[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2018/dsa-4208.wml



--- ../../english/security/2018/dsa-4208.wml	2018-05-23 09:34:58.000000000 +0500
+++ 2018/dsa-4208.wml	2018-05-23 09:43:29.071616405 +0500
@@ -1,55 +1,56 @@
-<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" mindelta="1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
-<p>The Qualys Research Labs discovered multiple vulnerabilities in procps,
-a set of command line and full screen utilities for browsing procfs. The
-Common Vulnerabilities and Exposures project identifies the following
-problems:</p>
+<p>СоÑ?Ñ?Ñ?дники Qualys Research Labs обнаÑ?Ñ?жили многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и в procps,
+набоÑ?е Ñ?Ñ?илиÑ? командной Ñ?Ñ?Ñ?оки длÑ? пÑ?оÑ?моÑ?Ñ?а procfs. Ð?Ñ?оекÑ?
+Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие
+пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1122";>CVE-2018-1122</a>
 
-    <p>top read its configuration from the current working directory if no
-    $HOME was configured. If top were started from a directory writable
-    by the attacker (such as /tmp) this could result in local privilege
-    escalation.</p></li>
+    <p>УÑ?илиÑ?а top Ñ?иÑ?аеÑ? Ñ?вои наÑ?Ñ?Ñ?ойки из Ñ?екÑ?Ñ?его Ñ?абоÑ?его каÑ?алога в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли
+    не наÑ?Ñ?Ñ?оена пеÑ?еменнаÑ? $HOME. Ð?Ñ?ли top запÑ?Ñ?Ñ?иÑ?Ñ? из каÑ?алога, длÑ? коÑ?оÑ?ого Ñ? злоÑ?мÑ?Ñ?ленника
+    имеÑ?Ñ?Ñ?Ñ? пÑ?ава на запиÑ?Ñ? (напÑ?имеÑ?, /tmp), Ñ?о Ñ?Ñ?о пÑ?иведÑ?Ñ? к локалÑ?номÑ? повÑ?Ñ?ениÑ?
+    пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1123";>CVE-2018-1123</a>
 
-    <p>Denial of service against the ps invocation of another user.</p></li>
+    <p>Ð?Ñ?каз в обÑ?лÑ?живании пÑ?и вÑ?зове ps дÑ?Ñ?гим полÑ?зоваÑ?елем.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1124";>CVE-2018-1124</a>
 
-    <p>An integer overflow in the file2strvec() function of libprocps could
-    result in local privilege escalation.</p></li>
+    <p>Ð?еÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?Ñ?нкÑ?ии file2strvec() из libprocps можеÑ?
+    пÑ?иводиÑ?Ñ? к локалÑ?номÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1125";>CVE-2018-1125</a>
 
-    <p>A stack-based buffer overflow in pgrep could result in denial
-    of service for a user using pgrep for inspecting a specially
-    crafted process.</p></li>
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а в pgrep можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании
+    длÑ? полÑ?зоваÑ?елÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?его pgrep длÑ? пÑ?оÑ?моÑ?Ñ?а Ñ?пеÑ?иалÑ?но
+    Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? пÑ?оÑ?еÑ?Ñ?ов.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-1126";>CVE-2018-1126</a>
 
-    <p>Incorrect integer size parameters used in wrappers for standard C
-    allocators could cause integer truncation and lead to integer
-    overflow issues.</p></li>
+    <p>Ð?екоÑ?Ñ?екÑ?нÑ?е паÑ?амеÑ?Ñ?а Ñ?азмеÑ?а Ñ?елÑ?Ñ? Ñ?иÑ?ел, иÑ?полÑ?зÑ?емÑ?е в обÑ?Ñ?Ñ?каÑ? Ñ?Ñ?андаÑ?Ñ?нÑ?Ñ?
+    Ñ?Ñ?нкÑ?ий Ñ?зÑ?ка C длÑ? вÑ?делениÑ? памÑ?Ñ?и могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? Ñ?Ñ?еÑ?ение Ñ?елÑ?Ñ? Ñ?иÑ?ел
+    и пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ?м Ñ?елÑ?Ñ? Ñ?иÑ?ел.</p></li>
 
 </ul>
 
-<p>For the oldstable distribution (jessie), these problems have been fixed
-in version 2:3.3.9-9+deb8u1.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ?
+в веÑ?Ñ?ии 2:3.3.9-9+deb8u1.</p>
 
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 2:3.3.12-3+deb9u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2:3.3.12-3+deb9u1.</p>
 
-<p>We recommend that you upgrade your procps packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? procps.</p>
 
-<p>For the detailed security status of procps please refer to its
-security tracker page at: <a href="https://security-tracker.debian.org/tracker/procps";>\
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и procps можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/procps";>\
 https://security-tracker.debian.org/tracker/procps</a></p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2018/dsa-4208.data"
-# $Id: dsa-4208.wml,v 1.1 2018/05/23 04:34:58 dogsleg Exp $


Reply to: