[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://News/2018/20180623.wml



--- english/News/2018/20180623.wml	2018-06-23 22:12:06.113697279 +0500
+++ russian/News/2018/20180623.wml	2018-06-24 14:46:48.730386229 +0500
@@ -1,7 +1,7 @@
-<define-tag pagetitle>Updated Debian 8: 8.11 released</define-tag>
+#use wml::debian::translation-check translation="0788aa9ab387393e2e9236d36df0630ae1c038c6" maintainer="Lev Lamberov"
+<define-tag pagetitle>Ð?бновлÑ?ннÑ?й Debian 8: вÑ?пÑ?Ñ?к 8.11</define-tag>
 <define-tag release_date>2018-06-23</define-tag>
 #use wml::debian::news
-# $Id:
 
 <define-tag release>8</define-tag>
 <define-tag codename>jessie</define-tag>
@@ -24,103 +24,103 @@
 
 <define-tag srcpkg><a href="https://packages.debian.org/src:%0";>%0</a></define-tag>
 
-<p>The Debian project is pleased to announce the eleventh (and final)
-update of its oldstable distribution Debian <release> (codename <q><codename></q>). 
-This point release mainly adds corrections for security issues,
-along with a few adjustments for serious problems.  Security advisories
-have already been published separately and are referenced where available.</p>
-
-<p>After this point release, Debian's Security and Release Teams will no
-longer be producing updates for Debian 8.
-Users wishing to continue to receive security support should upgrade
-to Debian 9, or see <url "https://wiki.debian.org/LTS";> for details about the
-subset of architectures and packages covered by the Long Term Support project.
+<p>Ð?Ñ?оекÑ? Debian Ñ? Ñ?адоÑ?Ñ?Ñ?Ñ? Ñ?ообÑ?аеÑ? об одиннадÑ?аÑ?ом (и поÑ?леднем) обновлении Ñ?воего
+пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка Debian <release> (кодовое имÑ? <q><codename></q>).
+ЭÑ?о обновление в оÑ?новном Ñ?одеÑ?жиÑ? иÑ?пÑ?авлениÑ? пÑ?облем безопаÑ?ноÑ?Ñ?и,
+а Ñ?акже неÑ?колÑ?ко коÑ?Ñ?екÑ?иÑ?овок Ñ?еÑ?Ñ?Ñ?знÑ?Ñ? пÑ?облем. РекомендаÑ?ии по безопаÑ?ноÑ?Ñ?и
+опÑ?бликованÑ? оÑ?делÑ?но и Ñ?казÑ?ваÑ?Ñ?Ñ?Ñ? пÑ?и необÑ?одимоÑ?Ñ?и.</p>
+
+<p>Ð?оÑ?ле вÑ?пÑ?Ñ?ка данной Ñ?едакÑ?ии командÑ? безопаÑ?ноÑ?Ñ?и и вÑ?пÑ?Ñ?ков Debian более не
+бÑ?дÑ?Ñ? Ñ?абоÑ?аÑ?Ñ? над обновлениÑ?ми Debian 8. Ð?олÑ?зоваÑ?ели, желаÑ?Ñ?ие пÑ?одолжаÑ?Ñ?
+полÑ?Ñ?аÑ?Ñ? поддеÑ?жкÑ? безопаÑ?ноÑ?Ñ?и должнÑ? вÑ?полниÑ?Ñ? обновление до Debian 9, либо
+обÑ?аÑ?иÑ?Ñ?Ñ?Ñ? к Ñ?Ñ?Ñ?аниÑ?е <url "https://wiki.debian.org/LTS";>, на коÑ?оÑ?ой пÑ?иводиÑ?Ñ?Ñ?
+подмножеÑ?Ñ?во аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? и пакеÑ?ов, коÑ?оÑ?Ñ?е бÑ?дÑ?Ñ? поддеÑ?живаÑ?Ñ?Ñ?Ñ? в Ñ?амкаÑ? пÑ?оекÑ?а долгоÑ?Ñ?оÑ?ной поддеÑ?жки.
 </p>
 
-<p>The packages for some architectures for DSA 3746, DSA 3944, DSA 3968, DSA 4010,
-DSA 4014, DSA 4061, DSA 4075, DSA 4102, DSA 4155, DSA 4209 and DSA 4218 are not
-included in this point release for technical reasons. All other security updates
-released during the lifetime of "jessie" that have not previously been part of a point
-release are included in this update.</p>
-
-<p>Please note that the point release does not constitute a new version of Debian
-<release> but only updates some of the packages included.  There is
-no need to throw away old <q><codename></q> media. After installation,
-packages can be upgraded to the current versions using an up-to-date Debian
-mirror.</p>
-
-<p>Those who frequently install updates from security.debian.org won't have
-to update many packages, and most such updates are
-included in the point release.</p>
-
-<p>New installation images will be available soon at the regular locations.</p>
-
-<p>Upgrading an existing installation to this revision can be achieved by
-pointing the package management system at one of Debian's many HTTP mirrors.
-A comprehensive list of mirrors is available at:</p>
+<p>Ð?акеÑ?Ñ? длÑ? некоÑ?оÑ?Ñ?Ñ? аÑ?Ñ?иÑ?екÑ?Ñ?Ñ? длÑ? Ñ?екомендаÑ?ий по безопаÑ?ноÑ?Ñ?и DSA 3746, DSA 3944, DSA 3968, DSA 4010,
+DSA 4014, DSA 4061, DSA 4075, DSA 4102, DSA 4155, DSA 4209 и DSA 4218 не вклÑ?Ñ?енÑ?
+в даннÑ?Ñ? Ñ?едакÑ?иÑ? по Ñ?еÑ?ниÑ?еÑ?ким пÑ?иÑ?инам. Ð?Ñ?е оÑ?Ñ?алÑ?нÑ?е обновлениÑ? безопаÑ?ноÑ?Ñ?и,
+вÑ?пÑ?Ñ?еннÑ?е во вÑ?емÑ? жизненного Ñ?икла "jessie" и Ñ?анее не воÑ?едÑ?ие в пÑ?едÑ?дÑ?Ñ?ие Ñ?едакÑ?ии,
+вклÑ?Ñ?енÑ? в данное обновление.</p>
+
+<p>Ð?амеÑ?Ñ?Ñ?е, Ñ?Ñ?о Ñ?Ñ?о обновление не Ñ?влÑ?еÑ?Ñ?Ñ? новой веÑ?Ñ?ией Debian
+<release>, а лиÑ?Ñ? обновлением некоÑ?оÑ?Ñ?Ñ? вклÑ?Ñ?Ñ?ннÑ?Ñ? в вÑ?пÑ?Ñ?к пакеÑ?ов. Ð?еÑ?
+необÑ?одимоÑ?Ñ?и вÑ?бÑ?аÑ?Ñ?ваÑ?Ñ? Ñ?Ñ?аÑ?Ñ?е ноÑ?иÑ?ели Ñ? вÑ?пÑ?Ñ?ком <q><codename></q>. Ð?оÑ?ле Ñ?Ñ?Ñ?ановки
+пакеÑ?Ñ? можно обновиÑ?Ñ? до Ñ?екÑ?Ñ?иÑ? веÑ?Ñ?ий, иÑ?полÑ?зÑ?Ñ? акÑ?Ñ?алÑ?ное
+зеÑ?кало Debian.</p>
+
+<p>Тем, кÑ?о Ñ?аÑ?Ñ?о Ñ?Ñ?Ñ?анавливаеÑ? обновлениÑ? Ñ? security.debian.org, не пÑ?идÑ?Ñ?Ñ?Ñ?
+обновлÑ?Ñ?Ñ? много пакеÑ?ов, болÑ?Ñ?инÑ?Ñ?во обновлений Ñ? security.debian.org
+вклÑ?Ñ?енÑ? в данное обновление.</p>
+
+<p>Ð?овÑ?е Ñ?Ñ?Ñ?ановоÑ?нÑ?е обÑ?азÑ? бÑ?дÑ?Ñ? доÑ?Ñ?Ñ?пнÑ? позже в обÑ?Ñ?ном меÑ?Ñ?е.</p>
+
+<p>Ð?бновление Ñ?Ñ?Ñ?еÑ?Ñ?вÑ?Ñ?Ñ?иÑ? Ñ?иÑ?Ñ?ем до Ñ?Ñ?ой Ñ?едакÑ?ии можно вÑ?полниÑ?Ñ? Ñ? помоÑ?Ñ?Ñ?
+Ñ?иÑ?Ñ?емÑ? Ñ?пÑ?авлениÑ? пакеÑ?ами, иÑ?полÑ?зÑ?Ñ? одно из множеÑ?Ñ?ва HTTP-зеÑ?кал Debian.
+Ð?Ñ?Ñ?еÑ?пÑ?ваÑ?Ñ?ий Ñ?пиÑ?ок зеÑ?кал доÑ?Ñ?Ñ?пен на Ñ?Ñ?Ñ?аниÑ?е:</p>
 
 <div class="center">
   <a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
 </div>
 
 
-<h2>Miscellaneous Bugfixes</h2>
+<h2>Ð?Ñ?пÑ?авлениÑ? Ñ?азлиÑ?нÑ?Ñ? оÑ?ибок</h2>
 
-<p>This oldstable update adds a few important corrections to the
-following packages:</p>
+<p>Ð?анное обновление пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка вноÑ?иÑ? неÑ?колÑ?ко важнÑ?Ñ? иÑ?пÑ?авлений длÑ? Ñ?ледÑ?Ñ?Ñ?иÑ?
+пакеÑ?ов:</p>
 <table border=0>
-<tr><th>Package</th>               <th>Reason</th></tr>
-<correction adminer                          "Don't allow connections to privileged ports [CVE-2018-7667]">
-<correction base-files                       "Update for the point release">
-<correction blktrace                         "Fix buffer overflow in btt [CVE-2018-10689]">
-<correction bwm-ng                           "Explicitly build without libstatgrab support">
-<correction clamav                           "Security update [CVE-2017-6418 CVE-2017-6420 CVE-2017-12374 CVE-2017-12375 CVE-2017-12376 CVE-2017-12377 CVE-2017-12378 CVE-2017-12379 CVE-2017-12380]; fix temporary file cleanup issue; new upstream release; new upstream version">
-<correction debian-installer                 "Rebuild for the point release">
-<correction debian-installer-netboot-images  "Rebuild for the point release">
-<correction debian-security-support          "Update package data">
-<correction dh-make-perl                     "Support Contents file without header">
-<correction dns-root-data                    "Update IANA DNSSEC files to 2017-02-02 versions">
-<correction faad2                            "Fix several DoS issues via crafted MP4 files [CVE-2017-9218 CVE-2017-9219 CVE-2017-9220 CVE-2017-9221 CVE-2017-9222 CVE-2017-9223 CVE-2017-9253 CVE-2017-9254 CVE-2017-9255 CVE-2017-9256 CVE-2017-9257]">
-<correction file                             "Avoid reading past the end of a buffer [CVE-2018-10360]]">
-<correction ghostscript                      "Fix segfault with fuzzing file in gxht_thresh_image_init[); fix buffer overflow in fill_threshold_buffer [CVE-2016-10317]; pdfwrite - Guard against trying to output an infinite number [CVE-2018-10194]">
-<correction intel-microcode                  "Update included microcode, including fixes for Spectre v2 [CVE-2017-5715]">
-<correction lame                             "Fix security issues by switching to use I/O routines from sndfile [CVE-2017-15018 CVE-2017-15045 CVE-2017-15046 CVE-2017-9869 CVE-2017-9870 CVE-2017-9871 CVE-2017-9872]">
-<correction libdatetime-timezone-perl        "Update included data">
-<correction libextractor                     "Various security fixes [CVE-2017-15266 CVE-2017-15267 CVE-2017-15600 CVE-2017-15601 CVE-2017-15602 CVE-2017-15922 CVE-2017-17440]">
-<correction libipc-run-perl                  "Fix memory leak">
-<correction linux                            "New upstream stable release">
-<correction mactelnet                        "Security fix [CVE-2016-7115]">
-<correction ncurses                          "Fix buffer overflow in the _nc_write_entry function [CVE-2017-16879]">
-<correction nvidia-graphics-drivers          "New upstream version">
-<correction nvidia-graphics-drivers-legacy-304xx "Update to latest driver">
-<correction openafs                          "Fix kernel module build against linux 3.16.51-3+deb8u1 kernels after security update-induced ABI changes">
-<correction openldap                         "Fix upgrade failure when olcSuffix contains a backslash; fix memory corruption caused by calling sasl_client_init() multiple times">
-<correction patch                            "Fix arbitrary command execution in ed-style patches [CVE-2018-1000156]">
-<correction postgresql-9.4                   "New upstream release">
-<correction psensor                          "Fix directory traversal issue [CVE-2014-10073]">
-<correction python-mimeparse                 "Fix python3-mimeparse's dependencies">
-<correction rar                              "Strip statically linked rar and install the dynamically linked version instead">
-<correction reportbug                        "Stop CCing secure-testing-team@lists.alioth.debian.org">
-<correction sam2p                            "Fix multiple invalid frees and buffer-overflow vulnerabilities [CVE-2018-7487 CVE-2018-7551 CVE-2018-7552 CVE-2018-7553 CVE-2018-7554]">
-<correction slurm-llnl                       "Fix upgrade issue from wheezy">
-<correction soundtouch                       "Security fixes [CVE-2017-9258 CVE-2017-9259 CVE-2017-9260]">
-<correction subversion                       "Fix crashes with Perl bindings, commonly seen when using git-svn">
-<correction tzdata                           "Update included data">
-<correction user-mode-linux                  "Rebuild against current jessie kernel">
-<correction virtualbox-guest-additions-iso   "Fix multiple security issues [CVE-2016-0592 CVE-2016-0495 CVE-2015-8104 CVE-2015-7183 CVE-2015-5307 CVE-2015-7183 CVE-2015-4813 CVE-2015-4896 CVE-2015-3456]">
-<correction xerces-c                         "Fix Denial of Service via external DTD reference [CVE-2017-12627]">
-<correction zsh                              "Rebuild against libraries currently in jessie">
+<tr><th>Ð?акеÑ?</th>               <th>Ð?Ñ?иÑ?ина</th></tr>
+<correction adminer                          "Ð?е Ñ?азÑ?еÑ?аÑ?Ñ?Ñ?Ñ? подклÑ?Ñ?ениÑ? к пÑ?ивилегиÑ?ованнÑ?м поÑ?Ñ?ам [CVE-2018-7667]">
+<correction base-files                       "Ð?бновление длÑ? данной Ñ?едакÑ?ии">
+<correction blktrace                         "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в btt [CVE-2018-10689]">
+<correction bwm-ng                           "СбоÑ?ка без поддеÑ?жки libstatgrab">
+<correction clamav                           "Ð?бновление безопаÑ?ноÑ?Ñ?и [CVE-2017-6418 CVE-2017-6420 CVE-2017-12374 CVE-2017-12375 CVE-2017-12376 CVE-2017-12377 CVE-2017-12378 CVE-2017-12379 CVE-2017-12380]; иÑ?пÑ?авление пÑ?облемÑ? Ñ? оÑ?иÑ?Ñ?кой вÑ?еменнÑ?Ñ? Ñ?айлов; новаÑ? веÑ?Ñ?иÑ? оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки; новаÑ? веÑ?Ñ?иÑ? оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки">
+<correction debian-installer                 "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка длÑ? данной Ñ?едакÑ?ии">
+<correction debian-installer-netboot-images  "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка длÑ? данной Ñ?едакÑ?ии">
+<correction debian-security-support          "Ð?бновление даннÑ?Ñ? о пакеÑ?аÑ?">
+<correction dh-make-perl                     "Ð?оддеÑ?жка Ñ?айла Contents, не имеÑ?Ñ?его заголовка">
+<correction dns-root-data                    "Ð?бновление Ñ?айлов IANA DNSSEC до веÑ?Ñ?ий 2017-02-02">
+<correction faad2                            "Ð?Ñ?пÑ?авление неÑ?колÑ?киÑ? оÑ?казов в обÑ?лÑ?живании, возникаÑ?Ñ?иÑ? из-за Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?Ñ? MP4-Ñ?айлов [CVE-2017-9218 CVE-2017-9219 CVE-2017-9220 CVE-2017-9221 CVE-2017-9222 CVE-2017-9223 CVE-2017-9253 CVE-2017-9254 CVE-2017-9255 CVE-2017-9256 CVE-2017-9257]">
+<correction file                             "Ð?Ñ?пÑ?авление Ñ?Ñ?ениÑ? за пÑ?еделами бÑ?Ñ?еÑ?а [CVE-2018-10360]]">
+<correction ghostscript                      "Ð?Ñ?пÑ?авление оÑ?ибки Ñ?егменÑ?иÑ?ованиÑ? пÑ?и иÑ?Ñ?ледовании Ñ?айла в Ñ?Ñ?нкÑ?ии gxht_thresh_image_init[); иÑ?пÑ?авление пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в fill_threshold_buffer [CVE-2016-10317]; pdfwrite &mdash; заÑ?иÑ?а оÑ? попÑ?Ñ?ки вÑ?веÑ?Ñ?и беÑ?конеÑ?ное Ñ?иÑ?ло [CVE-2018-10194]">
+<correction intel-microcode                  "Ð?бновление микÑ?окода, вклÑ?Ñ?аÑ?Ñ?ее иÑ?пÑ?авлениÑ? длÑ? Spectre v2 [CVE-2017-5715]">
+<correction lame                             "Ð?Ñ?пÑ?авление пÑ?облем безопаÑ?ноÑ?Ñ?и, возникаÑ?Ñ?иÑ? пÑ?и иÑ?олÑ?зовании Ñ?Ñ?нкÑ?ий ввода/вÑ?вода из sndfile [CVE-2017-15018 CVE-2017-15045 CVE-2017-15046 CVE-2017-9869 CVE-2017-9870 CVE-2017-9871 CVE-2017-9872]">
+<correction libdatetime-timezone-perl        "Ð?бновление даннÑ?Ñ?">
+<correction libextractor                     "РазлиÑ?нÑ?е иÑ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и [CVE-2017-15266 CVE-2017-15267 CVE-2017-15600 CVE-2017-15601 CVE-2017-15602 CVE-2017-15922 CVE-2017-17440]">
+<correction libipc-run-perl                  "Ð?Ñ?пÑ?авление Ñ?Ñ?еÑ?ки памÑ?Ñ?и">
+<correction linux                            "Ð?овÑ?й Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки">
+<correction mactelnet                        "Ð?Ñ?пÑ?авление безопаÑ?ноÑ?Ñ?и [CVE-2016-7115]">
+<correction ncurses                          "Ð?Ñ?пÑ?авление пеÑ?еполнениÑ? бÑ?Ñ?еÑ?а в Ñ?Ñ?нкÑ?ии _nc_write_entry [CVE-2017-16879]">
+<correction nvidia-graphics-drivers          "Ð?оваÑ? веÑ?Ñ?иÑ? оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки">
+<correction nvidia-graphics-drivers-legacy-304xx "Ð?бновление до поÑ?ледней веÑ?Ñ?ии дÑ?айвеÑ?а">
+<correction openafs                          "Ð?Ñ?пÑ?авление Ñ?боÑ?ки модÑ?лÑ? Ñ?дÑ?а Ñ? Ñ?дÑ?ами linux веÑ?Ñ?ии 3.16.51-3+deb8u1 поÑ?ле изменений ABI из-за иÑ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и">
+<correction openldap                         "Ð?Ñ?пÑ?авление оÑ?ибки обновлениÑ? в Ñ?лÑ?Ñ?аÑ?Ñ?, когда olcSuffix Ñ?одеÑ?жиÑ? обÑ?аÑ?нÑ?Ñ? коÑ?Ñ?Ñ? Ñ?еÑ?Ñ?Ñ?; иÑ?пÑ?авление повÑ?еждениÑ? Ñ?одеÑ?жимого памÑ?Ñ?и из-за вÑ?зова Ñ?Ñ?нкÑ?ии sasl_client_init() неÑ?колÑ?ко Ñ?аз">
+<correction patch                            "Ð?Ñ?пÑ?авление вÑ?полнениÑ? пÑ?оизволÑ?нÑ?Ñ? команд в заплаÑ?аÑ? в Ñ?Ñ?иле Ñ?едакÑ?оÑ?а ed [CVE-2018-1000156]">
+<correction postgresql-9.4                   "Ð?оваÑ? веÑ?Ñ?иÑ? оÑ?новной веÑ?ки Ñ?азÑ?абоÑ?ки">
+<correction psensor                          "Ð?Ñ?пÑ?авление обÑ?ода каÑ?алога [CVE-2014-10073]">
+<correction python-mimeparse                 "Ð?Ñ?пÑ?авление завиÑ?имоÑ?Ñ?ей python3-mimeparse">
+<correction rar                              "Удаление Ñ?Ñ?аÑ?иÑ?еÑ?ки Ñ?компанованного rar и Ñ?Ñ?Ñ?ановка вмеÑ?Ñ?о него динамиÑ?еÑ?ки Ñ?компанованной веÑ?Ñ?ии">
+<correction reportbug                        "Ð?Ñ?екÑ?аÑ?ение оÑ?пÑ?авки копий по адÑ?еÑ?Ñ? secure-testing-team@lists.alioth.debian.org">
+<correction sam2p                            "Ð?Ñ?пÑ?авление многоÑ?иÑ?леннÑ?е непÑ?авилÑ?нÑ?Ñ? оÑ?вобождений памÑ?Ñ?и и пеÑ?еполнений бÑ?Ñ?еÑ?а [CVE-2018-7487 CVE-2018-7551 CVE-2018-7552 CVE-2018-7553 CVE-2018-7554]">
+<correction slurm-llnl                       "Ð?Ñ?пÑ?авление пÑ?облем обновлениÑ? Ñ? вÑ?пÑ?Ñ?ка wheezy">
+<correction soundtouch                       "Ð?Ñ?пÑ?авлениÑ? безопаÑ?ноÑ?Ñ?и [CVE-2017-9258 CVE-2017-9259 CVE-2017-9260]">
+<correction subversion                       "Ð?Ñ?пÑ?авление аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановок в пÑ?ивÑ?зкаÑ? Perl, обÑ?Ñ?но вÑ?Ñ?Ñ?еÑ?аÑ?Ñ?иÑ?Ñ?Ñ? пÑ?и иÑ?полÑ?зовании git-svn">
+<correction tzdata                           "Ð?бновление даннÑ?Ñ?">
+<correction user-mode-linux                  "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка длÑ? Ñ?екÑ?Ñ?его Ñ?дÑ?а в jessie">
+<correction virtualbox-guest-additions-iso   "Ð?Ñ?пÑ?авление многоÑ?иÑ?леннÑ?Ñ? пÑ?облем безопаÑ?ноÑ?Ñ?и [CVE-2016-0592 CVE-2016-0495 CVE-2015-8104 CVE-2015-7183 CVE-2015-5307 CVE-2015-7183 CVE-2015-4813 CVE-2015-4896 CVE-2015-3456]">
+<correction xerces-c                         "Ð?Ñ?пÑ?авление оÑ?каза в обÑ?лÑ?живании из-за Ñ?казаниÑ? внеÑ?ней Ñ?Ñ?Ñ?ноÑ?Ñ?и [CVE-2017-12627]">
+<correction zsh                              "Ð?овÑ?оÑ?наÑ? Ñ?боÑ?ка Ñ? иÑ?полÑ?зованием библиоÑ?ек из jessie">
 </table>
 
-<h2>Security Updates</h2>
+<h2>Ð?бновлениÑ? безопаÑ?ноÑ?Ñ?и</h2>
 
 
-<p>This revision adds the following security updates to the oldstable
-release. The Security Team has already released an advisory for each of
-these updates:</p>
+<p>Ð? даннÑ?й вÑ?пÑ?Ñ?к внеÑ?енÑ? Ñ?ледÑ?Ñ?Ñ?ие обновлениÑ? безопаÑ?ноÑ?Ñ?и. Ð?оманда
+безопаÑ?ноÑ?Ñ?и Ñ?же вÑ?пÑ?Ñ?Ñ?ила Ñ?екомендаÑ?ии длÑ? каждого
+из Ñ?Ñ?иÑ? обновлений:</p>
 
 <table border=0>
-<tr><th>Advisory ID</th>  <th>Package</th></tr>
+<tr><th>Ð?денÑ?иÑ?икаÑ?ионнÑ?й номеÑ? Ñ?екомендаÑ?ии</th>  <th>Ð?акеÑ?</th></tr>
 
 
 <dsa 2016 3707 openjdk-7>
@@ -260,76 +260,77 @@
 
 </table>
 
-<h2>Removed packages</h2>
+<h2>УдалÑ?ннÑ?е пакеÑ?Ñ?</h2>
 
-<p>The following packages were removed due to circumstances beyond our
-control:</p>
+<p>СледÑ?Ñ?Ñ?ие пакеÑ?Ñ? бÑ?ли Ñ?даленÑ? из-за обÑ?Ñ?оÑ?Ñ?елÑ?Ñ?Ñ?в, на коÑ?оÑ?Ñ?е мÑ? не
+можем повлиÑ?Ñ?Ñ?:</p>
 
 
 <table border=0>
-<tr><th>Package</th>               <th>Reason</th></tr>
+<tr><th>Ð?акеÑ?</th>               <th>Ð?Ñ?иÑ?ина</th></tr>
 
-<correction dolibarr                  "Too much work to maintain it properly in Debian">
-<correction electrum                  "No longer able to connect to the network">
-<correction jirc                      "Broken with jessie's libpoe-filter-xml-perl">
-<correction nvidia-graphics-modules   "License problem; incompatible with current kernel ABI">
-<correction openstreetmap-client      "Broken">
-<correction redmine                   "No longer security supported">
-<correction redmine-plugin-pretend    "Depends on redmine">
-<correction redmine-plugin-recaptcha  "Depends on redmine">
-<correction redmine-recaptcha         "Depends on redmine">
-<correction youtube-dl                "Incompatible YouTube API changes">
+<correction dolibarr                  "СопÑ?овождение в Debian заÑ?Ñ?Ñ?днено и Ñ?Ñ?ебÑ?еÑ? Ñ?лиÑ?ком много Ñ?абоÑ?Ñ?">
+<correction electrum                  "Ð?олее не можеÑ? подклÑ?Ñ?иÑ?Ñ?Ñ?Ñ? к Ñ?еÑ?и">
+<correction jirc                      "Сломан пÑ?и иÑ?полÑ?зовании веÑ?Ñ?ии libpoe-filter-xml-perl из jessie">
+<correction nvidia-graphics-modules   "Ð?Ñ?облема Ñ? лиÑ?ензией; неÑ?овмеÑ?Ñ?имоÑ?Ñ?Ñ? Ñ? Ñ?екÑ?Ñ?им ABI Ñ?дÑ?а">
+<correction openstreetmap-client      "Сломан">
+<correction redmine                   "Ð?олее не поддеÑ?живаÑ?Ñ?Ñ?Ñ? обновлениÑ? безопаÑ?ноÑ?Ñ?и">
+<correction redmine-plugin-pretend    "Ð?авиÑ?иÑ? оÑ? redmine">
+<correction redmine-plugin-recaptcha  "Ð?авиÑ?иÑ? оÑ? redmine">
+<correction redmine-recaptcha         "Ð?авиÑ?иÑ? оÑ? redmine">
+<correction youtube-dl                "Ð?еÑ?овмеÑ?Ñ?им Ñ? изменениÑ?ми API YouTube">
 </table>
 
-<h2>Debian Installer</h2>
-<p>The installer has been updated to include the fixes incorporated into
-oldstable by the point release.</p>
+<h2>Ð?Ñ?огÑ?амма Ñ?Ñ?Ñ?ановки Debian</h2>
 
-<h2>URLs</h2>
+Ð?Ñ?огÑ?амма Ñ?Ñ?Ñ?ановки бÑ?ла обновлена Ñ? Ñ?елÑ?Ñ? вклÑ?Ñ?ениÑ? иÑ?пÑ?авлений, добавленнÑ?Ñ? в
+даннÑ?Ñ? Ñ?едакÑ?иÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка.
 
-<p>The complete lists of packages that have changed with this
-revision:</p>
+<h2>URL</h2>
+
+<p>Ð?олнÑ?й Ñ?пиÑ?ок пакеÑ?ов, коÑ?оÑ?Ñ?е бÑ?ли измененÑ? в данной
+Ñ?едакÑ?ии:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
 </div>
 
-<p>The current oldstable distribution:</p>
+<p>ТекÑ?Ñ?ий пÑ?едÑ?дÑ?Ñ?ий Ñ?Ñ?абилÑ?нÑ?й вÑ?пÑ?Ñ?к:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/oldstable/";>
 </div>
 
-<p>Proposed updates to the oldstable distribution:</p>
+<p>Ð?Ñ?едлагаемÑ?е обновлениÑ? длÑ? пÑ?едÑ?дÑ?Ñ?его Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка:</p>
 
 <div class="center">
   <url "http://ftp.debian.org/debian/dists/oldstable-proposed-updates";>
 </div>
 
-<p>oldstable distribution information (release notes, errata etc.):</p>
+<p>Ð?нÑ?оÑ?маÑ?иÑ? о пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (инÑ?оÑ?маÑ?иÑ? о вÑ?пÑ?Ñ?ке, извеÑ?Ñ?нÑ?е оÑ?ибки и Ñ?. д.):</p>
 
 <div class="center">
   <a
   href="$(HOME)/releases/oldstable/">https://www.debian.org/releases/oldstable/</a>
 </div>
 
-<p>Security announcements and information:</p>
+<p>Ð?нонÑ?Ñ? безопаÑ?ноÑ?Ñ?и и инÑ?оÑ?маÑ?иÑ?:</p>
 
 <div class="center">
   <a href="$(HOME)/security/">https://security.debian.org/</a>
 </div>
 
 
-<h2>About Debian</h2>
+<h2>Ð? Debian</h2>
 
-<p>The Debian Project is an association of Free Software developers who
-volunteer their time and effort in order to produce the completely free
-operating system Debian.</p>
+<p>Ð?Ñ?оекÑ? Debian â?? обÑ?единение Ñ?азÑ?абоÑ?Ñ?иков Ñ?вободного пÑ?огÑ?аммного обеÑ?пеÑ?ениÑ?,
+коÑ?оÑ?Ñ?е жеÑ?Ñ?вÑ?Ñ?Ñ? Ñ?воÑ? вÑ?емÑ? и знаниÑ? длÑ? Ñ?озданиÑ? абÑ?олÑ?Ñ?но Ñ?вободной
+опеÑ?аÑ?ионной Ñ?иÑ?Ñ?емÑ? Debian.</p>
 
 
-<h2>Contact Information</h2>
+<h2>Ð?онÑ?акÑ?наÑ? инÑ?оÑ?маÑ?иÑ?</h2>
 
-<p>For further information, please visit the Debian web pages at <a
-href="$(HOME)/">https://www.debian.org/</a>, send mail to
-&lt;press@debian.org&gt;, or contact the stable release team at
+<p>Ð?олее подÑ?обнÑ?Ñ? инÑ?оÑ?маÑ?иÑ? вÑ? можеÑ?е полÑ?Ñ?иÑ?Ñ? на Ñ?айÑ?е Debian
+<a href="$(HOME)/">https://www.debian.org/</a>, либо оÑ?пÑ?авив пиÑ?Ñ?мо по адÑ?еÑ?Ñ?
+&lt;press@debian.org&gt;, либо Ñ?вÑ?завÑ?иÑ?Ñ? Ñ? командой Ñ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ка по адÑ?еÑ?Ñ?
 &lt;debian-release@lists.debian.org&gt;.</p>


Reply to: