[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2009/dsa-1809.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- ../../english/security/2009/dsa-1809.wml	2017-11-01 10:11:10.023824652 +0500
+++ 2009/dsa-1809.wml	2018-03-27 11:06:50.044358797 +0500
@@ -1,54 +1,53 @@
- -<define-tag description>denial of service, privilege escalation</define-tag>
+#use wml::debian::translation-check translation="1.3" mindelta="1"
+<define-tag description>оÑ?каз в обÑ?лÑ?живании, повÑ?Ñ?ение пÑ?ивилегий</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a denial of service, or privilege escalation. The Common
- -Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ?
+пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании или повÑ?Ñ?ениÑ? пÑ?ивилегий. Ð?Ñ?оекÑ? Common
+Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1630";>CVE-2009-1630</a>
 
- -    <p>Frank Filz discovered that local users may be able to execute
- -    files without execute permission when accessed via an nfs4 mount.</p></li>
+    <p>ФÑ?анк ФилÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о локалÑ?нÑ?е полÑ?зоваÑ?ели могÑ?Ñ? бÑ?Ñ?Ñ? Ñ?поÑ?обнÑ? вÑ?полниÑ?Ñ?
+    Ñ?айлÑ?, не имеÑ? пÑ?ава на иÑ? вÑ?полнение, в Ñ?лÑ?Ñ?ае, когда они обÑ?аÑ?аÑ?Ñ?Ñ?Ñ? к Ñ?еÑ?Ñ?Ñ?Ñ?Ñ? nfs4.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1633";>CVE-2009-1633</a>
 
- -    <p>Jeff Layton and Suresh Jayaraman fixed several buffer overflows in
- -    the CIFS filesystem which allow remote servers to cause memory
- -    corruption.</p></li>
+    <p>Ð?жеÑ?Ñ? Ð?Ñ?йÑ?он и СÑ?Ñ?еÑ? Ð?жайаÑ?аман иÑ?пÑ?авили неÑ?колÑ?ко пеÑ?еполнений бÑ?Ñ?еÑ?а в
+    Ñ?айловой Ñ?иÑ?Ñ?еме CIFS, коÑ?оÑ?Ñ?е позволÑ?ли Ñ?далÑ?ннÑ?м Ñ?еÑ?веÑ?ам вÑ?зÑ?ваÑ?Ñ? повÑ?еждение
+    Ñ?одеÑ?жимого памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1758";>CVE-2009-1758</a>
 
- -    <p>Jan Beulich discovered an issue in Xen where local guest users may
- -    cause a denial of service (oops).</p></li>
+    <p>Ян Ð?Ñ?лиÑ? обнаÑ?Ñ?жил пÑ?облемÑ? в Xen, из-за коÑ?оÑ?ой локалÑ?нÑ?е полÑ?зоваÑ?ели гоÑ?Ñ?евой
+    Ñ?иÑ?Ñ?емÑ? могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (oops).</p></li>
 
 </ul>
 
- -<p>This update also fixes a regression introduced by the fix for
- -<a href="https://security-tracker.debian.org/tracker/CVE-2009-1184";>CVE-2009-1184</a> 
- -in 2.6.26-15lenny3. This prevents a boot time panic on systems with SELinux
- -enabled.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?егÑ?еÑ?Ñ?иÑ?, пÑ?оÑ?вивÑ?Ñ?Ñ?Ñ?Ñ? поÑ?ле иÑ?пÑ?авлениÑ?
+<a href="https://security-tracker.debian.org/tracker/CVE-2009-1184";>CVE-2009-1184</a>
+в 2.6.26-15lenny3. ЭÑ?о иÑ?пÑ?авлÑ?еÑ? паникÑ? Ñ?дÑ?а во вÑ?емÑ? загÑ?Ñ?зки на Ñ?иÑ?Ñ?емаÑ? Ñ?
+вклÑ?Ñ?Ñ?ннÑ?м SELinux.</p>
 
- -<p>For the oldstable distribution (etch), these problems, where
- -applicable, will be fixed in future updates to linux-2.6 and
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? (еÑ?ли они имеÑ?Ñ?
+меÑ?Ñ?о) бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? в бÑ?дÑ?Ñ?иÑ? обновлениÑ?Ñ? пакеÑ?ов linux-2.6 и
 linux-2.6.24.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.6.26-15lenny3.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.6.26-15lenny3.</p>
 
- -<p>We recommend that you upgrade your linux-2.6 and user-mode-linux
- -packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux-2.6 и
+user-mode-linux.</p>
 
- -<p>Note: Debian carefully tracks all known security issues across every
- -linux kernel package in all releases under active security support.
- -However, given the high frequency at which low-severity security
- -issues are discovered in the kernel and the resource requirements of
- -doing an update, updates for lower priority issues will normally not
- -be released for all kernels at the same time. Rather, they will be
- -released in a staggered or "leap-frog" fashion.</p>
+<p>Ð?нимание: Debian Ñ?Ñ?аÑ?елÑ?но оÑ?Ñ?леживаеÑ? вÑ?е извеÑ?Ñ?нÑ?е пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и во вÑ?еÑ?
+пакеÑ?аÑ? Ñ? Ñ?дÑ?ом linux во вÑ?еÑ? вÑ?пÑ?Ñ?каÑ?, длÑ? коÑ?оÑ?Ñ?Ñ? пÑ?едоÑ?Ñ?авлÑ?еÑ?Ñ?Ñ? поддеÑ?жка безопаÑ?ноÑ?Ñ?и.
+Тем не менее, Ñ?Ñ?иÑ?Ñ?ваÑ? вÑ?Ñ?окÑ?Ñ? Ñ?аÑ?Ñ?оÑ?Ñ? Ñ? коÑ?оÑ?ой обнаÑ?Ñ?живаÑ?Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?и низкой Ñ?Ñ?епени
+Ñ?еÑ?Ñ?Ñ?зноÑ?Ñ?и, а Ñ?акже Ñ?еÑ?Ñ?Ñ?Ñ?нÑ?е Ñ?Ñ?ебованиÑ? длÑ? подгоÑ?овки обновлениÑ?, обновлениÑ? пÑ?облем,
+имеÑ?Ñ?иÑ? низкий пÑ?иоÑ?иÑ?еÑ?, обÑ?Ñ?но не вÑ?пÑ?Ñ?каÑ?Ñ?Ñ?Ñ? длÑ? вÑ?еÑ? Ñ?дÑ?е одновÑ?еменно. СкоÑ?ее они
+бÑ?дÑ?Ñ? вÑ?пÑ?Ñ?каÑ?Ñ?Ñ?Ñ? в Ñ?аÑ?маÑ?ном поÑ?Ñ?дке или в поÑ?Ñ?дке Ñ?еÑ?аÑ?дÑ?.</p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2009/dsa-1809.data"
- -# $Id: dsa-1809.wml,v 1.3 2014/04/30 07:16:19 pabs Exp $
-----BEGIN PGP SIGNATURE-----
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=rgyd
-----END PGP SIGNATURE-----


Reply to: