--- ../../english/security/2018/dsa-4229.wml 2018-06-16 23:16:34.374046763 +0500 +++ 2018/dsa-4229.wml 2018-06-17 11:21:25.265378383 +0500 @@ -1,37 +1,38 @@ -<define-tag description>security update</define-tag> +#use wml::debian::translation-check translation="7663b108adb6e62efb10927c79ca889cf71999b5" mindelta="1" maintainer="Lev Lamberov" +<define-tag description>обновление безопаÑноÑÑи</define-tag> <define-tag moreinfo> -<p>Two vulnerabilities were discovered in strongSwan, an IKE/IPsec suite.</p> +<p>Ð strongSwan, набоÑе IKE/IPsec, бÑли обнаÑÑÐ¶ÐµÐ½Ñ Ð´Ð²Ðµ ÑÑзвимоÑÑи.</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-5388">CVE-2018-5388</a> - <p>The stroke plugin did not verify the message length when reading from its - control socket. This vulnerability could lead to denial of service. On - Debian write access to the socket requires root permission on default - configuration.</p></li> + <p>Ðополнение stroke не вÑполнÑÐµÑ Ð¿ÑовеÑÐºÑ Ð´Ð»Ð¸Ð½Ñ ÑообÑÐµÐ½Ð¸Ñ Ð¿Ñи ÑÑении из ÑпÑавлÑÑÑего + ÑокеÑа. ÐÐ°Ð½Ð½Ð°Ñ ÑÑзвимоÑÑÑ Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании. Ð + Debian пÑи наÑÑÑÐ¾Ð¹ÐºÐ°Ñ Ð¿Ð¾ ÑмолÑÐ°Ð½Ð¸Ñ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа к ÑокеÑÑ Ð´Ð»Ñ Ð·Ð°Ð¿Ð¸Ñи ÑÑебÑÑÑÑÑ Ð¿Ñава + ÑÑпеÑполÑзоваÑелÑ.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-10811">CVE-2018-10811</a> - <p>A missing variable initialization in IKEv2 key derivation could lead to a - denial of service (crash of the charon IKE daemon) if the openssl plugin is - used in FIPS mode and the negotiated PRF is HMAC-MD5.</p></li> + <p>ÐÑÑÑÑÑÑвие иниÑиализаÑии пеÑеменной в коде извлеÑÐµÐ½Ð¸Ñ ÐºÐ»ÑÑа IKEv2 Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ + к оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании (аваÑÐ¸Ð¹Ð½Ð°Ñ Ð¾ÑÑановка IKE-ÑлÑÐ¶Ð±Ñ charon) в ÑлÑÑае, еÑли дополнение + openssl иÑполÑзÑеÑÑÑ Ð² Ñежиме FIPS, а ÑоглаÑованнÑм меÑодом PRF ÑвлÑеÑÑÑ HMAC-MD5.</p></li> </ul> -<p>For the oldstable distribution (jessie), these problems have been fixed -in version 5.2.1-6+deb8u6.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (jessie) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ +в веÑÑии 5.2.1-6+deb8u6.</p> -<p>For the stable distribution (stretch), these problems have been fixed in -version 5.5.1-4+deb9u2.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (stretch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 5.5.1-4+deb9u2.</p> -<p>We recommend that you upgrade your strongswan packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ strongswan.</p> -<p>For the detailed security status of strongswan please refer to -its security tracker page at: -<a href="https://security-tracker.debian.org/tracker/strongswan">https://security-tracker.debian.org/tracker/strongswan</a></p> +<p>С подÑобнÑм ÑÑаÑÑÑом поддеÑжки безопаÑноÑÑи strongswan можно ознакомиÑÑÑÑ Ð½Ð° +ÑооÑвеÑÑÑвÑÑÑей ÑÑÑаниÑе оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи по адÑеÑÑ +<a href="https://security-tracker.debian.org/tracker/strongswan">\ +https://security-tracker.debian.org/tracker/strongswan</a></p> </define-tag> # do not modify the following line #include "$(ENGLISHDIR)/security/2018/dsa-4229.data" -# $Id: $