[DONE] wml://security/2018/dsa-4188.wml
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- ../../english/security/2018/dsa-4188.wml 2018-05-02 11:53:24.000000000 +0500
+++ 2018/dsa-4188.wml 2018-05-02 11:52:39.779225627 +0500
@@ -1,224 +1,225 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" mindelta="1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
<define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the Linux kernel that
- -may lead to a privilege escalation, denial of service or information
- -leaks.</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е
+могÑ?Ñ? пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий, оÑ?казÑ? в обÑ?лÑ?живании или
+Ñ?Ñ?еÑ?кам инÑ?оÑ?маÑ?ии.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5715">CVE-2017-5715</a>
- - <p>Multiple researchers have discovered a vulnerability in various
- - processors supporting speculative execution, enabling an attacker
- - controlling an unprivileged process to read memory from arbitrary
- - addresses, including from the kernel and all other processes
- - running on the system.</p>
- -
- - <p>This specific attack has been named Spectre variant 2 (branch
- - target injection) and is mitigated for the x86 architecture (amd64
- - and i386) by using the <q>retpoline</q> compiler feature which allows
- - indirect branches to be isolated from speculative execution.</p></li>
+ <p>Ð?еÑ?колÑ?ко иÑ?Ñ?ледоваÑ?елей обнаÑ?Ñ?жили Ñ?Ñ?звимоÑ?Ñ?Ñ? в Ñ?азлиÑ?нÑ?Ñ? пÑ?оÑ?еÑ?Ñ?оÑ?аÑ?,
+ поддеÑ?живаÑ?Ñ?иÑ? Ñ?пекÑ?лÑ?Ñ?ивное вÑ?полнение кода, коÑ?оÑ?аÑ? позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ?,
+ Ñ?пÑ?авлÑ?Ñ?Ñ?емÑ? непÑ?ивелигиÑ?ованнÑ?м пÑ?оÑ?еÑ?Ñ?ом, Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? Ñ?одеÑ?жимое памÑ?Ñ?и по пÑ?оизволÑ?номÑ?
+ адÑ?еÑ?Ñ?, вклÑ?Ñ?аÑ? памÑ?Ñ?Ñ? Ñ?дÑ?а и вÑ?еÑ? оÑ?Ñ?алÑ?нÑ?Ñ? пÑ?оÑ?еÑ?Ñ?ов, запÑ?Ñ?еннÑ?Ñ?
+ в Ñ?иÑ?Ñ?еме.</p>
+
+ <p>Ð?аннаÑ? аÑ?ака полÑ?Ñ?ила название Spectre ваÑ?ианÑ? 2 (введение веÑ?влений),
+ а еÑ? оÑ?Ñ?иÑ?аÑ?елÑ?нÑ?е поÑ?ледÑ?Ñ?виÑ? бÑ?ли минимизиÑ?ованÑ? длÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?Ñ? x86 (amd64 и i386)
+ пÑ?Ñ?Ñ?м иÑ?полÑ?зованиÑ? возможноÑ?Ñ?и компилÑ?Ñ?оÑ?а <q>retpoline</q>, позволÑ?Ñ?Ñ?ей изолиÑ?оваÑ?Ñ?
+ непÑ?Ñ?мое веÑ?вление оÑ? Ñ?пекÑ?лÑ?Ñ?ивного вÑ?полнениÑ? команд.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-5753">CVE-2017-5753</a>
- - <p>Multiple researchers have discovered a vulnerability in various
- - processors supporting speculative execution, enabling an attacker
- - controlling an unprivileged process to read memory from arbitrary
- - addresses, including from the kernel and all other processes
- - running on the system.</p>
- -
- - <p>This specific attack has been named Spectre variant 1
- - (bounds-check bypass) and is mitigated by identifying vulnerable
- - code sections (array bounds checking followed by array access) and
- - replacing the array access with the speculation-safe
- - array_index_nospec() function.</p>
+ <p>Ð?еÑ?колÑ?ко иÑ?Ñ?ледоваÑ?елей обнаÑ?Ñ?жили Ñ?Ñ?звимоÑ?Ñ?Ñ? в Ñ?азлиÑ?нÑ?Ñ? пÑ?оÑ?еÑ?Ñ?оÑ?аÑ?,
+ поддеÑ?живаÑ?Ñ?иÑ? Ñ?пекÑ?лÑ?Ñ?ивное вÑ?полнение кода, коÑ?оÑ?аÑ? позволÑ?еÑ? злоÑ?мÑ?Ñ?ленникÑ?,
+ Ñ?пÑ?авлÑ?Ñ?Ñ?емÑ? непÑ?ивелигиÑ?ованнÑ?м пÑ?оÑ?еÑ?Ñ?ом, Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ? Ñ?одеÑ?жимое памÑ?Ñ?и по пÑ?оизволÑ?номÑ?
+ адÑ?еÑ?Ñ?, вклÑ?Ñ?аÑ? памÑ?Ñ?Ñ? Ñ?дÑ?а и вÑ?еÑ? оÑ?Ñ?алÑ?нÑ?Ñ? пÑ?оÑ?еÑ?Ñ?ов, запÑ?Ñ?еннÑ?Ñ?
+ в Ñ?иÑ?Ñ?еме.</p>
+
+ <p>Ð?аннаÑ? аÑ?ака полÑ?Ñ?ила название Spectre ваÑ?ианÑ? 1 (обÑ?од пÑ?овеÑ?ки гÑ?аниÑ? бÑ?Ñ?еÑ?а),
+ а еÑ? оÑ?Ñ?иÑ?аÑ?елÑ?нÑ?е поÑ?ледÑ?Ñ?виÑ? бÑ?ли минимизиÑ?ованÑ? пÑ?Ñ?Ñ?м опÑ?еделениÑ? Ñ?Ñ?звимÑ?Ñ? Ñ?азделов
+ кода (пÑ?овеÑ?ка гÑ?аниÑ? маÑ?Ñ?ива поÑ?ле обÑ?аÑ?ениÑ? к маÑ?Ñ?ивÑ?) и заменÑ? обÑ?аÑ?ениÑ? к маÑ?Ñ?ивÑ?
+ на безопаÑ?нÑ?Ñ? пÑ?и иÑ?полÑ?зовании Ñ?пекÑ?лÑ?Ñ?ивного вÑ?полнениÑ?
+ Ñ?Ñ?нкÑ?иÑ? array_index_nospec().
- - <p>More use sites will be added over time.</p></li>
+ <p>Со вÑ?еменем бÑ?дÑ?Ñ? добавленÑ? дополниÑ?елÑ?нÑ?е меÑ?Ñ?а в коде.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-17975">CVE-2017-17975</a>
- - <p>Tuba Yavuz reported a use-after-free flaw in the USBTV007
- - audio-video grabber driver. A local user could use this for denial
- - of service by triggering failure of audio registration.</p></li>
+ <p>ТÑ?ба ЯвÑ?з Ñ?ообÑ?ил об иÑ?полÑ?зовании Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в дÑ?айвеÑ?е
+ аÑ?дио-видео заÑ?ваÑ?а USBTV007. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?
+ длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании пÑ?Ñ?Ñ?м вÑ?зова оÑ?ибки Ñ?егиÑ?Ñ?Ñ?аÑ?ии аÑ?дио.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18193">CVE-2017-18193</a>
- - <p>Yunlei He reported that the f2fs implementation does not properly
- - handle extent trees, allowing a local user to cause a denial of
- - service via an application with multiple threads.</p></li>
+ <p>ЮнÑ?лÑ?й Ð¥Ñ? Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? f2fs непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ?
+ деÑ?евÑ?Ñ? непÑ?еÑ?Ñ?внÑ?Ñ? облаÑ?Ñ?ей, позволÑ?Ñ? локалÑ?номÑ? полÑ?зоваÑ?елÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в
+ обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? пÑ?иложениÑ? Ñ? неÑ?колÑ?кими поÑ?оками.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18216">CVE-2017-18216</a>
- - <p>Alex Chen reported that the OCFS2 filesystem failed to hold a
- - necessary lock during nodemanager sysfs file operations,
- - potentially leading to a null pointer dereference. A local user
- - could use this for denial of service.</p></li>
+ <p>Ð?лекÑ? Чен Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?айловаÑ? Ñ?иÑ?Ñ?ема OCFS2 не вÑ?полнÑ?еÑ? необÑ?одимÑ?Ñ? блокиÑ?овкÑ?
+ во вÑ?емÑ? Ñ?айловÑ?Ñ? опеÑ?аÑ?ий nodemanager sysfs,
+ Ñ?Ñ?о поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к Ñ?азÑ?менованиÑ? null-Ñ?казаÑ?елÑ?. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?
+ можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? пÑ?облемÑ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18218">CVE-2017-18218</a>
- - <p>Jun He reported a use-after-free flaw in the Hisilicon HNS ethernet
- - driver. A local user could use this for denial of service.</p></li>
+ <p>ЦзÑ?нÑ? Ð¥Ñ? Ñ?ообÑ?ил об иÑ?полÑ?зовании Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и в дÑ?айвеÑ?е пÑ?оводной Ñ?еÑ?и
+ Hisilicon HNS. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18222">CVE-2017-18222</a>
- - <p>It was reported that the Hisilicon Network Subsystem (HNS) driver
- - implementation does not properly handle ethtool private flags. A
- - local user could use this for denial of service or possibly have
- - other impact.</p></li>
+ <p>Ð?Ñ?ло Ñ?ообÑ?ено, Ñ?Ñ?о Ñ?еализаÑ?иÑ? дÑ?айвеÑ?а Hisilicon Network Subsystem (HNS)
+ непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? закÑ?Ñ?Ñ?Ñ?е Ñ?лаги ethtool. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?
+ можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании или оказÑ?ваÑ?Ñ?
+ дÑ?Ñ?гое влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ? Ñ?иÑ?Ñ?емÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18224">CVE-2017-18224</a>
- - <p>Alex Chen reported that the OCFS2 filesystem omits the use of a
- - semaphore and consequently has a race condition for access to the
- - extent tree during read operations in DIRECT mode. A local user
- - could use this for denial of service.</p></li>
+ <p>Ð?лекÑ? Чен Ñ?ообÑ?ил, Ñ?Ñ?о в Ñ?айловой Ñ?иÑ?Ñ?еме OCFS2 не иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ? Ñ?емаÑ?оÑ?Ñ?,
+ а поÑ?омÑ? пÑ?и обÑ?аÑ?ении к деÑ?евÑ?Ñ?м непÑ?еÑ?Ñ?внÑ?Ñ? облаÑ?Ñ?ей возникаеÑ? Ñ?оÑ?Ñ?оÑ?ние гонки во
+ вÑ?емÑ? вÑ?полнении опеÑ?аÑ?ий Ñ?Ñ?ениÑ? в Ñ?ежиме DIRECT. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?
+ можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18241">CVE-2017-18241</a>
- - <p>Yunlei He reported that the f2fs implementation does not properly
- - initialise its state if the <q>noflush_merge</q> mount option is used.
- - A local user with access to a filesystem mounted with this option
- - could use this to cause a denial of service.</p></li>
+ <p>ЮнÑ?лÑ?й Ð¥Ñ? Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? f2fs непÑ?авилÑ?но иниÑ?иализиÑ?Ñ?еÑ?
+ Ñ?воÑ? Ñ?оÑ?Ñ?оÑ?ние пÑ?и иÑ?полÑ?зовании опÑ?ии монÑ?иÑ?ованиÑ? <q>noflush_merge</q>.
+ Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к Ñ?айловой Ñ?иÑ?Ñ?еме, Ñ?монÑ?иÑ?ованной Ñ? Ñ?казанной
+ опÑ?ией, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-18257">CVE-2017-18257</a>
- - <p>It was reported that the f2fs implementation is prone to an infinite
- - loop caused by an integer overflow in the __get_data_block()
- - function. A local user can use this for denial of service via
- - crafted use of the open and fallocate system calls with an
+ <p>Ð?Ñ?ло Ñ?ообÑ?ено, Ñ?Ñ?о в Ñ?еализаÑ?ии f2fs можеÑ? возникаÑ?Ñ? беÑ?конеÑ?нÑ?й Ñ?икл из-за
+ пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?Ñ?нкÑ?ии __get_data_block(). Ð?окалÑ?нÑ?й
+ полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ?
+ Ñ?пеÑ?иалÑ?ного иÑ?полÑ?зовании Ñ?иÑ?Ñ?емнÑ?Ñ? вÑ?зовов open и fallocate Ñ?
FS_IOC_FIEMAP ioctl.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1065">CVE-2018-1065</a>
- - <p>The syzkaller tool found a NULL pointer dereference flaw in the
- - netfilter subsystem when handling certain malformed iptables
- - rulesets. A local user with the CAP_NET_RAW or CAP_NET_ADMIN
- - capability (in any user namespace) could use this to cause a denial
- - of service. Debian disables unprivileged user namespaces by default.</p></li>
+ <p>С помоÑ?Ñ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?а syzkaller бÑ?ло обнаÑ?Ñ?жено Ñ?азÑ?менование NULL-Ñ?казаÑ?елÑ? в подÑ?иÑ?Ñ?еме
+ netfilter, возникаÑ?Ñ?ее пÑ?и обÑ?абоÑ?ке опÑ?еделÑ?ннÑ?Ñ? некоÑ?Ñ?екÑ?нÑ?Ñ? набоÑ?ов пÑ?авил iptables.
+ Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий пÑ?ава CAP_NET_RAW или CAP_NET_ADMIN (в лÑ?бом полÑ?зоваÑ?елÑ?Ñ?ком
+ пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ве имÑ?н), можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании. Ð?
+ Debian по Ñ?молÑ?аниÑ? непÑ?ивилегиÑ?ованнÑ?е полÑ?зоваÑ?елÑ?Ñ?кие пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва имÑ?н оÑ?клÑ?Ñ?енÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1066">CVE-2018-1066</a>
- - <p>Dan Aloni reported to Red Hat that the CIFS client implementation
- - would dereference a null pointer if the server sent an invalid
- - response during NTLMSSP setup negotiation. This could be used
- - by a malicious server for denial of service.</p></li>
+ <p>Ð?Ñ?н Ð?лони Ñ?ообÑ?ил Red Hat, Ñ?Ñ?о Ñ?еализаÑ?иÑ? клиенÑ?а CIFS вÑ?полнÑ?еÑ?
+ Ñ?азÑ?менование null-Ñ?казаÑ?елÑ? в Ñ?лÑ?Ñ?ае, еÑ?ли Ñ?еÑ?веÑ? оÑ?пÑ?авлÑ?еÑ? некоÑ?Ñ?екÑ?нÑ?й
+ оÑ?веÑ? в Ñ?оде Ñ?оглаÑ?ованиÑ? NTLMSSP. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+ вÑ?едоноÑ?нÑ?м Ñ?еÑ?веÑ?ом длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1068">CVE-2018-1068</a>
- - <p>The syzkaller tool found that the 32-bit compatibility layer of
- - ebtables did not sufficiently validate offset values. On a 64-bit
- - kernel, a local user with the CAP_NET_ADMIN capability (in any user
- - namespace) could use this to overwrite kernel memory, possibly
- - leading to privilege escalation. Debian disables unprivileged user
- - namespaces by default.</p></li>
+ <p>С помоÑ?Ñ?Ñ? инÑ?Ñ?Ñ?Ñ?менÑ?а syzkaller бÑ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о пÑ?оÑ?лойка 32-биÑ?ной Ñ?овмеÑ?Ñ?имоÑ?Ñ?и
+ ebtables недоÑ?Ñ?аÑ?оÑ?но пÑ?овеÑ?Ñ?еÑ? знаÑ?ениÑ? оÑ?Ñ?Ñ?Ñ?пов. Ð?а 64-биÑ?нÑ?Ñ? Ñ?дÑ?аÑ?
+ локалÑ?нÑ?й полÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий пÑ?ава CAP_NET_ADMIN (в лÑ?бом пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ве имÑ?н
+ полÑ?зоваÑ?елÑ?), можеÑ? иÑ?полÑ?зоваÑ?Ñ? даннÑ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? пеÑ?езапиÑ?и памÑ?Ñ?и Ñ?дÑ?а, Ñ?Ñ?о
+ поÑ?енÑ?иалÑ?но пÑ?иводиÑ? к повÑ?Ñ?ениÑ? пÑ?ивилегий. Ð? Debian непÑ?ивилегиÑ?ованнÑ?е полÑ?зоваÑ?елÑ?Ñ?кие
+ пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва имÑ?н по Ñ?молÑ?аниÑ? оÑ?клÑ?Ñ?енÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1092">CVE-2018-1092</a>
- - <p>Wen Xu reported that a crafted ext4 filesystem image would
- - trigger a null dereference when mounted. A local user able
- - to mount arbitrary filesystems could use this for denial of
- - service.</p></li>
+ <p>Ð?Ñ?нÑ? СÑ?й Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й обÑ?аз Ñ?айловой Ñ?иÑ?Ñ?емÑ? ext4
+ пÑ?и его монÑ?иÑ?овании вÑ?зÑ?ваеÑ? Ñ?азÑ?менование null-Ñ?казаÑ?елÑ?. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?,
+ Ñ?поÑ?обнÑ?й монÑ?иÑ?оваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айловÑ?е Ñ?иÑ?Ñ?емÑ?, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?
+ длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1093">CVE-2018-1093</a>
- - <p>Wen Xu reported that a crafted ext4 filesystem image could trigger
- - an out-of-bounds read in the ext4_valid_block_bitmap() function. A
- - local user able to mount arbitrary filesystems could use this for
- - denial of service.</p></li>
+ <p>Ð?Ñ?нÑ? СÑ?й Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й обÑ?аз Ñ?айловой Ñ?иÑ?Ñ?емÑ? ext4 можеÑ?
+ пÑ?иводиÑ?Ñ? к Ñ?Ñ?ениÑ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии ext4_valid_block_bitmap().
+ Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?, Ñ?поÑ?обнÑ?й монÑ?иÑ?оваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айловÑ?е Ñ?иÑ?Ñ?емÑ?, можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+ Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1108">CVE-2018-1108</a>
- - <p>Jann Horn reported that crng_ready() does not properly handle the
- - crng_init variable states and the RNG could be treated as
- - cryptographically safe too early after system boot.</p></li>
+ <p>Ян ХоÑ?н Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? crng_ready() непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?оÑ?Ñ?оÑ?ниÑ?
+ crng_init, а RNG можеÑ? Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ? кÑ?ипÑ?огÑ?аÑ?иÑ?еÑ?ки безопаÑ?нÑ?м на Ñ?лиÑ?ком Ñ?аннем Ñ?Ñ?апе
+ поÑ?ле загÑ?Ñ?зки Ñ?иÑ?Ñ?емÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5803">CVE-2018-5803</a>
- - <p>Alexey Kodanev reported that the SCTP protocol did not range-check
- - the length of chunks to be created. A local or remote user could
- - use this to cause a denial of service.</p></li>
+ <p>Ð?леÑ?ей Ð?оданев Ñ?ообÑ?ил, Ñ?Ñ?о в пÑ?оÑ?околе SCTP не вÑ?полнÑ?еÑ?Ñ?Ñ? пÑ?овеÑ?ка гÑ?аниÑ? маÑ?Ñ?ива
+ длÑ? длин Ñ?оздаваемÑ?Ñ? поÑ?Ñ?ий даннÑ?Ñ?. Ð?окалÑ?нÑ?й или Ñ?далÑ?ннÑ?й полÑ?зоваÑ?елÑ? могÑ?Ñ?
+ иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7480">CVE-2018-7480</a>
- - <p>Hou Tao discovered a double-free flaw in the blkcg_init_queue()
- - function in block/blk-cgroup.c. A local user could use this to cause
- - a denial of service or have other impact.</p></li>
+ <p>ХоÑ? Тао обнаÑ?Ñ?жил двойное оÑ?вобождение памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии blkcg_init_queue()
+ в block/blk-cgroup.c. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ?
+ вÑ?зова оÑ?каза в обÑ?лÑ?живании или оказÑ?ваÑ?Ñ? дÑ?Ñ?гое влиÑ?ние на безопаÑ?ноÑ?Ñ?Ñ? Ñ?иÑ?Ñ?емÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7566">CVE-2018-7566</a>
- - <p>Fan LongFei reported a race condition in the ALSA (sound)
- - sequencer core, between write and ioctl operations. This could
- - lead to an out-of-bounds access or use-after-free. A local user
- - with access to a sequencer device could use this for denial of
- - service or possibly for privilege escalation.</p></li>
+ <p>ФанÑ? Ð?Ñ?нФÑ?й Ñ?ообÑ?ил о Ñ?оÑ?Ñ?оÑ?нии гонки в Ñ?дÑ?е планиÑ?овÑ?ика ALSA (sound)
+ междÑ? опеÑ?аÑ?иÑ?ми запиÑ?и и ioctl. ÐÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? можеÑ? пÑ?иводиÑ?Ñ? к
+ обÑ?аÑ?ениÑ? в памÑ?Ñ?и за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а или иÑ?полÑ?зованиÑ? Ñ?казаÑ?елей
+ поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к
+ Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вÑ? планиÑ?овÑ?ика можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в
+ обÑ?лÑ?живании или возможного повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7740">CVE-2018-7740</a>
- - <p>Nic Losby reported that the hugetlbfs filesystem's mmap operation
- - did not properly range-check the file offset. A local user with
- - access to files on a hugetlbfs filesystem could use this to cause
- - a denial of service.</p></li>
+ <p>Ð?ик Ð?оÑ?Ñ?би Ñ?ообÑ?ил, Ñ?Ñ?о опеÑ?аÑ?иÑ? mmap Ñ?айловой Ñ?иÑ?Ñ?емÑ? hugetlbfs
+ непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? гÑ?аниÑ? маÑ?Ñ?ива длÑ? Ñ?айлового оÑ?Ñ?Ñ?Ñ?па. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?,
+ имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к Ñ?айлам в Ñ?айловой Ñ?иÑ?Ñ?еме hugetlbfs, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?
+ длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7757">CVE-2018-7757</a>
- - <p>Jason Yan reported a memory leak in the SAS (Serial-Attached
- - SCSI) subsystem. A local user on a system with SAS devices
- - could use this to cause a denial of service.</p></li>
+ <p>Ð?жейÑ?он Ян Ñ?ообÑ?ил об Ñ?Ñ?еÑ?ке памÑ?Ñ?и в подÑ?иÑ?Ñ?еме SAS (Serial-Attached
+ SCSI). Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ? в Ñ?иÑ?Ñ?еме Ñ? SAS-Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вами
+ можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-7995">CVE-2018-7995</a>
- - <p>Seunghun Han reported a race condition in the x86 MCE
- - (Machine Check Exception) driver. This is unlikely to have
- - any security impact.</p></li>
+ <p>СÑ?нÑ?Ñ?нÑ? ХанÑ? Ñ?ообÑ?ил о Ñ?оÑ?Ñ?оÑ?нии гонки в дÑ?айвеÑ?е x86 MCE
+ (Machine Check Exception). ÐÑ?а пÑ?облема Ñ?коÑ?ее вÑ?его не имееÑ?
+ влиÑ?ниÑ? на безопаÑ?ноÑ?Ñ?Ñ? Ñ?иÑ?Ñ?емÑ?.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8087">CVE-2018-8087</a>
- - <p>A memory leak flaw was found in the hwsim_new_radio_nl() function in
- - the simulated radio testing tool driver for mac80211, allowing a
- - local user to cause a denial of service.</p></li>
+ <p>Ð? Ñ?Ñ?нкÑ?ии hwsim_new_radio_nl() из дÑ?айвеÑ?а длÑ? Ñ?еÑ?Ñ?иÑ?ованиÑ? моделиÑ?ованного Ñ?адио
+ длÑ? mac80211 бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?еÑ?ка памÑ?Ñ?и, позволÑ?Ñ?Ñ?аÑ? локалÑ?номÑ? полÑ?зоваÑ?елÑ?
+ вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8781">CVE-2018-8781</a>
- - <p>Eyal Itkin reported that the udl (DisplayLink) driver's mmap
- - operation did not properly range-check the file offset. A local
- - user with access to a udl framebuffer device could exploit this to
- - overwrite kernel memory, leading to privilege escalation.</p></li>
+ <p>ÐÑ?лÑ? Ð?Ñ?кин Ñ?ообÑ?ил, Ñ?Ñ?о опеÑ?аÑ?иÑ? mmap дÑ?айвеÑ?а udl (DisplayLink)
+ непÑ?авилÑ?но вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? гÑ?аниÑ? маÑ?Ñ?ива длÑ? Ñ?айлового оÑ?Ñ?Ñ?Ñ?па. Ð?окалÑ?нÑ?й
+ полÑ?зоваÑ?елÑ?, имеÑ?Ñ?ий доÑ?Ñ?Ñ?п к Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?вÑ? udl можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ?
+ длÑ? пеÑ?езапиÑ?и памÑ?Ñ?и Ñ?дÑ?а, Ñ?Ñ?о пÑ?иводиÑ? к повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-8822">CVE-2018-8822</a>
- - <p>Dr Silvio Cesare of InfoSect reported that the ncpfs client
- - implementation did not validate reply lengths from the server. An
- - ncpfs server could use this to cause a denial of service or
- - remote code execution in the client.</p></li>
+ <p>Ð?-Ñ? СилÑ?вио ЦезаÑ?е из InfoSect Ñ?ообÑ?ил, Ñ?Ñ?о Ñ?еализаÑ?иÑ? клиенÑ?а ncpfs
+ не вÑ?полнÑ?еÑ? пÑ?овеÑ?кÑ? длинÑ? оÑ?веÑ?ов Ñ?еÑ?веÑ?а. СеÑ?веÑ? ncpfs
+ можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании или
+ Ñ?далÑ?нного вÑ?полнениÑ? кода на Ñ?Ñ?оÑ?оне клиенÑ?а.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10323">CVE-2018-10323</a>
- - <p>Wen Xu reported a NULL pointer dereference flaw in the
- - xfs_bmapi_write() function triggered when mounting and operating a
- - crafted xfs filesystem image. A local user able to mount arbitrary
- - filesystems could use this for denial of service.</p></li>
+ <p>Ð?Ñ?нÑ? СÑ?й Ñ?ообÑ?ил о Ñ?азÑ?меновании NULL-Ñ?казаÑ?елÑ? в Ñ?Ñ?нкÑ?ии xfs_bmapi_write(),
+ коÑ?оÑ?ое возникаеÑ? пÑ?и монÑ?иÑ?овании и Ñ?абоÑ?е Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?м обÑ?азом
+ Ñ?айловой Ñ?иÑ?Ñ?емÑ? xfs. Ð?окалÑ?нÑ?й полÑ?зоваÑ?елÑ?, Ñ?поÑ?обнÑ?й монÑ?иÑ?оваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айловÑ?е
+ Ñ?иÑ?Ñ?емÑ?, можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1000199">CVE-2018-1000199</a>
- - <p>Andy Lutomirski discovered that the ptrace subsystem did not
- - sufficiently validate hardware breakpoint settings. Local users
- - can use this to cause a denial of service, or possibly for
- - privilege escalation, on x86 (amd64 and i386) and possibly other
- - architectures.</p></li>
+ <p>Ðнди Ð?Ñ?Ñ?омиÑ?Ñ?кий обнаÑ?Ñ?жил, Ñ?Ñ?о подÑ?иÑ?Ñ?ема ptrace недоÑ?Ñ?аÑ?оÑ?но
+ пÑ?овеÑ?Ñ?еÑ? наÑ?Ñ?Ñ?ойки аппаÑ?аÑ?нÑ?Ñ? Ñ?оÑ?ке оÑ?Ñ?анова. Ð?окалÑ?нÑ?е полÑ?зоваÑ?ели могÑ?Ñ?
+ иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании или возможного
+ повÑ?Ñ?ениÑ? пÑ?ивилегий на аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?е x86 (amd64 и i386), а Ñ?акже поÑ?енÑ?иалÑ?но и на
+ дÑ?Ñ?гиÑ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?аÑ?.</p></li>
</ul>
- -<p>For the stable distribution (stretch), these problems have been fixed in
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
version 4.9.88-1.</p>
- -<p>We recommend that you upgrade your linux packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux.</p>
- -<p>For the detailed security status of linux please refer to its security
- -tracker page at:
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и linux можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
<a href="https://security-tracker.debian.org/tracker/linux">\
https://security-tracker.debian.org/tracker/linux</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2018/dsa-4188.data"
- -# $Id: dsa-4188.wml,v 1.2 2018/05/02 06:53:24 dogsleg Exp $
-----BEGIN PGP SIGNATURE-----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=wA7/
-----END PGP SIGNATURE-----
Reply to: