[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2018/dsa-4137.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2018/dsa-4137.wml	2018-03-15 14:57:05.000000000 +0500
+++ russian/security/2018/dsa-4137.wml	2018-03-15 16:34:01.082626753 +0500
@@ -1,41 +1,43 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in Libvirt, a virtualisation
- -abstraction library:</p>
+<p>Ð? Libvirt, библиоÑ?еки абÑ?Ñ?Ñ?акÑ?ий длÑ? виÑ?Ñ?Ñ?ализаÑ?ии, бÑ?ло обнаÑ?Ñ?жено
+неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1064";>CVE-2018-1064</a>
 
- -    <p>Daniel Berrange discovered that the QEMU guest agent performed
- -    insufficient validation of incoming data, which allows a privileged
- -    user in the guest to exhaust resources on the virtualisation host,
- -    resulting in denial of service.</p></li>
+    <p>Ð?Ñ?ниелÑ? Ð?еÑ?анж обнаÑ?Ñ?жил, Ñ?Ñ?о гоÑ?Ñ?евой агенÑ? QEMU вÑ?полнÑ?еÑ?
+    недоÑ?Ñ?аÑ?оÑ?нÑ?е пÑ?овеÑ?ки вÑ?одÑ?Ñ?иÑ? даннÑ?Ñ?, Ñ?Ñ?о позволÑ?еÑ? пÑ?ивилегиÑ?ованномÑ?
+    полÑ?зоваÑ?елÑ? гоÑ?Ñ?евой Ñ?иÑ?Ñ?емÑ? Ñ?Ñ?езмеÑ?но поÑ?Ñ?еблÑ?Ñ?Ñ? Ñ?еÑ?Ñ?Ñ?Ñ?Ñ? Ñ?зла виÑ?Ñ?Ñ?ализаÑ?ии,
+    Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5748";>CVE-2018-5748</a>
 
- -    <p>Daniel Berrange and Peter Krempa discovered that the QEMU monitor
- -    was susceptible to denial of service by memory exhaustion. This was
- -    already fixed in Debian stretch and only affects Debian jessie.</p></li>
+    <p>Ð?Ñ?ниелÑ? Ð?еÑ?анж и Ð?еÑ?еÑ? Ð?Ñ?емпа обнаÑ?Ñ?жили, Ñ?Ñ?о QEMU-мониÑ?оÑ?
+    пÑ?едположиÑ?елÑ?но Ñ?Ñ?звим к оÑ?казÑ? в обÑ?лÑ?живании из-за иÑ?Ñ?еÑ?паниÑ? памÑ?Ñ?и. ЭÑ?а пÑ?облема
+    Ñ?же иÑ?пÑ?авлена в Debian stretch и каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian jessie.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6764";>CVE-2018-6764</a>
 
- -    <p>Pedro Sampaio discovered that LXC containers detected the hostname
- -    insecurely. This only affects Debian stretch.</p></li>
+    <p>Ð?едÑ?о Сампайо обнаÑ?Ñ?жил, Ñ?Ñ?о LXC-конÑ?ейнеÑ?Ñ? опÑ?еделÑ?Ñ?Ñ? имÑ? Ñ?зла
+    небезопаÑ?нÑ?м обÑ?азом. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Debian stretch.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems have been fixed
- -in version 1.2.9-9+deb8u5.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 1.2.9-9+deb8u5.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 3.0.0-4+deb9u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.0.0-4+deb9u3.</p>
 
- -<p>We recommend that you upgrade your libvirt packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? libvirt.</p>
 
- -<p>For the detailed security status of libvirt please refer to
- -its security tracker page at:
- -<a href="https://security-tracker.debian.org/tracker/libvirt";>https://security-tracker.debian.org/tracker/libvirt</a></p>
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и libvirt можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/libvirt";>\
+https://security-tracker.debian.org/tracker/libvirt</a></p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=BvHv
-----END PGP SIGNATURE-----


Reply to: