[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3696.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3696.wml	2016-10-20 00:04:38.000000000 +0500
+++ russian/security/2016/dsa-3696.wml	2016-10-20 01:35:12.448116569 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a privilege escalation, denial of service or information
- -leaks.</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий, оÑ?казÑ? в обÑ?лÑ?живании или Ñ?Ñ?еÑ?кам
+инÑ?оÑ?маÑ?ии.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8956";>CVE-2015-8956</a>
 
- -    <p>It was discovered that missing input sanitising in RFCOMM Bluetooth
- -    socket handling may result in denial of service or information leak.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в коде обÑ?абоÑ?ки
+    RFCOMM Bluetooth-Ñ?океÑ?а можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или Ñ?Ñ?еÑ?кам инÑ?оÑ?маÑ?ии.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-5195";>CVE-2016-5195</a>
 
- -    <p>It was discovered that a race condition in the memory management
- -    code can be used for local privilege escalation.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?оÑ?Ñ?оÑ?ние гонки в коде Ñ?пÑ?авлениÑ? памÑ?Ñ?Ñ?Ñ? можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ? локалÑ?ного повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7042";>CVE-2016-7042</a>
 
- -    <p>Ondrej Kozina discovered that incorrect buffer allocation in the
- -    proc_keys_show() function may result in local denial of service.</p></li>
+    <p>Ð?ндÑ?ей Ð?озина обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?Ñ?екÑ?ное вÑ?деление бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии
+    proc_keys_show() можеÑ? пÑ?иводиÑ?Ñ? к локалÑ?номÑ? оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-7425";>CVE-2016-7425</a>
 
- -    <p>Marco Grassi discovered a buffer overflow in the arcmsr SCSI driver
- -    which may result in local denial of service, or potentially,
- -    arbitrary code execution.</p>
+    <p>Ð?аÑ?ко Ð?Ñ?аÑ?Ñ?и обнаÑ?Ñ?жил пеÑ?еполнение бÑ?Ñ?еÑ?а в SCSI-дÑ?айвеÑ?е arcmsr,
+    коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к локалÑ?номÑ? оÑ?казÑ? в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?номÑ?
+    вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p>
 
- -<p>Additionally this update fixes a regression introduced in DSA-3616-1
- -causing iptables performance issues (cf. Debian Bug #831014).</p></li>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?егÑ?еÑ?Ñ?иÑ?, поÑ?вивÑ?Ñ?Ñ?Ñ?Ñ? в DSA-3616-1
+и вÑ?зÑ?ваÑ?Ñ?Ñ?Ñ? пÑ?облемÑ? Ñ? пÑ?оизводиÑ?елÑ?ноÑ?Ñ?Ñ?Ñ? iptables (Ñ?м. Debian Bug #831014).</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 3.16.36-1+deb8u2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.16.36-1+deb8u2.</p>
 
- -<p>We recommend that you upgrade your linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=heD6
-----END PGP SIGNATURE-----


Reply to: