Re: приоритеты apt
On 19/01/2019 10:23, sergio wrote: Что я не досмотрел? # apt install libcurl4=7.62.0-1 Reading package lists... Done Building dependency tree Reading state information... Done Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: libcurl4 : Depends: libssl1.1 (>= 1.1.1) but 1.1.0j-1~deb9u1 is to be installed E: Unable to correct problems, you have held broken packages. Ну ok, но почему тогда: Packages that were upgraded: libcurl4 в /var/log/unattended-upgrades/unattended-upgrades-dpkg.log пусто и apt dist-upgrade ничего не сказал? -- sergio.
приоритеты apt
unattended-upgrades прислал письмо: Unattended upgrade returned: True Packages that were upgraded: libcurl4 Unattended-upgrades log: Initial blacklisted packages: Initial whitelisted packages: Starting unattended upgrades script Allowed origins are: ['origin=Debian', 'origin=Debian Backports'] Packages that will be upgraded: libcurl4 Writing dpkg log to '/var/log/unattended-upgrades/unattended-upgrades-dpkg.log' All upgrades installed Я зашёл на хост: % apt policy libcurl4 libcurl4: Installed: 7.61.0-1 Candidate: 7.62.0-1 Version table: 7.63.0-1 200 200 https://deb.debian.org/debian sid/main amd64 Packages 7.62.0-1 400 400 https://deb.debian.org/debian buster/main amd64 Packages *** 7.61.0-1 100 100 /var/lib/dpkg/status % grep curl /var/log/unattended-upgrades/unattended-upgrades-dpkg.log пусто % apt-mark showhold пусто # apt update Hit:1 https://cdn-aws.deb.debian.org/debian buster InRelease Hit:2 https://cdn-aws.deb.debian.org/debian-security buster/updates InRelease Hit:3 https://cdn-aws.deb.debian.org/debian buster-updates InRelease Hit:4 https://cdn-aws.deb.debian.org/debian buster-proposed-updates InRelease Hit:5 https://cdn-aws.deb.debian.org/debian sid InRelease Hit:6 https://cdn-aws.deb.debian.org/debian experimental InRelease Ign:7 https://cdn-aws.deb.debian.org/debian stretch InRelease Hit:8 https://cdn-aws.deb.debian.org/debian-security stretch/updates InRelease Hit:9 https://cdn-aws.deb.debian.org/debian stretch-updates InRelease Hit:10 https://cdn-aws.deb.debian.org/debian stretch-proposed-updates InRelease Hit:11 https://cdn-aws.deb.debian.org/debian stretch-backports InRelease Hit:12 https://cdn-aws.deb.debian.org/debian stretch Release Reading package lists... Done Building dependency tree Reading state information... Done 1 package can be upgraded. Run 'apt list --upgradable' to see it. # apt dist-upgrade Reading package lists... Done Building dependency tree Reading state information... Done Calculating upgrade... Done 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. % apt list --upgradable Listing... Done libcurl4/testing 7.62.0-1 amd64 [upgradable from: 7.61.0-1] N: There is 1 additional version. Please use the '-a' switch to see it % apt policy Package files: 100 /var/lib/dpkg/status release a=now 500 https://deb.debian.org/debian stretch-backports/non-free amd64 Packages release o=Debian Backports,a=stretch-backports,n=stretch-backports,l=Debian Backports,c=non-free,b=amd64 origin deb.debian.org 500 https://deb.debian.org/debian stretch-backports/contrib amd64 Packages release o=Debian Backports,a=stretch-backports,n=stretch-backports,l=Debian Backports,c=contrib,b=amd64 origin deb.debian.org 500 https://deb.debian.org/debian stretch-backports/main amd64 Packages release o=Debian Backports,a=stretch-backports,n=stretch-backports,l=Debian Backports,c=main,b=amd64 origin deb.debian.org 500 https://deb.debian.org/debian stretch-proposed-updates/contrib amd64 Packages release o=Debian,a=proposed-updates,n=stretch-proposed-updates,l=Debian,c=contrib,b=amd64 origin deb.debian.org 500 https://deb.debian.org/debian stretch-proposed-updates/main amd64 Packages release o=Debian,a=proposed-updates,n=stretch-proposed-updates,l=Debian,c=main,b=amd64 origin deb.debian.org 990 https://deb.debian.org/debian stretch-updates/main amd64 Packages release o=Debian,a=stable-updates,n=stretch-updates,l=Debian,c=main,b=amd64 origin deb.debian.org 990 https://deb.debian.org/debian-security stretch/updates/non-free amd64 Packages release v=9,o=Debian,a=stable,n=stretch,l=Debian-Security,c=non-free,b=amd64 origin deb.debian.org 990 https://deb.debian.org/debian-security stretch/updates/contrib amd64 Packages release v=9,o=Debian,a=stable,n=stretch,l=Debian-Security,c=contrib,b=amd64 origin deb.debian.org 990 https://deb.debian.org/debian-security stretch/updates/main amd64 Packages release v=9,o=Debian,a=stable,n=stretch,l=Debian-Security,c=main,b=amd64 origin deb.debian.org 990 https://deb.debian.org/debian stretch/non-free amd64 Packages release v=9.6,o=Debian,a=stable,n=stretch,l=Debian,c=non-free,b=amd64 origin deb.debian.org 990 https://deb.debian.org/debian stretch/contrib amd64 Packages release v=9.6,o=Debian,a=stable,n=stretch,l=Debian,c=contrib,b=amd64 origin deb.debian.org 990 https://deb.debian.org/debian stretch/main amd64 Packages release v=9.6,o=Debian,a=stable,n=stretch,l=Debian,c=main,b=amd64 origin deb.debian.org 200 https://deb.debian.org/debian experimental/non-free amd64 Packages release o=Debian,a=experimental,n=experimental,l=Debian,c=non-free,b=amd64 origin deb.debian.org 200 https://deb.debian.org/debian experimental/contrib amd64 Packages release o=Debian,a=experimental,n=experimental,l=Debian,c=contrib,b=amd64
Re: [DONE] wml://security/2019/dsa-4370.wml
Пт 18 янв 2019 @ 22:20 Vladimir Zhbanov : > On Fri, Jan 18, 2019 at 08:04:59PM +0500, Lev Lamberov wrote: >> +В Drupal, полнофункциональной программной платформе для управления >> содержимым, > > "обнаружены две уязвимости", как я понимаю? Исправил. Спасибо!
Re: [DONE] wml://security/2019/dsa-4370.wml
On Fri, Jan 18, 2019 at 08:04:59PM +0500, Lev Lamberov wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > - --- ../../english/security/2019/dsa-4370.wml2019-01-18 > 19:59:50.986949290 +0500 > +++ 2019/dsa-4370.wml 2019-01-18 20:03:38.747458357 +0500 > @@ -1,23 +1,23 @@ > - -security update > +#use wml::debian::translation-check > translation="4eb54b0c3467c7c7d85b14f5c07fa5a97d71ae2f" mindelta="1" > maintainer="Lev Lamberov" > +обновление безопасности > > - -Two vulnerabilities were found in Drupal, a fully-featured content > - -management framework, which could result in arbitrary code execution. > +В Drupal, полнофункциональной программной платформе для управления > содержимым, "обнаружены две уязвимости", как я понимаю? > +которые могут приводить к выполнению произвольного кода. > > - -For additional information, please refer to the upstream advisories at: > - - href="https://www.drupal.org/sa-core-2019-001;>https://www.drupal.org/sa-core-2019-001 > and > +За дополнительной информацией обращайтесь к рекомендациям основной ветки > разработки по следующим адресам: > + href="https://www.drupal.org/sa-core-2019-001;>https://www.drupal.org/sa-core-2019-001 > и > href="https://www.drupal.org/sa-core-2019-002;>https://www.drupal.org/sa-core-2019-002 > > - -For the stable distribution (stretch), this problem has been fixed in > - -version 7.52-2+deb9u6. > +В стабильном выпуске (stretch) эта проблема была исправлена в > +версии 7.52-2+deb9u6. > > - -We recommend that you upgrade your drupal7 packages. > +Рекомендуется обновить пакеты drupal7. > > - -For the detailed security status of drupal7 please refer to > - -its security tracker page at: > +С подробным статусом поддержки безопасности drupal7 можно ознакомиться на > +соответствующей странице отслеживания безопасности по адресу > https://security-tracker.debian.org/tracker/drupal7;>\ > https://security-tracker.debian.org/tracker/drupal7 > > > # do not modify the following line > #include "$(ENGLISHDIR)/security/2019/dsa-4370.data" > - -# $Id: $ > -BEGIN PGP SIGNATURE- > > iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlxB6xYACgkQXudu4gIW > 0qX/xRAAhbvLNKtlAzQMJ2EvVAwJ/k4gVWpF35JEUUNaDs75WfDZmHpmYHxVqvo3 > ZTOvV3A35mrFVydjPI+T3SjjPSIZk/DievPZpGHyzJnRQodKWnIGhB4dgv0mOtwb > f/kaMsfZPiKN7EjazYtcNLbksWvTLR+j42yfqz+nM809b+pmI9el4YUf5tZ6ZVLi > Lzd6uanEFHS4oGQrxD+MO6wJynbIuQPvF/PhX/XY8DiggrvtHROiLV1WjhxyObKd > EPFpEMpT2txnFCg0TNnujFzSoiOoonR7BMyJ7Yuj8wu7+nzk2CR3JnvJHcJEPvU0 > G7b7YMg3fD6ilOaLc/oF/dOI+I9J307JVDLucdKoQmS1DqWnbHdX/L/pc2gwIPeK > 4XjJMX5e4Mjap10ezVjSJDyN4b7FU6CTp/XkL5nGUN1BeixThyA+F7LYC6vhRbwW > WCCjyCpojCahIhmjTH3uo/my6lYyk8z+Nxk3N8d8UUV/I7F6XEtCYJd2a31eP35N > k0fevw4+JKFKTV9XdWOfd1yIiTGzxMll1ZJanfRpHkP2X3FD+vS62tzDXdVJM4jW > 17YJOLUVLzqFqH9LE7kFZ/BfuPXfQteC62GQ9VIthe2H1Ww5gA/YHEcwUa7emthv > UIs8shpRIisO1NRG6/CHAFL8X9pfza/qcoL3AQ9KPAMVeEbHTL8= > =Gu9K > -END PGP SIGNATURE- > -- Vladimir
[DONE] wml://security/2019/dsa-4370.wml
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - --- ../../english/security/2019/dsa-4370.wml 2019-01-18 19:59:50.986949290 +0500 +++ 2019/dsa-4370.wml 2019-01-18 20:03:38.747458357 +0500 @@ -1,23 +1,23 @@ - -security update +#use wml::debian::translation-check translation="4eb54b0c3467c7c7d85b14f5c07fa5a97d71ae2f" mindelta="1" maintainer="Lev Lamberov" +обновление безопасности - -Two vulnerabilities were found in Drupal, a fully-featured content - -management framework, which could result in arbitrary code execution. +В Drupal, полнофункциональной программной платформе для управления содержимым, +которые могут приводить к выполнению произвольного кода. - -For additional information, please refer to the upstream advisories at: - -https://www.drupal.org/sa-core-2019-001;>https://www.drupal.org/sa-core-2019-001 and +За дополнительной информацией обращайтесь к рекомендациям основной ветки разработки по следующим адресам: +https://www.drupal.org/sa-core-2019-001;>https://www.drupal.org/sa-core-2019-001 и https://www.drupal.org/sa-core-2019-002;>https://www.drupal.org/sa-core-2019-002 - -For the stable distribution (stretch), this problem has been fixed in - -version 7.52-2+deb9u6. +В стабильном выпуске (stretch) эта проблема была исправлена в +версии 7.52-2+deb9u6. - -We recommend that you upgrade your drupal7 packages. +Рекомендуется обновить пакеты drupal7. - -For the detailed security status of drupal7 please refer to - -its security tracker page at: +С подробным статусом поддержки безопасности drupal7 можно ознакомиться на +соответствующей странице отслеживания безопасности по адресу https://security-tracker.debian.org/tracker/drupal7;>\ https://security-tracker.debian.org/tracker/drupal7 # do not modify the following line #include "$(ENGLISHDIR)/security/2019/dsa-4370.data" - -# $Id: $ -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlxB6xYACgkQXudu4gIW 0qX/xRAAhbvLNKtlAzQMJ2EvVAwJ/k4gVWpF35JEUUNaDs75WfDZmHpmYHxVqvo3 ZTOvV3A35mrFVydjPI+T3SjjPSIZk/DievPZpGHyzJnRQodKWnIGhB4dgv0mOtwb f/kaMsfZPiKN7EjazYtcNLbksWvTLR+j42yfqz+nM809b+pmI9el4YUf5tZ6ZVLi Lzd6uanEFHS4oGQrxD+MO6wJynbIuQPvF/PhX/XY8DiggrvtHROiLV1WjhxyObKd EPFpEMpT2txnFCg0TNnujFzSoiOoonR7BMyJ7Yuj8wu7+nzk2CR3JnvJHcJEPvU0 G7b7YMg3fD6ilOaLc/oF/dOI+I9J307JVDLucdKoQmS1DqWnbHdX/L/pc2gwIPeK 4XjJMX5e4Mjap10ezVjSJDyN4b7FU6CTp/XkL5nGUN1BeixThyA+F7LYC6vhRbwW WCCjyCpojCahIhmjTH3uo/my6lYyk8z+Nxk3N8d8UUV/I7F6XEtCYJd2a31eP35N k0fevw4+JKFKTV9XdWOfd1yIiTGzxMll1ZJanfRpHkP2X3FD+vS62tzDXdVJM4jW 17YJOLUVLzqFqH9LE7kFZ/BfuPXfQteC62GQ9VIthe2H1Ww5gA/YHEcwUa7emthv UIs8shpRIisO1NRG6/CHAFL8X9pfza/qcoL3AQ9KPAMVeEbHTL8= =Gu9K -END PGP SIGNATURE-
Re: emacs and gnome
On 17 January 2019 3:23:04 am GMT+07:00, Thakur Mahashaya wrote: >всем привет >В emacs чтобы войти в меню нужно набрать M-` >но в гноме эта комбинация уже под что-то заточена. >как это можно изменить? >у меня дебиан 9 stretch Если я правильно ошибаюсь, то еще можно нажать F10. А общий принцип — вписать что-то в духе (global-set-key (kbd "") 'menu-bar-open) в ~/.emacs.el. Но стоит прочесть info emacs (можно в нем же самом — C-h i) на предмет того, какие кнопки можно переопределять уверенно, а какие могут быть перекрыты (и нередко бывают) режимами поддержки того или иного типа файла. -- Best regards, Artem.