[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2008/dsa-16{6,2}7.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1627.wml	2008-08-31 16:40:20.000000000 +0600
+++ russian/security/2008/dsa-1627.wml	2016-09-21 01:19:32.542634586 +0500
@@ -1,35 +1,36 @@
- -<define-tag description>programming error</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>оÑ?ибка пÑ?огÑ?аммиÑ?ованиÑ?</define-tag>
 <define-tag moreinfo>
- -<p>Chaskiel M Grundman discovered that opensc, a library and utilities to
- -handle smart cards, would initialise smart cards with the Siemens CardOS M4
- -card operating system without proper access rights. This allowed everyone
- -to change the card's PIN.</p>
- -
- -<p>With this bug anyone can change a user PIN without having the PIN or PUK
- -or the superusers PIN or PUK. However it can not be used to figure out the
- -PIN. If the PIN on your card is still the same you always had, there's a
- -reasonable chance that this vulnerability has not been exploited.</p>
- -
- -<p>This vulnerability affects only smart cards and USB crypto tokens based on
- -Siemens CardOS M4, and within that group only those that were initialised
- -with OpenSC. Users of other smart cards and USB crypto tokens, or cards
- -that have been initialised with some software other than OpenSC, are not
- -affected.</p>
+<p>ХаÑ?келÑ? Ð?Ñ?Ñ?ндман обнаÑ?Ñ?жил, Ñ?Ñ?о opensc, библиоÑ?ека и Ñ?Ñ?илиÑ?Ñ? длÑ?
+Ñ?абоÑ?Ñ? Ñ?о Ñ?маÑ?Ñ?-каÑ?Ñ?ами, иниÑ?иализиÑ?Ñ?Ñ?Ñ? Ñ?маÑ?Ñ?-каÑ?Ñ?Ñ? Ñ? каÑ?Ñ?оÑ?ной опеÑ?аÑ?ионной
+Ñ?иÑ?Ñ?емой Siemens CardOS M4 без Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ? пÑ?ав доÑ?Ñ?Ñ?па. ЭÑ?о позволÑ?еÑ? вÑ?ем
+полÑ?зоваÑ?елÑ?м изменÑ?Ñ?Ñ? PIN каÑ?Ñ?Ñ?.</p>
+
+<p>Ð?Ñ?полÑ?зÑ?Ñ? Ñ?Ñ?Ñ? оÑ?ибкÑ?, вÑ?Ñ?кий можеÑ? измениÑ?Ñ? PIN полÑ?зоваÑ?елÑ?, не имеÑ? Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?иÑ?
+PIN или PUK, либо PIN или PUK Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?. Тем не менее, Ñ?Ñ?а оÑ?ибка не можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ?
+опÑ?еделениÑ? PIN. Ð?Ñ?ли PIN на ваÑ?ей каÑ?Ñ?е Ñ?оÑ? же, Ñ?о Ñ?коÑ?ее вÑ?его
+Ñ?Ñ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? пÑ?оÑ?ив ваÑ? не бÑ?ла иÑ?полÑ?зована.</p>
+
+<p>ЭÑ?а Ñ?Ñ?звимоÑ?Ñ?Ñ? каÑ?аеÑ?Ñ?Ñ? Ñ?олÑ?ко Ñ?маÑ?Ñ?-каÑ?Ñ? и USB-Ñ?окенов Ñ?иÑ?Ñ?ованиÑ? на оÑ?нове
+Siemens CardOS M4, а к Ñ?Ñ?ой гÑ?Ñ?ппе Ñ?олÑ?ко Ñ?еÑ?, коÑ?оÑ?Ñ?е иниÑ?иализиÑ?Ñ?Ñ?Ñ?Ñ?Ñ?
+Ñ? помоÑ?Ñ?Ñ? OpenSC. Ð?олÑ?зоваÑ?ели дÑ?Ñ?гиÑ? Ñ?маÑ?Ñ?-каÑ?Ñ? и USB-Ñ?окенов Ñ?иÑ?Ñ?ованиÑ?, либо каÑ?Ñ?,
+коÑ?оÑ?Ñ?е иниÑ?иализиÑ?Ñ?Ñ?Ñ?Ñ?Ñ? Ñ? оÑ?лиÑ?нÑ?м оÑ? OpenSC Ð?Ð?, не подвеÑ?женÑ? Ñ?Ñ?ой
+Ñ?Ñ?звимоÑ?Ñ?и.</p>
 
- -<p>After upgrading the package, running
+<p>Ð?оÑ?ле обновлениÑ? пакеÑ?а запÑ?Ñ?к командÑ?
 <code>pkcs15-tool&nbsp;-T</code>
- -will show you whether the card is fine or vulnerable. If the card is
- -vulnerable, you need to update the security setting using:
+покажеÑ? вам, Ñ?Ñ?звима ли ваÑ?а каÑ?Ñ?а. Ð?Ñ?ли каÑ?Ñ?а
+Ñ?Ñ?звима, Ñ?о вам нÑ?жно обновиÑ?Ñ? наÑ?Ñ?Ñ?ойки безопаÑ?ноÑ?Ñ?и, иÑ?полÑ?зÑ?Ñ? Ñ?ледÑ?Ñ?Ñ?Ñ?Ñ? командÑ?:
 <code>pkcs15-tool&nbsp;-T&nbsp;-U</code>.</p>
 
- -<p>For the stable distribution (etch), this problem has been fixed in
- -version 0.11.1-2etch2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.11.1-2etch2.</p>
 
- -<p>For the unstable distribution (sid), this problem has been fixed in
- -version 0.11.4-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 0.11.4-5.</p>
 
- -<p>We recommend that you upgrade your opensc package and check
- -your card(s) with the command described above.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? opensc и пÑ?овеÑ?иÑ?Ñ?
+ваÑ?Ñ? каÑ?Ñ?Ñ?/ваÑ?и каÑ?Ñ?Ñ? Ñ? помоÑ?Ñ?Ñ? опиÑ?анной вÑ?Ñ?е командÑ?.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2008/dsa-1667.wml	2014-04-30 13:16:16.000000000 +0600
+++ russian/security/2008/dsa-1667.wml	2016-09-21 01:11:24.777227601 +0500
@@ -1,42 +1,43 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities have been discovered in the interpreter for the
- -Python language. The Common Vulnerabilities and Exposures project
- -identifies the following problems:</p>
+<p>Ð? инÑ?еÑ?пÑ?еÑ?аÑ?оÑ?е Ñ?зÑ?ка Python бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures
+опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-2315";>CVE-2008-2315</a>
 
- -    <p>David Remahl discovered several integer overflows in the
- -    stringobject, unicodeobject,  bufferobject, longobject,
- -    tupleobject, stropmodule, gcmodule, and mmapmodule modules.</p></li>
+    <p>Ð?авид РемалÑ? обнаÑ?Ñ?жил неÑ?колÑ?ко пеÑ?еполнений Ñ?елÑ?Ñ? Ñ?иÑ?ел в
+    модÑ?лÑ?Ñ? stringobject, unicodeobject,  bufferobject, longobject,
+    tupleobject, stropmodule, gcmodule и mmapmodule.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3142";>CVE-2008-3142</a>
 
- -    <p>Justin Ferguson discovered that incorrect memory allocation in
- -    the unicode_resize() function can lead to buffer overflows.</p></li>
+    <p>Ð?жаÑ?Ñ?ин ФеÑ?гÑ?Ñ?он обнаÑ?Ñ?жил, Ñ?Ñ?о некоÑ?Ñ?екÑ?ное вÑ?деление памÑ?Ñ?и в
+    Ñ?Ñ?нкÑ?ии unicode_resize() можеÑ? пÑ?иводиÑ?Ñ? к пеÑ?еполнениÑ?м бÑ?Ñ?еÑ?а.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3143";>CVE-2008-3143</a>
- - 
- -    <p>Several integer overflows were discovered in various Python core
- -    modules.</p></li>
+
+    <p>Ð? Ñ?азлиÑ?нÑ?Ñ? базовÑ?Ñ? модÑ?лÑ?Ñ? Python бÑ?ли обнаÑ?Ñ?женÑ? пеÑ?еполнениÑ?
+    Ñ?елÑ?Ñ? Ñ?иÑ?ел.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-3144";>CVE-2008-3144</a>
 
- -    <p>Several integer overflows were discovered in the PyOS_vsnprintf()
- -    function.</p></li>
+    <p>Ð? Ñ?Ñ?нкÑ?ии PyOS_vsnprintf() бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко
+    пеÑ?еполнений Ñ?елÑ?Ñ? Ñ?иÑ?ел.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch), these problems have been fixed in
- -version 2.4.4-3+etch2.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.4-3+etch2.</p>
 
- -<p>For the unstable distribution (sid) and the upcoming stable
- -distribution (lenny), these problems have been fixed in
- -version 2.4.5-5.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном (sid) и гоÑ?овÑ?Ñ?емÑ?Ñ? Ñ?Ñ?абилÑ?ном (lenny) вÑ?пÑ?Ñ?каÑ?
+Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.4.5-5.</p>
 
- -<p>We recommend that you upgrade your python2.4 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? python2.4.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=Gc+C
-----END PGP SIGNATURE-----


Reply to: