-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2018/dsa-4131.wml 2018-03-04 15:28:48.000000000 +0500 +++ russian/security/2018/dsa-4131.wml 2018-03-04 15:57:51.257882726 +0500 @@ -1,34 +1,36 @@ - -<define-tag description>security update</define-tag> +#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи</define-tag> <define-tag moreinfo> - -<p>Multiple vulnerabilities have been discovered in the Xen hypervisor:</p> +<p>РгипеÑвизоÑе Xen, бÑли обнаÑÑÐ¶ÐµÐ½Ñ Ð¼Ð½Ð¾Ð³Ð¾ÑиÑленнÑе ÑÑзвимоÑÑи:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7540">CVE-2018-7540</a> - - <p>Jann Horn discovered that missing checks in page table freeing may - - result in denial of service.</p></li> + <p>Ян ХоÑн обнаÑÑжил, ÑÑо оÑÑÑÑÑÑвие пÑовеÑок в коде оÑиÑÑки ÑаблиÑÑ Ð¿ÐµÑеадÑеÑаÑии + ÑÑÑÐ°Ð½Ð¸Ñ Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7541">CVE-2018-7541</a> - - <p>Jan Beulich discovered that incorrect error handling in grant table - - checks may result in guest-to-host denial of service and potentially - - privilege escalation.</p></li> + <p>Ян ÐÑÐ»Ð¸Ñ Ð¾Ð±Ð½Ð°ÑÑжил, ÑÑо непÑавилÑÐ½Ð°Ñ Ð¾Ð±ÑабоÑка оÑибок в коде пÑовеÑки ÑаблиÑÑ + пÑедоÑÑавлений Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании по ÑÐ¸Ð¿Ñ <q>гоÑÑÐµÐ²Ð°Ñ ÑиÑÑема — + Ð³Ð»Ð°Ð²Ð½Ð°Ñ ÑиÑÑема<q> и поÑенÑиалÑÐ½Ð¾Ð¼Ñ Ð¿Ð¾Ð²ÑÑÐµÐ½Ð¸Ñ Ð¿Ñивилегий.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7542">CVE-2018-7542</a> - - <p>Ian Jackson discovered that insufficient handling of x86 PVH guests - - without local APICs may result in guest-to-host denial of service.</p></li> + <p>ÐÑн ÐжекÑон обнаÑÑжил, ÑÑо недоÑÑаÑоÑÐ½Ð°Ñ Ð¾Ð±ÑабоÑка гоÑÑевÑÑ ÑиÑÑем x86 PVH + без локалÑнÑÑ APIC Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании по ÑÐ¸Ð¿Ñ <q>гоÑÑÐµÐ²Ð°Ñ ÑиÑÑема — + Ð³Ð»Ð°Ð²Ð½Ð°Ñ ÑиÑÑема<q>.</p></li> </ul> - -<p>For the stable distribution (stretch), these problems have been fixed in - -version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (stretch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5.</p> - -<p>We recommend that you upgrade your xen packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ xen.</p> - -<p>For the detailed security status of xen please refer to - -its security tracker page at: +<p>С подÑобнÑм ÑÑаÑÑÑом поддеÑжки безопаÑноÑÑи xen можно ознакомиÑÑÑÑ Ð½Ð° +ÑооÑвеÑÑÑвÑÑÑей ÑÑÑаниÑе оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи <a href="https://security-tracker.debian.org/tracker/xen">\ https://security-tracker.debian.org/tracker/xen</a></p> </define-tag> -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlqb0TUACgkQXudu4gIW 0qWWEg//QFhtdlm37xmnfgIJ0L0FwuUeuJ+nWP7g4hfMAsbqtPLkFF4q1UzmdK7k cuJPIJIkucytPSZMEgheQJx5DiBP/ZpXd8kv+Rr7tHERbL+NnIFQtcv0EAbnRPvo 0TG/27yoBIGKwKs7a4gdCbd+tB/J8WAoCCJW4yBXkqLwaTOoAdyHlsv8dJQ2afFP JgiD3rOckpiMQSuPXMkt0OTq7Xu9pElmc52f+ty2g+8rnKrRV74AJxi+iMfy6iS4 jeHwDJzSio6CdQc5fyVH/U4VtvGr9Mxmgnn3s0Zui31uyzKFFQq1rLKiUgVMZXKl /pFG3RzGBaVCtC6OC4tZQr1TpukfdNgyGwpRMg0hilESwq4U4x+0hPrYnUJ7nlFW oM+1T/gLMZTVqoa7DUmdFwT8akVXmP9BzG3a90vlaJ2ll48LF/+IoYbHZVL21WXG hetZ6NWwETGHrls92EnD0urAGIMmDHySI9Mf0215H4EHKxHe9Z++i1DIsfLanI0X dCcnTRVLd3iBDAv8BcRCeAfN90zFY8NgLZbApOr+vJQdhDKaYHYvcXL9SDICA0c9 p+3LMJjPdP7tSCVT1x8R3FwxUls/um3gKvL/gEgQViqLatarcq1Cwn8/5+SCiuOi IUjR7ypa2n5DBB7VHta4vuIrhhqXs9gSoDAPc5b2Ye2UtLsrBZw= =hYnI -----END PGP SIGNATURE-----