[DONE] wml://security/2018/dsa-4201.wml
--- ../../english/security/2018/dsa-4201.wml 2018-05-16 11:27:52.000000000 +0500
+++ 2018/dsa-4201.wml 2018-05-16 11:32:27.667344333 +0500
@@ -1,4 +1,5 @@
-<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" mindelta="1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
<p>Multiple vulnerabilities have been discovered in the Xen hypervisor:</p>
@@ -6,43 +7,42 @@
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8897">CVE-2018-8897</a>
- <p>Andy Lutomirski and Nick Peterson discovered that incorrect handling
- of debug exceptions could result in privilege escalation.</p></li>
+ <p>Ðнди Ð?Ñ?Ñ?омиÑ?Ñ?кий и Ð?ик Ð?еÑ?еÑ?Ñ?он обнаÑ?Ñ?жили, Ñ?Ñ?о непÑ?авилÑ?на обÑ?абоÑ?ка
+ оÑ?ладоÑ?нÑ?Ñ? иÑ?клÑ?Ñ?ений можеÑ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10471">CVE-2018-10471</a>
- <p>An error was discovered in the mitigations against Meltdown which
- could result in denial of service.</p></li>
+ <p>Ð?Ñ?ла обнаÑ?Ñ?жена оÑ?ибка в Ñ?поÑ?обаÑ? Ñ?нижениÑ? Ñ?иÑ?ков оÑ? Ñ?Ñ?звимоÑ?Ñ?и Meltdown,
+ коÑ?оÑ?аÑ? можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10472">CVE-2018-10472</a>
- <p>Anthony Perard discovered that incorrect parsing of CDROM images
- can result in information disclosure.</p></li>
+ <p>ÐнÑ?они Ð?еÑ?аÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?нÑ?й гÑ?аммаÑ?иÑ?еÑ?кий Ñ?азбоÑ? обÑ?азов компакÑ?-диÑ?ков
+ можеÑ? пÑ?иводиÑ?Ñ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10981">CVE-2018-10981</a>
- <p>Jan Beulich discovered that malformed device models could result
- in denial of service.</p></li>
+ <p>Ян Ð?Ñ?лиÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е модели Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?в могÑ?Ñ? пÑ?иводиÑ?Ñ?
+ к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10982">CVE-2018-10982</a>
- <p>Roger Pau Monne discovered that incorrect handling of high precision
- event timers could result in denial of service and potentially
- privilege escalation.</p></li>
+ <p>РоджеÑ? Ð?аÑ? Ð?онн обнаÑ?Ñ?жил, Ñ?Ñ?о непÑ?авилÑ?наÑ? обÑ?абоÑ?ка вÑ?Ñ?окоÑ?оÑ?нÑ?Ñ? Ñ?аймеÑ?ов Ñ?обÑ?Ñ?ий
+ можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании и поÑ?енÑ?иалÑ?номÑ?
+ повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
</ul>
-<p>For the stable distribution (stretch), these problems have been fixed in
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u6.</p>
-<p>We recommend that you upgrade your xen packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? xen.</p>
-<p>For the detailed security status of xen please refer to its
-security tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и xen можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
<a href="https://security-tracker.debian.org/tracker/xen">\
https://security-tracker.debian.org/tracker/xen</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2018/dsa-4201.data"
-# $Id: dsa-4201.wml,v 1.1 2018/05/16 06:27:52 dogsleg Exp $
Reply to: