[DONE] wml://security/2017/dsa-39{69,70}.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2017/dsa-3969.wml 2017-09-13 09:34:06.000000000 +0500
+++ russian/security/2017/dsa-3969.wml 2017-09-13 09:50:00.901103739 +0500
@@ -1,89 +1,90 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in the Xen hypervisor:</p>
+<p>Ð? гипеÑ?визоÑ?е Xen бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10912">CVE-2017-10912</a>
- - <p>Jann Horn discovered that incorrectly handling of page transfers might
- - result in privilege escalation.</p></li>
+ <p>Ян ХоÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка поÑ?Ñ?Ñ?аниÑ?ного обмена можеÑ?
+ пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10913">CVE-2017-10913</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2017-10914">CVE-2017-10914</a>
- - <p>Jann Horn discovered that race conditions in grant handling might
- - result in information leaks or privilege escalation.</p></li>
+ <p>Ян ХоÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?оÑ?Ñ?оÑ?ниÑ? гонки в коде обÑ?абоÑ?ки пÑ?едоÑ?Ñ?авлений могÑ?Ñ?
+ пÑ?иводиÑ?Ñ? к Ñ?Ñ?еÑ?ка инÑ?оÑ?маÑ?ии или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10915">CVE-2017-10915</a>
- - <p>Andrew Cooper discovered that incorrect reference counting with
- - shadow paging might result in privilege escalation.</p></li>
+ <p>ÐндÑ?Ñ? Ð?Ñ?пеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?нÑ?й подÑ?Ñ?Ñ?Ñ? Ñ?Ñ?Ñ?лок Ñ?
+ Ñ?еневÑ?ми Ñ?Ñ?Ñ?аниÑ?ами можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10916">CVE-2017-10916</a>
- - <p>Andrew Cooper discovered an information leak in the handling
- - of the the Memory Protection Extensions (MPX) and Protection
- - Key (PKU) CPU features. This only affects Debian stretch.</p></li>
+ <p>ÐндÑ?Ñ? Ð?Ñ?пеÑ? обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии в коде обÑ?абоÑ?ки
+ Ñ?ледÑ?Ñ?Ñ?иÑ? возможноÑ?Ñ?ей ЦÐ?: Memory Protection Extensions (MPX) и Protection
+ Key (PKU). ÐÑ?а пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian stretch.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10917">CVE-2017-10917</a>
- - <p>Ankur Arora discovered a NULL pointer dereference in event
- - polling, resulting in denial of service.</p></li>
+ <p>Ð?нкÑ?Ñ? Ð?Ñ?оÑ?а обнаÑ?Ñ?жил Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ? в коде Ñ?поÑ?Ñ?доÑ?ениÑ?
+ Ñ?обÑ?Ñ?ий, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10918">CVE-2017-10918</a>
- - <p>Julien Grall discovered that incorrect error handling in
- - physical-to-machine memory mappings may result in privilege
- - escalation, denial of service or an information leak.</p></li>
+ <p>Ð?Ñ?лÑ?ен Ð?Ñ?алл обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка оÑ?ибок в оÑ?обÑ?ажении
+ Ñ?изиÑ?еÑ?кой памÑ?Ñ?и в маÑ?иннÑ?Ñ? можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий,
+ оÑ?казÑ? в обÑ?лÑ?живании или Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10919">CVE-2017-10919</a>
- - <p>Julien Grall discovered that that incorrect handling of
- - virtual interrupt injection on ARM systems may result in
- - denial of service.</p></li>
+ <p>Ð?Ñ?лÑ?ен Ð?Ñ?алл обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка введениÑ? виÑ?Ñ?Ñ?алÑ?ного
+ пÑ?еÑ?Ñ?ваниÑ? на Ñ?иÑ?Ñ?емаÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой ARM можеÑ? пÑ?иводиÑ?Ñ? к
+ оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10920">CVE-2017-10920</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2017-10921">CVE-2017-10921</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2017-10922">CVE-2017-10922</a>
- - <p>Jan Beulich discovered multiple places where reference
- - counting on grant table operations was incorrect, resulting
- - in potential privilege escalation</p></li>
+ <p>Ян Ð?Ñ?лиÑ? обнаÑ?Ñ?жил множеÑ?Ñ?во Ñ?лÑ?Ñ?аев, когда подÑ?Ñ?Ñ?Ñ? Ñ?Ñ?Ñ?лок
+ в Ñ?аблиÑ?е опеÑ?аÑ?ий по пÑ?едоÑ?Ñ?авлениÑ? оказÑ?ваеÑ?Ñ?Ñ? непÑ?авилÑ?нÑ?м, Ñ?Ñ?о пÑ?иводиÑ?
+ к поÑ?енÑ?иалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12135">CVE-2017-12135</a>
- - <p>Jan Beulich found multiple problems in the handling of
- - transitive grants which could result in denial of service
- - and potentially privilege escalation.</p></li>
+ <p>Ян Ð?Ñ?лиÑ? наÑ?Ñ?л многоÑ?иÑ?леннÑ?е пÑ?облемÑ? к коде обÑ?абоÑ?ки Ñ?Ñ?анзиÑ?ивнÑ?Ñ?
+ пÑ?едоÑ?Ñ?авлений, коÑ?оÑ?Ñ?е могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании
+ и поÑ?енÑ?иалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12136">CVE-2017-12136</a>
- - <p>Ian Jackson discovered that race conditions in the allocator
- - for grant mappings may result in denial of service or privilege
- - escalation. This only affects Debian stretch.</p></li>
+ <p>Ð?Ñ?н Ð?жекÑ?он обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?оÑ?Ñ?оÑ?ниÑ? гонки в коде вÑ?делениÑ? Ñ?еÑ?Ñ?Ñ?Ñ?ов
+ длÑ? оÑ?обÑ?ажений пÑ?едоÑ?Ñ?авлений могÑ?Ñ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или повÑ?Ñ?ениÑ?
+ пÑ?ивилегий. ÐÑ?а пÑ?облема каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian stretch.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12137">CVE-2017-12137</a>
- - <p>Andrew Cooper discovered that incorrect validation of
- - grants may result in privilege escalation.</p></li>
+ <p>ÐндÑ?Ñ? Ð?Ñ?пеÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? пÑ?овеÑ?ка пÑ?едоÑ?Ñ?авлений
+ можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-12855">CVE-2017-12855</a>
- - <p>Jan Beulich discovered that incorrect grant status handling, thus
- - incorrectly informing the guest that the grant is no longer in use.</p></li>
+ <p>Ян Ð?Ñ?лиÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?авилÑ?наÑ? обÑ?абоÑ?ка Ñ?Ñ?аÑ?Ñ?Ñ?а пÑ?едоÑ?Ñ?авлений, из-за коÑ?оÑ?ой
+ гоÑ?Ñ?евÑ?е Ñ?иÑ?Ñ?емÑ? некоÑ?Ñ?екÑ?но инÑ?оÑ?миÑ?Ñ?Ñ?Ñ?Ñ?Ñ? о Ñ?ом, Ñ?Ñ?о пÑ?едоÑ?Ñ?авление более не иÑ?полÑ?зÑ?еÑ?Ñ?Ñ?.</p></li>
<li>XSA-235 (no CVE yet)
- - <p>Wei Liu discovered that incorrect locking of add-to-physmap
- - operations on ARM may result in denial of service.</p></li>
+ <p>Ð?Ñ?й Ð?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? блокиÑ?овка опеÑ?аÑ?ий add-to-physmap
+ на Ñ?иÑ?Ñ?емаÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой ARM можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
</ul>
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 4.4.1-9+deb8u10.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 4.4.1-9+deb8u10.</p>
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 4.8.1-1+deb9u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.8.1-1+deb9u3.</p>
- -<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
</define-tag>
# do not modify the following line
- --- english/security/2017/dsa-3970.wml 2017-09-13 09:35:12.000000000 +0500
+++ russian/security/2017/dsa-3970.wml 2017-09-13 09:53:15.549725718 +0500
@@ -1,16 +1,17 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Charles A. Roelli discovered that Emacs is vulnerable to arbitrary code
- -execution when rendering text/enriched MIME data (e.g. when using
- -Emacs-based mail clients).</p>
+<p>ЧаÑ?лÑ?з РоÑ?лли обнаÑ?Ñ?жил, Ñ?Ñ?о Emacs Ñ?Ñ?звим к вÑ?полнениÑ? пÑ?оизволÑ?ного
+кода пÑ?и оÑ?Ñ?иÑ?овке MIME-даннÑ?Ñ? Ñ?ипа text/enriched (напÑ?имеÑ?, пÑ?и иÑ?полÑ?зовании
+поÑ?Ñ?овÑ?Ñ? клиенÑ?ов на оÑ?нове Emacs).</p>
- -<p>For the oldstable distribution (jessie), this problem has been fixed
- -in version 24.4+1-5+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена
+в веÑ?Ñ?ии 24.4+1-5+deb8u1.</p>
- -<p>For the stable distribution (stretch), this problem has been fixed in
- -version 24.5+1-11+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 24.5+1-11+deb9u1.</p>
- -<p>We recommend that you upgrade your emacs24 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? emacs24.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=S9oc
-----END PGP SIGNATURE-----
Reply to: