[DONE] wml://{security/2015/dla-247.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2015/dla-247.wml 2016-04-08 01:24:54.000000000 +0500
+++ russian/security/2015/dla-247.wml 2016-05-12 23:16:25.642042735 +0500
@@ -1,50 +1,51 @@
- -<define-tag description>LTS security update</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и LTS</define-tag>
<define-tag moreinfo>
- -<p>Multiple vulnerabilities were discovered in OpenSSL, a Secure Sockets
- -Layer toolkit.</p>
+<p>Ð? OpenSSL, набоÑ?е инÑ?Ñ?Ñ?Ñ?менÑ?ов Secure Sockets Layer, бÑ?ли обнаÑ?Ñ?женÑ?
+многоÑ?иÑ?леннÑ?е Ñ?Ñ?звимоÑ?Ñ?и.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2014-8176">CVE-2014-8176</a>
- - <p>Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered
- - that an invalid memory free could be triggered when buffering DTLS
- - data. This could allow remote attackers to cause a denial of service
- - (crash) or potentially execute arbitrary code. This issue only
- - affected the oldstable distribution (wheezy).</p></li>
+ <p>Ð?Ñ?авеен Ð?аÑ?иÑ?наÑ?алли, Ð?йван ФÑ?аÑ?Ñ?ик и ФеликÑ? Ð?Ñ?Ñ?беÑ?Ñ? обнаÑ?Ñ?жили,
+ Ñ?Ñ?о можеÑ? пÑ?оиÑ?Ñ?одиÑ?Ñ? некоÑ?Ñ?екÑ?ное оÑ?вобождение памÑ?Ñ?и пÑ?и бÑ?Ñ?еÑ?изаÑ?ии
+ даннÑ?Ñ? DTLS. ÐÑ?о можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании
+ (аваÑ?ийнаÑ? оÑ?Ñ?ановка) или поÑ?енÑ?иалÑ?но вÑ?полниÑ?Ñ? пÑ?оизволÑ?нÑ?й код. ÐÑ?а пÑ?облема каÑ?аеÑ?Ñ?Ñ?
+ Ñ?олÑ?ко пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (wheezy).</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1789">CVE-2015-1789</a>
- - <p>Robert Swiecki and Hanno Böck discovered that the X509_cmp_time
- - function could read a few bytes out of bounds. This could allow remote
- - attackers to cause a denial of service (crash) via crafted
- - certificates and CRLs.</p></li>
+ <p>РобеÑ?Ñ? Свики и Ханно Ð?Ñ?к обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?Ñ?нкÑ?иÑ? X509_cmp_time можеÑ? Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ?
+ неÑ?колÑ?ко байÑ? за гÑ?аниÑ?ами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и. ÐÑ?о можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м
+ злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но
+ Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? Ñ?еÑ?Ñ?иÑ?икаÑ?ов и CRL.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1790">CVE-2015-1790</a>
- - <p>Michal Zalewski discovered that the PKCS#7 parsing code did not
- - properly handle missing content which could lead to a NULL pointer
- - dereference. This could allow remote attackers to cause a denial of
- - service (crash) via crafted ASN.1-encoded PKCS#7 blobs.</p></li>
+ <p>Ð?иÑ?ал Ð?алевÑ?ки обнаÑ?Ñ?жил, Ñ?Ñ?о код длÑ? вÑ?полнениÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а PKCS#7
+ непÑ?авилÑ?но обÑ?абаÑ?Ñ?ваеÑ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?ее Ñ?одеÑ?жимое, Ñ?Ñ?о пÑ?иводиÑ? к Ñ?азÑ?менованиÑ?
+ NULL-Ñ?казаÑ?елÑ?. ÐÑ?о можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?Ñ? злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ? оÑ?каз в
+ обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка) пÑ?и помоÑ?и Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? закодиÑ?ованнÑ?Ñ? Ñ? помоÑ?Ñ?Ñ? ASN.1 двоиÑ?нÑ?Ñ? даннÑ?Ñ? PKCS#7.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1791">CVE-2015-1791</a>
- - <p>Emilia Käsper discovered that a race condition could occur due to
- - incorrect handling of NewSessionTicket in a multi-threaded client,
- - leading to a double free. This could allow remote attackers to cause
- - a denial of service (crash).</p></li>
+ <p>ÐмилиÑ? Ð?Ñ?Ñ?пеÑ? обнаÑ?Ñ?жила, Ñ?Ñ?о из-за некоÑ?Ñ?екÑ?ной обÑ?абоÑ?ки NewSessionTicket в многопоÑ?оÑ?ном
+ клиенÑ?е можеÑ? возникаÑ?Ñ? Ñ?оÑ?Ñ?оÑ?ние гонки, коÑ?оÑ?ое
+ пÑ?иводиÑ? к двойномÑ? оÑ?вобождениÑ? памÑ?Ñ?и. ÐÑ?о можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ?
+ оÑ?каз в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка).</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2015-1792">CVE-2015-1792</a>
- - <p>Johannes Bauer discovered that the CMS code could enter an infinite
- - loop when verifying a signedData message, if presented with an
- - unknown hash function OID. This could allow remote attackers to cause
- - a denial of service.</p></li>
+ <p>Ð?оÑ?аннеÑ? Ð?аÑ?еÑ? обнаÑ?Ñ?жил, Ñ?Ñ?о код CMS можеÑ? войÑ?и в беÑ?конеÑ?нÑ?й
+ Ñ?икл пÑ?и пÑ?овеÑ?ке Ñ?ообÑ?ениÑ? signedData в Ñ?ом Ñ?лÑ?Ñ?ае, еÑ?ли емÑ? попадаеÑ?Ñ?Ñ?
+ неизвеÑ?Ñ?нÑ?й OID Ñ?еÑ?-Ñ?Ñ?нкÑ?ии. ÐÑ?о можеÑ? позволиÑ?Ñ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?зваÑ?Ñ?
+ оÑ?каз в обÑ?лÑ?живании.</p></li>
</ul>
- -<p>Additionally OpenSSL will now reject handshakes using DH parameters
- -shorter than 768 bits as a countermeasure against the Logjam attack
+<p>Ð?Ñ?оме Ñ?ого, OpenSSL Ñ?епеÑ?Ñ? оÑ?клонÑ?еÑ? Ñ?Ñ?копожаÑ?иÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?ие паÑ?амеÑ?Ñ?Ñ? DH
+коÑ?оÑ?е 768 биÑ?, Ñ?Ñ?о Ñ?влÑ?еÑ?Ñ?Ñ? конÑ?Ñ?меÑ?ой аÑ?аке Logjam
(<a href="https://security-tracker.debian.org/tracker/CVE-2015-4000">CVE-2015-4000</a>).</p>
</define-tag>
-----BEGIN PGP SIGNATURE-----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=qHhh
-----END PGP SIGNATURE-----
Reply to: