[DONE] wml://{security/2016/dsa-3503.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2016/dsa-3503.wml 2016-03-04 09:00:42.000000000 +0500
+++ russian/security/2016/dsa-3503.wml 2016-03-04 12:07:53.328638621 +0500
@@ -1,137 +1,138 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a privilege escalation, denial of service, information
- -leak or data loss.</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий, оÑ?казÑ? в обÑ?лÑ?живании, Ñ?Ñ?еÑ?ке
+инÑ?оÑ?маÑ?ии или поÑ?еÑ?е даннÑ?Ñ?.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2013-4312">CVE-2013-4312</a>
- - <p>Tetsuo Handa discovered that users can use pipes queued on local
- - (Unix) sockets to allocate an unfair share of kernel memory, leading
- - to denial-of-service (resource exhaustion).</p>
- -
- - <p>This issue was previously mitigated for the stable suite by limiting
- - the total number of files queued by each user on local sockets. The
- - new kernel version in both suites includes that mitigation plus
- - limits on the total size of pipe buffers allocated for each user.</p></li>
+ <p>ТеÑ?Ñ?Ñ?о Ханда обнаÑ?Ñ?жил, Ñ?Ñ?о полÑ?зоваÑ?ели могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? каналÑ?, поÑ?Ñ?авленнÑ?е в оÑ?еÑ?едÑ?
+ на локалÑ?нÑ?Ñ? (Unix) Ñ?океÑ?аÑ?, длÑ? вÑ?делениÑ? непÑ?авилÑ?ного колиÑ?еÑ?Ñ?ва памÑ?Ñ?и Ñ?дÑ?а, Ñ?Ñ?о пÑ?иводиÑ?
+ к оÑ?казÑ? в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов).</p>
+
+ <p>ÐÑ?а пÑ?облема бÑ?ла Ñ?анее Ñ?еÑ?ена в Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке пÑ?Ñ?Ñ?м огÑ?аниÑ?ениÑ?
+ обÑ?его Ñ?иÑ?ла Ñ?айлов, коÑ?оÑ?Ñ?е полÑ?зоваÑ?елÑ? поÑ?Ñ?авил в оÑ?еÑ?едÑ? на локалÑ?нÑ?Ñ? Ñ?океÑ?аÑ?. Ð?оваÑ?
+ веÑ?Ñ?иÑ? Ñ?дÑ?а в обоиÑ? вÑ?пÑ?Ñ?каÑ? вклÑ?Ñ?аеÑ? в Ñ?ебÑ? Ñ?Ñ?о Ñ?еÑ?ение, а Ñ?акже
+ огÑ?аниÑ?ение обÑ?его Ñ?иÑ?ла каналÑ?нÑ?Ñ? бÑ?Ñ?еÑ?ов, вÑ?деленнÑ?Ñ? длÑ? каждого полÑ?зоваÑ?елÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7566">CVE-2015-7566</a>
- - <p>Ralf Spenneberg of OpenSource Security reported that the visor
- - driver crashes when a specially crafted USB device without bulk-out
- - endpoint is detected.</p></li>
+ <p>РалÑ?Ñ? ШпенненбеÑ?г из OpenSource Security Ñ?ообÑ?ил, Ñ?Ñ?о дÑ?айвеÑ? visor
+ аваÑ?ийно завеÑ?Ñ?аеÑ? Ñ?воÑ? Ñ?абоÑ?Ñ? в Ñ?лÑ?Ñ?ае обнаÑ?Ñ?жениÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного USB-Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?ва
+ без конеÑ?ной Ñ?оÑ?ки длÑ? пеÑ?едаÑ?и болÑ?Ñ?ого обÑ?Ñ?ма даннÑ?Ñ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8767">CVE-2015-8767</a>
- - <p>An SCTP denial-of-service was discovered which can be triggered by a
- - local attacker during a heartbeat timeout event after the 4-way
- - handshake.</p></li>
+ <p>Ð?Ñ?л обнаÑ?Ñ?жен оÑ?каз в обÑ?лÑ?живании SCTP, коÑ?оÑ?Ñ?й можеÑ? бÑ?Ñ?Ñ? вÑ?зван
+ локалÑ?нÑ?м злоÑ?мÑ?Ñ?ленником во вÑ?емÑ? Ñ?обÑ?Ñ?иÑ? Ñ?аймеÑ?а поÑ?ле 4-Ñ?Ñ?оÑ?оннего
+ Ñ?Ñ?копожаÑ?иÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8785">CVE-2015-8785</a>
- - <p>It was discovered that local users permitted to write to a file on a
- - FUSE filesystem could cause a denial of service (unkillable loop in
- - the kernel).</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о локалÑ?нÑ?е полÑ?зоваÑ?ели, коÑ?оÑ?Ñ?м Ñ?азÑ?еÑ?ено вÑ?полнÑ?Ñ?Ñ? запиÑ?Ñ? в Ñ?айл на
+ Ñ?айловой Ñ?иÑ?Ñ?еме FUSE, могÑ?Ñ? вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (неÑ?биваемÑ?й Ñ?икл в
+ Ñ?дÑ?е).</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8812">CVE-2015-8812</a>
- - <p>A flaw was found in the iw_cxgb3 Infiniband driver. Whenever it
- - could not send a packet because the network was congested, it would
- - free the packet buffer but later attempt to send the packet again.
- - This use-after-free could result in a denial of service (crash or
- - hang), data loss or privilege escalation.</p></li>
+ <p>Ð?Ñ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ? в дÑ?айвеÑ?е Infiniband iw_cxgb3. Ð?огда дÑ?айвеÑ? не
+ можеÑ? оÑ?пÑ?авиÑ?Ñ? пакеÑ? из-за Ñ?ого, Ñ?Ñ?о Ñ?еÑ?Ñ? пеÑ?еполнена, он
+ оÑ?вобождаеÑ? пакеÑ?, но позже пÑ?Ñ?аеÑ?Ñ?Ñ? Ñ?нова его оÑ?пÑ?авиÑ?Ñ?.
+ ÐÑ?о иÑ?полÑ?зование Ñ?казаÑ?елÑ? поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании (аваÑ?ийнаÑ?
+ оÑ?Ñ?ановка или завиÑ?ание), поÑ?еÑ?е даннÑ?Ñ? или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8816">CVE-2015-8816</a>
- - <p>A use-after-free vulnerability was discovered in the USB hub driver.
- - This may be used by a physically present user for privilege
- - escalation.</p></li>
+ <p>Ð? дÑ?айвеÑ?е конÑ?енÑ?Ñ?аÑ?оÑ?а USB бÑ?ло обнаÑ?Ñ?жено иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ?
+ памÑ?Ñ?и. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? полÑ?зоваÑ?елем, имеÑ?Ñ?им Ñ?изиÑ?еÑ?кий доÑ?Ñ?Ñ?п к маÑ?ине, длÑ?
+ повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8830">CVE-2015-8830</a>
- - <p>Ben Hawkes of Google Project Zero reported that the AIO interface
- - permitted reading or writing 2 GiB of data or more in a single
- - chunk, which could lead to an integer overflow when applied to
- - certain filesystems, socket or device types. The full security
- - impact has not been evaluated.</p></li>
+ <p>Ð?ен ХаÑ?кÑ? из Google Project Zero Ñ?ообÑ?ил, Ñ?Ñ?о инÑ?еÑ?Ñ?ейÑ? AIO
+ позволÑ?еÑ? вÑ?полнÑ?Ñ?Ñ? Ñ?Ñ?ение или запиÑ?Ñ? 2 Ð?иÐ? даннÑ?Ñ? или более в одном
+ кÑ?Ñ?ке даннÑ?Ñ?, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел пÑ?и иÑ?полÑ?зовании
+ опÑ?еделÑ?ннÑ?Ñ? Ñ?айловÑ?Ñ? Ñ?иÑ?Ñ?ем, Ñ?океÑ?ов или Ñ?ипов Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?в. Ð?ообÑ?е же влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ?
+ Ñ?Ñ?ой Ñ?Ñ?звимоÑ?Ñ?и оÑ?енено не бÑ?ло.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0723">CVE-2016-0723</a>
- - <p>A use-after-free vulnerability was discovered in the TIOCGETD ioctl.
- - A local attacker could use this flaw for denial-of-service.</p></li>
+ <p>Ð? TIOCGETD ioctl бÑ?ло обнаÑ?Ñ?жено иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.
+ Ð?окалÑ?нÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0774">CVE-2016-0774</a>
- - <p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805">CVE-2015-1805</a> in kernel versions older
- - than Linux 3.16 did not correctly handle the case of a partially
- - failed atomic read. A local, unprivileged user could use this flaw
- - to crash the system or leak kernel memory to user space.</p></li>
+ <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о иÑ?пÑ?авление <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805">CVE-2015-1805</a> в веÑ?Ñ?иÑ?Ñ? Ñ?дÑ?а менее
+ Linux 3.16 непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?лÑ?Ñ?ай Ñ? Ñ?аÑ?Ñ?иÑ?но
+ неÑ?даÑ?нÑ?м аÑ?омаÑ?нÑ?м Ñ?Ñ?ением. Ð?окалÑ?нÑ?й непÑ?ивилегиÑ?ованнÑ?й полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? пÑ?облемÑ?
+ длÑ? аваÑ?ийного завеÑ?Ñ?ениÑ? Ñ?абоÑ?Ñ? Ñ?иÑ?Ñ?емÑ? или Ñ?Ñ?еÑ?ки памÑ?Ñ?и Ñ?дÑ?а в полÑ?зоваÑ?елÑ?Ñ?кое пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?во.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2069">CVE-2016-2069</a>
- - <p>Andy Lutomirski discovered a race condition in flushing of the TLB
- - when switching tasks on an x86 system. On an SMP system this could
- - possibly lead to a crash, information leak or privilege escalation.</p></li>
+ <p>Ðнди Ð?Ñ?Ñ?омиÑ?Ñ?ки обнаÑ?Ñ?жил Ñ?оÑ?Ñ?оÑ?ние гонки в коде Ñ?бÑ?аÑ?Ñ?ваниÑ? TLB,
+ коÑ?оÑ?ое возникаеÑ? пÑ?и пеÑ?еклÑ?Ñ?ении задаÑ? на Ñ?иÑ?Ñ?емаÑ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой x86. Ð?а Ñ?иÑ?Ñ?еме SMP Ñ?Ñ?о можеÑ?
+ пÑ?иводиÑ?Ñ? к аваÑ?ийной оÑ?Ñ?ановке, Ñ?Ñ?еÑ?ке инÑ?оÑ?маÑ?ии или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2384">CVE-2016-2384</a>
- - <p>Andrey Konovalov found that a crafted USB MIDI device with an
- - invalid USB descriptor could trigger a double-free. This may be used
- - by a physically present user for privilege escalation.</p></li>
+ <p>Ð?ндÑ?ей Ð?оновалов обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованное USB MIDI-Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?во Ñ?
+ непÑ?авилÑ?нÑ?м USB-деÑ?кÑ?ипÑ?оÑ?ом можеÑ? вÑ?зваÑ?Ñ? двойное оÑ?вобождение памÑ?Ñ?и. ÐÑ?а пÑ?облема можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+ полÑ?зоваÑ?елем, имеÑ?Ñ?им Ñ?изиÑ?еÑ?кий доÑ?Ñ?Ñ?п к маÑ?ине, длÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2543">CVE-2016-2543</a>
- - <p>Dmitry Vyukov found that the core sound sequencer driver (snd-seq)
- - lacked a necessary check for a null pointer, allowing a user
- - with access to a sound sequencer device to cause a denial-of service (crash).</p></li>
+ <p>Ð?миÑ?Ñ?ий Ð?Ñ?Ñ?ков обнаÑ?Ñ?жил, Ñ?Ñ?о в базовом дÑ?айвеÑ?е звÑ?кового Ñ?еквенÑ?оÑ?а (snd-seq)
+ оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? необÑ?одимаÑ? пÑ?овеÑ?ка null-Ñ?казаÑ?елÑ?, Ñ?Ñ?о позволÑ?еÑ? полÑ?зоваÑ?елÑ?,
+ имеÑ?Ñ?емÑ? доÑ?Ñ?Ñ?п к звÑ?ковомÑ? Ñ?еквенÑ?еÑ?Ñ?, вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка).</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2544">CVE-2016-2544</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2016-2546">CVE-2016-2546</a>,
<a href="https://security-tracker.debian.org/tracker/CVE-2016-2547">CVE-2016-2547</a>,
<a href="https://security-tracker.debian.org/tracker/CVE-2016-2548">CVE-2016-2548</a></p>
- - <p>Dmitry Vyukov found various race conditions in the sound subsystem
- - (ALSA)'s management of timers. A user with access to sound devices
- - could use these to cause a denial-of-service (crash or hang) or
- - possibly for privilege escalation.</p></li>
+ <p>Ð?миÑ?Ñ?ий Ð?Ñ?Ñ?ков обнаÑ?Ñ?жил Ñ?азлиÑ?нÑ?е Ñ?оÑ?Ñ?оÑ?ниÑ? гонки в коде звÑ?ковой подÑ?иÑ?Ñ?емÑ?
+ (ALSA) длÑ? Ñ?пÑ?авлениÑ? Ñ?аймеÑ?ами. Ð?олÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к звÑ?ковÑ?м Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вам,
+ можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?и пÑ?облемÑ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка или завиÑ?ание) или
+ длÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2545">CVE-2016-2545</a>
- - <p>Dmitry Vyukov found a flaw in list manipulation in the sound
- - subsystem (ALSA)'s management of timers. A user with access to sound
- - devices could use this to cause a denial-of-service (crash or hang)
- - or possibly for privilege escalation.</p></li>
+ <p>Ð?миÑ?Ñ?ий Ð?Ñ?Ñ?ков обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? в меÑ?одаÑ? обÑ?абоÑ?ки Ñ?пиÑ?ка в коде звÑ?ковой
+ подÑ?иÑ?Ñ?емÑ? (ALSA) длÑ? Ñ?пÑ?авлениÑ? Ñ?аймеÑ?ами. Ð?олÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к звÑ?ковÑ?м
+ Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вам, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? пÑ?облемÑ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка или
+ завиÑ?ание) или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2549">CVE-2016-2549</a>
- - <p>Dmitry Vyukov found a potential deadlock in the sound subsystem
- - (ALSA)'s use of high resolution timers. A user with access to sound
- - devices could use this to cause a denial-of-service (hang).</p></li>
+ <p>Ð?миÑ?Ñ?ий Ð?Ñ?Ñ?ков обнаÑ?Ñ?жил поÑ?енÑ?иалÑ?нÑ?Ñ? блокиÑ?овкÑ? в коде звÑ?ковой подÑ?иÑ?Ñ?емÑ?
+ (ALSA) длÑ? иÑ?полÑ?зованиÑ? Ñ?аймеÑ?ов вÑ?Ñ?окого Ñ?азÑ?еÑ?ениÑ?. Ð?олÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к звÑ?ковÑ?м
+ Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вам, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? пÑ?облемÑ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (завиÑ?ание).</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2550">CVE-2016-2550</a>
- - <p>The original mitigation of <a href="https://security-tracker.debian.org/tracker/CVE-2013-4312">CVE-2013-4312</a>, limiting the total number
- - of files a user could queue on local sockets, was flawed. A user
- - given a local socket opened by another user, for example through the
- - systemd socket activation mechanism, could make use of the other
- - user's quota, again leading to a denial-of-service (resource
- - exhaustion). This is fixed by accounting queued files to the sender
- - rather than the socket opener.</p></li>
+ <p>Ð?Ñ?игиналÑ?ное Ñ?еÑ?ение <a href="https://security-tracker.debian.org/tracker/CVE-2013-4312">CVE-2013-4312</a>, огÑ?аниÑ?иваÑ?Ñ?ее обÑ?ее Ñ?иÑ?ле
+ Ñ?айлов, коÑ?оÑ?ое полÑ?зоваÑ?елÑ? можеÑ? поÑ?Ñ?авиÑ?Ñ? в оÑ?еÑ?едÑ? на локалÑ?нÑ?Ñ? Ñ?океÑ?аÑ?, Ñ?одеÑ?жиÑ? оÑ?ибкÑ?. Ð?олÑ?зоваÑ?елÑ?,
+ еÑ?ли локалÑ?нÑ?й Ñ?океÑ? оÑ?кÑ?Ñ?Ñ? дÑ?Ñ?гим полÑ?зоваÑ?елем, напÑ?имеÑ?, Ñ?еÑ?ез
+ меÑ?анизм акÑ?иваÑ?ии Ñ?океÑ?ов systemd, можеÑ? иÑ?полÑ?зоваÑ?Ñ? квоÑ?Ñ? дÑ?Ñ?гого
+ полÑ?зоваÑ?елÑ?, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное
+ поÑ?Ñ?ебление Ñ?еÑ?Ñ?Ñ?Ñ?ов). ÐÑ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена пÑ?Ñ?Ñ?м пÑ?ипиÑ?Ñ?ваниÑ? Ñ?айлов в оÑ?еÑ?еди иÑ?
+ оÑ?пÑ?авиÑ?елÑ?, а не Ñ?омÑ?, кÑ?о оÑ?кÑ?Ñ?л Ñ?океÑ?.</p></li>
</ul>
- -<p>For the oldstable distribution (wheezy), these problems have been fixed
- -in version 3.2.73-2+deb7u3. The oldstable distribution (wheezy) is not
- -affected by <a href="https://security-tracker.debian.org/tracker/CVE-2015-8830">CVE-2015-8830</a>.</p>
- -
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 3.16.7-ckt20-1+deb8u4. <a href="https://security-tracker.debian.org/tracker/CVE-2015-7566">CVE-2015-7566</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8767">CVE-2015-8767</a> and
- -<a href="https://security-tracker.debian.org/tracker/CVE-2016-0723">CVE-2016-0723</a> were already fixed in DSA-3448-1. <a href="https://security-tracker.debian.org/tracker/CVE-2016-0774">CVE-2016-0774</a> does not
- -affect the stable distribution.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 3.2.73-2+deb7u3. Ð?Ñ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к (wheezy) не
+подвеÑ?жен <a href="https://security-tracker.debian.org/tracker/CVE-2015-8830">CVE-2015-8830</a>.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 3.16.7-ckt20-1+deb8u4. <a href="https://security-tracker.debian.org/tracker/CVE-2015-7566">CVE-2015-7566</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8767">CVE-2015-8767</a> и
+<a href="https://security-tracker.debian.org/tracker/CVE-2016-0723">CVE-2016-0723</a> Ñ?же бÑ?ли иÑ?пÑ?авленÑ? в DSA-3448-1. <a href="https://security-tracker.debian.org/tracker/CVE-2016-0774">CVE-2016-0774</a> не акÑ?Ñ?алÑ?на
+длÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.</p>
- -<p>We recommend that you upgrade your linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=zDdn
-----END PGP SIGNATURE-----
Reply to:
- Prev by Date:
[DONE] wml://users/com/{instasent,linode}.wml
- Next by Date:
[DONE] wml://events/2000/{0202-linexpo-fr,1014-linuxtag,1227-17c3,1209-pluto,1215-linuxfest,1214-ossworkshop,1106-systems,0629-linuxtag}.wml
- Previous by thread:
[DONE] wml://users/com/{instasent,linode}.wml
- Next by thread:
[DONE] wml://events/2000/{0202-linexpo-fr,1014-linuxtag,1227-17c3,1209-pluto,1215-linuxfest,1214-ossworkshop,1106-systems,0629-linuxtag}.wml
- Index(es):