-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2018/dsa-4133.wml 2018-03-08 03:19:27.000000000 +0500 +++ russian/security/2018/dsa-4133.wml 2018-03-08 10:35:44.318851365 +0500 @@ -1,46 +1,48 @@ - -<define-tag description>security update</define-tag> +#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been discovered in the ISC DHCP client, - -relay and server. The Common Vulnerabilities and Exposures project - -identifies the following issues:</p> +<p>Ð ISC, DHCP-клиенÑе, Ñзле и ÑеÑвеÑе, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures +опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2017-3144">CVE-2017-3144</a> - - <p>It was discovered that the DHCP server does not properly clean up - - closed OMAPI connections, which can lead to exhaustion of the pool - - of socket descriptors available to the DHCP server, resulting in - - denial of service.</p></li> + <p>ÐÑло обнаÑÑжено, ÑÑо DHCP-ÑеÑÐ²ÐµÑ Ð½ÐµÐ¿ÑавилÑно вÑполнÑÐµÑ Ð¾ÑиÑÑÐºÑ + закÑÑÑÑÑ OMAPI-Ñоединений, ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº иÑÑеÑÐ¿Ð°Ð½Ð¸Ñ Ð¿Ñла + деÑкÑипÑоÑов ÑокеÑов, доÑÑÑпнÑÑ DHCP-ÑеÑвеÑÑ, ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº + оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5732">CVE-2018-5732</a> - - <p>Felix Wilhelm of the Google Security Team discovered that the DHCP - - client is prone to an out-of-bound memory access vulnerability when - - processing specially constructed DHCP options responses, resulting - - in potential execution of arbitrary code by a malicious DHCP server.</p></li> + <p>Ð¤ÐµÐ»Ð¸ÐºÑ ÐилÑгелÑм из Google Security Team обнаÑÑжил, ÑÑо DHCP-ÐºÐ»Ð¸ÐµÐ½Ñ + ÑодеÑÐ¶Ð¸Ñ Ð¾ÑибкÑ, пÑиводÑÑÑÑ Ðº обÑаÑÐµÐ½Ð¸Ñ Ð·Ð° пÑÐµÐ´ÐµÐ»Ñ Ð²Ñделенного бÑÑеÑа памÑÑи пÑи + обÑабоÑке ÑпеÑиалÑно ÑÑоÑмиÑованнÑÑ DHCP-оÑвеÑов, ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº ÑомÑ, ÑÑо DHCP-ÑеÑÐ²ÐµÑ + злоÑмÑÑленника Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾ÑенÑиалÑно вÑполниÑÑ Ð¿ÑоизволÑнÑй код.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5733">CVE-2018-5733</a> - - <p>Felix Wilhelm of the Google Security Team discovered that the DHCP - - server does not properly handle reference counting when processing - - client requests. A malicious client can take advantage of this flaw - - to cause a denial of service (dhcpd crash) by sending large amounts - - of traffic.</p></li> + <p>Ð¤ÐµÐ»Ð¸ÐºÑ ÐилÑгелÑм из Google Security Team обнаÑÑжил, ÑÑо DHCP-ÑеÑÐ²ÐµÑ + непÑавилÑно обÑабаÑÑÐ²Ð°ÐµÑ Ð¿Ð¾Ð´ÑÑÑÑ ÑÑÑлок пÑи обÑабоÑке клиенÑÑÐºÐ¸Ñ + запÑоÑов. DHCP-ÐºÐ»Ð¸ÐµÐ½Ñ Ð·Ð»Ð¾ÑмÑÑленника Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполÑзоваÑÑ ÑÑÑ ÑÑзвимоÑÑÑ + Ð´Ð»Ñ Ð²Ñзова оÑказа в обÑлÑживании (аваÑÐ¸Ð¹Ð½Ð°Ñ Ð¾ÑÑановка dhcpd) пÑÑÑм оÑпÑавки + болÑÑого колиÑеÑÑва ÑÑаÑика.</p></li> </ul> - -<p>For the oldstable distribution (jessie), these problems have been fixed - -in version 4.3.1-6+deb8u3.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (jessie) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ +в веÑÑии 4.3.1-6+deb8u3.</p> - -<p>For the stable distribution (stretch), these problems have been fixed in - -version 4.3.5-3+deb9u1.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (stretch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 4.3.5-3+deb9u1.</p> - -<p>We recommend that you upgrade your isc-dhcp packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ isc-dhcp.</p> - -<p>For the detailed security status of isc-dhcp please refer to its - -security tracker page at: - -<a href="https://security-tracker.debian.org/tracker/isc-dhcp">https://security-tracker.debian.org/tracker/isc-dhcp</a></p> +<p>С подÑобнÑм ÑÑаÑÑÑом поддеÑжки безопаÑноÑÑи isc-dhcp можно ознакомиÑÑÑÑ Ð½Ð° +ÑооÑвеÑÑÑвÑÑÑей ÑÑÑаниÑе оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи по адÑеÑÑ +<a href="https://security-tracker.debian.org/tracker/isc-dhcp">\ +https://security-tracker.debian.org/tracker/isc-dhcp</a></p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlqgy7wACgkQXudu4gIW 0qXi6RAAr3v5UFVI2reuqsvE1zPXBPWawS6hW5HvXns+VVNTI1VhTlzPXss18s7M bc8mmhIsA1PG/4vGYvDJKVgTDTtlEnz/4NLdZWkBPAJ1Xbknxjyuh3KdyulZO+ao //dOv9nrRPMIreiH7QT0k4r3lTe6F/l8JbDKje9C27spSGlr4+sUwp4mf8hUFhNd NKiDISDCmUcFtlJnVLkjSR7ApuwmikZJZ1XYScLd7FHrKY5VZDAdizjblH5Octa2 nKon07SRIN53kWk3K6awnHHlg+eZncFt+fzWi2A2lueq9z9HLk8t7kftGmqtN2pt XrFwHwbOVHRitI+ucg9mV9Hf3sbyvtTb6HrMGPfOFzKYaBdI/2vucojgSeniUB+d PVuGyH+uuxlltM2hVmqAvyq0La0WaEKHuUREKnK/Px6Kxh4fKXP3w1wmlKcjiT9j w0R4CV2vx4LYgdrGNv/Y33uJ3sUhZJRFdXeYN6Igt3zI/cKhwsBoG/3faDzBnO8l R9Z5lnQekuGnd/Ww1U22ku8bu3QRurVPyqHgZOKEjlS3Pv2Z+e87mL5WZFwhS2yP iwKOT446m9S7YQFGI8KRl4bL1fNZWddprG6hxjLIv9IMZQ+Hnb7vcdUQdes+D9mj e5Ngjg5ugK998Me2THs1vITruVJ0y3KVWV7GCsN7m9bozotPTE0= =EMGR -----END PGP SIGNATURE-----