[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-39{69,70}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3969.wml	2017-09-13 09:34:06.000000000 +0500
+++ russian/security/2017/dsa-3969.wml	2017-09-13 09:50:00.901103739 +0500
@@ -1,89 +1,90 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in the Xen hypervisor:</p>
+<p>Ð? гипеÑ?визоÑ?е Xen бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10912";>CVE-2017-10912</a>
 
- -    <p>Jann Horn discovered that incorrectly handling of page transfers might
- -    result in privilege escalation.</p></li>
+    <p>Ян ХоÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка поÑ?Ñ?Ñ?аниÑ?ного обмена можеÑ?
+    пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10913";>CVE-2017-10913</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2017-10914";>CVE-2017-10914</a>
 
- -    <p>Jann Horn discovered that race conditions in grant handling might
- -    result in information leaks or privilege escalation.</p></li>
+    <p>Ян ХоÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?оÑ?Ñ?оÑ?ниÑ? гонки в коде обÑ?абоÑ?ки пÑ?едоÑ?Ñ?авлений могÑ?Ñ?
+    пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ка инÑ?оÑ?маÑ?ии или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10915";>CVE-2017-10915</a>
 
- -    <p>Andrew Cooper discovered that incorrect reference counting with
- -    shadow paging might result in privilege escalation.</p></li>
+    <p>ЭндÑ?Ñ? Ð?Ñ?пеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?нÑ?й подÑ?Ñ?Ñ?Ñ? Ñ?Ñ?Ñ?лок Ñ?
+    Ñ?еневÑ?ми Ñ?Ñ?Ñ?аниÑ?ами можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10916";>CVE-2017-10916</a>
 
- -    <p>Andrew Cooper discovered an information leak in the handling
- -    of the the Memory Protection Extensions (MPX) and Protection
- -    Key (PKU) CPU features. This only affects Debian stretch.</p></li>
+    <p>ЭндÑ?Ñ? Ð?Ñ?пеÑ? обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии в коде обÑ?абоÑ?ки
+    Ñ?ледÑ?Ñ?Ñ?иÑ? возможноÑ?Ñ?ей ЦÐ?: Memory Protection Extensions (MPX) и Protection
+    Key (PKU). ЭÑ?а пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian stretch.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10917";>CVE-2017-10917</a>
 
- -    <p>Ankur Arora discovered a NULL pointer dereference in event
- -    polling, resulting in denial of service.</p></li>
+    <p>Ð?нкÑ?Ñ? Ð?Ñ?оÑ?а обнаÑ?Ñ?жил Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ? в коде Ñ?поÑ?Ñ?доÑ?ениÑ?
+    Ñ?обÑ?Ñ?ий, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10918";>CVE-2017-10918</a>
 
- -    <p>Julien Grall discovered that incorrect error handling in
- -    physical-to-machine memory mappings may result in privilege
- -    escalation, denial of service or an information leak.</p></li>
+    <p>Ð?Ñ?лÑ?ен Ð?Ñ?алл обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка оÑ?ибок в оÑ?обÑ?ажении
+    Ñ?изиÑ?еÑ?кой памÑ?Ñ?и в маÑ?иннÑ?Ñ? можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий,
+    оÑ?казÑ? в обÑ?лÑ?живании или Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10919";>CVE-2017-10919</a>
 
- -    <p>Julien Grall discovered that that incorrect handling of
- -    virtual interrupt injection on ARM systems may result in
- -    denial of service.</p></li>
+    <p>Ð?Ñ?лÑ?ен Ð?Ñ?алл обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка введениÑ? виÑ?Ñ?Ñ?алÑ?ного
+    пÑ?еÑ?Ñ?ваниÑ? на Ñ?иÑ?Ñ?емаÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой ARM можеÑ? пÑ?иводиÑ?Ñ? к
+    оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10920";>CVE-2017-10920</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2017-10921";>CVE-2017-10921</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2017-10922";>CVE-2017-10922</a>
 
- -    <p>Jan Beulich discovered multiple places where reference
- -    counting on grant table operations was incorrect, resulting
- -    in potential privilege escalation</p></li>
+    <p>Ян Ð?Ñ?лиÑ? обнаÑ?Ñ?жил множеÑ?Ñ?во Ñ?лÑ?Ñ?аев, когда подÑ?Ñ?Ñ?Ñ? Ñ?Ñ?Ñ?лок
+    в Ñ?аблиÑ?е опеÑ?аÑ?ий по пÑ?едоÑ?Ñ?авлениÑ? оказÑ?ваеÑ?Ñ?Ñ? непÑ?авилÑ?нÑ?м, Ñ?Ñ?о пÑ?иводиÑ?
+    к поÑ?енÑ?иалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12135";>CVE-2017-12135</a>
 
- -    <p>Jan Beulich found multiple problems in the handling of
- -    transitive grants which could result in denial of service
- -    and potentially privilege escalation.</p></li>
+    <p>Ян Ð?Ñ?лиÑ? наÑ?Ñ?л многоÑ?иÑ?леннÑ?е пÑ?облемÑ? к коде обÑ?абоÑ?ки Ñ?Ñ?анзиÑ?ивнÑ?Ñ?
+    пÑ?едоÑ?Ñ?авлений, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании
+    и поÑ?енÑ?иалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12136";>CVE-2017-12136</a>
 
- -    <p>Ian Jackson discovered that race conditions in the allocator
- -    for grant mappings may result in denial of service or privilege
- -    escalation. This only affects Debian stretch.</p></li>
+    <p>Ð?Ñ?н Ð?жекÑ?он обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?оÑ?Ñ?оÑ?ниÑ? гонки в коде вÑ?делениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов
+    длÑ? оÑ?обÑ?ажений пÑ?едоÑ?Ñ?авлений могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или повÑ?Ñ?ениÑ?
+    пÑ?ивилегий. ЭÑ?а пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian stretch.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12137";>CVE-2017-12137</a>
 
- -    <p>Andrew Cooper discovered that incorrect validation of
- -    grants may result in privilege escalation.</p></li>
+    <p>ЭндÑ?Ñ? Ð?Ñ?пеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? пÑ?овеÑ?ка пÑ?едоÑ?Ñ?авлений
+    можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12855";>CVE-2017-12855</a>
 
- -    <p>Jan Beulich discovered that incorrect grant status handling, thus
- -    incorrectly informing the guest that the grant is no longer in use.</p></li>
+    <p>Ян Ð?Ñ?лиÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?авилÑ?наÑ? обÑ?абоÑ?ка Ñ?Ñ?аÑ?Ñ?Ñ?а пÑ?едоÑ?Ñ?авлений, из-за коÑ?оÑ?ой
+    гоÑ?Ñ?евÑ?е Ñ?иÑ?Ñ?емÑ? некоÑ?Ñ?екÑ?но инÑ?оÑ?миÑ?Ñ?Ñ?Ñ?Ñ?Ñ? о Ñ?ом, Ñ?Ñ?о пÑ?едоÑ?Ñ?авление более не иÑ?полÑ?зÑ?еÑ?Ñ?Ñ?.</p></li>
 
 <li>XSA-235 (no CVE yet)
 
- -    <p>Wei Liu discovered that incorrect locking of add-to-physmap
- -    operations on ARM may result in denial of service.</p></li>
+    <p>Ð?Ñ?й Ð?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? блокиÑ?овка опеÑ?аÑ?ий add-to-physmap
+    на Ñ?иÑ?Ñ?емаÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой ARM можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 4.4.1-9+deb8u10.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4.4.1-9+deb8u10.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 4.8.1-1+deb9u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.8.1-1+deb9u3.</p>
 
- -<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3970.wml	2017-09-13 09:35:12.000000000 +0500
+++ russian/security/2017/dsa-3970.wml	2017-09-13 09:53:15.549725718 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Charles A. Roelli discovered that Emacs is vulnerable to arbitrary code
- -execution when rendering text/enriched MIME data (e.g. when using
- -Emacs-based mail clients).</p>
+<p>ЧаÑ?лÑ?з РоÑ?лли обнаÑ?Ñ?жил, Ñ?Ñ?о Emacs Ñ?Ñ?звим к вÑ?полнениÑ? пÑ?оизволÑ?ного
+кода пÑ?и оÑ?Ñ?иÑ?овке MIME-даннÑ?Ñ? Ñ?ипа text/enriched (напÑ?имеÑ?, пÑ?и иÑ?полÑ?зовании
+поÑ?Ñ?овÑ?Ñ? клиенÑ?ов на оÑ?нове Emacs).</p>
 
- -<p>For the oldstable distribution (jessie), this problem has been fixed
- -in version 24.4+1-5+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 24.4+1-5+deb8u1.</p>
 
- -<p>For the stable distribution (stretch), this problem has been fixed in
- -version 24.5+1-11+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 24.5+1-11+deb9u1.</p>
 
- -<p>We recommend that you upgrade your emacs24 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? emacs24.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlm4ub8ACgkQXudu4gIW
0qVRyxAAmlQeVHvplb01HfnAn8gSkcfFB/P7ZOXHOkpAnYYAAOIo/lkg/2LX3lLM
bi0Odhuxj+rT5N7VZ5hCZ2gruFa5/60AowMXj/KKzWZqkqb8ztyDsdxVQ8ynOgri
p5MGraOhzx2KuzBYKO70RwxP37CAkRdTkxHU7xd9RItXWTkyyDs5GeXbh03ncouJ
CFeGbUjivW//m4TZMepKiKbQv7QgKtMH6u7iH3XRIdsI0pNUpjS4tiXtWGzHVkfb
jJFAEn3XnM41sNRcfBjPjVMeqc14ll0hlW4rwFwOIcZPtN9hNU7T6GEmN7rj9Nz8
7ux2rjIFYCtjjFXj7iGm0mPO0jyDv3z5n6ARhThCWebuwtMNgL6kdqrlU8igz042
UrFPiwaH8KrrmQcX7t3aeDibkHqL7VLzCkS9qnYckupeCX6RmV32cMBXY8O0tKxR
R0OphNZ9+ZZvFFEw+yUZrdJE+Dd+j7IqjBGZIs35VFcT3UCKzxlEcSxVIo1jA1Jr
agmJzEfTuvVmdut6r/wQKknra37srjEYCNm8TybSdavAIYRB7XK/VpVvHKCNahqr
bAuVfPiyZBx8POKMZvDBzq0VKs6rMWl8v60p7DqZobdlGSzJUSVroMWI9WDoJDHx
lPcjUUyYCHn5sXqXtoYHTYCfYCz4Q4up9z+oI4VQ/9UXF2VhnH8=
=S9oc
-----END PGP SIGNATURE-----


Reply to: