-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- english/security/2010/dsa-1974.wml 2014-04-30 13:16:22.000000000 +0600 +++ russian/security/2010/dsa-1974.wml 2016-09-16 22:47:14.557600243 +0500 @@ -1,38 +1,39 @@ - -<define-tag description>several vulnerabilities</define-tag> +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +<define-tag description>неÑколÑко ÑÑзвимоÑÑей</define-tag> <define-tag moreinfo> - -<p>Several vulnerabilities have been found in gzip, the GNU compression - -utilities. The Common Vulnerabilities and Exposures project identifies - -the following problems:</p> +<p>Ð gzip, ÑÑилиÑÐ°Ñ Ð´Ð»Ñ ÑжаÑÐ¸Ñ Ð¾Ñ GNU, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей. ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures опÑеделÑÐµÑ +ÑледÑÑÑие пÑоблемÑ:</p> <ul> <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-2624">CVE-2009-2624</a> - -<p>Thiemo Nagel discovered a missing input sanitation flaw in the way gzip - -used to decompress data blocks for dynamic Huffman codes, which could - -lead to the execution of arbitrary code when trying to decompress a - -crafted archive. This issue is a reappearance of <a href="https://security-tracker.debian.org/tracker/CVE-2006-4334">CVE-2006-4334</a> and only - -affects the lenny version.</p></li> +<p>Тимо ÐÐ°Ð³ÐµÐ»Ñ Ð¾Ð±Ð½Ð°ÑÑжил оÑÑÑÑÑÑвие оÑиÑÑки Ð²Ñ Ð¾Ð´Ð½ÑÑ Ð´Ð°Ð½Ð½ÑÑ Ð² ÑпоÑобе, иÑполÑзÑемом gzip +Ð´Ð»Ñ ÑаÑпаковки блоков даннÑÑ Ð´Ð»Ñ Ð´Ð¸Ð½Ð°Ð¼Ð¸ÑеÑÐºÐ¸Ñ ÐºÐ¾Ð´Ð¾Ð² ХаÑÑмана, ÑÑо Ð¼Ð¾Ð¶ÐµÑ +пÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода пÑи попÑÑке ÑаÑпаковки +ÑпеÑиалÑно ÑÑоÑмиÑованного аÑÑ Ð¸Ð²Ð°. ÐÑа пÑоблема пÑедÑÑавлÑÐµÑ Ñобой возвÑаÑение <a href="https://security-tracker.debian.org/tracker/CVE-2006-4334">CVE-2006-4334</a> и +каÑаеÑÑÑ ÑолÑко веÑÑии из ÑоÑÑава lenny.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0001">CVE-2010-0001</a> - -<p>Aki Helin discovered an integer underflow when decompressing files that - -are compressed using the LZW algorithm. This could lead to the execution - -of arbitrary code when trying to decompress a crafted LZW compressed - -gzip archive.</p></li> +<p>Ðки Хелин обнаÑÑжил оÑÑиÑаÑелÑное пеÑеполнение ÑелÑÑ ÑиÑел пÑи ÑаÑпаковке Ñайлов, +ÑжаÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð°Ð»Ð³Ð¾ÑиÑма LZW. Ðно Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ +пÑоизволÑного кода пÑи попÑÑке ÑаÑпаковки ÑпеÑиалÑно ÑÑоÑмиÑованного gzip-аÑÑ Ð¸Ð²Ð°, +ÑжаÑого Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ LZW.</p></li> </ul> - -<p>For the stable distribution (lenny), these problems have been fixed in - -version 1.3.12-6+lenny1.</p> +<p>Ð ÑÑабилÑном вÑпÑÑке (lenny) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 1.3.12-6+lenny1.</p> - -<p>For the oldstable distribution (etch), these problems have been fixed in - -version 1.3.5-15+etch1.</p> +<p>РпÑедÑдÑÑем ÑÑабилÑном вÑпÑÑке (etch) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 1.3.5-15+etch1.</p> - -<p>For the testing distribution (squeeze) and the unstable distribution - -(sid), these problems will be fixed soon.</p> +<p>Ð ÑеÑÑиÑÑемом (squeeze) и неÑÑабилÑном (sid) вÑпÑÑÐºÐ°Ñ +ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±ÑдÑÑ Ð¸ÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð¿Ð¾Ð·Ð¶Ðµ.</p> - -<p>We recommend that you upgrade your gzip packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ gzip.</p> </define-tag> # do not modify the following line - --- english/security/2010/dsa-2129.wml 2014-04-30 13:16:22.000000000 +0600 +++ russian/security/2010/dsa-2129.wml 2016-09-16 23:27:52.977276855 +0500 @@ -1,34 +1,35 @@ - -<define-tag description>checksum verification weakness</define-tag> +#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov" +<define-tag description>ÑÐ»Ð°Ð±Ð°Ñ Ð¿ÑовеÑка конÑÑолÑнÑÑ ÑÑмм</define-tag> <define-tag moreinfo> - -<p>A vulnerability has been found in krb5, the MIT implementation of - -Kerberos.</p> +<p>Ð krb5, ÑеализаÑии Kerberos Ð¾Ñ MIT, бÑла обнаÑÑжена +ÑÑзвимоÑÑÑ.</p> - -<p>MIT krb5 clients incorrectly accept unkeyed checksums in the SAM-2 - -preauthentication challenge: an unauthenticated remote attacker could - -alter a SAM-2 challenge, affecting the prompt text seen by the user or - -the kind of response sent to the KDC. Under some circumstances, this - -can negate the incremental security benefit of using a single-use - -authentication mechanism token.</p> - - - -<p>MIT krb5 incorrectly accepts RFC 3961 key-derivation checksums using - -RC4 keys when verifying KRB-SAFE messages: an unauthenticated remote - -attacker has a 1/256 chance of forging KRB-SAFE messages in an - -application protocol if the targeted pre-existing session uses an RC4 - -session key. Few application protocols use KRB-SAFE messages.</p> - - - -<p>The Common Vulnerabilities and Exposures project has assigned - -<a href="https://security-tracker.debian.org/tracker/CVE-2010-1323">CVE-2010-1323</a> to these issues.</p> - - - -<p>For the stable distribution (lenny), these problems have been fixed in - -version 1.6.dfsg.4~beta1-5lenny6.</p> +<p>ÐлиенÑÑ krb5 некоÑÑекÑно пÑинимаÑÑ Ð±ÐµÐ·ÐºÐ»ÑÑевÑе конÑÑолÑнÑе ÑÑÐ¼Ð¼Ñ Ð¿Ñи +пÑедваÑиÑелÑной аÑÑенÑиÑикаÑии по пÑоÑÐ¾ÐºÐ¾Ð»Ñ SAM-2: неаÑÑенÑиÑиÑиÑованнÑй ÑдалÑннÑй +злоÑмÑÑленник Ð¼Ð¾Ð¶ÐµÑ Ð¸Ð·Ð¼ÐµÐ½Ð¸ÑÑ Ð¿ÑовеÑÐºÑ Ð¿Ð¾ пÑоÑÐ¾ÐºÐ¾Ð»Ñ SAM-2, поменÑв ÑекÑÑ Ð·Ð°Ð¿ÑоÑа, видимÑй полÑзоваÑелем, +или вид оÑвеÑа, оÑпÑавленнÑй KDC. ÐÑи некоÑоÑÑÑ Ð¾Ð±ÑÑоÑÑелÑÑÑÐ²Ð°Ñ ÑÑо +Ð¼Ð¾Ð¶ÐµÑ Ð½Ð¸Ð²ÐµÐ»Ð¸ÑоваÑÑ Ð¿ÑеимÑÑеÑÑва аÑÑенÑиÑикаÑии Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð¾Ð´Ð½Ð¾ÑазовÑÑ +Ñокенов.</p> + +<p>krb5 некоÑÑекÑно пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÐºÐ¾Ð½ÑÑолÑнÑе ÑÑÐ¼Ð¼Ñ Ð²ÑÑабоÑки клÑÑей по RFC 3961 +пÑи иÑполÑзовании RC4-клÑÑей во вÑÐµÐ¼Ñ Ð¿ÑовеÑки ÑообÑений KRB-SAFE: неаÑÑенÑиÑиÑиÑованнÑй ÑдалÑннÑй +злоÑмÑÑленник Ð¸Ð¼ÐµÐµÑ ÑÐ°Ð½Ñ 1/256 на Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÑ ÑообÑений KRB-SAFE в +пÑоÑоколе пÑиложений в ÑлÑÑае, еÑли ÑÐµÐ»ÐµÐ²Ð°Ñ ÑеÑÑÐ¸Ñ Ð¸ÑполÑзÑÐµÑ ÑеÑÑионнÑй +RC4-клÑÑ. ÐекоÑоÑÑе пÑоÑÐ¾ÐºÐ¾Ð»Ñ Ð¿Ñиложений иÑполÑзÑÑÑ ÑообÑÐµÐ½Ð¸Ñ KRB-SAFE.</p> + +<p>ÐÑÐ¾ÐµÐºÑ Common Vulnerabilities and Exposures пÑиÑвоил ÑÑим пÑоблемам иденÑиÑикаÑÐ¾Ñ +<a href="https://security-tracker.debian.org/tracker/CVE-2010-1323">CVE-2010-1323</a>.</p> + +<p>Ð ÑÑабилÑном вÑпÑÑке (lenny) ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² +веÑÑии 1.6.dfsg.4~beta1-5lenny6.</p> - -<p>The builds for the mips architecture are not included in this advisory. - -They will be released as soon as they are available.</p> +<p>СбоÑки Ð´Ð»Ñ Ð°ÑÑ Ð¸ÑекÑÑÑÑ mips в данной ÑекомендаÑии оÑÑÑÑÑÑвÑÑÑ. +Ðни бÑдÑÑ Ð²ÑпÑÑÐµÐ½Ñ Ð¿Ð¾Ð·Ð¶Ðµ по меÑе доÑÑÑпноÑÑи.</p> - -<p>For the testing distribution (squeeze) and the unstable distribution - -(sid), these problem have been fixed in version 1.8.3+dfsg-3.</p> +<p>Ð ÑеÑÑиÑÑемом (squeeze) и неÑÑабилÑном (sid) вÑпÑÑÐºÐ°Ñ +ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² веÑÑии 1.8.3+dfsg-3.</p> - -<p>We recommend that you upgrade your krb5 packages.</p> +<p>РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ krb5.</p> </define-tag> # do not modify the following line -----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJX3DmuAAoJEF7nbuICFtKlIHYQAKRI/8cf4cBtzXM0s3wdeacr 8wDkVeEIZBdGY+nxeKJZ08PHwWpDNzsCqjyqquOK8nW1FB58G/dEN/nmrYkQ9cJ0 lCjSVi8qeTrvP06hreD2Mx7nLzYmFovhTstRz/9jcqxcXHMM6ZErwW1HCDhTWW05 GaX2cCbc+EMRE1Gkq5k4N6fa4slaiEeY2PtSxNHUdDJjNn/7UtZGMpRgXvM2Je+n EkQrYxGHRYh0H8+lvjEbffYZO9rFhuU6aDGiKq6qVT9vzFgKj6cHpiFIekNNDtuH yziBe7VIfU9w7ILjf0EZ2M0TTYDPUCVVgOfdGKIFNNDvb+KtxKNYrrldF9xa3Kg1 WKU9tBuDLTAsavVkERf3ygAaFiUYVBOHeIAUkzksORTiSf3ziq6bviwQShohNe4b cAMxKKkj/34vpzyxT0RCI8FETRk0OjXjIpeOJxH06ArHKC+x5XxYrtBhjs0QR6wn yNalLd4Wyr99o2dObIa3mmLyqbqGY7cWViUZzngwSDgrPyCcH+lmHOZ4F2HKOhRq Y4qsAE1COs8CWWzcSA3Opd1zcYxgNu7M5KE3Y1plsakfmNlGCC2CMfTfCxk8Itdm jFAOcTA/88mj4g0cxZEswB4HhFB1uuU6mhqYkdps4cd1wHuuc8NbFn6glPPwmR6A c15Hg/P/9n4Ku/wUmBYs =mSId -----END PGP SIGNATURE-----