[DONE] wml://{security/2016/dsa-3729.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3729.wml 2016-12-08 11:56:24.000000000 +0500
+++ russian/security/2016/dsa-3729.wml 2016-12-08 12:57:31.400769477 +0500
@@ -1,69 +1,70 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in the Xen hypervisor. The
- -Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? гипеÑ?визоÑ?е Xen бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и. Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7777">CVE-2016-7777</a>
(XSA-190)
- - <p>Jan Beulich from SUSE discovered that Xen does not properly honor
- - CR0.TS and CR0.EM for x86 HVM guests, potentially allowing guest
- - users to read or modify FPU, MMX, or XMM register state information
- - belonging to arbitrary tasks on the guest by modifying an
- - instruction while the hypervisor is preparing to emulate it.</p></li>
+ <p>Ян Ð?Ñ?лиÑ? из SUSE обнаÑ?Ñ?жил, Ñ?Ñ?о Xen непÑ?авилÑ?но Ñ?облÑ?даеÑ?
+ CR0.TS и CR0.EM длÑ? гоÑ?Ñ?евÑ?Ñ? Ñ?иÑ?Ñ?ем HVM аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? x86, поÑ?енÑ?иалÑ?но позволÑ?Ñ? полÑ?зоваÑ?елÑ?м
+ гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? или изменÑ?Ñ?Ñ? инÑ?оÑ?маÑ?иÑ? о Ñ?оÑ?Ñ?оÑ?нии Ñ?егиÑ?Ñ?Ñ?ов FPU, MMX или XMM,
+ оÑ?ноÑ?Ñ?Ñ?Ñ?Ñ?Ñ?Ñ? к пÑ?оизволÑ?нÑ?м задаÑ?ам гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? пÑ?Ñ?Ñ?м изменениÑ?
+ инÑ?Ñ?Ñ?Ñ?кÑ?ии в Ñ?оÑ? моменÑ?, когда гипеÑ?визоÑ? гоÑ?овиÑ?Ñ?Ñ? к еÑ? Ñ?мÑ?лÑ?Ñ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9379">CVE-2016-9379</a>,
<a href="https://security-tracker.debian.org/tracker/CVE-2016-9380">CVE-2016-9380</a> (XSA-198)
- - <p>Daniel Richman and Gabor Szarka of the Cambridge University
- - Student-Run Computing Facility discovered that pygrub, the boot
- - loader emulator, fails to quote (or sanity check) its results when
- - reporting them to its caller. A malicious guest administrator can
- - take advantage of this flaw to cause an information leak or denial
- - of service.</p></li>
+ <p>Ð?аниелÑ? РиÑ?мн и Ð?абоÑ? СзаÑ?ка из Ñ?Ñ?Ñ?денÑ?еÑ?кого вÑ?Ñ?иÑ?лиÑ?елÑ?ного Ñ?енÑ?Ñ?а Ð?ембÑ?иджÑ?кого
+ Ñ?нивеÑ?Ñ?иÑ?еÑ?а обнаÑ?Ñ?жили, Ñ?Ñ?о pygrub, Ñ?мÑ?лÑ?Ñ?оÑ? загÑ?Ñ?зÑ?ика,
+ не заклÑ?Ñ?аеÑ? в кавÑ?Ñ?ки (и не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? Ñ?иÑ?Ñ?оÑ?Ñ?) Ñ?езÑ?лÑ?Ñ?аÑ? Ñ?воей Ñ?абоÑ?Ñ? пÑ?и
+ Ñ?ообÑ?ении его вÑ?зÑ?ваÑ?Ñ?ей Ñ?Ñ?нкÑ?ии. Ð?дминиÑ?Ñ?Ñ?аÑ?оÑ? гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? можеÑ?
+ иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова Ñ?Ñ?еÑ?ки инÑ?оÑ?маÑ?ии или оÑ?каза
+ в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9382">CVE-2016-9382</a>
(XSA-192)
- - <p>Jan Beulich of SUSE discovered that Xen does not properly handle x86
- - task switches to VM86 mode. A unprivileged guest process can take
- - advantage of this flaw to crash the guest or, escalate its
- - privileges to that of the guest operating system.</p></li>
+ <p>Ян Ð?Ñ?лиÑ? из SUSE обнаÑ?Ñ?жил, Ñ?Ñ?о Xen непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? пеÑ?еклÑ?Ñ?ение задаÑ? x86
+ в Ñ?ежим VM86. Ð?епÑ?ивилегиÑ?ованнÑ?й гоÑ?Ñ?евой пÑ?оÑ?еÑ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+ Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? или повÑ?Ñ?ениÑ? пÑ?ивилегий
+ до Ñ?Ñ?овнÑ? опеÑ?аÑ?ионной Ñ?иÑ?Ñ?емÑ? на гоÑ?Ñ?евой маÑ?ине.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9383">CVE-2016-9383</a>
(XSA-195)
- - <p>George Dunlap of Citrix discovered that the Xen x86 64-bit bit test
- - instruction emulation is broken. A malicious guest can take
- - advantage of this flaw to modify arbitrary memory, allowing for
- - arbitrary code execution, denial of service (host crash), or
- - information leaks.</p></li>
+ <p>Ð?жоÑ?дж Ð?анлÑ?п из Citrix обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?мÑ?лÑ?Ñ?иÑ? 64-биÑ?нÑ?Ñ? x86 инÑ?Ñ?Ñ?Ñ?кÑ?ий конÑ?Ñ?олÑ?
+ биÑ?ов Ñ?ломана. Ð?лоÑ?мÑ?Ñ?ленник из гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+ Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? изменениÑ? пÑ?оизволÑ?ной облаÑ?Ñ?и памÑ?Ñ?и, Ñ?Ñ?о позволÑ?еÑ? вÑ?зваÑ?Ñ?
+ вÑ?полнение пÑ?оизволÑ?ного кода, оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка главной Ñ?иÑ?Ñ?емÑ?)
+ или Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9385">CVE-2016-9385</a>
(XSA-193)
- - <p>Andrew Cooper of Citrix discovered that Xen's x86 segment base write
- - emulation lacks canonical address checks. A malicious guest
- - administrator can take advantage of this flaw to crash the host,
- - leading to a denial of service.</p></li>
+ <p>ÐндÑ?Ñ? Ð?Ñ?пеÑ? из Citrix обнаÑ?Ñ?жил, Ñ?Ñ?о в Ñ?мÑ?лÑ?Ñ?ии запиÑ?Ñ? наÑ?ала Ñ?егменÑ?а
+ оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? пÑ?овеÑ?ки канониÑ?еÑ?кого адÑ?еÑ?а. Ð?дминиÑ?Ñ?Ñ?аÑ?оÑ? гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ?
+ можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийной оÑ?Ñ?ановки оÑ?новной Ñ?иÑ?Ñ?емÑ?,
+ Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9386">CVE-2016-9386</a>
(XSA-191)
- - <p>Andrew Cooper of Citrix discovered that x86 null segments are not
- - always treated as unusable. An unprivileged guest user program
- - may be able to elevate its privilege to that of the guest
- - operating system.</p></li>
+ <p>ÐндÑ?Ñ? Ð?Ñ?пеÑ? из Citrix обнаÑ?Ñ?жил, Ñ?Ñ?о null-Ñ?егменÑ?Ñ? на аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?е x86 не
+ вÑ?егда Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ? неиÑ?полÑ?зÑ?емÑ?ми. Ð?епÑ?ивилегиÑ?ованнаÑ? полÑ?зоваÑ?елÑ?Ñ?каÑ? пÑ?огÑ?амма в
+ гоÑ?Ñ?евой Ñ?иÑ?Ñ?еме можеÑ? поднÑ?Ñ?Ñ? Ñ?вои пÑ?ивилегии до Ñ?Ñ?овнÑ? опеÑ?аÑ?ионной Ñ?иÑ?Ñ?емÑ?
+ гоÑ?Ñ?евой маÑ?инÑ?.</p></li>
</ul>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 4.4.1-9+deb8u8.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.4.1-9+deb8u8.</p>
- -<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=Zi3i
-----END PGP SIGNATURE-----
Reply to: