[DONE] wml://{security/2018/dsa-4131.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2018/dsa-4131.wml 2018-03-04 15:28:48.000000000 +0500
+++ russian/security/2018/dsa-4131.wml 2018-03-04 15:57:51.257882726 +0500
@@ -1,34 +1,36 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Multiple vulnerabilities have been discovered in the Xen hypervisor:</p>
+<p>Ð? гипеÑ?визоÑ?е Xen, бÑ?ли обнаÑ?Ñ?женÑ? многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7540">CVE-2018-7540</a>
- - <p>Jann Horn discovered that missing checks in page table freeing may
- - result in denial of service.</p></li>
+ <p>Ян ХоÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ок в коде оÑ?иÑ?Ñ?ки Ñ?аблиÑ?Ñ? пеÑ?еадÑ?еÑ?аÑ?ии
+ Ñ?Ñ?Ñ?аниÑ? можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7541">CVE-2018-7541</a>
- - <p>Jan Beulich discovered that incorrect error handling in grant table
- - checks may result in guest-to-host denial of service and potentially
- - privilege escalation.</p></li>
+ <p>Ян Ð?Ñ?лиÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка оÑ?ибок в коде пÑ?овеÑ?ки Ñ?аблиÑ?Ñ?
+ пÑ?едоÑ?Ñ?авлений можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании по Ñ?ипÑ? <q>гоÑ?Ñ?еваÑ? Ñ?иÑ?Ñ?ема —
+ главнаÑ? Ñ?иÑ?Ñ?ема<q> и поÑ?енÑ?иалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7542">CVE-2018-7542</a>
- - <p>Ian Jackson discovered that insufficient handling of x86 PVH guests
- - without local APICs may result in guest-to-host denial of service.</p></li>
+ <p>Ð?Ñ?н Ð?жекÑ?он обнаÑ?Ñ?жил, Ñ?Ñ?о недоÑ?Ñ?аÑ?оÑ?наÑ? обÑ?абоÑ?ка гоÑ?Ñ?евÑ?Ñ? Ñ?иÑ?Ñ?ем x86 PVH
+ без локалÑ?нÑ?Ñ? APIC можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании по Ñ?ипÑ? <q>гоÑ?Ñ?еваÑ? Ñ?иÑ?Ñ?ема —
+ главнаÑ? Ñ?иÑ?Ñ?ема<q>.</p></li>
</ul>
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5.</p>
- -<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
- -<p>For the detailed security status of xen please refer to
- -its security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и xen можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и
<a href="https://security-tracker.debian.org/tracker/xen">\
https://security-tracker.debian.org/tracker/xen</a></p>
</define-tag>
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlqb0TUACgkQXudu4gIW
0qWWEg//QFhtdlm37xmnfgIJ0L0FwuUeuJ+nWP7g4hfMAsbqtPLkFF4q1UzmdK7k
cuJPIJIkucytPSZMEgheQJx5DiBP/ZpXd8kv+Rr7tHERbL+NnIFQtcv0EAbnRPvo
0TG/27yoBIGKwKs7a4gdCbd+tB/J8WAoCCJW4yBXkqLwaTOoAdyHlsv8dJQ2afFP
JgiD3rOckpiMQSuPXMkt0OTq7Xu9pElmc52f+ty2g+8rnKrRV74AJxi+iMfy6iS4
jeHwDJzSio6CdQc5fyVH/U4VtvGr9Mxmgnn3s0Zui31uyzKFFQq1rLKiUgVMZXKl
/pFG3RzGBaVCtC6OC4tZQr1TpukfdNgyGwpRMg0hilESwq4U4x+0hPrYnUJ7nlFW
oM+1T/gLMZTVqoa7DUmdFwT8akVXmP9BzG3a90vlaJ2ll48LF/+IoYbHZVL21WXG
hetZ6NWwETGHrls92EnD0urAGIMmDHySI9Mf0215H4EHKxHe9Z++i1DIsfLanI0X
dCcnTRVLd3iBDAv8BcRCeAfN90zFY8NgLZbApOr+vJQdhDKaYHYvcXL9SDICA0c9
p+3LMJjPdP7tSCVT1x8R3FwxUls/um3gKvL/gEgQViqLatarcq1Cwn8/5+SCiuOi
IUjR7ypa2n5DBB7VHta4vuIrhhqXs9gSoDAPc5b2Ye2UtLsrBZw=
=hYnI
-----END PGP SIGNATURE-----
Reply to: