[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2018/dsa-4266.wml



--- ../../english/security/2018/dsa-4266.wml	2018-08-07 01:19:15.470020918 +0500
+++ 2018/dsa-4266.wml	2018-08-07 01:29:13.102769752 +0500
@@ -1,36 +1,37 @@
-<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="f8f2f9257e00f87b05dddb078027f5189f09138f" mindelta="1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
-<p>Several vulnerabilities have been discovered in the Linux kernel that
-may lead to a privilege escalation or denial of service.</p>
+<p>Ð? Ñ?дÑ?е Linux бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей, коÑ?оÑ?Ñ?е могÑ?Ñ?
+пÑ?иводиÑ?Ñ? к повÑ?Ñ?ениÑ? пÑ?ивилегий или оÑ?казÑ? в обÑ?лÑ?живании.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5390";>CVE-2018-5390</a>
 
-    <p>Juha-Matti Tilli discovered that a remote attacker can trigger the
-    worst case code paths for TCP stream reassembly with low rates of
-    specially crafted packets leading to remote denial of service.</p></li>
+    <p>ЮÑ?а-Ð?аÑ?Ñ?и Тилли обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?далÑ?ннÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? вÑ?зваÑ?Ñ? обÑ?абоÑ?кÑ?
+    Ñ?Ñ?дÑ?его кода длÑ? повÑ?оÑ?ной Ñ?боÑ?ки поÑ?ока TCP Ñ? низкой Ñ?коÑ?оÑ?Ñ?Ñ?Ñ? длÑ? Ñ?пеÑ?иалÑ?но
+    Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? пакеÑ?ов, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?далÑ?нномÑ? оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13405";>CVE-2018-13405</a>
 
-    <p>Jann Horn discovered that the inode_init_owner function in
-    fs/inode.c in the Linux kernel allows local users to create files
-    with an unintended group ownership allowing attackers to escalate
-    privileges by making a plain file executable and SGID.</p></li>
+    <p>Янн ХоÑ?н обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? inode_init_owner в Ñ?айле
+    fs/inode.c в Ñ?дÑ?е Linux позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м Ñ?оздаваÑ?Ñ? Ñ?айлÑ?
+    Ñ? непÑ?еднамеÑ?еннÑ?м гÑ?Ñ?пповÑ?м владением, позволÑ?Ñ? злоÑ?мÑ?Ñ?ленникам повÑ?Ñ?аÑ?Ñ?
+    пÑ?ивилегии, делаÑ? обÑ?Ñ?нÑ?й Ñ?айл иÑ?полнÑ?емÑ?м, и добавлÑ?Ñ? емÑ? Ñ?лаг SGID.</p></li>
 
 </ul>
 
-<p>For the stable distribution (stretch), these problems have been fixed in
-version 4.9.110-3+deb9u1. This update includes fixes for several
-regressions in the latest point release.</p>
-
-<p>We recommend that you upgrade your linux packages.</p>
-
-<p>For the detailed security status of linux please refer to its security
-tracker page at:
-<a href="https://security-tracker.debian.org/tracker/linux";>https://security-tracker.debian.org/tracker/linux</a></p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (stretch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 4.9.110-3+deb9u1. Ð?анное обновление вклÑ?Ñ?аеÑ? в Ñ?ебÑ? иÑ?пÑ?авлениÑ? длÑ?
+неÑ?колÑ?киÑ? Ñ?егÑ?еÑ?Ñ?ий, пÑ?оÑ?вивÑ?иÑ?Ñ?Ñ? в поÑ?ледней Ñ?едакÑ?ии.</p>
+
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? linux.</p>
+
+<p>С подÑ?обнÑ?м Ñ?Ñ?аÑ?Ñ?Ñ?ом поддеÑ?жки безопаÑ?ноÑ?Ñ?и linux можно ознакомиÑ?Ñ?Ñ?Ñ? на
+Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ей Ñ?Ñ?Ñ?аниÑ?е оÑ?Ñ?леживаниÑ? безопаÑ?ноÑ?Ñ?и по адÑ?еÑ?Ñ?
+<a href="https://security-tracker.debian.org/tracker/linux";>\
+https://security-tracker.debian.org/tracker/linux</a></p>
 </define-tag>
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2018/dsa-4266.data"
-# $Id: $


Reply to: