--- ../../english/security/2018/dsa-4266.wml 2018-08-07 01:19:15.470020918 +0500 +++ 2018/dsa-4266.wml 2018-08-07 01:29:13.102769752 +0500 @@ -1,36 +1,37 @@ -<define-tag description>security update</define-tag> +#use wml::debian::translation-check translation="f8f2f9257e00f87b05dddb078027f5189f09138f" mindelta="1" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи</define-tag> <define-tag moreinfo> -<p>Several vulnerabilities have been discovered in the Linux kernel that -may lead to a privilege escalation or denial of service.</p> +<p>Ð ÑдÑе Linux бÑло обнаÑÑжено неÑколÑко ÑÑзвимоÑÑей, коÑоÑÑе могÑÑ +пÑиводиÑÑ Ðº повÑÑÐµÐ½Ð¸Ñ Ð¿Ñивилегий или оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании.</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5390">CVE-2018-5390</a> - <p>Juha-Matti Tilli discovered that a remote attacker can trigger the - worst case code paths for TCP stream reassembly with low rates of - specially crafted packets leading to remote denial of service.</p></li> + <p>Ð®Ñ Ð°-ÐаÑÑи Тилли обнаÑÑжил, ÑÑо ÑдалÑннÑй злоÑмÑÑленник Ð¼Ð¾Ð¶ÐµÑ Ð²ÑзваÑÑ Ð¾Ð±ÑабоÑÐºÑ + Ñ ÑдÑего кода Ð´Ð»Ñ Ð¿Ð¾Ð²ÑоÑной ÑбоÑки поÑока TCP Ñ Ð½Ð¸Ð·ÐºÐ¾Ð¹ ÑкоÑоÑÑÑÑ Ð´Ð»Ñ ÑпеÑиалÑно + ÑÑоÑмиÑованнÑÑ Ð¿Ð°ÐºÐµÑов, ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº ÑдалÑÐ½Ð½Ð¾Ð¼Ñ Ð¾ÑÐºÐ°Ð·Ñ Ð² обÑлÑживании.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-13405">CVE-2018-13405</a> - <p>Jann Horn discovered that the inode_init_owner function in - fs/inode.c in the Linux kernel allows local users to create files - with an unintended group ownership allowing attackers to escalate - privileges by making a plain file executable and SGID.</p></li> + <p>Янн ХоÑн обнаÑÑжил, ÑÑо ÑÑнкÑÐ¸Ñ inode_init_owner в Ñайле + fs/inode.c в ÑдÑе Linux позволÑÐµÑ Ð»Ð¾ÐºÐ°Ð»ÑнÑм полÑзоваÑелÑм ÑоздаваÑÑ ÑÐ°Ð¹Ð»Ñ + Ñ Ð½ÐµÐ¿ÑеднамеÑеннÑм гÑÑпповÑм владением, позволÑÑ Ð·Ð»Ð¾ÑмÑÑленникам повÑÑаÑÑ + пÑивилегии, Ð´ÐµÐ»Ð°Ñ Ð¾Ð±ÑÑнÑй Ñайл иÑполнÑемÑм, и добавлÑÑ ÐµÐ¼Ñ Ñлаг SGID.</p></li> </ul> -<p>For the stable distribution (stretch), these problems have been fixed in -version 4.9.110-3+deb9u1. This update includes fixes for several -regressions in the latest point release.</p> - -<p>We recommend that you upgrade your linux packages.</p> - -<p>For the detailed security status of linux please refer to its security -tracker page at: -<a href="https://security-tracker.debian.org/tracker/linux">https://security-tracker.debian.org/tracker/linux</a></p> +<p>Ð ÑÑабилÑном вÑпÑÑке (stretch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 4.9.110-3+deb9u1. Ðанное обновление вклÑÑÐ°ÐµÑ Ð² ÑÐµÐ±Ñ Ð¸ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð»Ñ +неÑколÑÐºÐ¸Ñ ÑегÑеÑÑий, пÑоÑвивÑÐ¸Ñ ÑÑ Ð² поÑледней ÑедакÑии.</p> + +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ linux.</p> + +<p>С подÑобнÑм ÑÑаÑÑÑом поддеÑжки безопаÑноÑÑи linux можно ознакомиÑÑÑÑ Ð½Ð° +ÑооÑвеÑÑÑвÑÑÑей ÑÑÑаниÑе оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи по адÑеÑÑ +<a href="https://security-tracker.debian.org/tracker/linux">\ +https://security-tracker.debian.org/tracker/linux</a></p> </define-tag> # do not modify the following line #include "$(ENGLISHDIR)/security/2018/dsa-4266.data" -# $Id: $