--- english/News/2018/20180623.wml 2018-06-23 22:12:06.113697279 +0500
+++ russian/News/2018/20180623.wml 2018-06-24 14:46:48.730386229 +0500
@@ -1,7 +1,7 @@
-<define-tag pagetitle>Updated Debian 8: 8.11 released</define-tag>
+#use wml::debian::translation-check
translation="0788aa9ab387393e2e9236d36df0630ae1c038c6" maintainer="Lev Lamberov"
+<define-tag pagetitle>ÐбновлÑннÑй Debian 8: вÑпÑÑк
8.11</define-tag>
<define-tag release_date>2018-06-23</define-tag>
#use wml::debian::news
-# $Id:
<define-tag release>8</define-tag>
<define-tag codename>jessie</define-tag>
@@ -24,103 +24,103 @@
<define-tag srcpkg><a
href="https://packages.debian.org/src:%0">%0</a></define-tag>
-<p>The Debian project is pleased to announce the eleventh (and final)
-update of its oldstable distribution Debian <release> (codename
<q><codename></q>).
-This point release mainly adds corrections for security issues,
-along with a few adjustments for serious problems. Security advisories
-have already been published separately and are referenced where available.</p>
-
-<p>After this point release, Debian's Security and Release Teams will no
-longer be producing updates for Debian 8.
-Users wishing to continue to receive security support should upgrade
-to Debian 9, or see <url "https://wiki.debian.org/LTS"> for details about the
-subset of architectures and packages covered by the Long Term Support project.
+<p>ÐÑÐ¾ÐµÐºÑ Debian Ñ ÑадоÑÑÑÑ ÑообÑÐ°ÐµÑ Ð¾Ð±
одиннадÑаÑом (и поÑледнем) обновлении
Ñвоего
+пÑедÑдÑÑего ÑÑабилÑного вÑпÑÑка Debian <release>
(кодовое Ð¸Ð¼Ñ <q><codename></q>).
+ÐÑо обновление в оÑновном ÑодеÑжиÑ
иÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿Ñоблем безопаÑноÑÑи,
+а Ñакже неÑколÑко коÑÑекÑиÑовок ÑеÑÑÑзнÑÑ
пÑоблем. РекомендаÑии по безопаÑноÑÑи
+опÑÐ±Ð»Ð¸ÐºÐ¾Ð²Ð°Ð½Ñ Ð¾ÑделÑно и ÑказÑваÑÑÑÑ Ð¿Ñи
необÑ
одимоÑÑи.</p>
+
+<p>ÐоÑле вÑпÑÑка данной ÑедакÑии командÑ
безопаÑноÑÑи и вÑпÑÑков Debian более не
+бÑдÑÑ ÑабоÑаÑÑ Ð½Ð°Ð´ обновлениÑми Debian 8.
ÐолÑзоваÑели, желаÑÑие пÑодолжаÑÑ
+полÑÑаÑÑ Ð¿Ð¾Ð´Ð´ÐµÑÐ¶ÐºÑ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи должнÑ
вÑполниÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ðµ до Debian 9, либо
+обÑаÑиÑÑÑÑ Ðº ÑÑÑаниÑе <url "https://wiki.debian.org/LTS">,
на коÑоÑой пÑиводиÑÑÑ
+подмножеÑÑво аÑÑ
иÑекÑÑÑ Ð¸ пакеÑов,
коÑоÑÑе бÑдÑÑ Ð¿Ð¾Ð´Ð´ÐµÑживаÑÑÑÑ Ð² ÑамкаÑ
пÑоекÑа долгоÑÑоÑной поддеÑжки.
</p>
-<p>The packages for some architectures for DSA 3746, DSA 3944, DSA 3968, DSA
4010,
-DSA 4014, DSA 4061, DSA 4075, DSA 4102, DSA 4155, DSA 4209 and DSA 4218 are not
-included in this point release for technical reasons. All other security
updates
-released during the lifetime of "jessie" that have not previously been part of
a point
-release are included in this update.</p>
-
-<p>Please note that the point release does not constitute a new version of
Debian
-<release> but only updates some of the packages included. There is
-no need to throw away old <q><codename></q> media. After installation,
-packages can be upgraded to the current versions using an up-to-date Debian
-mirror.</p>
-
-<p>Those who frequently install updates from security.debian.org won't have
-to update many packages, and most such updates are
-included in the point release.</p>
-
-<p>New installation images will be available soon at the regular locations.</p>
-
-<p>Upgrading an existing installation to this revision can be achieved by
-pointing the package management system at one of Debian's many HTTP mirrors.
-A comprehensive list of mirrors is available at:</p>
+<p>ÐакеÑÑ Ð´Ð»Ñ Ð½ÐµÐºÐ¾ÑоÑÑÑ
аÑÑ
иÑекÑÑÑ Ð´Ð»Ñ
ÑекомендаÑий по безопаÑноÑÑи DSA 3746, DSA 3944, DSA
3968, DSA 4010,
+DSA 4014, DSA 4061, DSA 4075, DSA 4102, DSA 4155, DSA 4209 и DSA 4218 не
вклÑÑенÑ
+в даннÑÑ ÑедакÑÐ¸Ñ Ð¿Ð¾ ÑеÑ
ниÑеÑким пÑиÑинам.
ÐÑе оÑÑалÑнÑе Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи,
+вÑпÑÑеннÑе во вÑÐµÐ¼Ñ Ð¶Ð¸Ð·Ð½ÐµÐ½Ð½Ð¾Ð³Ð¾ Ñикла "jessie"
и Ñанее не воÑедÑие в пÑедÑдÑÑие ÑедакÑии,
+вклÑÑÐµÐ½Ñ Ð² данное обновление.</p>
+
+<p>ÐамеÑÑÑе, ÑÑо ÑÑо обновление не ÑвлÑеÑÑÑ
новой веÑÑией Debian
+<release>, а лиÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸ÐµÐ¼ некоÑоÑÑÑ
вклÑÑÑннÑÑ
в вÑпÑÑк пакеÑов. ÐеÑ
+необÑ
одимоÑÑи вÑбÑаÑÑваÑÑ ÑÑаÑÑе
ноÑиÑели Ñ Ð²ÑпÑÑком <q><codename></q>. ÐоÑле
ÑÑÑановки
+пакеÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ обновиÑÑ Ð´Ð¾ ÑекÑÑиÑ
веÑÑий,
иÑполÑзÑÑ Ð°ÐºÑÑалÑное
+зеÑкало Debian.</p>
+
+<p>Тем, кÑо ÑаÑÑо ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ
Ñ security.debian.org, не пÑидÑÑÑÑ
+обновлÑÑÑ Ð¼Ð½Ð¾Ð³Ð¾ пакеÑов, болÑÑинÑÑво
обновлений Ñ security.debian.org
+вклÑÑÐµÐ½Ñ Ð² данное обновление.</p>
+
+<p>ÐовÑе ÑÑÑановоÑнÑе обÑÐ°Ð·Ñ Ð±ÑдÑÑ
доÑÑÑÐ¿Ð½Ñ Ð¿Ð¾Ð·Ð¶Ðµ в обÑÑном меÑÑе.</p>
+
+<p>Ðбновление ÑÑÑеÑÑвÑÑÑиÑ
ÑиÑÑем до ÑÑой
ÑедакÑии можно вÑполниÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ
+ÑиÑÑÐµÐ¼Ñ ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿Ð°ÐºÐµÑами, иÑполÑзÑÑ
одно из множеÑÑва HTTP-зеÑкал Debian.
+ÐÑÑеÑпÑваÑÑий ÑпиÑок зеÑкал доÑÑÑпен на
ÑÑÑаниÑе:</p>
<div class="center">
<a href="$(HOME)/mirror/list">https://www.debian.org/mirror/list</a>
</div>
-<h2>Miscellaneous Bugfixes</h2>
+<h2>ÐÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÑазлиÑнÑÑ
оÑибок</h2>
-<p>This oldstable update adds a few important corrections to the
-following packages:</p>
+<p>Ðанное обновление пÑедÑдÑÑего
ÑÑабилÑного вÑпÑÑка вноÑÐ¸Ñ Ð½ÐµÑколÑко
важнÑÑ
иÑпÑавлений Ð´Ð»Ñ ÑледÑÑÑиÑ
+пакеÑов:</p>
<table border=0>
-<tr><th>Package</th> <th>Reason</th></tr>
-<correction adminer "Don't allow connections to
privileged ports [CVE-2018-7667]">
-<correction base-files "Update for the point release">
-<correction blktrace "Fix buffer overflow in btt
[CVE-2018-10689]">
-<correction bwm-ng "Explicitly build without
libstatgrab support">
-<correction clamav "Security update [CVE-2017-6418
CVE-2017-6420 CVE-2017-12374 CVE-2017-12375 CVE-2017-12376 CVE-2017-12377
CVE-2017-12378 CVE-2017-12379 CVE-2017-12380]; fix temporary file cleanup
issue; new upstream release; new upstream version">
-<correction debian-installer "Rebuild for the point release">
-<correction debian-installer-netboot-images "Rebuild for the point release">
-<correction debian-security-support "Update package data">
-<correction dh-make-perl "Support Contents file without
header">
-<correction dns-root-data "Update IANA DNSSEC files to
2017-02-02 versions">
-<correction faad2 "Fix several DoS issues via
crafted MP4 files [CVE-2017-9218 CVE-2017-9219 CVE-2017-9220 CVE-2017-9221
CVE-2017-9222 CVE-2017-9223 CVE-2017-9253 CVE-2017-9254 CVE-2017-9255
CVE-2017-9256 CVE-2017-9257]">
-<correction file "Avoid reading past the end of a
buffer [CVE-2018-10360]]">
-<correction ghostscript "Fix segfault with fuzzing file
in gxht_thresh_image_init[); fix buffer overflow in fill_threshold_buffer
[CVE-2016-10317]; pdfwrite - Guard against trying to output an infinite number
[CVE-2018-10194]">
-<correction intel-microcode "Update included microcode,
including fixes for Spectre v2 [CVE-2017-5715]">
-<correction lame "Fix security issues by switching
to use I/O routines from sndfile [CVE-2017-15018 CVE-2017-15045 CVE-2017-15046
CVE-2017-9869 CVE-2017-9870 CVE-2017-9871 CVE-2017-9872]">
-<correction libdatetime-timezone-perl "Update included data">
-<correction libextractor "Various security fixes
[CVE-2017-15266 CVE-2017-15267 CVE-2017-15600 CVE-2017-15601 CVE-2017-15602
CVE-2017-15922 CVE-2017-17440]">
-<correction libipc-run-perl "Fix memory leak">
-<correction linux "New upstream stable release">
-<correction mactelnet "Security fix [CVE-2016-7115]">
-<correction ncurses "Fix buffer overflow in the
_nc_write_entry function [CVE-2017-16879]">
-<correction nvidia-graphics-drivers "New upstream version">
-<correction nvidia-graphics-drivers-legacy-304xx "Update to latest driver">
-<correction openafs "Fix kernel module build against
linux 3.16.51-3+deb8u1 kernels after security update-induced ABI changes">
-<correction openldap "Fix upgrade failure when
olcSuffix contains a backslash; fix memory corruption caused by calling
sasl_client_init() multiple times">
-<correction patch "Fix arbitrary command execution
in ed-style patches [CVE-2018-1000156]">
-<correction postgresql-9.4 "New upstream release">
-<correction psensor "Fix directory traversal issue
[CVE-2014-10073]">
-<correction python-mimeparse "Fix python3-mimeparse's
dependencies">
-<correction rar "Strip statically linked rar and
install the dynamically linked version instead">
-<correction reportbug "Stop CCing
secure-testing-t...@lists.alioth.debian.org">
-<correction sam2p "Fix multiple invalid frees and
buffer-overflow vulnerabilities [CVE-2018-7487 CVE-2018-7551 CVE-2018-7552
CVE-2018-7553 CVE-2018-7554]">
-<correction slurm-llnl "Fix upgrade issue from wheezy">
-<correction soundtouch "Security fixes [CVE-2017-9258
CVE-2017-9259 CVE-2017-9260]">
-<correction subversion "Fix crashes with Perl bindings,
commonly seen when using git-svn">
-<correction tzdata "Update included data">
-<correction user-mode-linux "Rebuild against current jessie
kernel">
-<correction virtualbox-guest-additions-iso "Fix multiple security issues
[CVE-2016-0592 CVE-2016-0495 CVE-2015-8104 CVE-2015-7183 CVE-2015-5307
CVE-2015-7183 CVE-2015-4813 CVE-2015-4896 CVE-2015-3456]">
-<correction xerces-c "Fix Denial of Service via
external DTD reference [CVE-2017-12627]">
-<correction zsh "Rebuild against libraries
currently in jessie">
+<tr><th>ÐакеÑ</th> <th>ÐÑиÑина</th></tr>
+<correction adminer "Ðе ÑазÑеÑаÑÑÑÑ
подклÑÑÐµÐ½Ð¸Ñ Ðº пÑивилегиÑованнÑм поÑÑам
[CVE-2018-7667]">
+<correction base-files "Ðбновление длÑ
данной ÑедакÑии">
+<correction blktrace "ÐÑпÑавление
пеÑÐµÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð±ÑÑеÑа в btt [CVE-2018-10689]">
+<correction bwm-ng "СбоÑка без
поддеÑжки libstatgrab">
+<correction clamav "Ðбновление
безопаÑноÑÑи [CVE-2017-6418 CVE-2017-6420 CVE-2017-12374
CVE-2017-12375 CVE-2017-12376 CVE-2017-12377 CVE-2017-12378 CVE-2017-12379
CVE-2017-12380]; иÑпÑавление пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ñ Ð¾ÑиÑÑкой
вÑеменнÑÑ
Ñайлов; Ð½Ð¾Ð²Ð°Ñ Ð²ÐµÑÑÐ¸Ñ Ð¾Ñновной
веÑки ÑазÑабоÑки; Ð½Ð¾Ð²Ð°Ñ Ð²ÐµÑÑÐ¸Ñ Ð¾Ñновной
веÑки ÑазÑабоÑки">
+<correction debian-installer "ÐовÑоÑÐ½Ð°Ñ ÑбоÑка
Ð´Ð»Ñ Ð´Ð°Ð½Ð½Ð¾Ð¹ ÑедакÑии">
+<correction debian-installer-netboot-images "ÐовÑоÑÐ½Ð°Ñ ÑбоÑка
Ð´Ð»Ñ Ð´Ð°Ð½Ð½Ð¾Ð¹ ÑедакÑии">
+<correction debian-security-support "Ðбновление даннÑÑ
о пакеÑаÑ
">
+<correction dh-make-perl "ÐоддеÑжка Ñайла
Contents, не имеÑÑего заголовка">
+<correction dns-root-data "Ðбновление
Ñайлов IANA DNSSEC до веÑÑий 2017-02-02">
+<correction faad2 "ÐÑпÑавление
неÑколÑкиÑ
оÑказов в обÑлÑживании,
возникаÑÑиÑ
из-за ÑпеÑиалÑно
ÑÑоÑмиÑованнÑÑ
MP4-Ñайлов [CVE-2017-9218 CVE-2017-9219
CVE-2017-9220 CVE-2017-9221 CVE-2017-9222 CVE-2017-9223 CVE-2017-9253
CVE-2017-9254 CVE-2017-9255 CVE-2017-9256 CVE-2017-9257]">
+<correction file "ÐÑпÑавление
ÑÑÐµÐ½Ð¸Ñ Ð·Ð° пÑеделами бÑÑеÑа [CVE-2018-10360]]">
+<correction ghostscript "ÐÑпÑавление
оÑибки ÑегменÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¿Ñи иÑÑледовании
Ñайла в ÑÑнкÑии gxht_thresh_image_init[); иÑпÑавление
пеÑÐµÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð±ÑÑеÑа в fill_threshold_buffer
[CVE-2016-10317]; pdfwrite — заÑиÑа Ð¾Ñ Ð¿Ð¾Ð¿ÑÑки
вÑвеÑÑи беÑконеÑное ÑиÑло [CVE-2018-10194]">
+<correction intel-microcode "Ðбновление
микÑокода, вклÑÑаÑÑее иÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Spectre
v2 [CVE-2017-5715]">
+<correction lame "ÐÑпÑавление
пÑоблем безопаÑноÑÑи, возникаÑÑиÑ
пÑи
иÑолÑзовании ÑÑнкÑий ввода/вÑвода из sndfile
[CVE-2017-15018 CVE-2017-15045 CVE-2017-15046 CVE-2017-9869 CVE-2017-9870
CVE-2017-9871 CVE-2017-9872]">
+<correction libdatetime-timezone-perl "Ðбновление даннÑÑ
">
+<correction libextractor "РазлиÑнÑе
иÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи [CVE-2017-15266 CVE-2017-15267
CVE-2017-15600 CVE-2017-15601 CVE-2017-15602 CVE-2017-15922 CVE-2017-17440]">
+<correction libipc-run-perl "ÐÑпÑавление
ÑÑеÑки памÑÑи">
+<correction linux "ÐовÑй ÑÑабилÑнÑй
вÑпÑÑк оÑновной веÑки ÑазÑабоÑки">
+<correction mactelnet "ÐÑпÑавление
безопаÑноÑÑи [CVE-2016-7115]">
+<correction ncurses "ÐÑпÑавление
пеÑÐµÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð±ÑÑеÑа в ÑÑнкÑии _nc_write_entry
[CVE-2017-16879]">
+<correction nvidia-graphics-drivers "ÐÐ¾Ð²Ð°Ñ Ð²ÐµÑÑиÑ
оÑновной веÑки ÑазÑабоÑки">
+<correction nvidia-graphics-drivers-legacy-304xx "Ðбновление до
поÑледней веÑÑии дÑайвеÑа">
+<correction openafs "ÐÑпÑавление
ÑбоÑки модÑÐ»Ñ ÑдÑа Ñ ÑдÑами linux веÑÑии
3.16.51-3+deb8u1 поÑле изменений ABI из-за
иÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи">
+<correction openldap "ÐÑпÑавление
оÑибки Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð² ÑлÑÑаÑÑ
, когда olcSuffix
ÑодеÑÐ¶Ð¸Ñ Ð¾Ð±ÑаÑнÑÑ ÐºÐ¾ÑÑÑ ÑеÑÑÑ; иÑпÑавление
повÑÐµÐ¶Ð´ÐµÐ½Ð¸Ñ ÑодеÑжимого памÑÑи из-за
вÑзова ÑÑнкÑии sasl_client_init() неÑколÑко Ñаз">
+<correction patch "ÐÑпÑавление
вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑнÑÑ
команд в заплаÑаÑ
в ÑÑиле ÑедакÑоÑа ed [CVE-2018-1000156]">
+<correction postgresql-9.4 "ÐÐ¾Ð²Ð°Ñ Ð²ÐµÑÑиÑ
оÑновной веÑки ÑазÑабоÑки">
+<correction psensor "ÐÑпÑавление обÑ
ода каÑалога [CVE-2014-10073]">
+<correction python-mimeparse "ÐÑпÑавление
завиÑимоÑÑей python3-mimeparse">
+<correction rar "Удаление
ÑÑаÑиÑеÑки Ñкомпанованного rar и ÑÑÑановка
вмеÑÑо него динамиÑеÑки Ñкомпанованной
веÑÑии">
+<correction reportbug "ÐÑекÑаÑение
оÑпÑавки копий по адÑеÑÑ
secure-testing-t...@lists.alioth.debian.org">
+<correction sam2p "ÐÑпÑавление
многоÑиÑленнÑе непÑавилÑнÑÑ
оÑвобождений
памÑÑи и пеÑеполнений бÑÑеÑа [CVE-2018-7487
CVE-2018-7551 CVE-2018-7552 CVE-2018-7553 CVE-2018-7554]">
+<correction slurm-llnl "ÐÑпÑавление
пÑоблем Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ñ Ð²ÑпÑÑка wheezy">
+<correction soundtouch "ÐÑпÑавлениÑ
безопаÑноÑÑи [CVE-2017-9258 CVE-2017-9259 CVE-2017-9260]">
+<correction subversion "ÐÑпÑавление
аваÑийнÑÑ
оÑÑановок в пÑивÑзкаÑ
Perl, обÑÑно
вÑÑÑеÑаÑÑиÑ
ÑÑ Ð¿Ñи иÑполÑзовании git-svn">
+<correction tzdata "Ðбновление даннÑÑ
">
+<correction user-mode-linux "ÐовÑоÑÐ½Ð°Ñ ÑбоÑка
Ð´Ð»Ñ ÑекÑÑего ÑдÑа в jessie">
+<correction virtualbox-guest-additions-iso "ÐÑпÑавление
многоÑиÑленнÑÑ
пÑоблем безопаÑноÑÑи
[CVE-2016-0592 CVE-2016-0495 CVE-2015-8104 CVE-2015-7183 CVE-2015-5307
CVE-2015-7183 CVE-2015-4813 CVE-2015-4896 CVE-2015-3456]">
+<correction xerces-c "ÐÑпÑавление
оÑказа в обÑлÑживании из-за ÑказаниÑ
внеÑней ÑÑÑноÑÑи [CVE-2017-12627]">
+<correction zsh "ÐовÑоÑÐ½Ð°Ñ ÑбоÑка
Ñ Ð¸ÑполÑзованием библиоÑек из jessie">
</table>
-<h2>Security Updates</h2>
+<h2>ÐÐ±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи</h2>
-<p>This revision adds the following security updates to the oldstable
-release. The Security Team has already released an advisory for each of
-these updates:</p>
+<p>РданнÑй вÑпÑÑк внеÑÐµÐ½Ñ ÑледÑÑÑие
Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи. Ðоманда
+безопаÑноÑÑи Ñже вÑпÑÑÑила ÑекомендаÑии
Ð´Ð»Ñ ÐºÐ°Ð¶Ð´Ð¾Ð³Ð¾
+из ÑÑиÑ
обновлений:</p>
<table border=0>
-<tr><th>Advisory ID</th> <th>Package</th></tr>
+<tr><th>ÐденÑиÑикаÑионнÑй номеÑ
ÑекомендаÑии</th> <th>ÐакеÑ</th></tr>
<dsa 2016 3707 openjdk-7>
@@ -260,76 +260,77 @@
</table>
-<h2>Removed packages</h2>
+<h2>УдалÑннÑе пакеÑÑ</h2>
-<p>The following packages were removed due to circumstances beyond our
-control:</p>
+<p>СледÑÑÑие пакеÑÑ Ð±Ñли ÑÐ´Ð°Ð»ÐµÐ½Ñ Ð¸Ð·-за
обÑÑоÑÑелÑÑÑв, на коÑоÑÑе Ð¼Ñ Ð½Ðµ
+можем повлиÑÑÑ:</p>
<table border=0>
-<tr><th>Package</th> <th>Reason</th></tr>
+<tr><th>ÐакеÑ</th> <th>ÐÑиÑина</th></tr>
-<correction dolibarr "Too much work to maintain it properly
in Debian">
-<correction electrum "No longer able to connect to the
network">
-<correction jirc "Broken with jessie's
libpoe-filter-xml-perl">
-<correction nvidia-graphics-modules "License problem; incompatible with
current kernel ABI">
-<correction openstreetmap-client "Broken">
-<correction redmine "No longer security supported">
-<correction redmine-plugin-pretend "Depends on redmine">
-<correction redmine-plugin-recaptcha "Depends on redmine">
-<correction redmine-recaptcha "Depends on redmine">
-<correction youtube-dl "Incompatible YouTube API changes">
+<correction dolibarr "СопÑовождение в Debian
заÑÑÑднено и ÑÑебÑÐµÑ ÑлиÑком много ÑабоÑÑ">
+<correction electrum "Ðолее не можеÑ
подклÑÑиÑÑÑÑ Ðº ÑеÑи">
+<correction jirc "Сломан пÑи
иÑполÑзовании веÑÑии libpoe-filter-xml-perl из jessie">
+<correction nvidia-graphics-modules "ÐÑоблема Ñ Ð»Ð¸Ñензией;
неÑовмеÑÑимоÑÑÑ Ñ ÑекÑÑим ABI ÑдÑа">
+<correction openstreetmap-client "Сломан">
+<correction redmine "Ðолее не
поддеÑживаÑÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи">
+<correction redmine-plugin-pretend "ÐавиÑÐ¸Ñ Ð¾Ñ redmine">
+<correction redmine-plugin-recaptcha "ÐавиÑÐ¸Ñ Ð¾Ñ redmine">
+<correction redmine-recaptcha "ÐавиÑÐ¸Ñ Ð¾Ñ redmine">
+<correction youtube-dl "ÐеÑовмеÑÑим Ñ
изменениÑми API YouTube">
</table>
-<h2>Debian Installer</h2>
-<p>The installer has been updated to include the fixes incorporated into
-oldstable by the point release.</p>
+<h2>ÐÑогÑамма ÑÑÑановки Debian</h2>
-<h2>URLs</h2>
+ÐÑогÑамма ÑÑÑановки бÑла обновлена Ñ
ÑелÑÑ Ð²ÐºÐ»ÑÑÐµÐ½Ð¸Ñ Ð¸ÑпÑавлений, добавленнÑÑ
в
+даннÑÑ ÑедакÑÐ¸Ñ Ð¿ÑедÑдÑÑего ÑÑабилÑного
вÑпÑÑка.
-<p>The complete lists of packages that have changed with this
-revision:</p>
+<h2>URL</h2>
+
+<p>ÐолнÑй ÑпиÑок пакеÑов, коÑоÑÑе бÑли
Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ñ Ð² данной
+ÑедакÑии:</p>
<div class="center">
<url "http://ftp.debian.org/debian/dists/<downcase <codename>>/ChangeLog">
</div>
-<p>The current oldstable distribution:</p>
+<p>ТекÑÑий пÑедÑдÑÑий ÑÑабилÑнÑй вÑпÑÑк:</p>
<div class="center">
<url "http://ftp.debian.org/debian/dists/oldstable/">
</div>
-<p>Proposed updates to the oldstable distribution:</p>
+<p>ÐÑедлагаемÑе Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¿ÑедÑдÑÑего
ÑÑабилÑного вÑпÑÑка:</p>
<div class="center">
<url "http://ftp.debian.org/debian/dists/oldstable-proposed-updates">
</div>
-<p>oldstable distribution information (release notes, errata etc.):</p>
+<p>ÐнÑоÑмаÑÐ¸Ñ Ð¾ пÑедÑдÑÑем ÑÑабилÑном
вÑпÑÑке (инÑоÑмаÑÐ¸Ñ Ð¾ вÑпÑÑке, извеÑÑнÑе
оÑибки и Ñ. д.):</p>
<div class="center">
<a
href="$(HOME)/releases/oldstable/">https://www.debian.org/releases/oldstable/</a>
</div>
-<p>Security announcements and information:</p>
+<p>ÐнонÑÑ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи и инÑоÑмаÑиÑ:</p>
<div class="center">
<a href="$(HOME)/security/">https://security.debian.org/</a>
</div>
-<h2>About Debian</h2>
+<h2>Ð Debian</h2>
-<p>The Debian Project is an association of Free Software developers who
-volunteer their time and effort in order to produce the completely free
-operating system Debian.</p>
+<p>ÐÑÐ¾ÐµÐºÑ Debian â обÑединение ÑазÑабоÑÑиков
Ñвободного пÑогÑаммного обеÑпеÑениÑ,
+коÑоÑÑе жеÑÑвÑÑÑ ÑÐ²Ð¾Ñ Ð²ÑÐµÐ¼Ñ Ð¸ Ð·Ð½Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð°Ð±ÑолÑÑно Ñвободной
+опеÑаÑионной ÑиÑÑÐµÐ¼Ñ Debian.</p>
-<h2>Contact Information</h2>
+<h2>ÐонÑакÑÐ½Ð°Ñ Ð¸Ð½ÑоÑмаÑиÑ</h2>
-<p>For further information, please visit the Debian web pages at <a
-href="$(HOME)/">https://www.debian.org/</a>, send mail to
-<pr...@debian.org>, or contact the stable release team at
+<p>Ðолее подÑобнÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе
полÑÑиÑÑ Ð½Ð° ÑайÑе Debian
+<a href="$(HOME)/">https://www.debian.org/</a>, либо оÑпÑавив
пиÑÑмо по адÑеÑÑ
+<pr...@debian.org>, либо ÑвÑзавÑиÑÑ Ñ ÐºÐ¾Ð¼Ð°Ð½Ð´Ð¾Ð¹
ÑÑабилÑного вÑпÑÑка по адÑеÑÑ
<debian-rele...@lists.debian.org>.</p>