[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://News/2017/{index,20170114}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/News/2017/20170114.wml	2017-01-14 23:17:38.000000000 +0500
+++ russian/News/2017/20170114.wml	2017-01-16 00:45:50.421742773 +0500
@@ -1,4 +1,5 @@
- -<define-tag pagetitle>Updated Debian 8: 8.7 released</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag pagetitle>Ð?бновлÑ?ннÑ?й Debian 8: вÑ?пÑ?Ñ?к 8.7</define-tag>
 <define-tag release_date>2017-01-14</define-tag>
 #use wml::debian::news
 # $Id:
@@ -24,138 +25,138 @@
 
 <define-tag srcpkg><a href="https://packages.debian.org/src:%0";>%0</a></define-tag>
 
- -<p>The Debian project is pleased to announce the seventh update of its
- -stable distribution Debian <release> (codename <q><codename></q>). 
- -This update mainly adds corrections for security problems to the stable
- -release, along with a few adjustments for serious problems.  Security advisories
- -were already published separately and are referenced where available.</p>
- -
- -<p>Please note that this update does not constitute a new version of Debian
- -<release> but only updates some of the packages included.  There is
- -no need to throw away old <q><codename></q> CDs or DVDs but only to update
- -via an up-to-date Debian mirror after an installation, to cause any out of
- -date packages to be updated.</p>
- -
- -<p>Those who frequently install updates from security.debian.org won't have
- -to update many packages and most updates from security.debian.org are
- -included in this update.</p>
- -
- -<p>New installation media and CD and DVD images containing updated packages
- -will be available soon at the regular locations.</p>
- -
- -<p>Upgrading to this revision online is usually done by pointing the
- -aptitude (or apt) package tool (see the sources.list(5) manual page) to
- -one of Debian's many FTP or HTTP mirrors.  A comprehensive list of
- -mirrors is available at:</p>
+<p>Ð?Ñ?оекÑ? Debian Ñ? Ñ?адоÑ?Ñ?Ñ?Ñ? Ñ?ообÑ?аеÑ? о Ñ?едÑ?мом обновлении Ñ?воего
+Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка Debian <release> (кодовое имÑ? <q><codename></q>).
+ЭÑ?о обновление в оÑ?новном Ñ?одеÑ?жиÑ? иÑ?пÑ?авлениÑ? пÑ?облем безопаÑ?ноÑ?Ñ?и Ñ?Ñ?абилÑ?ного
+вÑ?пÑ?Ñ?ка, а Ñ?акже неÑ?колÑ?ко коÑ?Ñ?екÑ?иÑ?овок Ñ?еÑ?Ñ?Ñ?знÑ?Ñ? пÑ?облем. РекомендаÑ?ии по безопаÑ?ноÑ?Ñ?и
+опÑ?бликованÑ? оÑ?делÑ?но и Ñ?казÑ?ваÑ?Ñ?Ñ?Ñ? пÑ?и необÑ?одимоÑ?Ñ?и.</p>
+
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?о обновление не Ñ?влÑ?еÑ?Ñ?Ñ? новой веÑ?Ñ?ией Debian
+<release>, а лиÑ?Ñ? обновлением некоÑ?оÑ?Ñ?Ñ? вклÑ?Ñ?Ñ?ннÑ?Ñ? в вÑ?пÑ?Ñ?к пакеÑ?ов. Ð?еÑ?
+необÑ?одимоÑ?Ñ?и вÑ?бÑ?аÑ?Ñ?ваÑ?Ñ? компакÑ?-диÑ?ки и DVD Ñ? вÑ?пÑ?Ñ?ком <q><codename></q>, длÑ? обновлениÑ?
+Ñ?Ñ?Ñ?аÑ?евÑ?иÑ? пакеÑ?ов нÑ?жно лиÑ?Ñ? обновиÑ?Ñ?Ñ?Ñ? Ñ?еÑ?ез акÑ?Ñ?алÑ?ное зеÑ?кало Debian
+поÑ?ле Ñ?Ñ?Ñ?ановки.</p>
+
+<p>Тем, кÑ?о Ñ?аÑ?Ñ?о Ñ?Ñ?Ñ?анавливаеÑ? обновлениÑ? Ñ? security.debian.org, не пÑ?идÑ?Ñ?Ñ?Ñ?
+обновлÑ?Ñ?Ñ? много пакеÑ?ов, болÑ?Ñ?инÑ?Ñ?во обновлений Ñ? security.debian.org
+вклÑ?Ñ?енÑ? в данное обновление.</p>
+
+<p>Ð?овÑ?е Ñ?Ñ?Ñ?ановоÑ?нÑ?е ноÑ?иÑ?ели, обÑ?азÑ? компакÑ?-диÑ?ков и DVD, Ñ?одеÑ?жаÑ?ие обновлÑ?ннÑ?е пакеÑ?Ñ?,
+бÑ?дÑ?Ñ? доÑ?Ñ?Ñ?пнÑ? позже в обÑ?Ñ?ном меÑ?Ñ?е.</p>
+
+<p>Ð?бновление до Ñ?Ñ?ого вÑ?пÑ?Ñ?ка по Ñ?еÑ?и пÑ?оизводиÑ?Ñ?Ñ? обÑ?Ñ?нÑ?м Ñ?поÑ?обом &mdash; Ñ?казанием
+aptitude (или apt) (Ñ?м. Ñ?пÑ?авоÑ?нÑ?Ñ? Ñ?Ñ?Ñ?аниÑ?Ñ? sources.list(5))
+одного из многиÑ? FTP или HTTP зеÑ?кал Debian. Ð?Ñ?Ñ?еÑ?пÑ?ваÑ?Ñ?ий Ñ?пиÑ?ок
+зеÑ?кал доÑ?Ñ?Ñ?пен на Ñ?Ñ?Ñ?аниÑ?е:</p>
 
 <div class="center">
   <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
 </div>
 
- -<h2>Miscellaneous Bugfixes</h2>
+<h2>Ð?Ñ?пÑ?авлениÑ? Ñ?азлиÑ?нÑ?Ñ? оÑ?ибок</h2>
 
- -<p>This stable update adds a few important corrections to the following
- -packages:</p>
+<p>Ð?анное Ñ?Ñ?абилÑ?ное обновление вноÑ?иÑ? неÑ?колÑ?ко важнÑ?Ñ? иÑ?пÑ?авлений длÑ? Ñ?ледÑ?Ñ?Ñ?иÑ?
+пакеÑ?ов:</p>
 <table border=0>
- -<tr><th>Package</th>               <th>Reason</th></tr>
- -<correction ark                              "Stop crashing on exit when being used solely as a KPart">
- -<correction asterisk                         "Fix security issue due to non-printable ASCII chars treated as whitespace [CVE-2016-9938]">
- -<correction asused                           "Use created fields instead of changed, in line with changes to source data">
- -<correction base-files                       "Change /etc/debian_version to 8.7">
- -<correction bash                             "Fix arbitrary code execution via malicious hostname [CVE-2016-0634] and specially crafted SHELLOPTS+PS4 variables allows command substitution [CVE-2016-7543]">
- -<correction ca-certificates                  "Update Mozilla certificate authority bundle to version 2.9; postinst: run update-certificates without hooks to initially populate /etc/ssl/certs">
- -<correction cairo                            "Fix DoS via using SVG to generate invalid pointers [CVE-2016-9082]">
- -<correction ccache                           "[amd64] Rebuild in a clean environment">
- -<correction ceph                             "Fix short CORS request issue [CVE-2016-9579], mon DoS [CVE-2016-5009], anonymous read on ACL [CVE-2016-7031], RGW DoS [CVE-2016-8626]">
- -<correction chirp                            "Disable reporting of telemetry by default">
- -<correction cyrus-imapd-2.4                  "Fix LIST GROUP support">
- -<correction darktable                        "Fix integer overflow in ljpeg_start() [CVE-2015-3885]">
- -<correction dbus                             "Fix potential format string vulnerability; dbus.prerm: ensure that dbus.socket is stopped before removal">
- -<correction debian-edu-doc                   "Update Debian Edu Jessie manual from the wiki; fix (da|nl) Jessie manual PO files to get the PDF manuals built; translation updates">
- -<correction debian-edu-install               "Update version number to 8+edu1">
- -<correction debian-installer                 "Rebuild for the point release">
- -<correction debian-installer-netboot-images  "Rebuild for the point release">
- -<correction duck                             "Fix loading of code from untrusted location [CVE-2016-1239]">
- -<correction e2fsprogs                        "Rebuild against dietlibc 0.33~cvs20120325-6+deb8u1, to pick up included security fixes">
- -<correction ebook-speaker                    "Fix hint about installing html2text to read html files">
- -<correction elog                             "Fix posting entry as arbitrary username [CVE-2016-6342]">
- -<correction evolution-data-server            "Fix premature drop of connection with reduced TCP window sizes and resulting loss of data">
- -<correction exim4                            "Fix GnuTLS memory leak">
- -<correction file                             "Fix memory leak in magic loader">
- -<correction ganeti-instance-debootstrap      "Fix losetup invocations by replacing -s with --show">
- -<correction glibc                            "Do not unconditionally use the fsqrt instruction on 64-bit PowerPC CPUs; fix a regression introduced by cvs-resolv-ipv6-nameservers.diff in hesiod; disable lock elision (aka Intel TSX) on x86 architectures">
- -<correction glusterfs                        "Quota: Fix could not start auxiliary mount issue">
- -<correction gnutls28                         "Fix incorrect certificate validation when using OCSP responses [GNUTLS-SA-2016-3 / CVE-2016-7444]; ensure compatibility with CVE-2016-6489-patched nettle">
- -<correction hplip                            "Use full gpg key fingerprint when fetching key from keyservers [CVE-2015-0839]">
- -<correction ieee-data                        "Disable monthly update cron job">
- -<correction intel-microcode                  "Update microcode">
- -<correction irssi                            "Fix information exposure issue via buf.pl and /upgrade [CVE-2016-7553]; fix NULL pointer dereference in the nickcmp function [CVE-2017-5193], use-after-free when receiving invalid nick message [CVE-2017-5194] and out-of-bounds read in certain incomplete control codes [CVE-2017-5195]">
- -<correction isenkram                         "Download firmware using curl; use HTTPS when downloading modaliases; change mirror from http.debian.net to httpredir.debian.org">
- -<correction jq                               "Fix heap buffer overflow [CVE-2015-8863] and stack exhaustion [CVE-2016-4074]">
- -<correction libclamunrar                     "Fix out-of-band access">
- -<correction libdatetime-timezone-perl        "Update to 2016h; update included data to 2016i; update to 2016j; update to 2016g">
- -<correction libfcgi-perl                     "Fix <q>numerous connections cause segfault DoS</q> [CVE-2012-6687]">
- -<correction libio-socket-ssl-perl            "Fix issue with incorrect <q>unreadable SSL_key_file</q> error when using filesystem ACLs">
- -<correction libmateweather                   "Switch from discontinued weather.noaa.gov to aviationweather.gov">
- -<correction libphp-adodb                     "Fix XSS vulnerability [CVE-2016-4855] and SQL injection issue [CVE-2016-7405]">
- -<correction libpng                           "Fix null pointer deference issue [CVE-2016-10087]">
- -<correction libwmf                           "Fix allocating huge block of memory [CVE-2016-9011]">
- -<correction linkchecker                      "Fix HTTPS checks">
- -<correction linux                            "Update to stable 3.16.39; add chaoskey driver, backported from 4.8, support for n25q256a11 SPI flash device; security,perf: Allow unprivileged use of perf_event_open to be disabled; several bug and security fixes">
- -<correction lxc                              "Attach: do not send procfd to attached process [CVE-2016-8649]; remount bind mounts if read-only flag is provided; fix Alpine Linux container creation">
- -<correction mapserver                        "Fix FTBFS with php &gt;= 5.6.25; fix information leak via error messages [CVE-2016-9839]">
- -<correction mdadm                            "Allow '--grow --continue' to successfully reshape an array when using backup space on a 'spare' device">
- -<correction metar                            "Update report URL">
- -<correction minissdpd                        "Fix improper validation of array index vulnerability [CVE-2016-3178 CVE-2016-3179]">
- -<correction monotone                         "Change the sigpipe test case to write 1M of test data to increase chances of overflowing the pipe buffer">
- -<correction most                             "Fix shell injection attack when opening lzma-compressed files [CVE-2016-1253]">
- -<correction mpg123                           "Fix DoS with crafted ID3v2 tags">
- -<correction musl                             "Fix integer overflow [CVE-2016-8859]">
- -<correction nbd                              "Stop mixing global flags into the flags field that gets sent to the kernel, so that connecting to nbd-server &gt;= 3.9 does not cause every export to be (incorrectly) marked as read-only">
- -<correction nettle                           "Protect against potential side-channel attacks against exponentiation operations [CVE-2016-6489]">
- -<correction nss-pam-ldapd                    "Have init script stop action only return when nslcd has actually stopped">
- -<correction nvidia-graphics-drivers          "Update to new driver version, including security fixes [CVE-2016-8826 CVE-2016-7382 CVE-2016-7389]">
- -<correction nvidia-graphics-drivers-legacy-304xx "Update to new driver version, including security fixes [CVE-2016-8826 CVE-2016-7382 CVE-2016-7389]">
- -<correction nvidia-graphics-modules          "Rebuild against nvidia-kernel-source 340.101">
- -<correction openbox                          "Add libxcursor-dev build-dependency to fix loading of startup notifications; replace getgrent with getgroups so as not to enumerate all groups at startup">
- -<correction opendkim                         "Fix relaxed canonicalization of folded headers, which broke signatures">
- -<correction pam                              "Fix handling of loginuid in containers">
- -<correction pgpdump                          "Fix endless loop parsing specially crafted input in read_binary [CVE-2016-4021] and buffer overrun in read_radix64">
- -<correction postgresql-9.4                   "New upstream release">
- -<correction postgresql-common                "Pg_upgradecluster: Properly upgrade databases with non-login role owners; pg_ctlcluster: Protect against symlink in /var/log/postgresql/ allowing the creation of arbitrary files elsewhere [CVE-2016-1255]">
- -<correction potrace                          "Security fixes [CVE-2016-8694 CVE-2016-8695 CVE-2016-8696 CVE-2016-8697 CVE-2016-8698 CVE-2016-8699 CVE-2016-8700 CVE-2016-8701 CVE-2016-8702  CVE-2016-8703]">
- -<correction python-crypto                    "Raise a warning when IV is used with ECB or CTR and ignore the IV [CVE-2013-7459]">
- -<correction python-werkzeug                  "Fix XSS issue in debugger">
- -<correction qtbase-opensource-src            "Prevent bad-ptrs deref in QNetworkConfigurationManagerPrivate; fix X11 tray icons on some desktops">
- -<correction rawtherapee                      "Fix buffer overflow in dcraw [CVE-2015-8366]">
- -<correction redmine                          "Handle dependency check failure when triggered, to avoid breaking in the middle of dist-upgrades; avoid opening database configuration that are not readable">
- -<correction samba                            "Fix <q>client side SMB2/3 required signing can be downgraded</q> [CVE-2016-2119], various regressions introduced by the 4.2.10 security fixes, segfault with clustering">
- -<correction sed                              "Ensure consistent permissions with different umasks">
- -<correction shutter                          "Fix insecure usage of system() [CVE-2015-0854]">
- -<correction sniffit                          "Security fix [CVE-2014-5439]">
- -<correction suckless-tools                   "Fix SEGV in slock when user's account has been disabled [CVE-2016-6866]">
- -<correction sympa                            "Fix logrotate configuration so that sympa is not left in a confused state when systemd is used">
- -<correction systemd                          "Don't return any error in manager_dispatch_notify_fd() [CVE-2016-7796]; core: Rework logic to determine when we decide to add automatic deps for mounts; various ordering fixes for ifupdown; systemctl: Fix argument handling when invoked as shutdown; localed: tolerate absence of /etc/default/keyboard; systemctl, loginctl, etc.: Don't start polkit agent when running as root">
- -<correction tevent                           "New upstream version, required for samba">
- -<correction tre                              "Fix regex integer overflow in buffer size computations [CVE-2016-8859]">
- -<correction tzdata                           "Update included data to 2016h; update to 2016g; update to 2016j; update included data to 2016i">
- -<correction unrtf                            "Fix buffer overflow in various cmd_ functions [CVE-2016-10091]">
- -<correction w3m                              "Several security fixes [CVE-2016-9430 CVE-2016-9434 CVE-2016-9438 CVE-2016-9440 CVE-2016-9441 CVE-2016-9423 CVE-2016-9431 CVE-2016-9424 CVE-2016-9432 CVE-2016-9433 CVE-2016-9437 CVE-2016-9422 CVE-2016-9435 CVE-2016-9436 CVE-2016-9426 CVE-2016-9425 CVE-2016-9428 CVE-2016-9442 CVE-2016-9443 CVE-2016-9429 CVE-2016-9621 CVE-2016-9439 CVE-2016-9622 CVE-2016-9623 CVE-2016-9624 CVE-2016-9625 CVE-2016-9626 CVE-2016-9627 CVE-2016-9628 CVE-2016-9629 CVE-2016-9631 CVE-2016-9630 CVE-2016-9632 CVE-2016-9633]">
- -<correction wireless-regdb                   "Update included data">
- -<correction wot                              "Remove plugin due to privacy issues">
- -<correction xwax                             "Replace ffmpeg with avconv from libav-tools">
- -<correction zookeeper                        "Fix buffer overflow via the input command when using the <q>cmd:</q> batch mode syntax [CVE-2016-5017]">
+<tr><th>Ð?акеÑ?</th>               <th>Ð?Ñ?иÑ?ина</th></tr>
+<correction ark                              "Ð?Ñ?пÑ?авление аваÑ?ийной оÑ?Ñ?ановки во вÑ?емÑ? вÑ?Ñ?ода пÑ?и иÑ?полÑ?зовании иÑ?клÑ?Ñ?иÑ?елÑ?но в каÑ?еÑ?Ñ?ве KPart">
+<correction asterisk                         "Ð?Ñ?пÑ?авление пÑ?облемÑ? безопаÑ?ноÑ?Ñ?и, возникаÑ?Ñ?ей из-за Ñ?ого, Ñ?Ñ?о непеÑ?аÑ?нÑ?е Ñ?имволÑ? ASCII Ñ?Ñ?иÑ?аÑ?Ñ?Ñ?Ñ? пÑ?обелами [CVE-2016-9938]">
+<correction asused                           "Ð?Ñ?полÑ?зование Ñ?озданнÑ?Ñ? полей вмеÑ?Ñ?о изменÑ?ннÑ?Ñ? в Ñ?Ñ?Ñ?оке Ñ? изменениÑ?ми иÑ?Ñ?однÑ?Ñ? даннÑ?Ñ?">
+<correction base-files                       "Ð?зменение /etc/debian_version до веÑ?Ñ?ии 8.7">
+<correction bash                             "Ð?Ñ?пÑ?авление иÑ?полнениÑ? пÑ?оизволÑ?ного кода из-за некоÑ?Ñ?екÑ?ного имени Ñ?зла [CVE-2016-0634] и подÑ?Ñ?ановки команд Ñ? помоÑ?Ñ?Ñ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? пеÑ?еменнÑ?Ñ? SHELLOPTS+PS4 [CVE-2016-7543]">
+<correction ca-certificates                  "Ð?бновление набоÑ?а авÑ?оÑ?иÑ?еÑ?нÑ?Ñ? Ñ?еÑ?Ñ?иÑ?икаÑ?ов Mozilla до веÑ?Ñ?ии 2.9; postinst: запÑ?Ñ?к update-certificates без Ñ?пеÑ?иалÑ?ной пÑ?оÑ?едÑ?Ñ?Ñ? длÑ? изнаÑ?алÑ?ного заполнениÑ? /etc/ssl/certs">
+<correction cairo                            "Ð?Ñ?пÑ?авление оÑ?каза в обÑ?лÑ?живании из-за иÑ?полÑ?зованиÑ? SVG длÑ? Ñ?озданиÑ? невеÑ?нÑ?Ñ? Ñ?казаÑ?елей [CVE-2016-9082]">
+<correction ccache                           "[amd64] Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка в Ñ?иÑ?Ñ?ом окÑ?Ñ?жении">
+<correction ceph                             "Ð?Ñ?пÑ?авление пÑ?облемÑ? Ñ? коÑ?оÑ?кими CORS-запÑ?оÑ?ами [CVE-2016-9579], оÑ?каз в обÑ?лÑ?живании в mon [CVE-2016-5009], анонимное Ñ?Ñ?ение в ACL [CVE-2016-7031], оÑ?каз в обÑ?лÑ?живании в RGW [CVE-2016-8626]">
+<correction chirp                            "Ð?Ñ?клÑ?Ñ?ение по Ñ?молÑ?аниÑ? Ñ?ообÑ?ений о Ñ?елемеÑ?Ñ?ии">
+<correction cyrus-imapd-2.4                  "Ð?Ñ?пÑ?авление поддеÑ?жки LIST GROUP">
+<correction darktable                        "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в ljpeg_start() [CVE-2015-3885]">
+<correction dbus                             "Ð?Ñ?пÑ?авление поÑ?енÑ?иалÑ?ной Ñ?Ñ?звимоÑ?Ñ?и Ñ?оÑ?маÑ?ной Ñ?Ñ?Ñ?оки; dbus.prerm: пÑ?овеÑ?ка, Ñ?Ñ?обÑ? dbus.socket бÑ?л оÑ?Ñ?ановлен пеÑ?ед его Ñ?далением">
+<correction debian-edu-doc                   "Ð?бновление Ñ?Ñ?ководÑ?Ñ?ва Debian Edu Jessie из вики; иÑ?пÑ?авление PO-Ñ?айлов Ñ?Ñ?ководÑ?Ñ?ва длÑ? Jessie (da|nl) длÑ? коÑ?Ñ?екÑ?ной Ñ?боÑ?ки Ñ?Ñ?ководÑ?Ñ?ва в Ñ?оÑ?маÑ?е PDF; обновление пеÑ?еводов">
+<correction debian-edu-install               "Ð?бновление номеÑ?а веÑ?Ñ?ии до 8+edu1">
+<correction debian-installer                 "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка длÑ? Ñ?едакÑ?ии">
+<correction debian-installer-netboot-images  "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка длÑ? Ñ?едакÑ?ии">
+<correction duck                             "Ð?Ñ?пÑ?авление загÑ?Ñ?зки кода из недовеÑ?енного иÑ?Ñ?оÑ?ника [CVE-2016-1239]">
+<correction e2fsprogs                        "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка Ñ? иÑ?полÑ?зованием dietlibc 0.33~cvs20120325-6+deb8u1 Ñ? Ñ?елÑ?Ñ? пÑ?именениÑ? вклÑ?Ñ?Ñ?ннÑ?Ñ? в Ñ?казаннÑ?й пакеÑ? иÑ?пÑ?авлений безопаÑ?ноÑ?Ñ?и">
+<correction ebook-speaker                    "Ð?Ñ?пÑ?авление Ñ?овеÑ?а об Ñ?Ñ?Ñ?ановке html2text длÑ? Ñ?Ñ?ениÑ? html-Ñ?айлов">
+<correction elog                             "Ð?Ñ?пÑ?авление оÑ?пÑ?авки запиÑ?и Ñ? иÑ?полÑ?зованием пÑ?оизволÑ?ного имени полÑ?зоваÑ?елÑ? [CVE-2016-6342]">
+<correction evolution-data-server            "Ð?Ñ?пÑ?авление пÑ?еждевÑ?еменной оÑ?менÑ? Ñ?оединениÑ? Ñ? Ñ?менÑ?Ñ?енÑ?м Ñ?азмеÑ?ом окна TCP, пÑ?иводÑ?Ñ?ей к поÑ?еÑ?е даннÑ?Ñ?">
+<correction exim4                            "Ð?Ñ?пÑ?авление Ñ?Ñ?еÑ?ки памÑ?Ñ?и в GnuTLS">
+<correction file                             "Ð?Ñ?пÑ?авление Ñ?Ñ?еÑ?ки памÑ?Ñ?и в загÑ?Ñ?зÑ?ике">
+<correction ganeti-instance-debootstrap      "Ð?Ñ?пÑ?авление вÑ?зовов losetup пÑ?Ñ?Ñ?м заменÑ? -s на --show">
+<correction glibc                            "Ð?е иÑ?полÑ?зоваÑ?Ñ? в безÑ?Ñ?ловном поÑ?Ñ?дке инÑ?Ñ?Ñ?Ñ?кÑ?иÑ? fsqrt на 64-биÑ?нÑ?Ñ? ЦÐ? Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?ой PowerPC; иÑ?пÑ?авление Ñ?егÑ?еÑ?Ñ?ии, добавленной заплаÑ?ой cvs-resolv-ipv6-nameservers.diff в hesiod; оÑ?клÑ?Ñ?ение пÑ?еÑ?Ñ?ваниÑ? блокиÑ?овки (извеÑ?Ñ?ного Ñ?акже как Intel TSX) на аÑ?Ñ?иÑ?екÑ?Ñ?Ñ?аÑ? x86">
+<correction glusterfs                        "Ð?воÑ?а: иÑ?пÑ?авление пÑ?облемÑ? Ñ? невозможноÑ?Ñ?Ñ?Ñ? запÑ?Ñ?ка дополниÑ?елÑ?ного монÑ?иÑ?ованиÑ?">
+<correction gnutls28                         "Ð?Ñ?пÑ?авление некоÑ?Ñ?екÑ?ной пÑ?овеÑ?ки Ñ?еÑ?Ñ?иÑ?икаÑ?ов пÑ?и иÑ?полÑ?зовании OCSP-оÑ?веÑ?ов [GNUTLS-SA-2016-3 / CVE-2016-7444]; пÑ?овеÑ?ка на Ñ?овмеÑ?Ñ?имоÑ?Ñ?Ñ? Ñ? nettle Ñ? заплаÑ?ой длÑ? CVE-2016-6489">
+<correction hplip                            "Ð?Ñ?полÑ?зоваÑ?Ñ? полнÑ?й оÑ?пеÑ?аÑ?ок клÑ?Ñ?а gpg пÑ?и загÑ?Ñ?зке клÑ?Ñ?а Ñ? Ñ?еÑ?веÑ?а клÑ?Ñ?ей [CVE-2015-0839]">
+<correction ieee-data                        "Ð?Ñ?клÑ?Ñ?ение ежемеÑ?Ñ?Ñ?ной задаÑ?и cron по обновлениÑ?">
+<correction intel-microcode                  "Ð?бновление микÑ?окода">
+<correction irssi                            "Ð?Ñ?пÑ?авление Ñ?аÑ?кÑ?Ñ?Ñ?иÑ? инÑ?оÑ?маÑ?ии Ñ?еÑ?ез buf.pl и /upgrade [CVE-2016-7553]; иÑ?пÑ?авление Ñ?азÑ?менованиÑ? NULL-Ñ?казаÑ?елÑ? в Ñ?Ñ?нкÑ?ии nickcmp [CVE-2017-5193], иÑ?полÑ?зование Ñ?казаÑ?елей поÑ?ле оÑ?вобождениÑ? памÑ?Ñ?и пÑ?и полÑ?Ñ?ении Ñ?ообÑ?ениÑ? оÑ? некоÑ?Ñ?екÑ?ного пÑ?евдонима [CVE-2017-5194] и Ñ?Ñ?ение за пÑ?еделами вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и в опÑ?еделÑ?ннÑ?Ñ? неполнÑ?Ñ? Ñ?пÑ?авлÑ?Ñ?Ñ?иÑ? кодаÑ? [CVE-2017-5195]">
+<correction isenkram                         "Ð?агÑ?Ñ?зка аппаÑ?аÑ?но-пÑ?огÑ?аммного Ð?Ð? Ñ? иÑ?полÑ?зованием curl; иÑ?полÑ?зование HTTPS пÑ?и загÑ?Ñ?зке modaliases; изменение зеÑ?кала Ñ? http.debian.net на httpredir.debian.org">
+<correction jq                               "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? динамиÑ?еÑ?кой памÑ?Ñ?и [CVE-2015-8863] и иÑ?Ñ?еÑ?паниÑ? Ñ?Ñ?ека [CVE-2016-4074]">
+<correction libclamunrar                     "Ð?Ñ?пÑ?авление доÑ?Ñ?Ñ?па за пÑ?еделÑ? вÑ?деленного бÑ?Ñ?еÑ?а памÑ?Ñ?и">
+<correction libdatetime-timezone-perl        "Ð?бновление до веÑ?Ñ?ии 2016h; обновление даннÑ?Ñ? в 2016i; обновление до веÑ?Ñ?ии 2016j; обновление до веÑ?Ñ?ии 2016g">
+<correction libfcgi-perl                     "Ð?Ñ?пÑ?авление оÑ?ибки <q>многоÑ?иÑ?леннÑ?е Ñ?оединениÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?ибкÑ? Ñ?егменÑ?иÑ?ованиÑ? и оÑ?каз в обÑ?лÑ?живании</q> [CVE-2012-6687]">
+<correction libio-socket-ssl-perl            "Ð?Ñ?пÑ?авление пÑ?облемÑ? Ñ? некоÑ?Ñ?екÑ?ной оÑ?ибкой по поводÑ? <q>неÑ?иÑ?аемого Ñ?айла клÑ?Ñ?ей SSL</q> пÑ?и иÑ?полÑ?зовании Ñ?пиÑ?ков доÑ?Ñ?Ñ?па Ñ?айловой Ñ?иÑ?Ñ?емÑ?">
+<correction libmateweather                   "Ð?еÑ?еÑ?од Ñ? неÑ?абоÑ?аÑ?Ñ?его weather.noaa.gov на aviationweather.gov">
+<correction libphp-adodb                     "Ð?Ñ?пÑ?авление XSS-Ñ?Ñ?звимоÑ?Ñ?и [CVE-2016-4855] и SQL-инÑ?екÑ?ии [CVE-2016-7405]">
+<correction libpng                           "Ð?Ñ?пÑ?авление Ñ?азÑ?менованиÑ? null-Ñ?казаÑ?елÑ? [CVE-2016-10087]">
+<correction libwmf                           "Ð?Ñ?пÑ?авление вÑ?делениÑ? огÑ?омного блока памÑ?Ñ?и [CVE-2016-9011]">
+<correction linkchecker                      "Ð?Ñ?пÑ?авление пÑ?овеÑ?ок HTTPS">
+<correction linux                            "Ð?бновление до Ñ?Ñ?абилÑ?ной веÑ?Ñ?ии 3.16.39; добавление дÑ?айвеÑ?а chaoskey, обÑ?аÑ?нÑ?й пеÑ?еноÑ? из 4.8, поддеÑ?жка длÑ? Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?в n25q256a11 SPI; безопаÑ?ноÑ?Ñ?Ñ?,пÑ?оизводиÑ?елÑ?ноÑ?Ñ?Ñ?: Ñ?азÑ?еÑ?аÑ?Ñ? непÑ?ивилегиÑ?ованное оÑ?клÑ?Ñ?ениÑ? иÑ?полÑ?зованиÑ? perf_event_open; неÑ?колÑ?ко оÑ?ибок и иÑ?пÑ?авлений безопаÑ?ноÑ?Ñ?и">
+<correction lxc                              "Ð?Ñ?икÑ?епление: не оÑ?пÑ?авлÑ?Ñ?Ñ? procfd пÑ?икÑ?еплÑ?нномÑ? пÑ?оÑ?еÑ?Ñ?Ñ? [CVE-2016-8649]; повÑ?оÑ?ное монÑ?иÑ?ование Ñ? опÑ?ией bind в Ñ?лÑ?Ñ?ае иÑ?полÑ?зованиÑ? Ñ?лага <q>Ñ?олÑ?ко длÑ? Ñ?Ñ?ениÑ?</q>; иÑ?пÑ?авление Ñ?озданиÑ? конÑ?ейнеÑ?ов Alpine Linux">
+<correction mapserver                        "Ð?Ñ?пÑ?авление оÑ?ибки Ñ?боÑ?ки из иÑ?Ñ?одного кода Ñ? иÑ?полÑ?зованием php &gt;= 5.6.25; иÑ?пÑ?авление Ñ?Ñ?еÑ?ки инÑ?оÑ?маÑ?ии Ñ?еÑ?ез Ñ?ообÑ?ениÑ? об оÑ?ибкаÑ? [CVE-2016-9839]">
+<correction mdadm                            "РазÑ?еÑ?иÑ?Ñ? '--grow --continue' Ñ?Ñ?пеÑ?ное воÑ?Ñ?Ñ?ановление маÑ?Ñ?ива пÑ?и иÑ?полÑ?зовании пÑ?оÑ?Ñ?Ñ?анÑ?Ñ?ва длÑ? Ñ?езеÑ?вного копиÑ?ованиÑ? на Ñ?Ñ?Ñ?Ñ?ойÑ?Ñ?ве 'spare'">
+<correction metar                            "Ð?бновление Ñ?ообÑ?ениÑ? URL">
+<correction minissdpd                        "Ð?Ñ?пÑ?авление Ñ?Ñ?звимоÑ?Ñ?и Ñ? невеÑ?ной пÑ?овеÑ?кой Ñ?казаÑ?елÑ? маÑ?Ñ?ива [CVE-2016-3178 CVE-2016-3179]">
+<correction monotone                         "Ð?зменение конÑ?Ñ?олÑ?нÑ?Ñ? пÑ?имеÑ?ов длÑ? запиÑ?и 1M Ñ?еÑ?Ñ?овÑ?Ñ? даннÑ?Ñ? длÑ? Ñ?велиÑ?ениÑ? Ñ?анÑ?ов на обнаÑ?Ñ?жение пеÑ?еполнениÑ? каналÑ?ного бÑ?Ñ?еÑ?а">
+<correction most                             "Ð?Ñ?пÑ?авление введениÑ? пÑ?оизволÑ?нÑ?Ñ? команд в команднÑ?Ñ? оболоÑ?кÑ? пÑ?и оÑ?кÑ?Ñ?Ñ?ии Ñ?айлов, Ñ?жаÑ?Ñ?Ñ? Ñ? помоÑ?Ñ?Ñ? lzma [CVE-2016-1253]">
+<correction mpg123                           "Ð?Ñ?пÑ?авление оÑ?каза в обÑ?лÑ?живании, вÑ?зÑ?ваемого Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?ми Ñ?егами ID3v2">
+<correction musl                             "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел [CVE-2016-8859]">
+<correction nbd                              "Ð?Ñ?екÑ?аÑ?ение Ñ?меÑ?ениÑ? глобалÑ?нÑ?Ñ? Ñ?егов Ñ? Ñ?егами, пеÑ?едаваемÑ?ми Ñ?дÑ?Ñ?, поÑ?Ñ?омÑ? подклÑ?Ñ?ение к nbd-server &gt;= 3.9 не пÑ?иводиÑ? к Ñ?омÑ?, Ñ?Ñ?о вÑ?Ñ?каÑ? опеÑ?аÑ?иÑ? по Ñ?кÑ?поÑ?Ñ?Ñ? бÑ?деÑ? (невеÑ?но) помеÑ?ена как <q>Ñ?олÑ?ко длÑ? Ñ?Ñ?ениÑ?</q>">
+<correction nettle                           "Ð?аÑ?иÑ?а оÑ? поÑ?енÑ?иалÑ?нÑ?Ñ? аÑ?ак Ñ?еÑ?ез Ñ?Ñ?оÑ?онние каналÑ? на опеÑ?аÑ?иÑ? возведениÑ? в Ñ?Ñ?епенÑ? [CVE-2016-6489]">
+<correction nss-pam-ldapd                    "Ð?ейÑ?Ñ?вие оÑ?Ñ?ановки Ñ?Ñ?енаÑ?иÑ? иниÑ?иализаÑ?ии возвÑ?аÑ?аеÑ? знаÑ?ение Ñ?олÑ?ко пÑ?и Ñ?акÑ?иÑ?еÑ?кой оÑ?Ñ?ановке nslcd">
+<correction nvidia-graphics-drivers          "Ð?бновление до новой веÑ?Ñ?ии дÑ?айвеÑ?а, вклÑ?Ñ?аÑ?Ñ?ей иÑ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и [CVE-2016-8826 CVE-2016-7382 CVE-2016-7389]">
+<correction nvidia-graphics-drivers-legacy-304xx "Ð?бновление до новой веÑ?Ñ?ии дÑ?айвеÑ?а, вклÑ?Ñ?аÑ?Ñ?ей иÑ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и [CVE-2016-8826 CVE-2016-7382 CVE-2016-7389]">
+<correction nvidia-graphics-modules          "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка Ñ? иÑ?полÑ?зованием nvidia-kernel-source 340.101">
+<correction openbox                          "Ð?обавление Ñ?боÑ?оÑ?ной завиÑ?имоÑ?Ñ?и оÑ? libxcursor-dev длÑ? иÑ?пÑ?авлениÑ? загÑ?Ñ?зки Ñ?ведомлений о запÑ?Ñ?ке; замена getgrent на getgroups, Ñ?Ñ?о пÑ?и запÑ?Ñ?ке не пеÑ?еÑ?иÑ?лÑ?лиÑ?Ñ? вÑ?е гÑ?Ñ?ппÑ?">
+<correction opendkim                         "Ð?Ñ?пÑ?авление неÑ?Ñ?Ñ?огой ноÑ?мализаÑ?ии Ñ?вÑ?Ñ?нÑ?Ñ?Ñ?Ñ? заголовков, Ñ?Ñ?о пÑ?иводиÑ? к поломке подпиÑ?ей">
+<correction pam                              "Ð?Ñ?пÑ?авление обÑ?абоÑ?ки loginuid в конÑ?ейнеÑ?аÑ?">
+<correction pgpdump                          "Ð?Ñ?пÑ?авление беÑ?конеÑ?ного Ñ?икла пÑ?и гÑ?аммаÑ?иÑ?еÑ?ком  Ñ?азбоÑ?е Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? вÑ?однÑ?Ñ? даннÑ?Ñ? в read_binary [CVE-2016-4021] и пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в read_radix64">
+<correction postgresql-9.4                   "Ð?овÑ?й вÑ?пÑ?Ñ?к оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки">
+<correction postgresql-common                "Pg_upgradecluster: коÑ?Ñ?екÑ?ное обновление баз даннÑ?Ñ?, пÑ?инадлежаÑ?иÑ? Ñ?оли без Ñ?Ñ?Ñ?Ñ?нÑ?Ñ? запиÑ?ей; pg_ctlcluster: заÑ?иÑ?а оÑ? Ñ?имволÑ?ной Ñ?Ñ?Ñ?лки в /var/log/postgresql/, позволÑ?Ñ?Ñ?ей Ñ?оздаваÑ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ? в дÑ?Ñ?гиÑ? каÑ?алогаÑ? [CVE-2016-1255]">
+<correction potrace                          "Ð?Ñ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и [CVE-2016-8694 CVE-2016-8695 CVE-2016-8696 CVE-2016-8697 CVE-2016-8698 CVE-2016-8699 CVE-2016-8700 CVE-2016-8701 CVE-2016-8702  CVE-2016-8703]">
+<correction python-crypto                    "Ð?Ñ?вод пÑ?едÑ?пÑ?еждениÑ? пÑ?и иÑ?полÑ?зовании IV Ñ? ECB или CTR и игноÑ?иÑ?овании IV [CVE-2013-7459]">
+<correction python-werkzeug                  "Ð?Ñ?пÑ?авление пÑ?облемÑ? XSS в оÑ?ладÑ?ике">
+<correction qtbase-opensource-src            "Ð?апÑ?еÑ? bad-ptrs deref в QNetworkConfigurationManagerPrivate; иÑ?пÑ?авление иконок панели задаÑ? длÑ? X11 на некоÑ?оÑ?Ñ?Ñ? Ñ?абоÑ?иÑ? Ñ?Ñ?олаÑ?">
+<correction rawtherapee                      "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в dcraw [CVE-2015-8366]">
+<correction redmine                          "Ð?бÑ?абоÑ?ка оÑ?ибок пÑ?овеÑ?ки завиÑ?имоÑ?Ñ?ей длÑ? Ñ?ого, Ñ?Ñ?обÑ? избежаÑ?Ñ? поломки в пÑ?оÑ?еÑ?Ñ?е вÑ?полнениÑ? dist-upgrade; запÑ?еÑ? на оÑ?кÑ?Ñ?Ñ?ие неÑ?иÑ?аемÑ?Ñ? наÑ?Ñ?Ñ?оек базÑ? даннÑ?Ñ?">
+<correction samba                            "Ð?Ñ?пÑ?авление <q>возможноÑ?Ñ?и понижениÑ? Ñ?Ñ?ебований к Ñ?Ñ?овнÑ? подпиÑ?и SMB2/3 на Ñ?Ñ?оÑ?оне клиенÑ?а</q> [CVE-2016-2119], Ñ?азлиÑ?нÑ?е Ñ?егÑ?еÑ?Ñ?ии, добавленнÑ?е в иÑ?пÑ?авлениÑ?Ñ? безопаÑ?ноÑ?Ñ?и 4.2.10, оÑ?ибка Ñ?егменÑ?иÑ?ованиÑ? пÑ?и клаÑ?Ñ?еÑ?изаÑ?ии">
+<correction sed                              "Ð?Ñ?овеÑ?ка Ñ?ого, Ñ?Ñ?обÑ? пÑ?ава доÑ?Ñ?Ñ?па Ñ?ооÑ?веÑ?Ñ?Ñ?вовали Ñ?азнÑ?м знаÑ?ениÑ?м umask">
+<correction shutter                          "Ð?Ñ?пÑ?авление небезопаÑ?ного иÑ?полÑ?зованиÑ? system() [CVE-2015-0854]">
+<correction sniffit                          "Ð?Ñ?пÑ?авление безопаÑ?ноÑ?Ñ?и [CVE-2014-5439]">
+<correction suckless-tools                   "Ð?Ñ?пÑ?авление SEGV в slock, еÑ?ли Ñ?Ñ?Ñ?Ñ?наÑ? запиÑ?Ñ? полÑ?зоваÑ?елÑ? бÑ?ла оÑ?клÑ?Ñ?ена [CVE-2016-6866]">
+<correction sympa                            "Ð?Ñ?пÑ?авление наÑ?Ñ?Ñ?оек logrotate, Ñ?Ñ?обÑ? Ñ?лÑ?жба sympa не оÑ?Ñ?авалаÑ?Ñ? в неÑ?Ñ?ном Ñ?оÑ?Ñ?оÑ?нии пÑ?и иÑ?полÑ?зовании systemd">
+<correction systemd                          "Ð?е возÑ?аÑ?аÑ?Ñ? какÑ?Ñ?-либо оÑ?ибкÑ? в manager_dispatch_notify_fd() [CVE-2016-7796]; Ñ?дÑ?о: пеÑ?еÑ?абоÑ?ка логики опÑ?еделениÑ? Ñ?ого, когда мÑ? Ñ?еÑ?аем добавиÑ?Ñ? авÑ?омаÑ?иÑ?еÑ?кие завиÑ?имоÑ?Ñ?и длÑ? монÑ?иÑ?ований; Ñ?азлиÑ?нÑ?е иÑ?пÑ?авлениÑ? Ñ?поÑ?Ñ?Ñ?доÑ?ений длÑ? ifupdown; systemctl: иÑ?пÑ?авление обÑ?абоÑ?ки пÑ?и вÑ?зове длÑ? вÑ?клÑ?Ñ?ениÑ?; localed: допÑ?Ñ?каÑ?Ñ? оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие /etc/default/keyboard; systemctl, loginctl и дÑ?.: не запÑ?Ñ?каÑ?Ñ? polkit-агенÑ? пÑ?и запÑ?Ñ?ке оÑ? лиÑ?а Ñ?Ñ?пеÑ?полÑ?зоваÑ?елÑ?">
+<correction tevent                           "Ð?оваÑ? веÑ?Ñ?иÑ? оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки, Ñ?Ñ?ебÑ?еÑ?Ñ?Ñ? длÑ? samba">
+<correction tre                              "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? Ñ?елÑ?Ñ? Ñ?иÑ?ел в вÑ?Ñ?иÑ?лении Ñ?азмеÑ?а бÑ?Ñ?еÑ?а [CVE-2016-8859]">
+<correction tzdata                           "Ð?бновление даннÑ?Ñ? до веÑ?Ñ?ии 2016h; обновление до веÑ?Ñ?ии 2016g; обновлении до веÑ?Ñ?ии 2016j; обновление даннÑ?Ñ? до 2016i">
+<correction unrtf                            "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в Ñ?азлиÑ?нÑ?Ñ? Ñ?Ñ?нкÑ?иÑ?Ñ? cmd_ [CVE-2016-10091]">
+<correction w3m                              "Ð?еÑ?колÑ?ко иÑ?пÑ?авлений безопаÑ?ноÑ?Ñ?и [CVE-2016-9430 CVE-2016-9434 CVE-2016-9438 CVE-2016-9440 CVE-2016-9441 CVE-2016-9423 CVE-2016-9431 CVE-2016-9424 CVE-2016-9432 CVE-2016-9433 CVE-2016-9437 CVE-2016-9422 CVE-2016-9435 CVE-2016-9436 CVE-2016-9426 CVE-2016-9425 CVE-2016-9428 CVE-2016-9442 CVE-2016-9443 CVE-2016-9429 CVE-2016-9621 CVE-2016-9439 CVE-2016-9622 CVE-2016-9623 CVE-2016-9624 CVE-2016-9625 CVE-2016-9626 CVE-2016-9627 CVE-2016-9628 CVE-2016-9629 CVE-2016-9631 CVE-2016-9630 CVE-2016-9632 CVE-2016-9633]">
+<correction wireless-regdb                   "Ð?бновление даннÑ?Ñ? из пакеÑ?а">
+<correction wot                              "Удаление дополнениÑ? из-за пÑ?облем Ñ? пÑ?иваÑ?ноÑ?Ñ?Ñ?Ñ?">
+<correction xwax                             "Ð?амена ffmpeg на avconv из пакеÑ?а libav-tools">
+<correction zookeeper                        "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а из-за вÑ?одной командÑ? пÑ?и иÑ?полÑ?зовании Ñ?инÑ?акÑ?иÑ?а Ñ?ежима пакеÑ?ной обÑ?абоÑ?ки <q>cmd:</q> [CVE-2016-5017]">
 </table>
 
- -<h2>Security Updates</h2>
+<h2>Ð?бновлениÑ? безопаÑ?ноÑ?Ñ?и</h2>
 
 
- -<p>This revision adds the following security updates to the stable
- -release. The Security Team has already released an advisory for each of
- -these updates:</p>
+<p>Ð? даннÑ?й вÑ?пÑ?Ñ?к внеÑ?енÑ? Ñ?ледÑ?Ñ?Ñ?ие обновлениÑ? безопаÑ?ноÑ?Ñ?и. Ð?оманда
+безопаÑ?ноÑ?Ñ?и Ñ?же вÑ?пÑ?Ñ?Ñ?ила Ñ?екомендаÑ?ии длÑ? каждого
+из Ñ?Ñ?иÑ? обновлений:</p>
 
 <table border=0>
- -<tr><th>Advisory ID</th>  <th>Package</th></tr>
+<tr><th>Ð?денÑ?иÑ?икаÑ?ионнÑ?й номеÑ? Ñ?екомендаÑ?ии</th>  <th>Ð?акеÑ?</th></tr>
 
 
 <dsa 2016 3636 collectd>
@@ -247,68 +248,68 @@
 
 </table>
 
- -<h2>Removed packages</h2>
+<h2>УдалÑ?ннÑ?е пакеÑ?Ñ?</h2>
 
- -<p>The following packages were removed due to circumstances beyond our
- -control:</p>
+<p>СледÑ?Ñ?Ñ?ие пакеÑ?Ñ? бÑ?ли Ñ?даленÑ? из-за обÑ?Ñ?оÑ?Ñ?елÑ?Ñ?Ñ?в, на коÑ?оÑ?Ñ?е мÑ? не
+можем повлиÑ?Ñ?Ñ?:</p>
 
 
 <table border=0>
- -<tr><th>Package</th>               <th>Reason</th></tr>
+<tr><th>Ð?акеÑ?</th>               <th>Ð?Ñ?иÑ?ина</th></tr>
 
- -<correction dotclear                  "Security issues">
- -<correction sogo                      "Security issues">
+<correction dotclear                  "Ð?Ñ?облемÑ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ?">
+<correction sogo                      "Ð?Ñ?облемÑ? Ñ? безопаÑ?ноÑ?Ñ?Ñ?Ñ?">
 </table>
 
- -<h2>Debian Installer</h2>
- -<p>The installer has been updated to include the fixes incorporated into
- -stable by the point release.</p>
+<h2>Ð?Ñ?огÑ?амма Ñ?Ñ?Ñ?ановки Debian</h2>
 
- -<h2>URLs</h2>
+Ð?Ñ?огÑ?амма Ñ?Ñ?Ñ?ановки бÑ?ла обновлена Ñ? Ñ?елÑ?Ñ? вклÑ?Ñ?ениÑ? иÑ?пÑ?авлений, добавленнÑ?Ñ? в
+даннÑ?Ñ? Ñ?едакÑ?иÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.
 
- -<p>The complete lists of packages that have changed with this
- -revision:</p>
+<h2>URL</h2>
+
+<p>Ð?олнÑ?й Ñ?пиÑ?ок пакеÑ?ов, коÑ?оÑ?Ñ?е бÑ?ли измененÑ? в данной
+Ñ?едакÑ?ии:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
 </div>
 
- -<p>The current stable distribution:</p>
+<p>ТекÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/stable/";>
 </div>
 
- -<p>Proposed updates to the stable distribution:</p>
+<p>Ð?Ñ?едлагаемÑ?е обновлениÑ? длÑ? Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/proposed-updates";>
 </div>
 
- -<p>stable distribution information (release notes, errata etc.):</p>
+<p>Ð?нÑ?оÑ?маÑ?иÑ? о Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (инÑ?оÑ?маÑ?иÑ? о вÑ?пÑ?Ñ?ке, извеÑ?Ñ?нÑ?е оÑ?ибки и Ñ?. д.):</p>
 
 <div class="center">
   <a
   href="$(HOME)/releases/stable/">https://www.debian.org/releases/stable/</a>
 </div>
 
- -<p>Security announcements and information:</p>
+<p>Ð?нонÑ?Ñ? безопаÑ?ноÑ?Ñ?и и инÑ?оÑ?маÑ?иÑ?:</p>
 
 <div class="center">
   <a href="$(HOME)/security/">https://security.debian.org/</a>
 </div>
 
 
- -<h2>About Debian</h2>
- -
- -<p>The Debian Project is an association of Free Software developers who
- -volunteer their time and effort in order to produce the completely free
- -operating system Debian.</p>
+<h2>Ð? Debian</h2>
 
+<p>Ð?Ñ?оекÑ? Debian â?? обÑ?единение Ñ?азÑ?абоÑ?Ñ?иков Ñ?вободного пÑ?огÑ?аммного обеÑ?пеÑ?ениÑ?,
+коÑ?оÑ?Ñ?е жеÑ?Ñ?вÑ?Ñ?Ñ? Ñ?воÑ? вÑ?емÑ? и знаниÑ? длÑ? Ñ?озданиÑ? абÑ?олÑ?Ñ?но Ñ?вободной
+опеÑ?аÑ?ионной Ñ?иÑ?Ñ?емÑ? Debian.</p>
 
- -<h2>Contact Information</h2>
+<h2>Ð?онÑ?акÑ?наÑ? инÑ?оÑ?маÑ?иÑ?</h2>
 
- -<p>For further information, please visit the Debian web pages at <a
- -href="$(HOME)/">https://www.debian.org/</a>, send mail to
- -&lt;press@debian.org&gt;, or contact the stable release team at
+<p>Ð?олее подÑ?обнÑ?Ñ? инÑ?оÑ?маÑ?иÑ? вÑ? можеÑ?е полÑ?Ñ?иÑ?Ñ? на Ñ?айÑ?е Debian
+<a href="$(HOME)/">https://www.debian.org/</a>, либо оÑ?пÑ?авив пиÑ?Ñ?мо по адÑ?еÑ?Ñ?
+&lt;press@debian.org&gt;, либо Ñ?вÑ?завÑ?иÑ?Ñ? Ñ? командой Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка по адÑ?еÑ?Ñ?
 &lt;debian-release@lists.debian.org&gt;.</p>
- --- english/News/2017/index.wml	2017-01-14 23:39:09.000000000 +0500
+++ russian/News/2017/index.wml	2017-01-15 23:30:53.605775884 +0500
@@ -1,14 +1,15 @@
- -#use wml::debian::template title="News from 2017"
+#use wml::debian::template title="Ð?овоÑ?Ñ?и за 2017 год"
 #use wml::debian::recent_list
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
 
- -<p><:= get_recent_list ('.', '0', '$(ENGLISHDIR)/News/2017', '', 
+<p><:= get_recent_list ('.', '0', '$(ENGLISHDIR)/News/2017', '',
 '\d+\w*') :></p>
 
- -<p>Note: you can get the latest Debian news by
- -subscribing to or browsing the
- -archives for our
- -<a 
+<p>Ð?Ñ?имеÑ?ание: вÑ? можеÑ?е полÑ?Ñ?аÑ?Ñ? поÑ?ледние новоÑ?Ñ?и Debian,
+подпиÑ?авÑ?иÑ?Ñ? на Ñ?пиÑ?ки
+Ñ?аÑ?Ñ?Ñ?лки
+<a
 href="https://lists.debian.org/debian-announce/debian-announce-2017/";>\
- -<strong>debian-announce</strong></a> and 
+<strong>debian-announce</strong></a> и
 <a href="https://lists.debian.org/debian-news/";>\
- -<strong>debian-news</strong></a> mailing lists.</p>
+<strong>debian-news</strong></a> или пÑ?оÑ?маÑ?Ñ?иваÑ? иÑ? аÑ?Ñ?ивÑ?.</p>
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlh70XgACgkQXudu4gIW
0qVE4hAAplPTgNugziIr2GW0ieD+vmiyTDcKwEX7IaY+3b5WLwSPKEO47JHkf83w
3D+kJcjCufUuMtbaPxu6CBKzdqJAN5Iscj9AYlGzr+Sl1F/Km91omogYqbLkDjMO
HYdTeHx/Cd31aJ/owC1X/eN0rI+e8P2SmfoLraW4Tz3yxL4AvR6i/xE7hdu3OsWQ
bcPTG1cfojfF+5txsMoDKpWXyUKa+1kOSszwYCmWbR333HB2KbDKVvHzb/gBLAvk
HXXOo4VyHaFoNdCNQ8uqOHBLKvicr55NyZgGDL91nMTRRagdu8bMPPrJr8oz8lRq
HDcbsz3ABTlb7dzGRkeg97ZaOrFVdDsRHUi8xkexenOjuEFqmtdXb+fAxpEWff/m
/dxL656MbuVX66c2vXpCtSzyJ11zy6297FFrhmCjPJ3eezyHztIhU9TkVyrdGf+q
qAwT3JreApByxdxkNa51KON4FA0VJ3wCL1r1Jx60thPhFHcin8QTY5AfcPoFF3qy
fZCWyBHSBw3N7vW9l0FrYbAmpinR7BruuTksf8sQ+8xZOs7OGmcSo1tyH20bHoNa
hdJMLJ3Km3GTx7veazJTjn204oan9Rao7/bXDG6O/qq/3UjbS6397ICBYGMXkG3a
lazuSqacvHwy0sfpx4Kcjy3m5iNk4X+9+A1Ra8K3qAgqdoXf/5o=
=ZpMC
-----END PGP SIGNATURE-----


Reply to: