Re: приоритеты apt

2019-01-18 Пенетрантность sergio

On 19/01/2019 10:23, sergio wrote:


Что я не досмотрел?


# apt install libcurl4=7.62.0-1
Reading package lists... Done
Building dependency tree
Reading state information... Done
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:

The following packages have unmet dependencies:
 libcurl4 : Depends: libssl1.1 (>= 1.1.1) but 1.1.0j-1~deb9u1 is to be
 installed
 E: Unable to correct problems, you have held broken packages.


Ну ok, но почему тогда:


Packages that were upgraded:
  libcurl4


в
/var/log/unattended-upgrades/unattended-upgrades-dpkg.log
пусто


и apt dist-upgrade ничего не сказал?


--
sergio.



приоритеты apt

2019-01-18 Пенетрантность sergio

unattended-upgrades прислал письмо:

Unattended upgrade returned: True

Packages that were upgraded:
 libcurl4

Unattended-upgrades log:
Initial blacklisted packages:
Initial whitelisted packages:
Starting unattended upgrades script
Allowed origins are: ['origin=Debian', 'origin=Debian Backports']
Packages that will be upgraded: libcurl4
Writing dpkg log to 
'/var/log/unattended-upgrades/unattended-upgrades-dpkg.log'

All upgrades installed


Я зашёл на хост:

% apt policy libcurl4
libcurl4:
  Installed: 7.61.0-1
  Candidate: 7.62.0-1
  Version table:
 7.63.0-1 200
200 https://deb.debian.org/debian sid/main amd64 Packages
 7.62.0-1 400
400 https://deb.debian.org/debian buster/main amd64 Packages
 *** 7.61.0-1 100
100 /var/lib/dpkg/status

% grep curl /var/log/unattended-upgrades/unattended-upgrades-dpkg.log
пусто

% apt-mark showhold
пусто


# apt update
Hit:1 https://cdn-aws.deb.debian.org/debian buster InRelease
Hit:2 https://cdn-aws.deb.debian.org/debian-security buster/updates 
InRelease

Hit:3 https://cdn-aws.deb.debian.org/debian buster-updates InRelease
Hit:4 https://cdn-aws.deb.debian.org/debian buster-proposed-updates 
InRelease

Hit:5 https://cdn-aws.deb.debian.org/debian sid InRelease
Hit:6 https://cdn-aws.deb.debian.org/debian experimental InRelease
Ign:7 https://cdn-aws.deb.debian.org/debian stretch InRelease
Hit:8 https://cdn-aws.deb.debian.org/debian-security stretch/updates 
InRelease

Hit:9 https://cdn-aws.deb.debian.org/debian stretch-updates InRelease
Hit:10 https://cdn-aws.deb.debian.org/debian stretch-proposed-updates 
InRelease

Hit:11 https://cdn-aws.deb.debian.org/debian stretch-backports InRelease
Hit:12 https://cdn-aws.deb.debian.org/debian stretch Release
Reading package lists... Done
Building dependency tree
Reading state information... Done
1 package can be upgraded. Run 'apt list --upgradable' to see it.


# apt dist-upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.


% apt list --upgradable
Listing... Done
libcurl4/testing 7.62.0-1 amd64 [upgradable from: 7.61.0-1]
N: There is 1 additional version. Please use the '-a' switch to see it

% apt policy
Package files:
 100 /var/lib/dpkg/status
 release a=now
 500 https://deb.debian.org/debian stretch-backports/non-free amd64 
Packages
 release o=Debian 
Backports,a=stretch-backports,n=stretch-backports,l=Debian 
Backports,c=non-free,b=amd64

 origin deb.debian.org
 500 https://deb.debian.org/debian stretch-backports/contrib amd64 Packages
 release o=Debian 
Backports,a=stretch-backports,n=stretch-backports,l=Debian 
Backports,c=contrib,b=amd64

 origin deb.debian.org
 500 https://deb.debian.org/debian stretch-backports/main amd64 Packages
 release o=Debian 
Backports,a=stretch-backports,n=stretch-backports,l=Debian 
Backports,c=main,b=amd64

 origin deb.debian.org
 500 https://deb.debian.org/debian stretch-proposed-updates/contrib 
amd64 Packages
 release 
o=Debian,a=proposed-updates,n=stretch-proposed-updates,l=Debian,c=contrib,b=amd64

 origin deb.debian.org
 500 https://deb.debian.org/debian stretch-proposed-updates/main amd64 
Packages
 release 
o=Debian,a=proposed-updates,n=stretch-proposed-updates,l=Debian,c=main,b=amd64

 origin deb.debian.org
 990 https://deb.debian.org/debian stretch-updates/main amd64 Packages
 release 
o=Debian,a=stable-updates,n=stretch-updates,l=Debian,c=main,b=amd64

 origin deb.debian.org
 990 https://deb.debian.org/debian-security stretch/updates/non-free 
amd64 Packages
 release 
v=9,o=Debian,a=stable,n=stretch,l=Debian-Security,c=non-free,b=amd64

 origin deb.debian.org
 990 https://deb.debian.org/debian-security stretch/updates/contrib 
amd64 Packages
 release 
v=9,o=Debian,a=stable,n=stretch,l=Debian-Security,c=contrib,b=amd64

 origin deb.debian.org
 990 https://deb.debian.org/debian-security stretch/updates/main amd64 
Packages
 release 
v=9,o=Debian,a=stable,n=stretch,l=Debian-Security,c=main,b=amd64

 origin deb.debian.org
 990 https://deb.debian.org/debian stretch/non-free amd64 Packages
 release v=9.6,o=Debian,a=stable,n=stretch,l=Debian,c=non-free,b=amd64
 origin deb.debian.org
 990 https://deb.debian.org/debian stretch/contrib amd64 Packages
 release v=9.6,o=Debian,a=stable,n=stretch,l=Debian,c=contrib,b=amd64
 origin deb.debian.org
 990 https://deb.debian.org/debian stretch/main amd64 Packages
 release v=9.6,o=Debian,a=stable,n=stretch,l=Debian,c=main,b=amd64
 origin deb.debian.org
 200 https://deb.debian.org/debian experimental/non-free amd64 Packages
 release 
o=Debian,a=experimental,n=experimental,l=Debian,c=non-free,b=amd64

 origin deb.debian.org
 200 https://deb.debian.org/debian experimental/contrib amd64 Packages
 release 
o=Debian,a=experimental,n=experimental,l=Debian,c=contrib,b=amd64

 

Re: [DONE] wml://security/2019/dsa-4370.wml

2019-01-18 Пенетрантность Lev Lamberov
Пт 18 янв 2019 @ 22:20 Vladimir Zhbanov :

> On Fri, Jan 18, 2019 at 08:04:59PM +0500, Lev Lamberov wrote:
>> +В Drupal, полнофункциональной программной платформе для управления 
>> содержимым,
>
> "обнаружены две уязвимости", как я понимаю?

Исправил. Спасибо!


Re: [DONE] wml://security/2019/dsa-4370.wml

2019-01-18 Пенетрантность Vladimir Zhbanov
On Fri, Jan 18, 2019 at 08:04:59PM +0500, Lev Lamberov wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> - --- ../../english/security/2019/dsa-4370.wml2019-01-18 
> 19:59:50.986949290 +0500
> +++ 2019/dsa-4370.wml 2019-01-18 20:03:38.747458357 +0500
> @@ -1,23 +1,23 @@
> - -security update
> +#use wml::debian::translation-check 
> translation="4eb54b0c3467c7c7d85b14f5c07fa5a97d71ae2f" mindelta="1" 
> maintainer="Lev Lamberov"
> +обновление безопасности
>  
> - -Two vulnerabilities were found in Drupal, a fully-featured content
> - -management framework, which could result in arbitrary code execution.
> +В Drupal, полнофункциональной программной платформе для управления 
> содержимым,

"обнаружены две уязвимости", как я понимаю?

> +которые могут приводить к выполнению произвольного кода.
>  
> - -For additional information, please refer to the upstream advisories at:
> - - href="https://www.drupal.org/sa-core-2019-001;>https://www.drupal.org/sa-core-2019-001
>  and
> +За дополнительной информацией обращайтесь к рекомендациям основной ветки 
> разработки по следующим адресам:
> + href="https://www.drupal.org/sa-core-2019-001;>https://www.drupal.org/sa-core-2019-001
>  и
>   href="https://www.drupal.org/sa-core-2019-002;>https://www.drupal.org/sa-core-2019-002
>  
> - -For the stable distribution (stretch), this problem has been fixed in
> - -version 7.52-2+deb9u6.
> +В стабильном выпуске (stretch) эта проблема была исправлена в
> +версии 7.52-2+deb9u6.
>  
> - -We recommend that you upgrade your drupal7 packages.
> +Рекомендуется обновить пакеты drupal7.
>  
> - -For the detailed security status of drupal7 please refer to
> - -its security tracker page at:
> +С подробным статусом поддержки безопасности drupal7 можно ознакомиться на
> +соответствующей странице отслеживания безопасности по адресу
>  https://security-tracker.debian.org/tracker/drupal7;>\
>  https://security-tracker.debian.org/tracker/drupal7
>  
>  
>  # do not modify the following line
>  #include "$(ENGLISHDIR)/security/2019/dsa-4370.data"
> - -# $Id: $
> -BEGIN PGP SIGNATURE-
> 
> iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlxB6xYACgkQXudu4gIW
> 0qX/xRAAhbvLNKtlAzQMJ2EvVAwJ/k4gVWpF35JEUUNaDs75WfDZmHpmYHxVqvo3
> ZTOvV3A35mrFVydjPI+T3SjjPSIZk/DievPZpGHyzJnRQodKWnIGhB4dgv0mOtwb
> f/kaMsfZPiKN7EjazYtcNLbksWvTLR+j42yfqz+nM809b+pmI9el4YUf5tZ6ZVLi
> Lzd6uanEFHS4oGQrxD+MO6wJynbIuQPvF/PhX/XY8DiggrvtHROiLV1WjhxyObKd
> EPFpEMpT2txnFCg0TNnujFzSoiOoonR7BMyJ7Yuj8wu7+nzk2CR3JnvJHcJEPvU0
> G7b7YMg3fD6ilOaLc/oF/dOI+I9J307JVDLucdKoQmS1DqWnbHdX/L/pc2gwIPeK
> 4XjJMX5e4Mjap10ezVjSJDyN4b7FU6CTp/XkL5nGUN1BeixThyA+F7LYC6vhRbwW
> WCCjyCpojCahIhmjTH3uo/my6lYyk8z+Nxk3N8d8UUV/I7F6XEtCYJd2a31eP35N
> k0fevw4+JKFKTV9XdWOfd1yIiTGzxMll1ZJanfRpHkP2X3FD+vS62tzDXdVJM4jW
> 17YJOLUVLzqFqH9LE7kFZ/BfuPXfQteC62GQ9VIthe2H1Ww5gA/YHEcwUa7emthv
> UIs8shpRIisO1NRG6/CHAFL8X9pfza/qcoL3AQ9KPAMVeEbHTL8=
> =Gu9K
> -END PGP SIGNATURE-
> 

-- 
  Vladimir



[DONE] wml://security/2019/dsa-4370.wml

2019-01-18 Пенетрантность Lev Lamberov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- --- ../../english/security/2019/dsa-4370.wml  2019-01-18 19:59:50.986949290 
+0500
+++ 2019/dsa-4370.wml   2019-01-18 20:03:38.747458357 +0500
@@ -1,23 +1,23 @@
- -security update
+#use wml::debian::translation-check 
translation="4eb54b0c3467c7c7d85b14f5c07fa5a97d71ae2f" mindelta="1" 
maintainer="Lev Lamberov"
+обновление безопасности
 
- -Two vulnerabilities were found in Drupal, a fully-featured content
- -management framework, which could result in arbitrary code execution.
+В Drupal, полнофункциональной программной платформе для управления 
содержимым,
+которые могут приводить к выполнению произвольного кода.
 
- -For additional information, please refer to the upstream advisories at:
- -https://www.drupal.org/sa-core-2019-001;>https://www.drupal.org/sa-core-2019-001
 and
+За дополнительной информацией обращайтесь к рекомендациям основной ветки 
разработки по следующим адресам:
+https://www.drupal.org/sa-core-2019-001;>https://www.drupal.org/sa-core-2019-001
 и
 https://www.drupal.org/sa-core-2019-002;>https://www.drupal.org/sa-core-2019-002
 
- -For the stable distribution (stretch), this problem has been fixed in
- -version 7.52-2+deb9u6.
+В стабильном выпуске (stretch) эта проблема была исправлена в
+версии 7.52-2+deb9u6.
 
- -We recommend that you upgrade your drupal7 packages.
+Рекомендуется обновить пакеты drupal7.
 
- -For the detailed security status of drupal7 please refer to
- -its security tracker page at:
+С подробным статусом поддержки безопасности drupal7 можно ознакомиться на
+соответствующей странице отслеживания безопасности по адресу
 https://security-tracker.debian.org/tracker/drupal7;>\
 https://security-tracker.debian.org/tracker/drupal7
 
 
 # do not modify the following line
 #include "$(ENGLISHDIR)/security/2019/dsa-4370.data"
- -# $Id: $
-BEGIN PGP SIGNATURE-
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=Gu9K
-END PGP SIGNATURE-



Re: emacs and gnome

2019-01-18 Пенетрантность Artem Chuprina



On 17 January 2019 3:23:04 am GMT+07:00, Thakur Mahashaya  
wrote:
>всем привет
>В emacs чтобы войти в меню нужно набрать M-`
>но в гноме эта комбинация уже под что-то заточена.
>как это можно изменить?
>у меня дебиан 9 stretch

Если я правильно ошибаюсь, то еще можно нажать F10.

А общий принцип — вписать что-то в духе

(global-set-key (kbd "") 'menu-bar-open)

в ~/.emacs.el. Но стоит прочесть info emacs (можно в нем же самом — C-h i) на 
предмет того, какие кнопки можно переопределять уверенно, а какие могут быть 
перекрыты (и нередко бывают) режимами поддержки того или иного типа файла.

-- 
Best regards, Artem.