[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3663.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3663.wml	2016-09-09 10:43:47.000000000 +0500
+++ russian/security/2016/dsa-3663.wml	2016-09-09 10:54:49.859882575 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? гипеÑ?визоÑ?е Xen бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и.
+Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures project опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7092";>CVE-2016-7092</a> (XSA-185)
 
- -    <p>Jeremie Boutoille of Quarkslab and Shangcong Luan of Alibaba
- -    discovered a flaw in the handling of L3 pagetable entries, allowing
- -    a malicious 32-bit PV guest administrator can escalate their
- -    privilege to that of the host.</p></li>
+    <p>Ð?еÑ?еми Ð?Ñ?Ñ?илÑ?е из Quarkslab и ШанÑ?Ñ?н Ð?Ñ?анÑ? из Alibaba
+    обнаÑ?Ñ?жили Ñ?Ñ?звимоÑ?Ñ?Ñ? в коде обÑ?абоÑ?ки запиÑ?ей Ñ?аблиÑ?Ñ? Ñ?Ñ?Ñ?аниÑ? L3, позволÑ?Ñ?Ñ?Ñ?Ñ?
+    админиÑ?Ñ?Ñ?аÑ?оÑ?Ñ? 32-биÑ?ной гоÑ?Ñ?евой PV-Ñ?иÑ?Ñ?емÑ? повÑ?Ñ?аÑ?Ñ? Ñ?вои пÑ?ивилегии
+    до Ñ?Ñ?овнÑ? оÑ?новной Ñ?иÑ?Ñ?емÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7094";>CVE-2016-7094</a> (XSA-187)
 
- -    <p>x86 HVM guests running with shadow paging use a subset of the x86
- -    emulator to handle the guest writing to its own pagetables. Andrew
- -    Cooper of Citrix discovered that there are situations a guest can
- -    provoke which result in exceeding the space allocated for internal
- -    state. A malicious HVM guest administrator can cause Xen to fail a
- -    bug check, causing a denial of service to the host.</p></li>
+    <p>Ð?оÑ?Ñ?евÑ?е HVM-Ñ?иÑ?Ñ?емÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой x86 Ñ? Ñ?еневÑ?ми Ñ?Ñ?Ñ?аниÑ?ами иÑ?полÑ?зÑ?Ñ?Ñ? подмножеÑ?Ñ?во
+    Ñ?мÑ?лÑ?Ñ?оÑ?а x86 длÑ? обÑ?абоÑ?ки запиÑ?и в Ñ?вои Ñ?аблиÑ?Ñ? Ñ?Ñ?Ñ?аниÑ?. ЭндÑ?Ñ?
+    Ð?Ñ?пеÑ? из Citrix обнаÑ?Ñ?жил, Ñ?Ñ?о гоÑ?Ñ?еваÑ? Ñ?иÑ?Ñ?ема можеÑ? вÑ?зваÑ?Ñ? Ñ?акÑ?Ñ?
+    Ñ?иÑ?Ñ?аÑ?иÑ?, коÑ?оÑ?аÑ? пÑ?иведÑ?Ñ? к пÑ?евÑ?Ñ?ениÑ? меÑ?Ñ?а, вÑ?деленного длÑ? внÑ?Ñ?Ñ?еннего
+    Ñ?оÑ?Ñ?оÑ?ниÑ?. Ð?дминиÑ?Ñ?Ñ?аÑ?оÑ? гоÑ?Ñ?евой HVM-Ñ?иÑ?Ñ?емÑ? можеÑ? вÑ?зваÑ?Ñ? Ñ?иÑ?Ñ?аÑ?иÑ?, в коÑ?оÑ?ой Xen
+    не пÑ?ойдÑ?Ñ? пÑ?овеÑ?кÑ? на оÑ?ибки, Ñ?Ñ?о пÑ?иведÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании в оÑ?новной Ñ?иÑ?Ñ?еме.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7154";>CVE-2016-7154</a> (XSA-188)
 
- -    <p>Mikhail Gorobets of Advanced Threat Research, Intel Security
- -    discovered a use after free flaw in the FIFO event channel code. A
- -    malicious guest administrator can crash the host, leading to a
- -    denial of service. Arbitrary code execution (and therefore privilege
- -    escalation), and information leaks, cannot be excluded.</p></li>
+    <p>Ð?иÑ?аил Ð?оÑ?обеÑ? из Advanced Threat Research, Intel Security
+    обнаÑ?Ñ?жил иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в каналÑ?ном коде Ñ?обÑ?Ñ?ий FIFO.
+    Ð?дминиÑ?Ñ?Ñ?аÑ?оÑ? гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? можеÑ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? оÑ?новной Ñ?иÑ?Ñ?емÑ?, вÑ?зÑ?ваÑ?
+    оÑ?каз в обÑ?лÑ?живании. Ð?Ñ?оме Ñ?ого, нелÑ?зÑ? иÑ?клÑ?Ñ?аÑ?Ñ? вÑ?полнение пÑ?оизволÑ?ного кода (а поÑ?омÑ?
+    и повÑ?Ñ?ение пÑ?ивилегий), а Ñ?акже Ñ?Ñ?еÑ?ки.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 4.4.1-9+deb8u7.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.4.1-9+deb8u7.</p>
 
- -<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX0k6tAAoJEF7nbuICFtKlUNQP/joUaddXcT6PiBQ6YDRyN6zP
hpikkWFvI5npmVPEw1k1AdAit29rShVaoRM09JWLy9OKwG6MWNtTiBqva75HmKpx
gaCUELdmJv6gZpjbuRmxjWsq/lLu43CCn11cHwo/O+FNKTLQaCF+t5L7srExJ37O
l79eaC+eYHFBc1c1KyLuWYgv+eDFgNzG/HEO7jKcDrIyojTL8dflhGmASryjxbpO
hPbVA6aahhlc37LPjHa1fo3o3qKDz80jdUqLwl3FXMqHYS4CvZHmrm3M09qmZnFY
EDlKhBRKp1/xdOXlg31wBy2san4G3HmXf7iL4aa4cXGG+MJ2yf2yKlYRA4MPns27
pwa4Tw0CYxRDm4aXb9illbBCxJ7/p9HATQuJoCmxyGIKTwtlI2ToHVZoHcNj88F6
ihYKeByKXaOCTOrfzfAhY7wpeh3bP61VIo+CFN+0fwZInHW/Q23LN4GDg+dGcQ22
wXjNlthU+mU3OM+NqqBxyRHaVmWheJA2xMDnfTnyxW38kqL+qn3v7Dwsd9y+uYJT
T/B1uqnE3Yr2fA7i34ro2JbewlKLj+knQ4zI/xu4Z8++VrfBbENMmhNgpmmnfUZv
lF3zgA07rGNKVK1K2jjAmS1XORckOPSixR9dSxU1flx4eV6tLECSGIso+J9Tz4SW
6lRswNfSJGlAlZOybEk3
=25GP
-----END PGP SIGNATURE-----


Reply to: