[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3503.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3503.wml	2016-03-04 09:00:42.000000000 +0500
+++ russian/security/2016/dsa-3503.wml	2016-03-04 12:07:53.328638621 +0500
@@ -1,137 +1,138 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a privilege escalation, denial of service, information
- -leak or data loss.</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий, оÑ?казÑ? в обÑ?лÑ?живании, Ñ?Ñ?еÑ?ке
+инÑ?оÑ?маÑ?ии или поÑ?еÑ?е даннÑ?Ñ?.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4312";>CVE-2013-4312</a>
 
- -    <p>Tetsuo Handa discovered that users can use pipes queued on local
- -    (Unix) sockets to allocate an unfair share of kernel memory, leading
- -    to denial-of-service (resource exhaustion).</p>
- -
- -    <p>This issue was previously mitigated for the stable suite by limiting
- -    the total number of files queued by each user on local sockets. The
- -    new kernel version in both suites includes that mitigation plus
- -    limits on the total size of pipe buffers allocated for each user.</p></li>
+    <p>ТеÑ?Ñ?Ñ?о Ханда обнаÑ?Ñ?жил, Ñ?Ñ?о полÑ?зоваÑ?ели могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? каналÑ?, поÑ?Ñ?авленнÑ?е в оÑ?еÑ?едÑ?
+    на локалÑ?нÑ?Ñ? (Unix) Ñ?океÑ?аÑ?, длÑ? вÑ?делениÑ? непÑ?авилÑ?ного колиÑ?еÑ?Ñ?ва памÑ?Ñ?и Ñ?дÑ?а, Ñ?Ñ?о пÑ?иводиÑ?
+    к оÑ?казÑ? в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов).</p>
+
+    <p>ЭÑ?а пÑ?облема бÑ?ла Ñ?анее Ñ?еÑ?ена в Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке пÑ?Ñ?Ñ?м огÑ?аниÑ?ениÑ?
+    обÑ?его Ñ?иÑ?ла Ñ?айлов, коÑ?оÑ?Ñ?е полÑ?зоваÑ?елÑ? поÑ?Ñ?авил в оÑ?еÑ?едÑ? на локалÑ?нÑ?Ñ? Ñ?океÑ?аÑ?. Ð?оваÑ?
+    веÑ?Ñ?иÑ? Ñ?дÑ?а в обоиÑ? вÑ?пÑ?Ñ?каÑ? вклÑ?Ñ?аеÑ? в Ñ?ебÑ? Ñ?Ñ?о Ñ?еÑ?ение, а Ñ?акже
+    огÑ?аниÑ?ение обÑ?его Ñ?иÑ?ла каналÑ?нÑ?Ñ? бÑ?Ñ?еÑ?ов, вÑ?деленнÑ?Ñ? длÑ? каждого полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7566";>CVE-2015-7566</a>
 
- -    <p>Ralf Spenneberg of OpenSource Security reported that the visor
- -    driver crashes when a specially crafted USB device without bulk-out
- -    endpoint is detected.</p></li>
+    <p>РалÑ?Ñ? ШпенненбеÑ?г из OpenSource Security Ñ?ообÑ?ил, Ñ?Ñ?о дÑ?айвеÑ? visor
+    аваÑ?ийно завеÑ?Ñ?аеÑ? Ñ?воÑ? Ñ?абоÑ?Ñ? в Ñ?лÑ?Ñ?ае обнаÑ?Ñ?жениÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного USB-Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?ва
+    без конеÑ?ной Ñ?оÑ?ки длÑ? пеÑ?едаÑ?и болÑ?Ñ?ого обÑ?Ñ?ма даннÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8767";>CVE-2015-8767</a>
 
- -    <p>An SCTP denial-of-service was discovered which can be triggered by a
- -    local attacker during a heartbeat timeout event after the 4-way
- -    handshake.</p></li>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен оÑ?каз в обÑ?лÑ?живании SCTP, коÑ?оÑ?Ñ?й можеÑ? бÑ?Ñ?Ñ? вÑ?зван
+    локалÑ?нÑ?м злоÑ?мÑ?Ñ?ленником во вÑ?емÑ? Ñ?обÑ?Ñ?иÑ? Ñ?аймеÑ?а поÑ?ле 4-Ñ?Ñ?оÑ?оннего
+    Ñ?Ñ?копожаÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8785";>CVE-2015-8785</a>
 
- -    <p>It was discovered that local users permitted to write to a file on a
- -    FUSE filesystem could cause a denial of service (unkillable loop in
- -    the kernel).</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о локалÑ?нÑ?е полÑ?зоваÑ?ели, коÑ?оÑ?Ñ?м Ñ?азÑ?еÑ?ено вÑ?полнÑ?Ñ?Ñ? запиÑ?Ñ? в Ñ?айл на
+    Ñ?айловой Ñ?иÑ?Ñ?еме FUSE, могÑ?Ñ? вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (неÑ?биваемÑ?й Ñ?икл в
+    Ñ?дÑ?е).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8812";>CVE-2015-8812</a>
 
- -    <p>A flaw was found in the iw_cxgb3 Infiniband driver. Whenever it
- -    could not send a packet because the network was congested, it would
- -    free the packet buffer but later attempt to send the packet again.
- -    This use-after-free could result in a denial of service (crash or
- -    hang), data loss or privilege escalation.</p></li>
+    <p>Ð?Ñ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ? в дÑ?айвеÑ?е Infiniband iw_cxgb3. Ð?огда дÑ?айвеÑ? не
+    можеÑ? оÑ?пÑ?авиÑ?Ñ? пакеÑ? из-за Ñ?ого, Ñ?Ñ?о Ñ?еÑ?Ñ? пеÑ?еполнена, он
+    оÑ?вобождаеÑ? пакеÑ?, но позже пÑ?Ñ?аеÑ?Ñ?Ñ? Ñ?нова его оÑ?пÑ?авиÑ?Ñ?.
+    ЭÑ?о иÑ?полÑ?зование Ñ?казаÑ?елÑ? поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании (аваÑ?ийнаÑ?
+    оÑ?Ñ?ановка или завиÑ?ание), поÑ?еÑ?е даннÑ?Ñ? или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8816";>CVE-2015-8816</a>
 
- -    <p>A use-after-free vulnerability was discovered in the USB hub driver.
- -    This may be used by a physically present user for privilege
- -    escalation.</p></li>
+    <p>Ð? дÑ?айвеÑ?е конÑ?енÑ?Ñ?аÑ?оÑ?а USB бÑ?ло обнаÑ?Ñ?жено иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ?
+    памÑ?Ñ?и. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? полÑ?зоваÑ?елем, имеÑ?Ñ?им Ñ?изиÑ?еÑ?кий доÑ?Ñ?Ñ?п к маÑ?ине, длÑ?
+    повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8830";>CVE-2015-8830</a>
 
- -    <p>Ben Hawkes of Google Project Zero reported that the AIO interface
- -    permitted reading or writing 2 GiB of data or more in a single
- -    chunk, which could lead to an integer overflow when applied to
- -    certain filesystems, socket or device types. The full security
- -    impact has not been evaluated.</p></li>
+    <p>Ð?ен ХаÑ?кÑ? из Google Project Zero Ñ?ообÑ?ил, Ñ?Ñ?о инÑ?еÑ?Ñ?ейÑ? AIO
+    позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? Ñ?Ñ?ение или запиÑ?Ñ? 2 Ð?иÐ? даннÑ?Ñ? или более в одном
+    кÑ?Ñ?ке даннÑ?Ñ?, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел пÑ?и иÑ?полÑ?зовании
+    опÑ?еделÑ?ннÑ?Ñ? Ñ?айловÑ?Ñ? Ñ?иÑ?Ñ?ем, Ñ?океÑ?ов или Ñ?ипов Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?в. Ð?ообÑ?е же влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ?
+    Ñ?Ñ?ой Ñ?Ñ?звимоÑ?Ñ?и оÑ?енено не бÑ?ло.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0723";>CVE-2016-0723</a>
 
- -    <p>A use-after-free vulnerability was discovered in the TIOCGETD ioctl.
- -    A local attacker could use this flaw for denial-of-service.</p></li>
+    <p>Ð? TIOCGETD ioctl бÑ?ло обнаÑ?Ñ?жено иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.
+    Ð?окалÑ?нÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0774";>CVE-2016-0774</a>
 
- -    <p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805";>CVE-2015-1805</a> in kernel versions older
- -    than Linux 3.16 did not correctly handle the case of a partially
- -    failed atomic read. A local, unprivileged user could use this flaw
- -    to crash the system or leak kernel memory to user space.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о иÑ?пÑ?авление <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805";>CVE-2015-1805</a> в веÑ?Ñ?иÑ?Ñ? Ñ?дÑ?а менее
+    Linux 3.16 непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?лÑ?Ñ?ай Ñ? Ñ?аÑ?Ñ?иÑ?но
+    неÑ?даÑ?нÑ?м аÑ?омаÑ?нÑ?м Ñ?Ñ?ением. Ð?окалÑ?нÑ?й непÑ?ивилегиÑ?ованнÑ?й полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? пÑ?облемÑ?
+    длÑ? аваÑ?ийного завеÑ?Ñ?ениÑ? Ñ?абоÑ?Ñ? Ñ?иÑ?Ñ?емÑ? или Ñ?Ñ?еÑ?ки памÑ?Ñ?и Ñ?дÑ?а в полÑ?зоваÑ?елÑ?Ñ?кое пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?во.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2069";>CVE-2016-2069</a>
 
- -    <p>Andy Lutomirski discovered a race condition in flushing of the TLB
- -    when switching tasks on an x86 system. On an SMP system this could
- -    possibly lead to a crash, information leak or privilege escalation.</p></li>
+    <p>Энди Ð?Ñ?Ñ?омиÑ?Ñ?ки обнаÑ?Ñ?жил Ñ?оÑ?Ñ?оÑ?ние гонки в коде Ñ?бÑ?аÑ?Ñ?ваниÑ? TLB,
+    коÑ?оÑ?ое возникаеÑ? пÑ?и пеÑ?еклÑ?Ñ?ении задаÑ? на Ñ?иÑ?Ñ?емаÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой x86. Ð?а Ñ?иÑ?Ñ?еме SMP Ñ?Ñ?о можеÑ?
+    пÑ?иводиÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке, Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2384";>CVE-2016-2384</a>
 
- -    <p>Andrey Konovalov found that a crafted USB MIDI device with an
- -    invalid USB descriptor could trigger a double-free. This may be used
- -    by a physically present user for privilege escalation.</p></li>
+    <p>Ð?ндÑ?ей Ð?оновалов обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное USB MIDI-Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?во Ñ?
+    непÑ?авилÑ?нÑ?м USB-деÑ?кÑ?ипÑ?оÑ?ом можеÑ? вÑ?зваÑ?Ñ? двойное оÑ?вобождение памÑ?Ñ?и. ЭÑ?а пÑ?облема можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+    полÑ?зоваÑ?елем, имеÑ?Ñ?им Ñ?изиÑ?еÑ?кий доÑ?Ñ?Ñ?п к маÑ?ине, длÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2543";>CVE-2016-2543</a>
 
- -    <p>Dmitry Vyukov found that the core sound sequencer driver (snd-seq)
- -    lacked a necessary check for a null pointer, allowing a user
- -    with access to a sound sequencer device to cause a denial-of    service (crash).</p></li>
+    <p>Ð?миÑ?Ñ?ий Ð?Ñ?Ñ?ков обнаÑ?Ñ?жил, Ñ?Ñ?о в базовом дÑ?айвеÑ?е звÑ?кового Ñ?еквенÑ?оÑ?а (snd-seq)
+    оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? необÑ?одимаÑ? пÑ?овеÑ?ка null-Ñ?казаÑ?елÑ?, Ñ?Ñ?о позволÑ?еÑ? полÑ?зоваÑ?елÑ?,
+    имеÑ?Ñ?емÑ? доÑ?Ñ?Ñ?п к звÑ?ковомÑ? Ñ?еквенÑ?еÑ?Ñ?, вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2544";>CVE-2016-2544</a>
 <a href="https://security-tracker.debian.org/tracker/CVE-2016-2546";>CVE-2016-2546</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2016-2547";>CVE-2016-2547</a>,
 <a href="https://security-tracker.debian.org/tracker/CVE-2016-2548";>CVE-2016-2548</a></p>
 
- -    <p>Dmitry Vyukov found various race conditions in the sound subsystem
- -    (ALSA)'s management of timers. A user with access to sound devices
- -    could use these to cause a denial-of-service (crash or hang) or
- -    possibly for privilege escalation.</p></li>
+    <p>Ð?миÑ?Ñ?ий Ð?Ñ?Ñ?ков обнаÑ?Ñ?жил Ñ?азлиÑ?нÑ?е Ñ?оÑ?Ñ?оÑ?ниÑ? гонки в коде звÑ?ковой подÑ?иÑ?Ñ?емÑ?
+    (ALSA) длÑ? Ñ?пÑ?авлениÑ? Ñ?аймеÑ?ами. Ð?олÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к звÑ?ковÑ?м Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вам,
+    можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?и пÑ?облемÑ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка или завиÑ?ание) или
+    длÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2545";>CVE-2016-2545</a>
 
- -    <p>Dmitry Vyukov found a flaw in list manipulation in the sound
- -    subsystem (ALSA)'s management of timers. A user with access to sound
- -    devices could use this to cause a denial-of-service (crash or hang)
- -    or possibly for privilege escalation.</p></li>
+    <p>Ð?миÑ?Ñ?ий Ð?Ñ?Ñ?ков обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в меÑ?одаÑ? обÑ?абоÑ?ки Ñ?пиÑ?ка в коде звÑ?ковой
+    подÑ?иÑ?Ñ?емÑ? (ALSA) длÑ? Ñ?пÑ?авлениÑ? Ñ?аймеÑ?ами. Ð?олÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к звÑ?ковÑ?м
+    Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вам, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? пÑ?облемÑ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка или
+    завиÑ?ание) или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2549";>CVE-2016-2549</a>
 
- -    <p>Dmitry Vyukov found a potential deadlock in the sound subsystem
- -    (ALSA)'s use of high resolution timers. A user with access to sound
- -    devices could use this to cause a denial-of-service (hang).</p></li>
+    <p>Ð?миÑ?Ñ?ий Ð?Ñ?Ñ?ков обнаÑ?Ñ?жил поÑ?енÑ?иалÑ?нÑ?Ñ? блокиÑ?овкÑ? в коде звÑ?ковой подÑ?иÑ?Ñ?емÑ?
+    (ALSA) длÑ? иÑ?полÑ?зованиÑ? Ñ?аймеÑ?ов вÑ?Ñ?окого Ñ?азÑ?еÑ?ениÑ?. Ð?олÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к звÑ?ковÑ?м
+    Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вам, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? пÑ?облемÑ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (завиÑ?ание).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2550";>CVE-2016-2550</a>
 
- -    <p>The original mitigation of <a href="https://security-tracker.debian.org/tracker/CVE-2013-4312";>CVE-2013-4312</a>, limiting the total number
- -    of files a user could queue on local sockets, was flawed. A user
- -    given a local socket opened by another user, for example through the
- -    systemd socket activation mechanism, could make use of the other
- -    user's quota, again leading to a denial-of-service (resource
- -    exhaustion). This is fixed by accounting queued files to the sender
- -    rather than the socket opener.</p></li>
+    <p>Ð?Ñ?игиналÑ?ное Ñ?еÑ?ение <a href="https://security-tracker.debian.org/tracker/CVE-2013-4312";>CVE-2013-4312</a>, огÑ?аниÑ?иваÑ?Ñ?ее обÑ?ее Ñ?иÑ?ле
+    Ñ?айлов, коÑ?оÑ?ое полÑ?зоваÑ?елÑ? можеÑ? поÑ?Ñ?авиÑ?Ñ? в оÑ?еÑ?едÑ? на локалÑ?нÑ?Ñ? Ñ?океÑ?аÑ?, Ñ?одеÑ?жиÑ? оÑ?ибкÑ?. Ð?олÑ?зоваÑ?елÑ?,
+    еÑ?ли локалÑ?нÑ?й Ñ?океÑ? оÑ?кÑ?Ñ?Ñ? дÑ?Ñ?гим полÑ?зоваÑ?елем, напÑ?имеÑ?, Ñ?еÑ?ез
+    меÑ?анизм акÑ?иваÑ?ии Ñ?океÑ?ов systemd, можеÑ? иÑ?полÑ?зоваÑ?Ñ? квоÑ?Ñ? дÑ?Ñ?гого
+    полÑ?зоваÑ?елÑ?, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное
+    поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов). ЭÑ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена пÑ?Ñ?Ñ?м пÑ?ипиÑ?Ñ?ваниÑ? Ñ?айлов в оÑ?еÑ?еди иÑ?
+    оÑ?пÑ?авиÑ?елÑ?, а не Ñ?омÑ?, кÑ?о оÑ?кÑ?Ñ?л Ñ?океÑ?.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 3.2.73-2+deb7u3. The oldstable distribution (wheezy) is not
- -affected by <a href="https://security-tracker.debian.org/tracker/CVE-2015-8830";>CVE-2015-8830</a>.</p>
- -
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 3.16.7-ckt20-1+deb8u4. <a href="https://security-tracker.debian.org/tracker/CVE-2015-7566";>CVE-2015-7566</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8767";>CVE-2015-8767</a> and
- -<a href="https://security-tracker.debian.org/tracker/CVE-2016-0723";>CVE-2016-0723</a> were already fixed in DSA-3448-1. <a href="https://security-tracker.debian.org/tracker/CVE-2016-0774";>CVE-2016-0774</a> does not
- -affect the stable distribution.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.2.73-2+deb7u3. Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (wheezy) не
+подвеÑ?жен <a href="https://security-tracker.debian.org/tracker/CVE-2015-8830";>CVE-2015-8830</a>.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.16.7-ckt20-1+deb8u4. <a href="https://security-tracker.debian.org/tracker/CVE-2015-7566";>CVE-2015-7566</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8767";>CVE-2015-8767</a> и
+<a href="https://security-tracker.debian.org/tracker/CVE-2016-0723";>CVE-2016-0723</a> Ñ?же бÑ?ли иÑ?пÑ?авленÑ? в DSA-3448-1. <a href="https://security-tracker.debian.org/tracker/CVE-2016-0774";>CVE-2016-0774</a> не акÑ?Ñ?алÑ?на
+длÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.</p>
 
- -<p>We recommend that you upgrade your linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=zDdn
-----END PGP SIGNATURE-----


Reply to: