[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{News/2017/20171209.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/News/2017/20171209.wml	2017-12-09 17:40:19.000000000 +0500
+++ russian/News/2017/20171209.wml	2017-12-09 23:09:49.780014488 +0500
@@ -1,4 +1,5 @@
- -<define-tag pagetitle>Updated Debian 8: 8.10 released</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag pagetitle>Ð?бновлÑ?ннÑ?й Debian 8: вÑ?пÑ?Ñ?к 8.10</define-tag>
 <define-tag release_date>2017-12-09</define-tag>
 #use wml::debian::news
 # $Id:
@@ -24,104 +25,104 @@
 
 <define-tag srcpkg><a href="https://packages.debian.org/src:%0";>%0</a></define-tag>
 
- -<p>The Debian project is pleased to announce the tenth update of its
- -oldstable distribution Debian <release> (codename <q><codename></q>). 
- -This point release mainly adds corrections for security issues,
- -along with a few adjustments for serious problems.  Security advisories
- -have already been published separately and are referenced where available.</p>
- -
- -<p>Please note that the point release does not constitute a new version of Debian
- -<release> but only updates some of the packages included.  There is
- -no need to throw away old <q><codename></q> media. After installation,
- -packages can be upgraded to the current versions using an up-to-date Debian
- -mirror.</p>
- -
- -<p>Those who frequently install updates from security.debian.org won't have
- -to update many packages, and most such updates are
- -included in the point release.</p>
- -
- -<p>New installation images will be available soon at the regular locations.</p>
- -
- -<p>Upgrading an existing installation to this revision can be achieved by
- -pointing the package management system at one of Debian's many HTTP mirrors.
- -A comprehensive list of mirrors is available at:</p>
+<p>Ð?Ñ?оекÑ? Debian Ñ? Ñ?адоÑ?Ñ?Ñ?Ñ? Ñ?ообÑ?аеÑ? о деÑ?Ñ?Ñ?ом обновлении Ñ?воего
+пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка Debian <release> (кодовое имÑ? <q><codename></q>).
+ЭÑ?о обновление в оÑ?новном Ñ?одеÑ?жиÑ? иÑ?пÑ?авлениÑ? пÑ?облем безопаÑ?ноÑ?Ñ?и,
+а Ñ?акже неÑ?колÑ?ко коÑ?Ñ?екÑ?иÑ?овок Ñ?еÑ?Ñ?Ñ?знÑ?Ñ? пÑ?облем. РекомендаÑ?ии по безопаÑ?ноÑ?Ñ?и
+опÑ?бликованÑ? оÑ?делÑ?но и Ñ?казÑ?ваÑ?Ñ?Ñ?Ñ? пÑ?и необÑ?одимоÑ?Ñ?и.</p>
+
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?о обновление не Ñ?влÑ?еÑ?Ñ?Ñ? новой веÑ?Ñ?ией Debian
+<release>, а лиÑ?Ñ? обновлением некоÑ?оÑ?Ñ?Ñ? вклÑ?Ñ?Ñ?ннÑ?Ñ? в вÑ?пÑ?Ñ?к пакеÑ?ов. Ð?еÑ?
+необÑ?одимоÑ?Ñ?и вÑ?бÑ?аÑ?Ñ?ваÑ?Ñ? Ñ?Ñ?аÑ?Ñ?е ноÑ?иÑ?ели Ñ? вÑ?пÑ?Ñ?ком <q><codename></q>. Ð?оÑ?ле Ñ?Ñ?Ñ?ановки
+пакеÑ?Ñ? можно обновиÑ?Ñ? до Ñ?екÑ?Ñ?иÑ? веÑ?Ñ?ий, иÑ?полÑ?зÑ?Ñ? акÑ?Ñ?алÑ?ное
+зеÑ?кало Debian.</p>
+
+<p>Тем, кÑ?о Ñ?аÑ?Ñ?о Ñ?Ñ?Ñ?анавливаеÑ? обновлениÑ? Ñ? security.debian.org, не пÑ?идÑ?Ñ?Ñ?Ñ?
+обновлÑ?Ñ?Ñ? много пакеÑ?ов, болÑ?Ñ?инÑ?Ñ?во обновлений Ñ? security.debian.org
+вклÑ?Ñ?енÑ? в данное обновление.</p>
+
+<p>Ð?овÑ?е Ñ?Ñ?Ñ?ановоÑ?нÑ?е обÑ?азÑ? бÑ?дÑ?Ñ? доÑ?Ñ?Ñ?пнÑ? позже в обÑ?Ñ?ном меÑ?Ñ?е.</p>
+
+<p>Ð?бновление Ñ?Ñ?Ñ?еÑ?Ñ?вÑ?Ñ?Ñ?иÑ? Ñ?иÑ?Ñ?ем до Ñ?Ñ?ой Ñ?едакÑ?ии можно вÑ?полниÑ?Ñ? Ñ? помоÑ?Ñ?Ñ?
+Ñ?иÑ?Ñ?емÑ? Ñ?пÑ?авлениÑ? пакеÑ?ами, иÑ?полÑ?зÑ?Ñ? одно из множеÑ?Ñ?ва HTTP-зеÑ?кал Debian.
+Ð?Ñ?Ñ?еÑ?пÑ?ваÑ?Ñ?ий Ñ?пиÑ?ок зеÑ?кал доÑ?Ñ?Ñ?пен на Ñ?Ñ?Ñ?аниÑ?е:</p>
 
 <div class="center">
   <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
 </div>
 
 
- -<h2>Miscellaneous Bugfixes</h2>
+<h2>Ð?Ñ?пÑ?авлениÑ? Ñ?азлиÑ?нÑ?Ñ? оÑ?ибок</h2>
 
- -<p>This oldstable update adds a few important corrections to the
- -following packages:</p>
+<p>Ð?анное обновление пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка вноÑ?иÑ? неÑ?колÑ?ко важнÑ?Ñ? иÑ?пÑ?авлений длÑ? Ñ?ледÑ?Ñ?Ñ?иÑ?
+пакеÑ?ов:</p>
 <table border=0>
- -<tr><th>Package</th>               <th>Reason</th></tr>
- -<correction bareos                           "Fix permissions of bareos-dir logrotate config; fix file corruption when using SHA1 signature">
- -<correction base-files                       "Update for the point release">
- -<correction bind9                            "Import upcoming DNSSEC KSK-2017">
- -<correction cups                             "Disable SSLv3 and RC4 by default to address POODLE vulnerability">
- -<correction db                               "Do not access DB_CONFIG when db_home is not set [CVE-2017-10140]">
- -<correction db5.3                            "Do not access DB_CONFIG when db_home is not set [CVE-2017-10140]">
- -<correction debian-installer                 "Rebuild for the point release">
- -<correction debian-installer-netboot-images  "Rebuild for the point release">
- -<correction debmirror                        "Tolerate unknown lines in *.diff/Index; mirror DEP-11 metadata files; prefer xz over gz, and cope with either being missing; mirror and validate InRelease files">
- -<correction dns-root-data                    "Update root.hints to 2017072601 version; add KSK-2017 to root.key file">
- -<correction dput                             "dput.cf: replace security-master.debian.org with ftp.upload.security.debian.org">
- -<correction dwww                             "Fix <q>Last-Modified</q> header name">
- -<correction elog                             "Update patch 0005_elogd_CVE-2016-6342_fix to grant access as normal user">
- -<correction flightgear                       "Fix arbitrary file overwrite vulnerability [CVE-2017-13709]">
- -<correction gsoap                            "Fix integer overflow via large XML document [CVE-2017-9765]">
- -<correction hexchat                          "Fix segmentation fault following /server command">
- -<correction icu                              "Fix double free in createMetazoneMappings() [CVE-2017-14952]">
- -<correction kdepim                           "Fix <q>send Later with Delay bypasses OpenPGP</q> [CVE-2017-9604]">
- -<correction kedpm                            "Fix information leak via command history file [CVE-2017-8296]">
- -<correction keyringer                        "Handle subkeys without expiration date and public keys listed multiple times">
- -<correction krb5                             "Security fixes - remote authenticated attackers can crash the KDC [CVE-2017-11368]; kdc crash on restrict_anon_to_tgt [CVE-2016-3120]; remote DOS with ldap for authenticated attackers [CVE-2016-3119]; prevent requires_preauth bypass [CVE-2015-2694]">
- -<correction libdatetime-timezone-perl        "Update included data">
- -<correction libdbi                           "Re-enable error handler call in dbi_result_next_row()">
- -<correction libembperl-perl                  "Change hard dependency on mod_perl in zembperl.load to Recommends, fixing an installation failure when libapache2-mod-perl2 is not installed">
- -<correction libio-socket-ssl-perl            "Fix segfault using malformed client certificates">
- -<correction liblouis                         "Fix multiple stack-based buffer overflows [CVE-2014-8184]">
- -<correction libofx                           "Security fixes [CVE-2017-2816 CVE-2017-14731]">
- -<correction libwnckmm                        "Tighten dependencies between packages; use jquery.js from libjs-jquery">
- -<correction libwpd                           "Security fix [CVE-2017-14226]">
- -<correction libx11                           "Fix <q>insufficient validation of data from the X server can cause out of boundary memory read (XGetImage()) or write (XListFonts())</q> [CVE-2016-7942 CVE-2016-7943]">
- -<correction libxfixes                        "Fix integer overflow on illegal server response [CVE-2016-7944]">
- -<correction libxi                            "Fix <q>insufficient validation of data from the X server can cause out of boundary memory access or endless loops</q> [CVE-2016-7945 CVE-2016-7946]">
- -<correction libxrandr                        "Avoid out of boundary accesses on illegal responses [CVE-2016-7947 CVE-2016-7948]">
- -<correction libxtst                          "Fix <q>insufficient validation of data from the X server can cause out of boundary memory access or endless loops</q> [CVE-2016-7951 CVE-2016-7952]">
- -<correction libxv                            "Fix protocol handling issues in libXv [CVE-2016-5407]">
- -<correction libxvmc                          "Avoid buffer underflow on empty strings [CVE-2016-7953]">
- -<correction linux                            "New stable kernel version 3.16.51">
- -<correction ncurses                          "Fix various crash bugs in the tic library and the tic binary [CVE-2017-10684 CVE-2017-10685 CVE-2017-11112 CVE-2017-11113 CVE-2017-13728 CVE-2017-13729 CVE-2017-13730 CVE-2017-13731 CVE-2017-13732 CVE-2017-13734 CVE-2017-13733]">
- -<correction openssh                          "Test configuration before starting or reloading sshd under systemd; make <q>--</q> before the hostname terminate argument processing after the hostname too">
- -<correction pdns                             "Add missing check on API operations [CVE-2017-15091]">
- -<correction pdns-recursor                    "Fix configuration file injection in the API [CVE-2017-15093]">
- -<correction postgresql-9.4                   "New upstream bugfix release">
- -<correction python-tablib                    "Securely load YAML [CVE-2017-2810]">
- -<correction request-tracker4                 "Fix regression in previous security release where incorrect SHA256 passwords could trigger an error">
- -<correction ruby-ox                          "Avoid crash with invalid XML passed to Oj.parse_obj() [CVE-2017-15928]">
- -<correction sam2p                            "Fix several integer overflow or heap-based buffer overflow issues [CVE-2017-14628 CVE-2017-14629 CVE-2017-14630 CVE-2017-14631 CVE-2017-14636 CVE-2017-14637 CVE-2017-16663]">
- -<correction slurm-llnl                       "Fix security issue caused by insecure file path handling triggered by the failure of a Prolog script [CVE-2016-10030]">
- -<correction sudo                             "Fix arbitrary terminal access [CVE-2017-1000368]">
- -<correction syslinux                         "Fix boot problem for old BIOS firmware by correcting C/H/S order">
- -<correction tor                              "Add <q>Bastet</q> directory authority; update geoip and geoip6 to the October 4 2017 Maxmind GeoLite2 country database; fix a memset() off the end of an array when packing cells">
- -<correction transfig                         "Add input sanitisation on FIG files [CVE-2017-16899]; sanitize input of fill patterns">
- -<correction tzdata                           "New upstream release">
- -<correction unbound                          "Fix install of trust anchor when two anchors are present; include root trust anchor id 20326">
- -<correction weechat                          "<q>logger: call strftime before replacing buffer local variables</q> [CVE-2017-14727]">
+<tr><th>Ð?акеÑ?</th>               <th>Ð?Ñ?иÑ?ина</th></tr>
+<correction bareos                           "Ð?Ñ?пÑ?авление пÑ?ав доÑ?Ñ?Ñ?па наÑ?Ñ?Ñ?оек bareos-dir logrotate; иÑ?пÑ?авление повÑ?еждениÑ? Ñ?айлов пÑ?и иÑ?полÑ?зовании подпиÑ?ей SHA1">
+<correction base-files                       "Ð?бновление длÑ? данной Ñ?едакÑ?ии">
+<correction bind9                            "Ð?мпоÑ?Ñ? гоÑ?овÑ?Ñ?егоÑ?Ñ? набоÑ? Ñ?аÑ?Ñ?иÑ?ений DNSSEC KSK-2017">
+<correction cups                             "Ð?Ñ?клÑ?Ñ?ение по Ñ?молÑ?аниÑ? SSLv3 и RC4 длÑ? пÑ?оÑ?иводейÑ?Ñ?виÑ? Ñ?Ñ?звимоÑ?Ñ?и POODLE">
+<correction db                               "Ð?е обÑ?аÑ?аÑ?Ñ?Ñ?Ñ? к DB_CONFIG, еÑ?ли не Ñ?Ñ?Ñ?ановлена опÑ?иÑ? db_home [CVE-2017-10140]">
+<correction db5.3                            "Ð?е обÑ?аÑ?аÑ?Ñ?Ñ?Ñ? к DB_CONFIG, еÑ?ли не Ñ?Ñ?Ñ?ановлена опÑ?иÑ? db_home [CVE-2017-10140]">
+<correction debian-installer                 "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка длÑ? данной Ñ?едакÑ?ии">
+<correction debian-installer-netboot-images  "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка длÑ? данной Ñ?едакÑ?ии">
+<correction debmirror                        "Ð?опÑ?Ñ?ение неизвеÑ?Ñ?нÑ?Ñ? Ñ?Ñ?Ñ?ок в *.diff/Index; зеÑ?калиÑ?ование Ñ?айлов меÑ?аданнÑ?Ñ? DEP-11; пÑ?едпоÑ?ение xz над gz, Ñ?еагиÑ?ование в Ñ?лÑ?Ñ?ае, еÑ?ли оба оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?; зеÑ?калиÑ?ование и пÑ?овеÑ?ка Ñ?айлов InRelease">
+<correction dns-root-data                    "Ð?бновление root.hints до веÑ?Ñ?ии 2017072601; добавление KSK-2017 в Ñ?айл root.key">
+<correction dput                             "dput.cf: замена security-master.debian.org на ftp.upload.security.debian.org">
+<correction dwww                             "Ð?Ñ?пÑ?авление имени заголовка <q>Last-Modified</q>">
+<correction elog                             "Ð?бновление заплаÑ?Ñ? 0005_elogd_CVE-2016-6342_fix длÑ? пÑ?едоÑ?Ñ?авлениÑ? доÑ?Ñ?Ñ?па оÑ? лиÑ?а обÑ?Ñ?ного полÑ?зоваÑ?елÑ?">
+<correction flightgear                       "Ð?Ñ?пÑ?авление пеÑ?езапиÑ?и пÑ?оизволÑ?нÑ?Ñ? Ñ?айлов [CVE-2017-13709]">
+<correction gsoap                            "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел пÑ?и обÑ?абоÑ?ке болÑ?Ñ?ого докÑ?менÑ?а в Ñ?оÑ?маÑ?е XML [CVE-2017-9765]">
+<correction hexchat                          "Ð?Ñ?пÑ?авление оÑ?ибки Ñ?егменÑ?иÑ?ованиÑ? поÑ?ле командÑ? /server">
+<correction icu                              "Ð?Ñ?пÑ?авление двойного оÑ?вобождениÑ? памÑ?Ñ?и в Ñ?Ñ?нкÑ?ии createMetazoneMappings() [CVE-2017-14952]">
+<correction kdepim                           "Ð?Ñ?пÑ?авление оÑ?ибки <q>оÑ?пÑ?авка позже Ñ? задеÑ?жкой пÑ?иводиÑ? к обÑ?одÑ? OpenPGP</q> [CVE-2017-9604]">
+<correction kedpm                            "Ð?Ñ?пÑ?авление Ñ?Ñ?еÑ?ки инÑ?оÑ?маÑ?ии из-за Ñ?айла иÑ?Ñ?оÑ?ии команд [CVE-2017-8296]">
+<correction keyringer                        "Ð?бÑ?абоÑ?ка подклÑ?Ñ?ей без даÑ?Ñ? иÑ?Ñ?еÑ?ениÑ? Ñ?Ñ?ока иÑ?полÑ?зованиÑ? и оÑ?кÑ?Ñ?Ñ?Ñ?Ñ? клÑ?Ñ?ей, Ñ?казаннÑ?Ñ? в Ñ?пиÑ?ке неÑ?колÑ?ко Ñ?аз">
+<correction krb5                             "Ð?Ñ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и &mdash; Ñ?далÑ?ннÑ?е аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?е злоÑ?мÑ?Ñ?ленники могÑ?Ñ? аваÑ?ийно завеÑ?Ñ?иÑ?Ñ? Ñ?абоÑ?Ñ? KDC [CVE-2017-11368]; аваÑ?ийнаÑ? оÑ?Ñ?ановка kdc пÑ?и restrict_anon_to_tgt [CVE-2016-3120]; Ñ?далÑ?ннÑ?й оÑ?каз в обÑ?лÑ?живании ldap длÑ? аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?Ñ? злоÑ?мÑ?Ñ?ленников [CVE-2016-3119]; пÑ?едоÑ?вÑ?аÑ?ение обÑ?ода requires_preauth [CVE-2015-2694]">
+<correction libdatetime-timezone-perl        "Ð?бновление даннÑ?Ñ?, вÑ?одÑ?Ñ?иÑ? в Ñ?оÑ?Ñ?ав пакеÑ?а">
+<correction libdbi                           "Ð?овÑ?оÑ?ное вклÑ?Ñ?ение вÑ?зова обÑ?абоÑ?Ñ?ика оÑ?ибок в Ñ?Ñ?нкÑ?ии dbi_result_next_row()">
+<correction libembperl-perl                  "Ð?зменение жÑ?Ñ?Ñ?кой завиÑ?имоÑ?Ñ?и оÑ? mod_perl в zembperl.load на Ñ?екомендÑ?емÑ?Ñ? завиÑ?имоÑ?Ñ?Ñ?, иÑ?пÑ?авление оÑ?ибок Ñ?Ñ?Ñ?ановки, когда не Ñ?Ñ?Ñ?ановлен пакеÑ? libapache2-mod-perl2">
+<correction libio-socket-ssl-perl            "Ð?Ñ?пÑ?авление оÑ?ибок Ñ?егменÑ?иÑ?ованиÑ? пÑ?и иÑ?полÑ?зовании Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? клиенÑ?Ñ?киÑ? Ñ?еÑ?Ñ?иÑ?икаÑ?ов">
+<correction liblouis                         "Ð?Ñ?пÑ?авление многоÑ?иÑ?леннÑ?Ñ? пеÑ?еполнений бÑ?Ñ?еÑ?а [CVE-2014-8184]">
+<correction libofx                           "Ð?Ñ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и [CVE-2017-2816 CVE-2017-14731]">
+<correction libwnckmm                        "УÑ?иление завиÑ?имоÑ?Ñ?ей междÑ? пакеÑ?ами; иÑ?полÑ?зование jquery.js из пакеÑ?а libjs-jquery">
+<correction libwpd                           "Ð?Ñ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и [CVE-2017-14226]">
+<correction libx11                           "Ð?Ñ?пÑ?авление оÑ?ибки <q>недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка даннÑ?Ñ? оÑ? X-Ñ?еÑ?веÑ?а можеÑ? пÑ?иводиÑ?Ñ? к Ñ?Ñ?ениÑ? (XGetImage()) или запиÑ?и (XListFonts()) за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и</q> [CVE-2016-7942 CVE-2016-7943]">
+<correction libxfixes                        "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел пÑ?и полÑ?Ñ?ении некоÑ?Ñ?екÑ?ного оÑ?веÑ?а Ñ?еÑ?веÑ?а [CVE-2016-7944]">
+<correction libxi                            "Ð?Ñ?пÑ?авление оÑ?ибки <q>недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка даннÑ?Ñ? оÑ? X-Ñ?еÑ?веÑ?а можеÑ? пÑ?иводиÑ?Ñ? к обÑ?аÑ?ениÑ?м за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и или беÑ?конеÑ?нÑ?м Ñ?иклами</q> [CVE-2016-7945 CVE-2016-7946]">
+<correction libxrandr                        "Ð?Ñ?пÑ?авление обÑ?аÑ?ений за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и пÑ?и некоÑ?Ñ?екÑ?нÑ?Ñ? оÑ?веÑ?аÑ? [CVE-2016-7947 CVE-2016-7948]">
+<correction libxtst                          "Ð?Ñ?пÑ?авление оÑ?ибки <q>недоÑ?Ñ?аÑ?оÑ?наÑ? пÑ?овеÑ?ка даннÑ?Ñ? оÑ? X-Ñ?еÑ?веÑ?а можеÑ? пÑ?иводиÑ?Ñ? к обÑ?аÑ?ениÑ?м за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и или беÑ?конеÑ?нÑ?м Ñ?иклами</q> [CVE-2016-7951 CVE-2016-7952]">
+<correction libxv                            "Ð?Ñ?пÑ?авление оÑ?ибок обÑ?абоÑ?ки пÑ?оÑ?окола в libXv [CVE-2016-5407]">
+<correction libxvmc                          "Ð?Ñ?пÑ?авление оÑ?Ñ?иÑ?аÑ?елÑ?ного пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а пÑ?и Ñ?абоÑ?е Ñ? пÑ?Ñ?Ñ?Ñ?ми Ñ?Ñ?Ñ?оками [CVE-2016-7953]">
+<correction linux                            "Ð?оваÑ? Ñ?Ñ?абилÑ?наÑ? веÑ?Ñ?иÑ? Ñ?дÑ?а 3.16.51">
+<correction ncurses                          "Ð?Ñ?пÑ?авление Ñ?азлиÑ?нÑ?Ñ? оÑ?ибок, пÑ?иводÑ?Ñ?иÑ? к аваÑ?ийнÑ?м оÑ?Ñ?ановкам, в библиоÑ?еке tic и двоиÑ?ном Ñ?айле tic [CVE-2017-10684 CVE-2017-10685 CVE-2017-11112 CVE-2017-11113 CVE-2017-13728 CVE-2017-13729 CVE-2017-13730 CVE-2017-13731 CVE-2017-13732 CVE-2017-13734 CVE-2017-13733]">
+<correction openssh                          "Ð?Ñ?овеÑ?ка наÑ?Ñ?Ñ?оек до запÑ?Ñ?ка или пеÑ?езагÑ?Ñ?зки наÑ?Ñ?Ñ?оек sshd под systemd; Ñ?епеÑ?Ñ? <q>--</q> до имени Ñ?зла завеÑ?Ñ?аеÑ? обÑ?абоÑ?кÑ? аÑ?гÑ?менÑ?ов поÑ?ле имени Ñ?зла">
+<correction pdns                             "Ð?обавление оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?Ñ?Ñ?ей пÑ?овеÑ?ки API-опеÑ?аÑ?ий [CVE-2017-15091]">
+<correction pdns-recursor                    "Ð?Ñ?пÑ?авление добавлениÑ? Ñ?айла наÑ?Ñ?Ñ?оек в API [CVE-2017-15093]">
+<correction postgresql-9.4                   "Ð?оваÑ? веÑ?Ñ?иÑ? из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки Ñ? иÑ?пÑ?авлениÑ?ми оÑ?ибок">
+<correction python-tablib                    "Ð?езопаÑ?наÑ? загÑ?Ñ?зка YAML [CVE-2017-2810]">
+<correction request-tracker4                 "Ð?Ñ?пÑ?авление Ñ?егÑ?еÑ?Ñ?ии в пÑ?едÑ?дÑ?Ñ?ем иÑ?пÑ?авлении безопаÑ?ноÑ?Ñ?и, пÑ?и коÑ?оÑ?ой непÑ?авилÑ?нÑ?е паÑ?оли SHA256 могÑ?Ñ? вÑ?зÑ?ваÑ?Ñ? оÑ?ибкÑ?">
+<correction ruby-ox                          "Ð?Ñ?пÑ?авление аваÑ?ийной оÑ?Ñ?ановки пÑ?и вÑ?полнении гÑ?аммаÑ?иÑ?еÑ?кого Ñ?азбоÑ?а XML, пеÑ?едаваемого Oj.parse_obj() [CVE-2017-15928]">
+<correction sam2p                            "Ð?Ñ?пÑ?авление неÑ?колÑ?киÑ? пеÑ?еполнений бÑ?Ñ?еÑ?а или пеÑ?еполнений динамиÑ?еÑ?кой памÑ?Ñ?и [CVE-2017-14628 CVE-2017-14629 CVE-2017-14630 CVE-2017-14631 CVE-2017-14636 CVE-2017-14637 CVE-2017-16663]">
+<correction slurm-llnl                       "Ð?Ñ?пÑ?авление пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и, вÑ?зÑ?ваемой небезопаÑ?ной обÑ?абоÑ?кой пÑ?Ñ?и к Ñ?айлÑ? и пÑ?оÑ?влÑ?Ñ?Ñ?ейÑ?Ñ? пÑ?и оÑ?ибке в Ñ?Ñ?енаÑ?ии на Ñ?зÑ?ке Prolog [CVE-2016-10030]">
+<correction sudo                             "Ð?Ñ?пÑ?авление пÑ?оизволÑ?ного доÑ?Ñ?Ñ?па к Ñ?еÑ?миналÑ? [CVE-2017-1000368]">
+<correction syslinux                         "Ð?Ñ?пÑ?авление пÑ?облем загÑ?Ñ?зки пÑ?и иÑ?полÑ?зовании Ñ?Ñ?аÑ?Ñ?Ñ? пÑ?оÑ?ивок BIOS пÑ?Ñ?Ñ?м иÑ?пÑ?авлениÑ? поÑ?Ñ?дка C/H/S">
+<correction tor                              "Ð?обавление авÑ?оÑ?иÑ?еÑ?а каÑ?алога <q>Bastet</q>; обновление geoip и geoip6 до веÑ?Ñ?ии оÑ? 4 окÑ?Ñ?бÑ?Ñ? 2017 из базÑ? даннÑ?Ñ? Ñ?Ñ?Ñ?ан Maxmind GeoLite2; иÑ?пÑ?авление вÑ?Ñ?ода за пÑ?еделÑ? маÑ?Ñ?ива в memset() пÑ?и паковке Ñ?Ñ?еек">
+<correction transfig                         "Ð?обавление оÑ?иÑ?Ñ?ки вÑ?Ñ?однÑ?Ñ? даннÑ?Ñ? длÑ? Ñ?айлов FIG [CVE-2017-16899]; sanitize input of fill patterns">
+<correction tzdata                           "Ð?овÑ?й вÑ?пÑ?Ñ?к из оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки">
+<correction unbound                          "Ð?Ñ?пÑ?авление Ñ?Ñ?Ñ?ановки довеÑ?енного Ñ?коÑ?Ñ?, еÑ?ли имеÑ?Ñ?Ñ?Ñ? два Ñ?коÑ?Ñ?; добавление Ñ?коÑ?Ñ? довеÑ?иÑ? коÑ?нÑ? Ñ? иденÑ?иÑ?икаÑ?оÑ?ом 20326">
+<correction weechat                          "<q>logger: вÑ?зов strftime до заменÑ? локалÑ?нÑ?Ñ? пеÑ?еменнÑ?Ñ? бÑ?Ñ?еÑ?а</q> [CVE-2017-14727]">
 </table>
 
- -<h2>Security Updates</h2>
+<h2>Ð?бновлениÑ? безопаÑ?ноÑ?Ñ?и</h2>
 
 
- -<p>This revision adds the following security updates to the oldstable
- -release. The Security Team has already released an advisory for each of
- -these updates:</p>
+<p>Ð? даннÑ?й вÑ?пÑ?Ñ?к внеÑ?енÑ? Ñ?ледÑ?Ñ?Ñ?ие обновлениÑ? безопаÑ?ноÑ?Ñ?и. Ð?оманда
+безопаÑ?ноÑ?Ñ?и Ñ?же вÑ?пÑ?Ñ?Ñ?ила Ñ?екомендаÑ?ии длÑ? каждого
+из Ñ?Ñ?иÑ? обновлений:</p>
 
 <table border=0>
- -<tr><th>Advisory ID</th>  <th>Package</th></tr>
+<tr><th>Ð?денÑ?иÑ?икаÑ?ионнÑ?й номеÑ? Ñ?екомендаÑ?ии</th>  <th>Ð?акеÑ?</th></tr>
 
 
 <dsa 2017 3904 bind9>
@@ -221,70 +222,69 @@
 
 </table>
 
- -<h2>Removed packages</h2>
+<h2>УдалÑ?ннÑ?е пакеÑ?Ñ?</h2>
 
- -<p>The following packages were removed due to circumstances beyond our
- -control:</p>
+<p>СледÑ?Ñ?Ñ?ие пакеÑ?Ñ? бÑ?ли Ñ?даленÑ? из-за обÑ?Ñ?оÑ?Ñ?елÑ?Ñ?Ñ?в, на коÑ?оÑ?Ñ?е мÑ? не
+можем повлиÑ?Ñ?Ñ?:</p>
 
 
 <table border=0>
- -<tr><th>Package</th>               <th>Reason</th></tr>
+<tr><th>Ð?акеÑ?</th>               <th>Ð?Ñ?иÑ?ина</th></tr>
 
- -<correction libnet-ping-external-perl "Unmaintained, security issues">
- -<correction aiccu                     "Useless since shutdown of SixXS">
+<correction libnet-ping-external-perl "Ð?е Ñ?опÑ?овождаеÑ?Ñ?Ñ?, пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и">
+<correction aiccu                     "Ð?еÑ?полезен в Ñ?вÑ?зи Ñ? пÑ?екÑ?аÑ?ением Ñ?абоÑ?Ñ? SixXS">
 </table>
 
- -<h2>Debian Installer</h2>
- -<p>The installer has been updated to include the fixes incorporated into
- -stable by the point release.</p>
+<h2>Ð?Ñ?огÑ?амма Ñ?Ñ?Ñ?ановки Debian</h2>
 
- -<h2>URLs</h2>
+Ð?Ñ?огÑ?амма Ñ?Ñ?Ñ?ановки бÑ?ла обновлена Ñ? Ñ?елÑ?Ñ? вклÑ?Ñ?ениÑ? иÑ?пÑ?авлений, добавленнÑ?Ñ? в
+даннÑ?Ñ? Ñ?едакÑ?иÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.
 
- -<p>The complete lists of packages that have changed with this
- -revision:</p>
+<h2>URL</h2>
+
+<p>Ð?олнÑ?й Ñ?пиÑ?ок пакеÑ?ов, коÑ?оÑ?Ñ?е бÑ?ли измененÑ? в данной
+Ñ?едакÑ?ии:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
 </div>
 
- -<p>The current oldstable distribution:</p>
+<p>ТекÑ?Ñ?ий пÑ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/oldstable/";>
 </div>
 
- -<p>Proposed updates to the oldstable distribution:</p>
+<p>Ð?Ñ?едлагаемÑ?е обновлениÑ? длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/oldstable-proposed-updates";>
 </div>
 
- -<p>oldstable distribution information (release notes, errata etc.):</p>
+<p>Ð?нÑ?оÑ?маÑ?иÑ? о пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (инÑ?оÑ?маÑ?иÑ? о вÑ?пÑ?Ñ?ке, извеÑ?Ñ?нÑ?е оÑ?ибки и Ñ?. д.):</p>
 
 <div class="center">
   <a
   href="$(HOME)/releases/oldstable/">https://www.debian.org/releases/oldstable/</a>
 </div>
 
- -<p>Security announcements and information:</p>
+<p>Ð?нонÑ?Ñ? безопаÑ?ноÑ?Ñ?и и инÑ?оÑ?маÑ?иÑ?:</p>
 
 <div class="center">
   <a href="$(HOME)/security/">https://security.debian.org/</a>
 </div>
 
 
- -<h2>About Debian</h2>
+<h2>Ð? Debian</h2>
 
- -<p>The Debian Project is an association of Free Software developers who
- -volunteer their time and effort in order to produce the completely free
- -operating system Debian.</p>
+<p>Ð?Ñ?оекÑ? Debian â?? обÑ?единение Ñ?азÑ?абоÑ?Ñ?иков Ñ?вободного пÑ?огÑ?аммного обеÑ?пеÑ?ениÑ?,
+коÑ?оÑ?Ñ?е жеÑ?Ñ?вÑ?Ñ?Ñ? Ñ?воÑ? вÑ?емÑ? и знаниÑ? длÑ? Ñ?озданиÑ? абÑ?олÑ?Ñ?но Ñ?вободной
+опеÑ?аÑ?ионной Ñ?иÑ?Ñ?емÑ? Debian.</p>
 
 
- -<h2>Contact Information</h2>
+<h2>Ð?онÑ?акÑ?наÑ? инÑ?оÑ?маÑ?иÑ?</h2>
 
- -<p>For further information, please visit the Debian web pages at <a
- -href="$(HOME)/">https://www.debian.org/</a>, send mail to
- -&lt;press@debian.org&gt;, or contact the stable release team at
+<p>Ð?олее подÑ?обнÑ?Ñ? инÑ?оÑ?маÑ?иÑ? вÑ? можеÑ?е полÑ?Ñ?иÑ?Ñ? на Ñ?айÑ?е Debian
+<a href="$(HOME)/">https://www.debian.org/</a>, либо оÑ?пÑ?авив пиÑ?Ñ?мо по адÑ?еÑ?Ñ?
+&lt;press@debian.org&gt;, либо Ñ?вÑ?завÑ?иÑ?Ñ? Ñ? командой Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка по адÑ?еÑ?Ñ?
 &lt;debian-release@lists.debian.org&gt;.</p>
- -
- -
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlosJvkACgkQXudu4gIW
0qVtCQ/+IMTVJC6Jitxf3P1i+RoDa6bnM8dNYua09zBE4bkcZr1IHvY4PrLpIMNG
6CgegLoSOq/2cq2Vr0SrhibeXfBZnGNeU9J9BAaznP/s1RdvmLfjL09aDXEZis0c
leiudTyrG4CLk88zISb49Tnq/dkvtUxPYIyo9/3YaK0+0D/wu5eyO8rk+suhOEMU
WNU7Do6YsSWpLN0DXxBG7Y9G1fibDA1fiG5fLub+RmwveJY+7/6MH3PhnuJAlwrW
TfcQ1rkh3k5srg2XOFkE8/l0M/INUb+VbNtwxKDYGdyMOxnGc26lr/vn0BtiQfO1
rZSExtrroUQbex6h0SqnsoISUKj5W3fIXEWgtIGTY/e2sAGa0xLtQsmrzNdN9oeb
S2UsFOpuuDtJBVKTnntkxzCDW7CarP3ewRQkQ1D/nEDFI0sZqsIC38capxjjh8ek
FnOB+4WAqzdoOwvrjneQk4dPD/UaJXS1AwndLjb60ftTp8ihgyVn6zoZG9j2i0fJ
ISehlmjDOMmWgfeNO3QfjOIFYyH92EOOC6jUjAiSCF/LlSiCeja8+tjHhMbMdUkQ
U/HIwzVY+4uodEV9/A1gCoZy6nrMQhBsJlnmIwQUkxMtqT1j0ClMpupDnAU+yjjw
8FStI+KdYdAqKUbKflBb8GbIKbFE+dM0JhmB2gQv+LOPKtH9/30=
=5Wr4
-----END PGP SIGNATURE-----


Reply to: