[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2016/dsa-3673.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2016/dsa-3673.wml	2016-09-22 22:06:04.000000000 +0500
+++ russian/security/2016/dsa-3673.wml	2016-09-22 22:14:35.226234267 +0500
@@ -1,60 +1,61 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Several vulnerabilities were discovered in OpenSSL:</p>
+<p>Ð? OpenSSL бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2177";>CVE-2016-2177</a>
 
- -    <p>Guido Vranken discovered that OpenSSL uses undefined pointer
- -    arithmetic. Additional information can be found at
+    <p>Ð?видо Ð?Ñ?анкен обнаÑ?Ñ?жил, Ñ?Ñ?о OpenSSL иÑ?полÑ?зÑ?еÑ? неопÑ?еделÑ?ннÑ?Ñ? аÑ?иÑ?меÑ?иÑ?еÑ?кÑ?Ñ? опеÑ?аÑ?иÑ?
+    над Ñ?казаÑ?елÑ?ми. Ð?ополниÑ?елÑ?нÑ?Ñ? инÑ?оÑ?маÑ?иÑ? можно найÑ?и по Ñ?ледÑ?Ñ?Ñ?емÑ? адÑ?еÑ?Ñ?:
     <a href="https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/";>
     https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/</a></p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2178";>CVE-2016-2178</a>
 
- -    <p>Cesar Pereida, Billy Brumley and Yuval Yarom discovered a timing
- -    leak in the DSA code.</p></li>
+    <p>ЦезаÑ?Ñ? Ð?еÑ?еида, Ð?илли Ð?Ñ?амли и Ювал ЯÑ?ом обнаÑ?Ñ?жили Ñ?Ñ?еÑ?кÑ? Ñ?аймингов
+    в коде DSA.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2179";>CVE-2016-2179</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2016-2181";>CVE-2016-2181</a>
 
- -    <p>Quan Luo and the OCAP audit team discovered denial of service
- -    vulnerabilities in DTLS.</p></li>
+    <p>ЦÑ?анÑ? Ð?о и команда аÑ?диÑ?а OCAP обнаÑ?Ñ?жили оÑ?казÑ? в обÑ?лÑ?живании
+    в DTLS.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2180";>CVE-2016-2180</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2016-2182";>CVE-2016-2182</a> / <a href="https://security-tracker.debian.org/tracker/CVE-2016-6303";>CVE-2016-6303</a></p>
 
- -    <p>Shi Lei discovered an out-of-bounds memory read in
- -    TS_OBJ_print_bio() and an out-of-bounds write in BN_bn2dec()
+    <p>Ши Ð?Ñ?й обнаÑ?Ñ?жил Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в
+    TS_OBJ_print_bio() и запиÑ?Ñ? за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в BN_bn2dec()
     and MDC2_Update().</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-2183";>CVE-2016-2183</a>
 
- -    <p>DES-based cipher suites are demoted from the HIGH group to MEDIUM
- -    as a mitigation for the SWEET32 attack.</p></li>
+    <p>Ð?абоÑ?Ñ? Ñ?иÑ?Ñ?ов на оÑ?нове DES пеÑ?енеÑ?енÑ? из гÑ?Ñ?ппÑ? HIGH в гÑ?Ñ?ппÑ? MEDIUM
+    Ñ? Ñ?елÑ?Ñ? Ñ?низиÑ?Ñ? Ñ?иÑ?к SWEET32-аÑ?аки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6302";>CVE-2016-6302</a>
 
- -    <p>Shi Lei discovered that the use of SHA512 in TLS session tickets
- -    is susceptible to denial of service.</p></li>
+    <p>Ши Ð?Ñ?й обнаÑ?Ñ?жил, Ñ?Ñ?о код иÑ?полÑ?зованиÑ? SHA512 в билеÑ?аÑ? Ñ?еÑ?Ñ?ий TLS
+    возможно Ñ?одеÑ?жиÑ? оÑ?каз в обÑ?лÑ?живании.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6304";>CVE-2016-6304</a>
 
- -    <p>Shi Lei discovered that excessively large OCSP status request may
- -    result in denial of service via memory exhaustion.</p></li>
+    <p>Ши Ð?Ñ?й обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?лиÑ?ком болÑ?Ñ?ой запÑ?оÑ? OCSP-Ñ?Ñ?аÑ?Ñ?Ñ?а можеÑ?
+    пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании из-за иÑ?Ñ?еÑ?паниÑ? памÑ?Ñ?и.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2016-6306";>CVE-2016-6306</a>
 
- -    <p>Shi Lei discovered that missing message length validation when parsing
- -    certificates may potentially result in denial of service.</p></li>
+    <p>Ши Ð?Ñ?й обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие пÑ?овеÑ?ки длинÑ? Ñ?ообÑ?ениÑ? пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого
+    Ñ?азбоÑ?а Ñ?еÑ?Ñ?иÑ?икаÑ?ов можеÑ? поÑ?енÑ?иалÑ?но пÑ?иводиÑ?Ñ? к оÑ?казÑ? в обÑ?лÑ?живании.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (jessie), these problems have been fixed in
- -version 1.0.1t-1+deb8u4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 1.0.1t-1+deb8u4.</p>
 
- -<p>For the unstable distribution (sid), these problems will be fixed soon.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?дÑ?Ñ? иÑ?пÑ?авленÑ? позже.</p>
 
- -<p>We recommend that you upgrade your openssl packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? openssl.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJX5BF9AAoJEF7nbuICFtKl1wAP/RbGrs1fanhTJ7M6z41ZKFO9
HmArS+Gg381FBiOWf7VVBKG/k9Y5RmwhaSOMuMHw+xCfSsVE7lmAtelJx0EG6qf6
RqHAI5TsE64Es/sUDXN7zvgJgzb1thPjxG8vslWE43Q9C/ztulGgDBt8ZFlXh70V
X8OdKohLPA9wOiOWmMJoU/75pJw4WUIvgHOvL1gY2+4EU0IEhEmo2hz6sPziK820
Rm7nPURPqzMqpU8Hmy0xBU3NgRvG/C4C7NvA8guXilI42+JMxEspBB8Z0e4C2zdm
mYOtPyAzJN5qxB1Yk4MODFlbVMFAFNNuBokDa2vPZhJOQYagj3gfpZRq4OSNwaHh
ACL0CQLrhhv9cZlkisGTjExVrWsU/V0cR18ZIw/NruSBbhSqngdkRLZnV/Uc4g4x
5zksfYzXEBfrMS8ASdeRtNi+CJ1lBHPpnieCuZInem4fAUgV8GKn9HlZwUmlfum8
WS8jK5elGLkm1UfP7ViLfJ+UGcsD6O0CrNHtPeeGcxMYR2r8AEWqat/4uF0lwkrc
QDaqT7/JGlfsfE7xtjqDL5S/6s6LS8e4gtYpJpNR//IX1JRE+Kq8heMjd8kgFVB9
hxhp+1a0M4V902kERxbMNGOtTyC7vvUMgihD6VhKkE7Azyaku1M/U/il4ktx9pKn
DXcpXYcLZYNUBXNTe4au
=J4Oe
-----END PGP SIGNATURE-----


Reply to: