[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2017/dsa-3927.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3927.wml	2017-08-07 10:31:48.000000000 +0500
+++ russian/security/2017/dsa-3927.wml	2017-08-07 17:55:56.444971068 +0500
@@ -1,86 +1,87 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a privilege escalation, denial of service or information
- -leaks.</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий, оÑ?казÑ? в обÑ?лÑ?живании или Ñ?Ñ?еÑ?кам
+инÑ?оÑ?маÑ?ии.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7346";>CVE-2017-7346</a>
 
- -    <p>Li Qiang discovered that the DRM driver for VMware virtual GPUs does
- -    not properly check user-controlled values in the
- -    vmw_surface_define_ioctl() functions for upper limits. A local user
- -    can take advantage of this flaw to cause a denial of service.</p></li>
+    <p>Ð?и ЦÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о дÑ?айвеÑ? DRM длÑ? виÑ?Ñ?Ñ?алÑ?ного видеоÑ?ипа VMware
+    непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? полÑ?зоваÑ?елÑ?Ñ?киÑ? знаÑ?ений в Ñ?Ñ?нÑ?иÑ?Ñ?
+    vmw_surface_define_ioctl() на пÑ?едмеÑ? пÑ?евÑ?Ñ?ениÑ? огÑ?аниÑ?ений. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?
+    можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7482";>CVE-2017-7482</a>
 
- -    <p>Shi Lei discovered that RxRPC Kerberos 5 ticket handling code does
- -    not properly verify metadata, leading to information disclosure,
- -    denial of service or potentially execution of arbitrary code.</p></li>
+    <p>Ши Ð?Ñ?й обнаÑ?Ñ?жил, Ñ?Ñ?о код Ñ?абоÑ?Ñ? Ñ? билеÑ?ами RxRPC Kerberos 5 непÑ?авилÑ?но
+    вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? меÑ?аданнÑ?Ñ?, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии,
+    оÑ?казÑ? в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?номÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7533";>CVE-2017-7533</a>
 
- -    <p>Fan Wu and Shixiong Zhao discovered a race condition between inotify
- -    events and VFS rename operations allowing an unprivileged local
- -    attacker to cause a denial of service or escalate privileges.</p></li>
+    <p>Фан Ð?Ñ? и ШиÑ?Ñ?н Чжао обнаÑ?Ñ?жили Ñ?оÑ?Ñ?оÑ?ние гонки междÑ? Ñ?обÑ?Ñ?иÑ?ми inotify
+    и опеÑ?аÑ?иÑ?ми пеÑ?еименованиÑ? VFS, коÑ?оÑ?ое позволÑ?еÑ? непÑ?ивилегиÑ?ованномÑ?
+    локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании или повÑ?Ñ?ение пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7541";>CVE-2017-7541</a>
 
- -    <p>A buffer overflow flaw in the Broadcom IEEE802.11n PCIe SoftMAC WLAN
- -    driver could allow a local user to cause kernel memory corruption,
- -    leading to a denial of service or potentially privilege escalation.</p></li>
+    <p>Ð? дÑ?айвеÑ?е Broadcom IEEE802.11n PCIe SoftMAC WLAN бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение
+    бÑ?Ñ?еÑ?а, позволÑ?Ñ?Ñ?ее локалÑ?номÑ? полÑ?зоваÑ?елÑ? вÑ?зÑ?ваÑ?Ñ? повÑ?еждение Ñ?одеÑ?жимого памÑ?Ñ?и
+    Ñ?дÑ?а, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7542";>CVE-2017-7542</a>
 
- -    <p>An integer overflow vulnerability in the ip6_find_1stfragopt()
- -    function was found allowing a local attacker with privileges to open
- -    raw sockets to cause a denial of service.</p></li>
+    <p>Ð? Ñ?Ñ?нкÑ?ии ip6_find_1stfragopt() бÑ?ло обнаÑ?Ñ?жено пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел,
+    позволÑ?Ñ?Ñ?ее локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ?, имеÑ?Ñ?емÑ? пÑ?ивилегии на оÑ?кÑ?Ñ?Ñ?ие Ñ?Ñ?Ñ?Ñ?Ñ?
+    Ñ?океÑ?ов, вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-9605";>CVE-2017-9605</a>
 
- -    <p>Murray McAllister discovered that the DRM driver for VMware virtual
- -    GPUs does not properly initialize memory, potentially allowing a
- -    local attacker to obtain sensitive information from uninitialized
- -    kernel memory via a crafted ioctl call.</p></li>
+    <p>Ð?Ñ?Ñ?Ñ?ей Ð?акалиÑ?Ñ?веÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о дÑ?айвеÑ? DRM длÑ? виÑ?Ñ?Ñ?алÑ?ного видеоÑ?ипа VMware
+    непÑ?авилÑ?но вÑ?полнÑ?еÑ? иниÑ?иализаÑ?иÑ? памÑ?Ñ?и, Ñ?Ñ?о поÑ?енÑ?иалÑ?но позволÑ?еÑ?
+    локалÑ?номÑ? злоÑ?мÑ?Ñ?ленникÑ? полÑ?Ñ?аÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? из неиниÑ?иализиÑ?ованной
+    памÑ?Ñ?и Ñ?дÑ?а Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного вÑ?зова ioctl.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10810";>CVE-2017-10810</a>
 
- -    <p>Li Qiang discovered a memory leak flaw within the VirtIO GPU driver
- -    resulting in denial of service (memory consumption).</p></li>
+    <p>Ð?и ЦÑ?н обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? памÑ?Ñ?и в дÑ?айвеÑ?е видеоÑ?ипов VirtIO,
+    пÑ?иводÑ?Ñ?Ñ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании (Ñ?Ñ?езмеÑ?ное поÑ?Ñ?ебление памÑ?Ñ?и).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-10911";>CVE-2017-10911</a> /
 <a href="https://xenbits.xen.org/xsa/advisory-216.txt";>XSA-216</a>
 
- -    <p>Anthony Perard of Citrix discovered an information leak flaw in Xen
- -    blkif response handling, allowing a malicious unprivileged guest to
- -    obtain sensitive information from the host or other guests.</p></li>
+    <p>ЭнÑ?они Ð?еÑ?аÑ? из Citrix обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? инÑ?оÑ?маÑ?ии в коде обÑ?абоÑ?ки blkif-оÑ?веÑ?а
+    в Xen, коÑ?оÑ?аÑ? позволÑ?еÑ? непÑ?ивилегиÑ?ованномÑ? гоÑ?Ñ?Ñ? полÑ?Ñ?аÑ?Ñ? Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?Ñ?
+    инÑ?оÑ?маÑ?иÑ? Ñ? оÑ?новной Ñ?иÑ?Ñ?емÑ? или дÑ?Ñ?гиÑ? гоÑ?Ñ?евÑ?Ñ? Ñ?иÑ?Ñ?ем.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-11176";>CVE-2017-11176</a>
 
- -    <p>It was discovered that the mq_notify() function does not set the
- -    sock pointer to NULL upon entry into the retry logic. An attacker
- -    can take advantage of this flaw during a user-space close of a
- -    Netlink socket to cause a denial of service or potentially cause
- -    other impact.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? mq_notify() не Ñ?Ñ?Ñ?анавливаеÑ?
+    sock-Ñ?казаÑ?елÑ? в знаÑ?ение NULL пÑ?и вÑ?ождении в логикÑ? повÑ?оÑ?а попÑ?Ñ?ки. Ð?лоÑ?мÑ?Ñ?ленник
+    можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? во вÑ?емÑ? закÑ?Ñ?Ñ?иÑ? в полÑ?зоваÑ?елÑ?Ñ?ком пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ве
+    Ñ?океÑ?а Netlink, Ñ?Ñ?о пÑ?иводиÑ? к оÑ?казÑ? в обÑ?лÑ?живании или поÑ?енÑ?иалÑ?но можеÑ? оказÑ?ваÑ?Ñ?
+    дÑ?Ñ?гое влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-1000365";>CVE-2017-1000365</a>
 
- -    <p>It was discovered that argument and environment pointers are not
- -    taken properly into account to the imposed size restrictions on
- -    arguments and environmental strings passed through
- -    RLIMIT_STACK/RLIMIT_INFINITY. A local attacker can take advantage of
- -    this flaw in conjunction with other flaws to execute arbitrary code.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?казаÑ?ели аÑ?гÑ?менÑ?а и окÑ?Ñ?жениÑ? не Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ?Ñ?Ñ?
+    Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?им обÑ?азом пÑ?и наложении огÑ?аниÑ?ений Ñ?азмеÑ?а на Ñ?Ñ?Ñ?оковÑ?е
+    знаÑ?ениÑ? аÑ?гÑ?менÑ?ов и окÑ?Ñ?жениÑ?, пеÑ?едаваемÑ?е Ñ?еÑ?ез RLIMIT_STACK/RLIMIT_INFINITY.
+    Ð?окалÑ?нÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? вмеÑ?Ñ?е Ñ?
+    дÑ?Ñ?гими Ñ?Ñ?звимоÑ?Ñ?Ñ?ми длÑ? вÑ?полнениÑ? пÑ?оизволÑ?ного кода.</p></li>
 
 </ul>
 
- -<p>For the oldstable distribution (jessie), these problems will be fixed in
- -a subsequent DSA.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? в
+Ñ?ледÑ?Ñ?Ñ?ей Ñ?екомендаÑ?ии по безопаÑ?ноÑ?Ñ?и.</p>
 
- -<p>For the stable distribution (stretch), these problems have been fixed in
- -version 4.9.30-2+deb9u3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.9.30-2+deb9u3.</p>
 
- -<p>We recommend that you upgrade your linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=G2FO
-----END PGP SIGNATURE-----


Reply to: