    result in privilege escalation inside a Xen guest instance.</p></li>
+    <p>Ян Ð?ойлиÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка Ñ?аблиÑ?Ñ? пеÑ?еадÑ?еÑ?аÑ?ии Ñ?Ñ?Ñ?аниÑ? можеÑ?
+    пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий в гоÑ?Ñ?евой Ñ?иÑ?Ñ?еме Xen.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-4962";>CVE-2016-4962</a>
 
- -    <p>Wei Liu discovered multiple cases of missing input sanitising in
- -    libxl which could result in denial of service.</p></li>
+    <p>Ð?Ñ?й Ð?Ñ? обнаÑ?Ñ?жил многоÑ?иÑ?леннÑ?е Ñ?лÑ?Ñ?аи оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?виÑ? оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в
+    libxl, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5242";>CVE-2016-5242</a>
 
- -    <p>Aaron Cornelius discovered that incorrect resource handling on
- -    ARM systems could result in denial of service.</p></li>
+    <p>Ð?аÑ?он Ð?оÑ?нелиÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка Ñ?еÑ?Ñ?Ñ?Ñ?ов на Ñ?иÑ?Ñ?емаÑ?
+    Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой ARM можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6258";>CVE-2016-6258</a>
 
- -    <p>Jeremie Boutoille discovered that incorrect pagetable handling in
- -    PV instances could result in guest to host privilege escalation.</p></li>
+    <p>Ð?еÑ?еми Ð?Ñ?Ñ?илÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?Ñ?екÑ?наÑ? обÑ?абоÑ?ка Ñ?аблиÑ?Ñ? пеÑ?еадÑ?еÑ?аÑ?ии Ñ?Ñ?Ñ?аниÑ? в
+    PV можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ении пÑ?ивилегии Ñ? Ñ?Ñ?овнÑ? гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? до оÑ?новной Ñ?иÑ?Ñ?емÑ?.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 4.4.1-9+deb8u6.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.4.1-9+deb8u6.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXmaRRAAoJEF7nbuICFtKlNJkP/1EzpLKs5aPZZSuWL0aJ/gcR
q/QZTWeizB8p7QAicz0nKO3SRSWNCUIEjchICKz9AlFZ5AypGfSv5lmsXXUsjxq4
TZZrSUQEwAvvvU5EPm8EnkVzbgBqRh9/gIa4LZ5NjONonk+rmptnRT/0Xa6+G55+
u5KW+U+ahmNKkSWhY6rfc5aqCOxpgc1rIUMBm8cbt/VJqCHm8dnZk8rntjte9Dwo
hULCmPp0AlN2mlL0QN57Mk/ZLFv8eWe3tXork3CcQZ/o80Z7PIaD7t48jJXRmeZz
3ixLrTrUS/AZ/EgbdU1PVO7qIiaRPHO2Sop9HrsAp1exq6SKvrN0W/9/5s7Ukfo+
uxF/Ow0TluFl3T701/gU30R0hCenNt8VAuK12mSStvlfdaZovjIpEh4FCuPxpbfj
IaOPmNEntlc7hX21cNUwJkZOzA1HRXwxH4pqNJg3THRHLbbES3uHddmy4tJmEOYy
i3SDDu5d8ClvXzaLSFCoLeN1jLBEhFFG0lDzE3/8P7Mj9pQSbivHEP3t/HvSnO1P
B9oyx56yXzhFmiAK6Kj2uH+2CtYrn753xqTE1n/tEpZ5j1dqwkaPMpSRG9jc/uic
Zh137ytnbomTwdZfyXm0kwpF/NrenOshzC80+dLTjBGP9YWbkIGQDlwIlI6mxgNL
Lk59tLxTty0FMpCVvD6Z
=7ygR
-----END PGP SIGNATURE-----


Reply to: