[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1588.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1588.wml	2017-11-01 10:11:09.883815525 +0500
+++ russian/security/2008/dsa-1588.wml	2018-02-10 10:33:12.775455995 +0500
@@ -1,47 +1,48 @@
- -<define-tag description>denial of service</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that may
- -lead to a denial of service. The Common Vulnerabilities and Exposures
- -project identifies the following problems:</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ?
+пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-6712";>CVE-2007-6712</a>
 
- -    <p>Johannes Bauer discovered an integer overflow condition in the hrtimer
- -    subsystem on 64-bit systems. This can be exploited by local users to
- -    trigger a denial of service (DoS) by causing the kernel to execute an
- -    infinite loop.</p></li>
+    <p>Ð?оÑ?аннеÑ? Ð?аÑ?Ñ?Ñ? обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в подÑ?иÑ?Ñ?еме hrtimer
+    на 64-биÑ?нÑ?Ñ? Ñ?иÑ?Ñ?емаÑ?. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? локалÑ?нÑ?ми полÑ?зоваÑ?елÑ?ми
+    длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (DoS), коÑ?оÑ?Ñ?е могÑ?Ñ? вÑ?полнÑ?Ñ?Ñ? Ñ?Ñ?ловиÑ?, Ñ?оздаÑ?Ñ?ие
+    в Ñ?дÑ?е беÑ?конеÑ?нÑ?й Ñ?икл.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-1615";>CVE-2008-1615</a>
 
- -    <p>Jan Kratochvil reported a local denial of service condition that
- -    permits local users on systems running the amd64 flavor kernel
- -    to cause a system crash.</p></li>
+    <p>Ян Ð?Ñ?аÑ?оÑ?вил Ñ?ообÑ?ил о локалÑ?ном оÑ?казе в обÑ?лÑ?живании, позволÑ?Ñ?Ñ?ем
+    локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м в Ñ?иÑ?Ñ?емаÑ? Ñ? Ñ?дÑ?ом длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? amd64
+    вÑ?зÑ?ваÑ?Ñ? аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? Ñ?иÑ?Ñ?емÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-2136";>CVE-2008-2136</a>
 
- -    <p>Paul Harks discovered a memory leak in the Simple Internet Transition
- -    (SIT) code used for IPv6 over IPv4 tunnels. This can be exploited
- -    by remote users to cause a denial of service condition.</p></li>
+    <p>Ð?ол ХаÑ?кÑ? обнаÑ?Ñ?жил Ñ?Ñ?еÑ?кÑ? памÑ?Ñ?и в коде Simple Internet Transition
+    (SIT), иÑ?полÑ?зÑ?емом длÑ? Ñ?еализаÑ?ии IPv6 по IPv4-Ñ?Ñ?ннелÑ?м. ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ? Ñ?далÑ?ннÑ?ми полÑ?зоваÑ?елÑ?ми длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-2137";>CVE-2008-2137</a>
 
- -    <p>David Miller and Jan Lieskovsky discovered issues with the virtual
- -    address range checking of mmaped regions on the sparc architecture
- -    that may be exploited by local users to cause a denial of service.</p></li>
+    <p>Ð?Ñ?вид Ð?иллеÑ? и Ян Ð?иÑ?ковÑ?кий обнаÑ?Ñ?жили пÑ?облемÑ? Ñ? пÑ?овеÑ?кой виÑ?Ñ?Ñ?алÑ?ного адÑ?еÑ?ного
+    пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва облаÑ?Ñ?ей mmaped на аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?е sparc, Ñ?Ñ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+    локалÑ?нÑ?ми полÑ?зоваÑ?елÑ?ми длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), this problem has been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии
 2.6.18.dfsg.1-18etch5.</p>
 
- -<p>Builds for linux-2.6/s390 and fai-kernels/powerpc were not yet available at
- -the time of this advisory. This advisory will be updated as these builds
- -become available.</p>
+<p>СбоÑ?ки длÑ? linux-2.6/s390 и fai-kernels/powerpc пока не гоÑ?овÑ?. Ð?аннаÑ?
+Ñ?екомендаÑ?иÑ? бÑ?деÑ? обновлена как Ñ?олÑ?ко бÑ?дÑ?Ñ? доÑ?Ñ?Ñ?пнÑ?
+Ñ?казаннÑ?е Ñ?боÑ?ки.</p>
 
- -<p>We recommend that you upgrade your linux-2.6, fai-kernels, and
- -user-mode-linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux-2.6, fai-kernels и
+user-mode-linux.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=C1L2
-----END PGP SIGNATURE-----


Reply to: