[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2002/dsa-1{40,36}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2002/dsa-136.wml	2004-09-03 20:15:32.000000000 +0600
+++ russian/security/2002/dsa-136.wml	2016-09-22 22:51:06.795311269 +0500
@@ -1,32 +1,33 @@
- -<define-tag description>multiple remote exploits</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>многоÑ?иÑ?леннÑ?е Ñ?далÑ?ннÑ?е Ñ?Ñ?звимоÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>The OpenSSL development team has announced that a security audit by A.L.
- -Digital Ltd and The Bunker, under the DARPA CHATS program, has revealed
- -remotely exploitable buffer overflow conditions in the OpenSSL code.
- -Additionally, the ASN1 parser in OpenSSL has a potential DoS attack
- -independently discovered by Adi Stav and James Yonan.</p>
- -
- -<p>CAN-2002-0655 references overflows in buffers used to hold ASCII
- -representations of integers on 64 bit platforms. CAN-2002-0656
- -references buffer overflows in the SSL2 server implementation (by
- -sending an invalid key to the server) and the SSL3 client implementation
- -(by sending a large session id to the client). The SSL2 issue was also
- -noticed by Neohapsis, who have privately demonstrated exploit code for
- -this issue. CAN-2002-0659 references the ASN1 parser DoS issue.</p>
+<p>Ð?оманда Ñ?азÑ?абоÑ?ки OpenSSL Ñ?ообÑ?ила, Ñ?Ñ?о аÑ?диÑ? безопаÑ?ноÑ?Ñ?и, пÑ?оводимÑ?й Ñ?оÑ?Ñ?Ñ?дниками A.L.
+Digital Ltd и The Bunker, по пÑ?огÑ?амме DARPA CHATS, позволил обнаÑ?Ñ?жиÑ?Ñ?
+пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в коде OpenSSL, коÑ?оÑ?Ñ?е могÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? Ñ?далÑ?нно.
+Ð?Ñ?оме Ñ?ого, коде длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а ASN1 в OpenSSL поÑ?енÑ?иалÑ?но Ñ?Ñ?звим к оÑ?казÑ? в
+обÑ?лÑ?живании, Ñ?Ñ?о незавиÑ?имо бÑ?ло обнаÑ?Ñ?жено Эди СÑ?авом и Ð?жеймÑ?ом Ð?онаном.</p>
+
+<p>Ð? CAN-2002-0655 Ñ?казанÑ? пеÑ?еполнениÑ? в бÑ?Ñ?еÑ?аÑ?, иÑ?полÑ?зÑ?емÑ?Ñ? длÑ? Ñ?Ñ?анениÑ?
+ASCII-пÑ?едÑ?Ñ?авлений Ñ?елÑ?Ñ? Ñ?иÑ?ел на 64-биÑ?нÑ?Ñ? плаÑ?Ñ?оÑ?маÑ?. Ð? CAN-2002-0656
+Ñ?казанÑ? пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в Ñ?еализаÑ?ии Ñ?еÑ?веÑ? SSL2 (из-за оÑ?пÑ?авки
+Ñ?еÑ?веÑ?Ñ? некоÑ?Ñ?екÑ?ного клÑ?Ñ?а) а Ñ?еализаÑ?ии клиенÑ?а SSL3
+(из-за оÑ?пÑ?авки клиенÑ?Ñ? болÑ?Ñ?ого иденÑ?иÑ?икаÑ?оÑ?а Ñ?еÑ?Ñ?ии). Ð?Ñ?облема Ñ? SSL2 бÑ?ла Ñ?ак же
+обнаÑ?Ñ?жена Neohapsis, коÑ?оÑ?Ñ?й в Ñ?аÑ?Ñ?ном поÑ?Ñ?дке пÑ?одемонÑ?Ñ?Ñ?иÑ?овал код длÑ?
+иÑ?полÑ?зованиÑ? Ñ?Ñ?ой пÑ?облемÑ?. Ð? CAN-2002-0659 Ñ?казана пÑ?облема Ñ? кодом длÑ? гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а ASN1.</p>
 
- -<p>These vulnerabilities have been addressed for Debian 3.0 (woody) in
- -openssl094_0.9.4-6.woody.2, openssl095_0.9.5a-6.woody.1 and
+<p>ЭÑ?и Ñ?Ñ?звимоÑ?Ñ?и бÑ?ли иÑ?пÑ?авленÑ? в Debian 3.0 (woody) в
+openssl094_0.9.4-6.woody.2, openssl095_0.9.5a-6.woody.1 и
 openssl_0.9.6c-2.woody.1.</p>
 
- -<p>These vulnerabilities are also present in Debian 2.2 (potato). Fixed
- -packages are available in openssl094_0.9.4-6.potato.2 and
+<p>Ð?Ñ?оме Ñ?ого, Ñ?Ñ?и Ñ?Ñ?звимоÑ?Ñ?и пÑ?иÑ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ? в Debian 2.2 (potato). Ð?оÑ?Ñ?Ñ?пнÑ?
+иÑ?пÑ?авленнÑ?е пакеÑ?Ñ? openssl094_0.9.4-6.potato.2 и
 openssl_0.9.6c-0.potato.4.</p>
 
- -<p>A worm is actively exploiting this issue on internet-attached hosts;
- -we recommend you upgrade your OpenSSL as soon as possible. Note that you
- -must restart any daemons using SSL. (E.g., ssh or ssl-enabled apache.)
- -If you are uncertain which programs are using SSL you may choose to
- -reboot to ensure that all running daemons are using the new libraries.</p>
+<p>ЧеÑ?вÑ? акÑ?ивно иÑ?полÑ?зÑ?еÑ? Ñ?Ñ?Ñ? пÑ?облемÑ? на подклÑ?Ñ?Ñ?ннÑ?Ñ? к Ñ?еÑ?и Ð?нÑ?еÑ?неÑ? Ñ?злаÑ?;
+Ñ?екомендÑ?еÑ?Ñ?Ñ? как можно Ñ?коÑ?ее обновиÑ?Ñ? OpenSSL. Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о вам
+Ñ?ледÑ?еÑ? пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ? вÑ?е Ñ?лÑ?жбÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?ие SSL. (Ð?апÑ?имеÑ?, ssh или apache Ñ? поддеÑ?жкой ssl.)
+Ð?Ñ?ли вÑ? не Ñ?веÑ?енÑ? в Ñ?ом, какие пÑ?огÑ?аммÑ? иÑ?полÑ?зÑ?Ñ?Ñ? SSL, вÑ? можеÑ?е
+пеÑ?езагÑ?Ñ?зиÑ?Ñ? Ñ?иÑ?Ñ?емÑ?, в Ñ?Ñ?ом Ñ?лÑ?Ñ?ае вÑ?е запÑ?Ñ?еннÑ?е Ñ?лÑ?жбÑ? бÑ?дÑ?Ñ? иÑ?полÑ?зоваÑ?Ñ? новÑ?е библиоÑ?еки.</p>
 
 </define-tag>
 
- --- english/security/2002/dsa-140.wml	2002-08-16 15:56:07.000000000 +0600
+++ russian/security/2002/dsa-140.wml	2016-09-22 22:40:03.065168526 +0500
@@ -1,34 +1,35 @@
- -<define-tag description>buffer overflow</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение бÑ?Ñ?еÑ?а</define-tag>
 <define-tag moreinfo>
- -<p>Developers of the PNG library have fixed a buffer overflow in the
- -progressive reader when the PNG datastream contains more IDAT data
- -than indicated by the IHDR chunk.  Such deliberately malformed
- -datastreams would crash applications which could potentially allow an
- -attacker to execute malicious code.  Programs such as Galeon,
- -Konqueror and various others make use of these libraries.</p>
- -
- -<p>In addition to that, the packages below fix another
- -potential buffer overflow.  The PNG libraries implement a safety
- -margin which is also included in a newer upstream release.  Thanks to
- -Glenn Randers-Pehrson for informing us.</p>
+<p>РазÑ?абоÑ?Ñ?ики библиоÑ?еки PNG иÑ?пÑ?авили пеÑ?еполнение бÑ?Ñ?еÑ?а в
+коде непÑ?еÑ?Ñ?вного Ñ?Ñ?ениÑ?, коÑ?оÑ?ое возникаеÑ? в Ñ?лÑ?Ñ?ае, когда поÑ?ок даннÑ?Ñ? PNG Ñ?одеÑ?жиÑ? болÑ?Ñ?е IDAT-даннÑ?Ñ?,
+Ñ?ем Ñ?Ñ?о Ñ?казано в блоке IHDR.  Такие Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?е
+поÑ?оки даннÑ?Ñ?, пÑ?иводÑ?Ñ?ие к аваÑ?ийной оÑ?Ñ?ановке пÑ?иложений, поÑ?енÑ?иалÑ?но могÑ?Ñ? позволиÑ?Ñ?
+злоÑ?мÑ?Ñ?ленникÑ? вÑ?полниÑ?Ñ? вÑ?едоноÑ?нÑ?й код.  Такие пÑ?огÑ?аммÑ? как Galeon,
+Konqueror и дÑ?Ñ?гие иÑ?полÑ?зÑ?Ñ?Ñ? Ñ?казаннÑ?е библиоÑ?еки.</p>
+
+<p>Ð? дополнение к Ñ?Ñ?омÑ? пакеÑ?Ñ?, пÑ?иводимÑ?е ниже, Ñ?одеÑ?жаÑ? иÑ?пÑ?авление еÑ?Ñ? одного
+поÑ?енÑ?иалÑ?ного пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а.  Ð?иблиоÑ?еки PNG Ñ?еализÑ?Ñ?Ñ? поле
+безопаÑ?ноÑ?Ñ?и, Ñ?еализаÑ?иÑ? коÑ?оÑ?ого вклÑ?Ñ?ена в более Ñ?вежий вÑ?пÑ?Ñ?к оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки.  Ð?Ñ?Ñ?ажаем
+благодаÑ?ноÑ?Ñ?Ñ? Ð?ленÑ? РÑ?ндеÑ?Ñ?-Ð?еÑ?Ñ?онÑ? за Ñ?о, Ñ?Ñ?о он нам об Ñ?Ñ?ом Ñ?ообÑ?ил.</p>
 
- -<p>To find out which packages depend on this library, you may want to
- -execute the following commands:</p>
+<p>ЧÑ?обÑ? вÑ?Ñ?Ñ?ниÑ?Ñ?, какие пакеÑ?Ñ? завиÑ?Ñ?Ñ? оÑ? Ñ?Ñ?ой библиоÑ?еки вÑ? можеÑ?е вÑ?полниÑ?Ñ?
+Ñ?ледÑ?Ñ?Ñ?ие командÑ?:</p>
 
 <pre>
     apt-cache showpkg libpng2
     apt-cache showpkg libpng3
 </pre>
 
- -<p>This problem has been fixed in version 1.0.12-3.woody.2 of libpng and
- -version 1.2.1-1.1.woody.2 of libpng3 for the current stable
- -distribution (woody) and in version 1.0.12-4 of libpng and version
- -1.2.1-2 of libpng3 for the unstable distribution (sid).
- -The potato release of Debian does not seem to be vulnerable.</p>
- -
- -<p>We recommend that you upgrade your libpng packages immediately and
- -restart programs and daemons that link to these libraries and read
- -external data, such as web browsers.</p>
+<p>ЭÑ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 1.0.12-3.woody.2 пакеÑ?а libpng и
+в веÑ?Ñ?ии 1.2.1-1.1.woody.2 пакеÑ?а libpng3 длÑ? Ñ?екÑ?Ñ?его Ñ?Ñ?абилÑ?ного
+вÑ?пÑ?Ñ?ка (woody), а Ñ?акже в веÑ?Ñ?ии 1.0.12-4 пакеÑ?а libpng и в веÑ?ии
+1.2.1-2 пакеÑ?а libpng3 длÑ? неÑ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка (sid).
+Ð?ак кажеÑ?Ñ?Ñ?, вÑ?пÑ?Ñ?к potato не подвеÑ?жен Ñ?казаннÑ?м Ñ?Ñ?звимоÑ?Ñ?Ñ?м.</p>
+
+<p>РекомендÑ?еÑ?Ñ?Ñ? как можно Ñ?коÑ?ее обновиÑ?Ñ? пакеÑ?Ñ? libpng и
+пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ? пÑ?огÑ?аммÑ? и Ñ?лÑ?жбÑ?, Ñ?компонованнÑ?е Ñ? Ñ?Ñ?ими библиоÑ?еками и Ñ?Ñ?иÑ?Ñ?ваÑ?Ñ?ие
+внеÑ?ние даннÑ?е (как Ñ?Ñ?о делаÑ?Ñ?, напÑ?имеÑ?, веб-бÑ?аÑ?зеÑ?Ñ?).</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=MmTr
-----END PGP SIGNATURE-----


Reply to: