[DONE] wml://{security/2016/dsa-3616.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3616.wml 2016-07-04 16:02:22.585591920 +0500
+++ russian/security/2016/dsa-3616.wml 2016-07-04 16:19:54.835377542 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a privilege escalation, denial of service or information
- -leaks.</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий, оÑ?казÑ? в обÑ?лÑ?живании или Ñ?Ñ?еÑ?кам
+инÑ?оÑ?маÑ?ии.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-9904">CVE-2014-9904</a>
- - <p>It was discovered that the snd_compress_check_input function used in
- - the ALSA subsystem does not properly check for an integer overflow,
- - allowing a local user to cause a denial of service.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? snd_compress_check_input, иÑ?полÑ?зÑ?емаÑ? в
+ подÑ?иÑ?Ñ?еме ALSA, непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел,
+ Ñ?Ñ?о позволÑ?еÑ? локалÑ?номÑ? полÑ?зоваÑ?елÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5728">CVE-2016-5728</a>
- - <p>Pengfei Wang discovered a race condition in the MIC VOP driver that
- - could allow a local user to obtain sensitive information from kernel
- - memory or cause a denial of service.</p></li>
+ <p>Ð?енгÑ?ай Ð?анг обнаÑ?Ñ?жил Ñ?оÑ?Ñ?оÑ?ние гонки в дÑ?айвеÑ?е MIC VOP, коÑ?оÑ?ое
+ можеÑ? позволиÑ?Ñ? локалÑ?номÑ? полÑ?зоваÑ?елÑ? полÑ?Ñ?иÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? из памÑ?Ñ?и
+ Ñ?дÑ?а или вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5828">CVE-2016-5828</a>
- - <p>Cyril Bur and Michael Ellerman discovered a flaw in the handling of
- - Transactional Memory on powerpc systems allowing a local user to
- - cause a denial of service (kernel crash) or possibly have
- - unspecified other impact, by starting a transaction, suspending it,
- - and then calling any of the exec() class system calls.</p></li>
+ <p>СиÑ?ил Ð?Ñ?Ñ? и Ð?айкл ÐлеÑ?ман обнаÑ?Ñ?жили Ñ?Ñ?звимоÑ?Ñ?Ñ? в коде обÑ?абоÑ?ки
+ Transactional Memory в Ñ?иÑ?Ñ?емаÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой powerpc, коÑ?оÑ?аÑ? позволÑ?еÑ? локалÑ?нÑ?м
+ полÑ?зоваÑ?елÑ?м вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка Ñ?дÑ?а) или пÑ?иводиÑ?
+ к дÑ?Ñ?гим неопÑ?еделÑ?ннÑ?м Ñ?Ñ?Ñ?екÑ?ам. Ð?окалÑ?нÑ?е полÑ?зоваÑ?ели могÑ?Ñ? наÑ?аÑ?Ñ? Ñ?Ñ?анзакÑ?иÑ?, пÑ?иоÑ?Ñ?ановиÑ?Ñ? еÑ?,
+ а заÑ?ем вÑ?зваÑ?Ñ? лÑ?бой Ñ?иÑ?Ñ?емнÑ?й вÑ?зов из клаÑ?Ñ?а exec().</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5829">CVE-2016-5829</a>
- - <p>A heap-based buffer overflow vulnerability was found in the hiddev
- - driver, allowing a local user to cause a denial of service or,
- - potentially escalate their privileges.</p></li>
+ <p>Ð? дÑ?айвеÑ?е hiddev бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение динамиÑ?еÑ?кой памÑ?Ñ?и,
+ позволÑ?Ñ?Ñ?ее локалÑ?номÑ? полÑ?зоваÑ?елÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании или
+ поÑ?енÑ?иалÑ?но повÑ?Ñ?аÑ?Ñ? Ñ?вои пÑ?ивилегии.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6130">CVE-2016-6130</a>
- - <p>Pengfei Wang discovered a flaw in the S/390 character device drivers
- - potentially leading to information leak with /dev/sclp.</p></li>
+ <p>Ð?енгÑ?ай Ð?анг обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в дÑ?айвеÑ?аÑ? Ñ?имволÑ?нÑ?Ñ? Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?в S/390,
+ поÑ?енÑ?иалÑ?но пÑ?иводÑ?Ñ?Ñ?Ñ? к Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии Ñ?еÑ?ез /dev/sclp.</p></li>
</ul>
- -<p>Additionally this update fixes a regression in the ebtables facility
- -(#828914) that was introduced in DSA-3607-1.</p>
+<p>Ð?Ñ?оме Ñ?ого, в данном обновлении иÑ?пÑ?авлена Ñ?егÑ?еÑ?Ñ?иÑ? в ebtables
+(#828914), коÑ?оÑ?аÑ? поÑ?вилаÑ?Ñ? в DSA-3607-1.</p>
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 3.16.7-ckt25-2+deb8u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.16.7-ckt25-2+deb8u3.</p>
- -<p>We recommend that you upgrade your linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=0LCq
-----END PGP SIGNATURE-----
Reply to: