-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- --- english/security/2017/dsa-4017.wml2017-11-04 11:17:12.0
+0500
+++ russian/security/2017/dsa-4017.wml 2017-11-04 11:24:50.192916625 +0500
@@ -1,39 +1,42 @@
- -security update
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+обновление
безопаÑноÑÑи
- -Multiple vulnerabilities have been discovered in OpenSSL, a Secure
- -Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
- -identifies the following issues:
+Ð OpenSSL, набоÑе инÑÑÑÑменÑов Secure Sockets Layer,
бÑли обнаÑÑженÑ
+многоÑиÑленнÑе ÑÑзвимоÑÑи. ÐÑÐ¾ÐµÐºÑ Common
Vulnerabilities and Exposures
+опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ:
https://security-tracker.debian.org/tracker/CVE-2017-3735;>CVE-2017-3735
- -It was discovered that OpenSSL is prone to a one-byte buffer
- -overread while parsing a malformed IPAddressFamily extension in an
- -X.509 certificate.
+ÐÑло обнаÑÑжено, ÑÑо OpenSSL ÑÑзвим к
ÑÑÐµÐ½Ð¸Ñ Ð¾Ð´Ð½Ð¾Ð³Ð¾ байÑа за пÑеделами
+вÑделенного бÑÑеÑа, ÑÑо пÑоÑвлÑеÑÑÑ Ð¿Ñи
вÑполнении гÑаммаÑиÑеÑкого ÑазбоÑа
+некоÑÑекÑного ÑаÑÑиÑÐµÐ½Ð¸Ñ IPAddressFamily
ÑеÑÑиÑикаÑа
+X.509.
- -Details can be found in the upstream advisory:
+ÐодÑобноÑÑи можно найÑи в
ÑекомендаÑии из оÑновной веÑки ÑазÑабоÑки:
https://www.openssl.org/news/secadv/20170828.txt;>\
https://www.openssl.org/news/secadv/20170828.txt
https://security-tracker.debian.org/tracker/CVE-2017-3736;>CVE-2017-3736
- -It was discovered that OpenSSL contains a carry propagation bug in
- -the x86_64 Montgomery squaring procedure.
+ÐÑло обнаÑÑжено, ÑÑо OpenSSL ÑодеÑжиÑ
оÑÐ¸Ð±ÐºÑ ÑаÑпÑоÑÑÑÐ°Ð½ÐµÐ½Ð¸Ñ Ñигнала
+пеÑеноÑа в пÑоÑедÑÑе бÑÑÑÑого
Ð²Ð¾Ð·Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð² ÑÑепени по ÐонÑгомеÑи
+Ð´Ð»Ñ Ð°ÑÑ
иÑекÑÑÑÑ x86_64.
- -Details can be found in the upstream advisory:
+ÐодÑобноÑÑи можно найÑи в
ÑекомендаÑии из оÑновной веÑки ÑазÑабоÑки:
https://www.openssl.org/news/secadv/20171102.txt;>\
https://www.openssl.org/news/secadv/20171102.txt
- -For the stable distribution (stretch), these problems have been fixed in
- -version 1.0.2l-2+deb9u1.
+Ð ÑÑабилÑном вÑпÑÑке (stretch) ÑÑи пÑоблемÑ
бÑли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð²
+веÑÑии 1.0.2l-2+deb9u1.
- -For the unstable distribution (sid), these problems have been fixed in
- -version 1.0.2m-1.
+РнеÑÑабилÑном вÑпÑÑке (sid) ÑÑи пÑоблемÑ
бÑли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð²
+веÑÑии 1.0.2m-1.
- -We recommend that you upgrade your openssl1.0 packages.
+РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ openssl1.0.
# do not modify the following line
- --- english/security/2017/dsa-4018.wml2017-11-04 11:18:38.0
+0500
+++ russian/security/2017/dsa-4018.wml 2017-11-04 11:27:34.758465747 +0500
@@ -1,44 +1,47 @@
- -security update
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+обновление
безопаÑноÑÑи
- -Multiple vulnerabilities have been discovered in OpenSSL, a Secure
- -Sockets Layer toolkit. The Common Vulnerabilities and Exposures project
- -identifies the following issues:
+Ð OpenSSL, набоÑе инÑÑÑÑменÑов Secure Sockets Layer,
бÑли обнаÑÑженÑ
+многоÑиÑленнÑе ÑÑзвимоÑÑи. ÐÑÐ¾ÐµÐºÑ Common
Vulnerabilities and Exposures
+опÑеделÑÐµÑ ÑледÑÑÑие пÑоблемÑ:
https://security-tracker.debian.org/tracker/CVE-2017-3735;>CVE-2017-3735
- -It was discovered that OpenSSL is prone to a one-byte buffer
- -overread while parsing a malformed IPAddressFamily extension in an
- -X.509 certificate.
+ÐÑло обнаÑÑжено, ÑÑо OpenSSL ÑÑзвим к
ÑÑÐµÐ½Ð¸Ñ Ð¾Ð´Ð½Ð¾Ð³Ð¾ байÑа за пÑеделами
+вÑделенного бÑÑеÑа, ÑÑо пÑоÑвлÑеÑÑÑ Ð¿Ñи
вÑполнении гÑаммаÑиÑеÑкого ÑазбоÑа
+некоÑÑекÑного ÑаÑÑиÑÐµÐ½Ð¸Ñ IPAddressFamily
ÑеÑÑиÑикаÑа
+X.509.
- -Details can be found in the upstream advisory:
+ÐодÑобноÑÑи можно найÑи в
ÑекомендаÑии из оÑновной веÑки ÑазÑабоÑки:
https://www.openssl.org/news/secadv/20170828.txt;>\
https://www.openssl.org/news/secadv/20170828.txt
https://security-tracker.debian.org/tracker/CVE-2017-3736;>CVE-2017-3736
- -