[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2016/dla-{387,412,439}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dla-387.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-387.wml	2016-04-17 19:03:37.626158409 +0500
@@ -1,50 +1,51 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>The Qualys Security team discovered two vulnerabilities in the roaming
- -code of the OpenSSH client (an implementation of the SSH protocol
- -suite).</p>
- -
- -<p>SSH roaming enables a client, in case an SSH connection breaks
- -unexpectedly, to resume it at a later time, provided the server also
- -supports it.</p>
- -
- -<p>The OpenSSH server doesn't support roaming, but the OpenSSH client
- -supports it (even though it's not documented) and it's enabled by
- -default.</p>
+<p>Ð?оманда Qualys Security обнаÑ?Ñ?жила две Ñ?Ñ?звимоÑ?Ñ?и в коде авÑ?омаÑ?иÑ?еÑ?кой наÑ?Ñ?Ñ?ойки
+Ñ?еÑ?и в клиенÑ?е OpenSSH (Ñ?еализаÑ?ии набоÑ?а пÑ?оÑ?околов
+SSH).</p>
+
+<p>Ð?вÑ?омаÑ?иÑ?еÑ?каÑ? наÑ?Ñ?Ñ?ойка Ñ?еÑ?и SSH позволÑ?еÑ? клиенÑ?Ñ? в Ñ?лÑ?Ñ?аÑ?Ñ?, когда SSH-Ñ?оединение
+пÑ?еÑ?Ñ?ваеÑ?Ñ?Ñ? неожиданно, воÑ?Ñ?Ñ?анавливаÑ?Ñ? его пÑ?и Ñ?Ñ?ловии Ñ?ого, Ñ?Ñ?о Ñ?еÑ?веÑ? Ñ?оже
+поддеÑ?живаеÑ? Ñ?Ñ?Ñ? возможноÑ?Ñ?Ñ?.</p>
+
+<p>СеÑ?веÑ? OpenSSH не поддеÑ?живаеÑ? авÑ?омаÑ?иÑ?еÑ?кÑ?Ñ? наÑ?Ñ?Ñ?ойкÑ? Ñ?еÑ?и, а клиенÑ? OpenSSH
+поддеÑ?живаеÑ? Ñ?Ñ?Ñ? возможноÑ?Ñ?Ñ? (даже неÑ?моÑ?Ñ?Ñ? на Ñ?о, Ñ?Ñ?о она не опиÑ?ана в докÑ?менÑ?аÑ?ии), в клиенÑ?е
+она вклÑ?Ñ?ена по Ñ?молÑ?аниÑ?.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0777";>CVE-2016-0777</a>
 
- -    <p>An information leak (memory disclosure) can be exploited by a rogue
- -    SSH server to trick a client into leaking sensitive data from the
- -    client memory, including for example private keys.</p></li>
+    <p>УÑ?еÑ?ка инÑ?оÑ?маÑ?ии (Ñ?аÑ?кÑ?Ñ?Ñ?ие Ñ?одеÑ?жимого памÑ?Ñ?и) можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? SSH-Ñ?еÑ?веÑ?ом
+    злоÑ?мÑ?Ñ?ленника длÑ? Ñ?ого, Ñ?Ñ?обÑ? клиенÑ? пеÑ?едал Ñ?Ñ?вÑ?Ñ?виÑ?елÑ?нÑ?е даннÑ?е из
+    клиенÑ?Ñ?кой памÑ?Ñ?и, вклÑ?Ñ?аÑ? закÑ?Ñ?Ñ?Ñ?е клÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0778";>CVE-2016-0778</a>
 
- -    <p>A buffer overflow (leading to file descriptor leak), can also be
- -    exploited by a rogue SSH server, but due to another bug in the code
- -    is possibly not exploitable, and only under certain conditions (not
- -    the default configuration), when using ProxyCommand, ForwardAgent or
+    <p>Ð?еÑ?еполнение бÑ?Ñ?еÑ?а (пÑ?иводÑ?Ñ?ее к Ñ?Ñ?еÑ?ке Ñ?айловÑ?Ñ? деÑ?кÑ?ипÑ?оÑ?ов) можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? SSH-Ñ?еÑ?веÑ?ом злоÑ?мÑ?Ñ?ленника, но из-за дÑ?Ñ?гой оÑ?ибки в коде
+    оно, веÑ?оÑ?Ñ?но, можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?олÑ?ко пÑ?и опÑ?еделÑ?ннÑ?Ñ? Ñ?Ñ?ловиÑ?Ñ? (не
+    пÑ?и наÑ?Ñ?Ñ?ойкаÑ? по Ñ?молÑ?аниÑ?) пÑ?и иÑ?полÑ?зовании ProxyCommand, ForwardAgent или
     ForwardX11.</p></li>
 
 </ul>
 
- -<p>This security update completely disables the roaming code in the OpenSSH
- -client.</p>
+<p>Ð?анное обновление безопаÑ?ноÑ?Ñ?и полноÑ?Ñ?Ñ?Ñ? оÑ?клÑ?Ñ?аеÑ? код авÑ?омаÑ?иÑ?еÑ?кой наÑ?Ñ?Ñ?ойки Ñ?еÑ?и в
+клиенÑ?е OpenSSH.</p>
 
- -<p>It is also possible to disable roaming by adding the (undocumented)
- -option <q>UseRoaming no</q> to the global /etc/ssh/ssh_config file, or to the
- -user configuration in ~/.ssh/config, or by passing -oUseRoaming=no on
- -the command line.</p>
- -
- -<p>Users with passphrase-less privates keys, especially in non interactive
- -setups (automated jobs using ssh, scp, rsync+ssh etc.) are advised to
- -update their keys if they have connected to an SSH server they don't
- -trust.</p>
+<p>Ð?Ñ?оме Ñ?ого, авÑ?омаÑ?иÑ?еÑ?кÑ?Ñ? наÑ?Ñ?Ñ?ойкÑ? можно оÑ?клÑ?Ñ?иÑ?Ñ?, добавив (не опиÑ?аннÑ?Ñ? в докÑ?менÑ?аÑ?ии)
+опÑ?иÑ? <q>UseRoaming no</q> в глобалÑ?нÑ?й Ñ?айл /etc/ssh/ssh_config, либо в
+полÑ?зоваÑ?елÑ?Ñ?кие наÑ?Ñ?Ñ?ойки в ~/.ssh/config, либо пеÑ?едав -oUseRoaming=no
+в командной Ñ?Ñ?Ñ?окÑ?.</p>
+
+<p>Ð?олÑ?зоваÑ?елÑ?м, иÑ?полÑ?зÑ?Ñ?Ñ?им закÑ?Ñ?Ñ?Ñ?е клÑ?Ñ?и без паÑ?олей, оÑ?обенно пÑ?и неинÑ?еÑ?акÑ?ивной
+наÑ?Ñ?Ñ?ойке (авÑ?омаÑ?иÑ?еÑ?кие задаÑ?и, иÑ?полÑ?зÑ?Ñ?Ñ?ие ssh, scp, rsync+ssh и Ñ?. д.), Ñ?екомендÑ?еÑ?Ñ?Ñ?
+обновиÑ?Ñ? Ñ?вои клÑ?Ñ?и в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли они подклÑ?Ñ?алиÑ?Ñ? к SSH-Ñ?еÑ?веÑ?Ñ?, коÑ?оÑ?омÑ? они
+не довеÑ?Ñ?Ñ?Ñ?.</p>
 
- -<p>More details about identifying an attack and mitigations can be found in
- -the Qualys Security Advisory.</p>
+<p>Ð?ополниÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? об опÑ?еделении аÑ?ак Ñ?Ñ?ого вида и Ñ?Ñ?едÑ?Ñ?ваÑ? минимазаÑ?ии Ñ?иÑ?ков можно найÑ?и
+в Ñ?екомендаÑ?ии по безопаÑ?ноÑ?Ñ?и Qualys.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-412.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-412.wml	2016-04-17 19:13:06.556928051 +0500
@@ -1,51 +1,52 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>This update fixes the CVEs described below.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? опиÑ?аннÑ?е ниже CVE.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-7566";>CVE-2015-7566</a>
 
- -    <p>Ralf Spenneberg of OpenSource Security reported that the visor
- -    driver crashes when a specially crafted USB device without bulk-out
- -    endpoint is detected.</p></li>
+    <p>РалÑ?Ñ? ШпеннебеÑ?г из OpenSource Security Ñ?ообÑ?ил, Ñ?Ñ?о дÑ?айвеÑ? visor
+    аваÑ?ийно завеÑ?Ñ?аеÑ? Ñ?воÑ? Ñ?абоÑ?Ñ? пÑ?и обнаÑ?Ñ?жении Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованного Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?ва USB, не
+    имеÑ?Ñ?его конеÑ?ной Ñ?оÑ?ки пеÑ?едаÑ?и маÑ?Ñ?ива даннÑ?Ñ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8767";>CVE-2015-8767</a>
 
- -    <p>An SCTP denial-of-service was discovered which can be triggered by a
- -    local attacker during a heartbeat timeout event after the 4-way
- -    handshake.</p></li>
+    <p>Ð?Ñ?л обнаÑ?Ñ?жен оÑ?каз в обÑ?лÑ?живании SCTP, коÑ?оÑ?Ñ?й можеÑ? бÑ?Ñ?Ñ? вÑ?зван
+    локалÑ?нÑ?м злоÑ?мÑ?Ñ?ленником по вÑ?емÑ? Ñ?обÑ?Ñ?иÑ? Ñ?аймаÑ?Ñ?е длÑ? пеÑ?иодиÑ?еÑ?кого конÑ?Ñ?олÑ?ного Ñ?ообÑ?ениÑ? поÑ?ле
+    4-Ñ?Ñ?оÑ?оннего Ñ?Ñ?копожаÑ?иÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8785";>CVE-2015-8785</a>
 
- -    <p>It was discovered that local users permitted to write to a file on
- -    a FUSE filesystem could cause a denial of service (unkillable loop
- -    in the kernel).</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о локалÑ?нÑ?е полÑ?зоваÑ?ели, имеÑ?Ñ?ие пÑ?ава на запиÑ?Ñ? в Ñ?айл в
+    Ñ?айловой Ñ?иÑ?Ñ?еме FUSE, могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (Ñ?икл в Ñ?дÑ?е, коÑ?оÑ?Ñ?й
+    невозможно пÑ?инÑ?диÑ?елÑ?но завеÑ?Ñ?иÑ?Ñ?).</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0723";>CVE-2016-0723</a>
 
- -    <p>A use-after-free vulnerability was discovered in the TIOCGETD ioctl.
- -    A local attacker could use this flaw for denial-of-service.</p></li>
+    <p>Ð? TIOCGETD ioctl бÑ?ло обнаÑ?Ñ?жено иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и.
+    Ð?окалÑ?нÑ?й злоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2069";>CVE-2016-2069</a>
 
- -    <p>Andy Lutomirski discovered a race condition in flushing of the TLB
- -    when switching tasks.  On an SMP system this could possibly lead to
- -    a crash, information leak or privilege escalation.</p></li>
+    <p>Энди Ð?Ñ?Ñ?омиÑ?Ñ?ки обнаÑ?Ñ?жил Ñ?оÑ?Ñ?оÑ?ние гонки в коде длÑ? Ñ?бÑ?аÑ?Ñ?ваниÑ? TLB на диÑ?к
+    пÑ?и пеÑ?еклÑ?Ñ?ении задаÑ?.  Ð? Ñ?иÑ?Ñ?еме Ñ? SMP Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к
+    аваÑ?ийнÑ?м оÑ?Ñ?ановкам, Ñ?Ñ?еÑ?кам инÑ?оÑ?маÑ?ии или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 </ul>
 
- -<p>For the oldoldstable distribution (squeeze), these problems have been
- -fixed in version 2.6.32-48squeeze19.  Additionally, this version
- -includes upstream stable update 2.6.32.70.  This is the final update
- -to the linux-2.6 package for squeeze.</p>
- -
- -<p>For the oldstable distribution (wheezy), these problems will be fixed
- -soon.</p>
- -
- -<p>For the stable distribution (jessie), <a href="https://security-tracker.debian.org/tracker/CVE-2015-7566";>CVE-2015-7566</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8767";>CVE-2015-8767</a> and
- -<a href="https://security-tracker.debian.org/tracker/CVE-2016-0723";>CVE-2016-0723</a> were fixed in linux version 3.16.7-ckt20-1+deb8u3 and
- -the remaining problems will be fixed soon.</p>
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.6.32-48squeeze19.  Ð?Ñ?оме Ñ?ого, даннаÑ? веÑ?Ñ?иÑ?
+вклÑ?Ñ?аеÑ? в Ñ?ебÑ? Ñ?Ñ?абилÑ?ное обновление из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки, 2.6.32.70.  ЭÑ?о поÑ?леднее обновление
+пакеÑ?а linux-2.6 длÑ? squeeze.</p>
+
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ?
+позже.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) <a href="https://security-tracker.debian.org/tracker/CVE-2015-7566";>CVE-2015-7566</a>, <a href="https://security-tracker.debian.org/tracker/CVE-2015-8767";>CVE-2015-8767</a> и
+<a href="https://security-tracker.debian.org/tracker/CVE-2016-0723";>CVE-2016-0723</a> бÑ?ли иÑ?пÑ?авленÑ? в linux веÑ?Ñ?ии 3.16.7-ckt20-1+deb8u3, а
+оÑ?Ñ?алÑ?нÑ?е пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2016/dla-439.wml	2016-04-08 01:54:44.000000000 +0500
+++ russian/security/2016/dla-439.wml	2016-04-17 19:36:20.588576272 +0500
@@ -1,54 +1,55 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
 <define-tag moreinfo>
- -<p>This update fixes the CVEs described below.</p>
+<p>Ð?анное обновление иÑ?пÑ?авлÑ?еÑ? опиÑ?аннÑ?е ниже CVE.</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2015-8812";>CVE-2015-8812</a>
 
- -    <p>A flaw was found in the iw_cxgb3 Infiniband driver.  Whenever it
- -    could not send a packet because the network was congested, it
- -    would free the packet buffer but later attempt to send the packet
- -    again.  This use-after-free could result in a denial of service
- -    (crash or hang), data loss or privilege escalation.</p></li>
+    <p>Ð? дÑ?айвеÑ?е Infiniband iw_cxgb3 бÑ?ла обнаÑ?Ñ?жена Ñ?Ñ?звимоÑ?Ñ?Ñ?.  Ð?огда дÑ?айвеÑ?
+    не можеÑ? оÑ?пÑ?авиÑ?Ñ? пакеÑ? из-за пеÑ?егÑ?Ñ?зки Ñ?еÑ?и, он
+    оÑ?вобождаеÑ? пакеÑ?нÑ?й бÑ?Ñ?еÑ?, но заÑ?ем пÑ?Ñ?аеÑ?Ñ?Ñ? оÑ?пÑ?авиÑ?Ñ? Ñ?Ñ?оÑ? пакеÑ?
+    Ñ?нова.  ЭÑ?о иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и можеÑ? пÑ?иводиÑ?Ñ? к оÑ?казÑ?
+    в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка или завиÑ?ание), поÑ?еÑ?е даннÑ?Ñ? или повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-0774";>CVE-2016-0774</a>
 
- -    <p>It was found that the fix for <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805";>CVE-2015-1805</a> in kernel versions
- -    older than Linux 3.16 did not correctly handle the case of a
- -    partially failed atomic read.  A local, unprivileged user could
- -    use this flaw to crash the system or leak kernel memory to user
- -    space.</p></li>
+    <p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о иÑ?пÑ?авление длÑ? <a href="https://security-tracker.debian.org/tracker/CVE-2015-1805";>CVE-2015-1805</a> в веÑ?Ñ?иÑ?Ñ? Ñ?дÑ?а
+    Linux Ñ?Ñ?аÑ?ее 3.16 непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? Ñ?лÑ?Ñ?ай
+    Ñ?аÑ?Ñ?иÑ?но оÑ?ибоÑ?ного аÑ?омаÑ?ного Ñ?Ñ?ениÑ?.  Ð?окалÑ?нÑ?й непÑ?ивилегиÑ?ованнÑ?й полÑ?зоваÑ?елÑ? можеÑ?
+    иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?Ñ? Ñ?Ñ?звимоÑ?Ñ?Ñ? длÑ? аваÑ?ийного завеÑ?Ñ?ениÑ? Ñ?абоÑ?Ñ? Ñ?иÑ?Ñ?емÑ? или Ñ?Ñ?еÑ?ки Ñ?одеÑ?жимого памÑ?Ñ?и Ñ?дÑ?а в
+    пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?во полÑ?зоваÑ?елÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2384";>CVE-2016-2384</a>
 
- -    <p>Andrey Konovalov found that a USB MIDI device with an invalid USB
- -    descriptor could trigger a double-free.  This may be used by a
- -    physically present user for privilege escalation.</p></li>
+    <p>Ð?ндÑ?ей Ð?оновалов обнаÑ?Ñ?жил, Ñ?Ñ?о USB MIDI-Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?во Ñ? непÑ?авилÑ?нÑ?м
+    USB-деÑ?кÑ?ипÑ?оÑ?ом можеÑ? вÑ?зÑ?ваÑ?Ñ? двойное оÑ?вобождениÑ? памÑ?Ñ?и.  ЭÑ?о можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ?
+    полÑ?зоваÑ?елем, имеÑ?Ñ?им Ñ?изиÑ?еÑ?кий доÑ?Ñ?Ñ?п к Ñ?иÑ?Ñ?еме, длÑ? повÑ?Ñ?ениÑ? пÑ?ивилегий.</p></li>
 
 </ul>
 
- -<p>Additionally, it fixes some old security issues with no CVE ID:</p>
+<p>Ð?Ñ?оме Ñ?ого, обновление иÑ?пÑ?авлÑ?еÑ? некоÑ?оÑ?Ñ?е Ñ?Ñ?аÑ?Ñ?е пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и, не имеÑ?Ñ?ие иденÑ?иÑ?икаÑ?оÑ?а CVE:</p>
 
- -    <p>Several kernel APIs permitted reading or writing 2 GiB of data or
- -    more in a single chunk, which could lead to an integer overflow
- -    when applied to certain filesystems, socket or device types.  The
- -    full security impact has not been evaluated.</p>
- -
- -<p>Finally, it fixes a regression in 2.6.32-48squeeze17 that would cause
- -Samba to hang in some situations.</p>
- -
- -<p>For the oldoldstable distribution (squeeze), these problems have been
- -fixed in version 2.6.32-48squeeze20.  This is *really* the final
- -update to the linux-2.6 package for squeeze.</p>
- -
- -<p>For the oldstable distribution (wheezy), the kernel was not affected
- -by the integer overflow issues and the remaining problems will be
- -fixed in version 3.2.73-2+deb7u3.</p>
- -
- -<p>For the stable distribution (jessie), the kernel was not affected by
- -the integer overflow issues or <a href="https://security-tracker.debian.org/tracker/CVE-2016-0774";>CVE-2016-0774</a>, and the remaining
- -problems will be fixed in version 3.16.7-ckt20-1+deb8u4.</p>
+    <p>Ð?еÑ?колÑ?ко API Ñ?дÑ?а имеÑ?Ñ? пÑ?ава на Ñ?Ñ?ение или запиÑ?Ñ? 2 или более Ð?Ð? даннÑ?Ñ?
+    в виде одной Ñ?аÑ?Ñ?и, Ñ?Ñ?о можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в Ñ?лÑ?Ñ?ае,
+    Ñ?абоÑ?Ñ? Ñ? некоÑ?оÑ?Ñ?ми Ñ?айловÑ?ми Ñ?иÑ?Ñ?емами, Ñ?океÑ?ами или Ñ?ипами Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?в.  Ð?олноÑ?Ñ?Ñ?Ñ?
+    влиÑ?ние Ñ?Ñ?ой пÑ?облемÑ? на безопаÑ?ноÑ?Ñ?Ñ? иÑ?Ñ?ледовано не бÑ?ло.</p>
+
+<p>Ð?аконеÑ? Ñ?Ñ?о обновление иÑ?пÑ?авлÑ?еÑ? Ñ?егÑ?еÑ?Ñ? в веÑ?Ñ?ии 2.6.32-48squeeze17, коÑ?оÑ?Ñ?й в некоÑ?оÑ?Ñ?Ñ?
+Ñ?иÑ?Ñ?аÑ?иÑ?Ñ? пÑ?иводил к завиÑ?аниÑ? Samba.</p>
+
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?аÑ?ом Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (squeeze) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.6.32-48squeeze20.  ЭÑ?о *дейÑ?Ñ?виÑ?елÑ?но* поÑ?леднее
+обновление пакеÑ?а linux-2.6 длÑ? squeeze.</p>
+
+<p>Ð? пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (wheezy) Ñ?дÑ?о не подвеÑ?жено
+пÑ?облемам Ñ? пеÑ?еполнением Ñ?елÑ?Ñ? Ñ?иÑ?ел, а оÑ?Ñ?алÑ?нÑ?е пÑ?облемÑ? бÑ?дÑ?Ñ?
+иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.2.73-2+deb7u3.</p>
+
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?дÑ?о не подвеÑ?жено
+пÑ?облемам Ñ? пеÑ?еполнением Ñ?елÑ?Ñ? Ñ?иÑ?ел и <a href="https://security-tracker.debian.org/tracker/CVE-2016-0774";>CVE-2016-0774</a>, а оÑ?Ñ?алÑ?нÑ?е
+пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 3.16.7-ckt20-1+deb8u4.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=hAJp
-----END PGP SIGNATURE-----


Reply to: