-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- ../../english/security/2009/dsa-1809.wml 2017-11-01 10:11:10.023824652 +0500 +++ 2009/dsa-1809.wml 2018-03-27 11:06:50.044358797 +0500 @@ -1,54 +1,53 @@ - -<define-tag description>denial of service, privilege escalation</define-tag> +#use wml::debian::translation-check translation="1.3" mindelta="1" +<define-tag description>оÑказ в обÑлÑживании, повÑÑение пÑивилегий</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in the Linux kernel that - -may lead to a denial of service, or privilege escalation. The Common - -Vulnerabilities and Exposures project identifies the following - -problems:</p> +<p>Ð ÑдÑе Linux бÑло обнаÑÑжено неÑколÑко ÑÑзвимоÑÑей, коÑоÑÑе могÑÑ +пÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании или повÑÑÐµÐ½Ð¸Ñ Ð¿Ñивилегий. ÐÑÐ¾ÐµÐºÑ Common +Vulnerabilities and Exposures опÑеделÑÐµÑ ÑледÑÑÑие +пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1630">CVE-2009-1630</a> - - <p>Frank Filz discovered that local users may be able to execute - - files without execute permission when accessed via an nfs4 mount.</p></li> + <p>ФÑанк Ð¤Ð¸Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑжил, ÑÑо локалÑнÑе полÑзоваÑели могÑÑ Ð±ÑÑÑ ÑпоÑÐ¾Ð±Ð½Ñ Ð²ÑполниÑÑ + ÑайлÑ, не Ð¸Ð¼ÐµÑ Ð¿Ñава на Ð¸Ñ Ð²Ñполнение, в ÑлÑÑае, когда они обÑаÑаÑÑÑÑ Ðº ÑеÑÑÑÑÑ nfs4.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1633">CVE-2009-1633</a> - - <p>Jeff Layton and Suresh Jayaraman fixed several buffer overflows in - - the CIFS filesystem which allow remote servers to cause memory - - corruption.</p></li> + <p>ÐжеÑÑ ÐÑйÑон и СÑÑÐµÑ ÐжайаÑаман иÑпÑавили неÑколÑко пеÑеполнений бÑÑеÑа в + Ñайловой ÑиÑÑеме CIFS, коÑоÑÑе позволÑли ÑдалÑннÑм ÑеÑвеÑам вÑзÑваÑÑ Ð¿Ð¾Ð²Ñеждение + ÑодеÑжимого памÑÑи.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-1758">CVE-2009-1758</a> - - <p>Jan Beulich discovered an issue in Xen where local guest users may - - cause a denial of service (oops).</p></li> + <p>Ян ÐÑÐ»Ð¸Ñ Ð¾Ð±Ð½Ð°ÑÑжил пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð² Xen, из-за коÑоÑой локалÑнÑе полÑзоваÑели гоÑÑевой + ÑиÑÑÐµÐ¼Ñ Ð¼Ð¾Ð³ÑÑ Ð²ÑзÑваÑÑ Ð¾Ñказ в обÑлÑживании (oops).</p></li> </ul> - -<p>This update also fixes a regression introduced by the fix for - -<a href="https://security-tracker.debian.org/tracker/CVE-2009-1184">CVE-2009-1184</a> - -in 2.6.26-15lenny3. This prevents a boot time panic on systems with SELinux - -enabled.</p> +<p>ÐÑоме Ñого, данное обновление иÑпÑавлÑÐµÑ ÑегÑеÑÑиÑ, пÑоÑвивÑÑÑÑÑ Ð¿Ð¾Ñле иÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ +<a href="https://security-tracker.debian.org/tracker/CVE-2009-1184">CVE-2009-1184</a> +в 2.6.26-15lenny3. ÐÑо иÑпÑавлÑÐµÑ Ð¿Ð°Ð½Ð¸ÐºÑ ÑдÑа во вÑÐµÐ¼Ñ Ð·Ð°Ð³ÑÑзки на ÑиÑÑÐµÐ¼Ð°Ñ Ñ +вклÑÑÑннÑм SELinux.</p> - -<p>For the oldstable distribution (etch), these problems, where - -applicable, will be fixed in future updates to linux-2.6 and +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ (еÑли они имеÑÑ +меÑÑо) бÑдÑÑ Ð¸ÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² бÑдÑÑÐ¸Ñ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸ÑÑ Ð¿Ð°ÐºÐµÑов linux-2.6 и linux-2.6.24.</p> - -<p>For the stable distribution (lenny), these problems have been fixed in - -version 2.6.26-15lenny3.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (lenny) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 2.6.26-15lenny3.</p> - -<p>We recommend that you upgrade your linux-2.6 and user-mode-linux - -packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ linux-2.6 и +user-mode-linux.</p> - -<p>Note: Debian carefully tracks all known security issues across every - -linux kernel package in all releases under active security support. - -However, given the high frequency at which low-severity security - -issues are discovered in the kernel and the resource requirements of - -doing an update, updates for lower priority issues will normally not - -be released for all kernels at the same time. Rather, they will be - -released in a staggered or "leap-frog" fashion.</p> +<p>Ðнимание: Debian ÑÑаÑелÑно оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð²Ñе извеÑÑнÑе пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи во вÑÐµÑ +пакеÑÐ°Ñ Ñ ÑдÑом linux во вÑÐµÑ Ð²ÑпÑÑÐºÐ°Ñ , Ð´Ð»Ñ ÐºÐ¾ÑоÑÑÑ Ð¿ÑедоÑÑавлÑеÑÑÑ Ð¿Ð¾Ð´Ð´ÐµÑжка безопаÑноÑÑи. +Тем не менее, ÑÑиÑÑÐ²Ð°Ñ Ð²ÑÑокÑÑ ÑаÑÑоÑÑ Ñ ÐºÐ¾ÑоÑой обнаÑÑживаÑÑÑÑ ÑÑзвимоÑÑи низкой ÑÑепени +ÑеÑÑÑзноÑÑи, а Ñакже ÑеÑÑÑÑнÑе ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ Ð¿Ð¾Ð´Ð³Ð¾Ñовки обновлениÑ, Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿Ñоблем, +имеÑÑÐ¸Ñ Ð½Ð¸Ð·ÐºÐ¸Ð¹ пÑиоÑиÑеÑ, обÑÑно не вÑпÑÑкаÑÑÑÑ Ð´Ð»Ñ Ð²ÑÐµÑ ÑдÑе одновÑеменно. СкоÑее они +бÑдÑÑ Ð²ÑпÑÑкаÑÑÑÑ Ð² ÑÐ°Ñ Ð¼Ð°Ñном поÑÑдке или в поÑÑдке ÑÐµÑ Ð°ÑдÑ.</p> </define-tag> # do not modify the following line #include "$(ENGLISHDIR)/security/2009/dsa-1809.data" - -# $Id: dsa-1809.wml,v 1.3 2014/04/30 07:16:19 pabs Exp $ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlq539wACgkQXudu4gIW 0qWq/g//erSCwYIZOj5rQxnCLj1nCCPazbLrkvqW6ZwWx35gyGsG7ieMx3Q95VJq L4aAVZjWKEIfdsSfe05Hc1cBNBGrWCfHDvm4n+I8yOPCRe5Wlt4fRewolRzbHroA iCk+sTZLCbfczYLUKxqSj39uZExEAUXKEA6wRLMhUfsBrXHqF4KB5B+9rHeiyM6T YHObghFS1lWBcB+iFzrQZT5fAEz2oSrFvBDMy3CJ3G6nUE9XKQaMYdELWkLkRrQ7 RuDSpEOSP9ViaoynXR5SudD1Lsr2gPUzI6tnCZHyqOdxXF3RX2QjmgVBoy3xK1Nt g2kJWUyoUKYn/obyFyeJ18pdmjlAM6zUPd4dgmfis5A5OE+0xPA+OenyfdVhxI1h z2n1DqAPk0bwZwkwfxz+14rgUGNwWgR6Wbxv8kPzWW3492t+EMtkxFQoobfWOrMA pNM9Lz9QIZEOP94yE9tv9BZajLngMK6emPjmhGsUeabZRuzr75CCHJn/ZhiZm3N4 WQCZ0CjsU+DN1oPWx16XpGrFbXmS5f6pDMkb56WytgpYtkNxvVElRnDM1KZ9aY2W ObX5n6rRSq9zzzpK59AUwn2+GLN0YDvo752tj6SOYShrPXO4uV7lgL6pxhOKdoOZ 7NoCxOowt+yZWcPF72DEWnK6O8ETpYBiMhE8DX38rA9eYXJ8qL0= =rgyd -----END PGP SIGNATURE-----