[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3448.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3448.wml	2016-01-19 17:41:35.000000000 +0500
+++ russian/security/2016/dsa-3448.wml	2016-01-19 22:14:36.982417278 +0500
@@ -1,45 +1,46 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a privilege escalation or denial-of-service.</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий или оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4312";>CVE-2013-4312</a>
 
- -    <p>Tetsuo Handa discovered that it is possible for a process to open
- -    far more files than the process' limit leading to denial-of-service
- -    conditions.</p></li>
+    <p>ТеÑ?Ñ?Ñ?о Ханда обнаÑ?Ñ?жил, Ñ?Ñ?о пÑ?оÑ?еÑ?Ñ? можеÑ? оÑ?кÑ?Ñ?Ñ?Ñ?
+    болÑ?Ñ?е Ñ?айлов, Ñ?ем опÑ?еделено Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?им огÑ?аниÑ?ением, Ñ?Ñ?о пÑ?иводиÑ?
+    к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7566";>CVE-2015-7566</a>
 
- -    <p>Ralf Spenneberg of OpenSource Security reported that the visor
- -    driver crashes when a specially crafted USB device without bulk-out
- -    endpoint is detected.</p></li>
+    <p>РалÑ?Ñ? ШпеннебеÑ?г из OpenSource Security Ñ?ообÑ?ил, Ñ?Ñ?о дÑ?айвеÑ? visor
+    аваÑ?ийно завеÑ?Ñ?аеÑ? Ñ?воÑ? Ñ?абоÑ?Ñ? пÑ?и обнаÑ?Ñ?жении Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?ва
+    USB без пеÑ?едаваемой конеÑ?ной Ñ?оÑ?ки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8767";>CVE-2015-8767</a>
 
- -    <p>An SCTP denial-of-service was discovered which can be triggered by a
- -    local attacker during a heartbeat timeout event after the 4-way
- -    handshake.</p></li>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен оÑ?каз обÑ?лÑ?живаниÑ? в SCTP, коÑ?оÑ?Ñ?й можеÑ? бÑ?Ñ?Ñ? вÑ?зван
+    локалÑ?нÑ?м злоÑ?мÑ?Ñ?ленником во вÑ?емÑ? ожиданиÑ? Ñ?обÑ?Ñ?иÑ? Ñ?акÑ?а поÑ?ле 4-Ñ?Ñ?оÑ?оннего
+    Ñ?Ñ?копожаÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0723";>CVE-2016-0723</a>
 
- -    <p>A use-after-free vulnerability was discovered in the TIOCGETD ioctl.
- -    A local attacker could use this flaw for denial-of-service.</p></li>
+    <p>Ð?Ñ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и бÑ?ло обнаÑ?Ñ?жено в TIOCGETD ioctl.
+    Ð?окалÑ?нÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0728";>CVE-2016-0728</a>
 
- -    <p>The Perception Point research team discovered a use-after-free
- -    vulnerability in the keyring facility, possibly leading to local
- -    privilege escalation.</p></li>
+    <p>Ð?Ñ?Ñ?ледоваÑ?елÑ?Ñ?каÑ? команда Perception Point обнаÑ?Ñ?жила иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле
+    оÑ?вобождениÑ? памÑ?Ñ?и в инÑ?Ñ?Ñ?Ñ?менÑ?аÑ?ии keyring, коÑ?оÑ?ое можеÑ? пÑ?иводиÑ?Ñ? к локалÑ?номÑ?
+    повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 3.16.7-ckt20-1+deb8u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.16.7-ckt20-1+deb8u3.</p>
 
- -<p>We recommend that you upgrade your linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Uxgc
-----END PGP SIGNATURE-----


Reply to: