Re: Не работает xbacklight
Alexander Gerasiovwrites: > А правильный выход указать не судьба? Зачем? Ему хоть какой не укажи, а подсветкой он рулить не умеет. Только гаммой. Ман читал уже. Не то это. А так, спасибо, конечно.
Re: Не работает xbacklight
Hello Melleus, On Tue, 21 Jun 2016 21:37:30 +0300 Melleuswrote: > Alexander GQ Gerasiov writes: > > > > xrandr –output DP2 –brightness 0.6 > > Спасибо, конечно. Но инструмент не работает: > > ~/ > xrandr --output DP2 --brightness 0.6 > warning: output DP2 not found; ignoring А правильный выход указать не судьба? -- Best regards, Alexander Gerasiov Contacts: e-mail: g...@cs.msu.su Homepage: http://gerasiov.net Skype: gerasiov PGP fingerprint: 04B5 9D90 DF7C C2AB CD49 BAEA CA87 E9E8 2AAC 33F1
[DONE] wml://security/2014/dla-1{21,12,24,17}.wml
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - --- english/security/2014/dla-112.wml 2016-04-09 01:32:21.0 +0500 +++ russian/security/2014/dla-112.wml 2016-06-22 16:16:19.529579532 +0500 @@ -1,16 +1,17 @@ - -LTS security update +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +обновление безопаÑноÑÑи LTS - -This update fixes a denial of service vulnerability in BIND, a DNS server. +Ðанное обновление иÑпÑавлÑÐµÑ Ð¾Ñказ в обÑлÑживании в BIND, ÑеÑвеÑе DNS. - -By making use of maliciously-constructed zones or a rogue server, an attacker - -could exploit an oversight in the code BIND 9 used to follow delegations in - -the Domain Name Service, causing BIND to issue unlimited queries in an attempt - -to follow the delegation. +ÐÑполÑзÑÑ ÑпеÑиалÑно ÑÑоÑмиÑованнÑе Ð·Ð¾Ð½Ñ Ð¸Ð»Ð¸ ÑобÑÑвеннÑй ÑеÑвеÑ, злоÑмÑÑленник +Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполÑзоваÑÑ Ð¾ÑÐ¸Ð±ÐºÑ Ð² коде BIND 9, иÑполÑзÑемом Ð´Ð»Ñ ÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´ÐµÐ»ÐµÐ³Ð°ÑиÑм +в ÑлÑжбе доменнÑÑ Ð¸Ð¼Ñн, ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº ÑомÑ, ÑÑо BIND оÑпÑавлÑÐµÑ Ð½ÐµÐ¾Ð³ÑаниÑенное колиÑеÑÑво запÑоÑов в попÑÑке +ÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´ÐµÐ»ÐµÐ³Ð°ÑиÑми. - -This can lead to resource exhaustion and denial of service (up to and - -including termination of the named server process). +ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиводиÑÑ Ðº иÑÑоÑÐµÐ½Ð¸Ñ ÑеÑÑÑÑов и оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании (вплоÑÑ Ð´Ð¾ +завеÑÑÐµÐ½Ð¸Ñ Ð¿ÑоÑеÑÑа именованного ÑеÑвеÑа). - -For Debian 6 Squeeze, these issues have been fixed in bind9 version 9.7.3.dfsg-1~squeeze13 +Ð Debian 6 Squeeze ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² пакеÑе bind9 веÑÑии 9.7.3.dfsg-1~squeeze13 # do not modify the following line - --- english/security/2014/dla-117.wml 2016-04-09 01:32:21.0 +0500 +++ russian/security/2014/dla-117.wml 2016-06-22 16:22:54.764305584 +0500 @@ -1,24 +1,25 @@ - -LTS security update +#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov" +обновление безопаÑноÑÑи LTS https://security-tracker.debian.org/tracker/CVE-2011-3193;>CVE-2011-3193 - -Check for buffer overflow in Lookup_MarkMarkPos that may cause crash - -in this function with certain fonts. +ÐÑовеÑка на возможное возникновение пеÑÐµÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð±ÑÑеÑа в Lookup_MarkMarkPos, коÑоÑое Ð¼Ð¾Ð¶ÐµÑ +вÑзваÑÑ Ð°Ð²Ð°ÑийнÑÑ Ð¾ÑÑÐ°Ð½Ð¾Ð²ÐºÑ Ð² ÑÑой ÑÑнкÑии пÑи ÑабоÑе Ñ Ð¾Ð¿ÑеделÑннÑми ÑÑиÑÑами. https://security-tracker.debian.org/tracker/CVE-2011-3194;>CVE-2011-3194 - -Fix tiff reader to handle TIFFTAG_SAMPLESPERPIXEL for grayscale - -images. The reader uses QImage::Format_Indexed8, but since the samples - -per pixel value this should be (non-existent) QImage::Format_Indexed16, - -causing memory corruption. The fix falls back to the normal way of - -reading tiff images. +ÐÑпÑавление кода Ð´Ð»Ñ ÑÑÐµÐ½Ð¸Ñ tiff Ñак, ÑÑÐ¾Ð±Ñ Ð¾Ð½ обÑабаÑÑвал TIFFTAG_SAMPLESPERPIXEL Ð´Ð»Ñ Ð¸Ð·Ð¾Ð±Ñажений, +иÑполÑзÑÑÑÐ¸Ñ Ð³ÑадаÑии ÑеÑого в каÑеÑÑве ÑвеÑовой палиÑÑÑ. Ðод Ð´Ð»Ñ ÑÑÐµÐ½Ð¸Ñ Ð¸ÑполÑзÑÐµÑ QImage::Format_Indexed8, но поÑколÑÐºÑ Ð·Ð½Ð°Ñение +обÑазÑов на пикÑÐµÐ»Ñ Ð´Ð¾Ð»Ð¶Ð½Ð¾ бÑÑÑ (неÑÑÑеÑÑвÑÑÑим) QImage::Format_Indexed16, +Ñо ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº повÑÐµÐ¶Ð´ÐµÐ½Ð¸Ñ ÑодеÑжимого памÑÑи. ÐÑпÑавление пÑедÑÑавлÑÐµÑ Ñобой оÑÐºÐ°Ñ Ðº ноÑмалÑÐ½Ð¾Ð¼Ñ ÑпоÑÐ¾Ð±Ñ +ÑÑÐµÐ½Ð¸Ñ Ð¸Ð·Ð¾Ð±Ñажений tiff. - -For Debian 6 Squeeze, these issues have been fixed in qt4-x11 version 4:4.6.3-4+squeeze2 +Ð Debian 6 Squeeze ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² пакеÑе qt4-x11 веÑÑии 4:4.6.3-4+squeeze2 # do not modify the following line - --- english/security/2014/dla-121.wml 2016-04-09 01:32:21.0 +0500 +++ russian/security/2014/dla-121.wml 2016-06-22 16:12:13.112980481 +0500 @@ -1,12 +1,13 @@ - -LTS security update +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +обновление безопаÑноÑÑи LTS - -Jose Duart of the Google Security Team discovered a double free flaw - -(https://security-tracker.debian.org/tracker/CVE-2014-8137;>CVE-2014-8137) and a heap-based buffer overflow flaw (https://security-tracker.debian.org/tracker/CVE-2014-8138;>CVE-2014-8138) - -in JasPer, a library for manipulating JPEG-2000 files. A specially - -crafted
[DONE] wml://security/2014/dla-{82,62,17}.wml
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - --- english/security/2014/dla-17.wml 2016-04-09 01:32:21.0 +0500 +++ russian/security/2014/dla-17.wml2016-06-22 15:59:19.672574423 +0500 @@ -1,21 +1,22 @@ - -LTS security update +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +обновление безопаÑноÑÑи LTS - -The Tor version previously in Debian squeeze, 0.2.2.39, is no longer - -supported by upstream. +ÐеÑÑÐ¸Ñ Tor, коÑоÑÐ°Ñ Ñанее бÑла в ÑоÑÑаве Debian squeeze, 0.2.2.39, более +не поддеÑживаеÑÑÑ Ð¾Ñновной веÑкой ÑазÑабоÑки. - -This update brings the currently stable version of Tor, 0.2.4.23, to - -Debian squeeze. +Ðанное обновление добавлÑÐµÑ Ð² Debian squeeze ÑекÑÑÑÑ ÑÑабилÑнÑÑ +веÑÑÐ¸Ñ Tor, 0.2.4.23. - -Changes include use of stronger cryptographic primitives, always - -clearing bignums before freeing them to avoid leaving key material in - -memory, mitigating several linkability vectors such as by disabling - -client-side DNS caches, blacklisting authority signing keys potentially - -compromised due to heartbleed, updating the list of directory - -authorities, and much more. +СÑеди Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ ÑказаÑÑ Ð¸ÑполÑзование более ÑÑÐ¾Ð¹ÐºÐ¸Ñ Ð¿ÑимиÑивов ÑиÑÑованиÑ, +вÑполнение оÑиÑÑки ÑвеÑÑ Ð±Ð¾Ð»ÑÑÐ¸Ñ ÑиÑел до Ð¸Ñ Ð¾ÑÐ²Ð¾Ð±Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ Ñ ÑелÑÑ Ð¸Ð·Ð±ÐµÐ¶Ð°ÑÑ ÑиÑÑаÑий, когда ÑаÑÑÑ Ð¼Ð°ÑеÑиала клÑÑа +оÑÑавалаÑÑ Ð² памÑÑи, Ñнижение ÑиÑка ÑÑда векÑоÑов, ÑвÑзаннÑÑ Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑÑ ÐºÐ¾Ð¼Ð¿Ð¾Ð½Ð¾Ð²ÐºÐ¸, напÑимеÑ, пÑÑÑм оÑклÑÑÐµÐ½Ð¸Ñ +кеÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ DNS на ÑÑоÑоне клиенÑа, добавление клÑÑей авÑоÑиÑеÑов, коÑоÑÑе поÑенÑиалÑно +бÑли компÑомеÑиÑÐ¾Ð²Ð°Ð½Ñ Ð°Ñакой heartbleed, обновление ÑпиÑка авÑоÑиÑеÑов +и многое дÑÑгое. - -We recommend that you upgrade your tor packages. +РекомендÑеÑÑÑ Ð¾Ð±Ð½Ð¾Ð²Ð¸ÑÑ Ð¿Ð°ÐºÐµÑÑ tor. - -For Debian 6 Squeeze, these issues have been fixed in tor version 0.2.4.23-1~deb6u1 +Ð Debian 6 Squeeze ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² пакеÑе tor веÑÑии 0.2.4.23-1~deb6u1 # do not modify the following line - --- english/security/2014/dla-62.wml 2016-04-09 01:32:21.0 +0500 +++ russian/security/2014/dla-62.wml2016-06-22 15:53:44.037756690 +0500 @@ -1,18 +1,19 @@ - -LTS security update +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +обновление безопаÑноÑÑи LTS - -Antoine Delignat-Lavaud from Inria discovered an issue in the way NSS - -(the Mozilla Network Security Service library) was parsing ASN.1 data - -used in signatures, making it vulnerable to a signature forgery attack. +ÐнÑÑан ÐелинÑ-ÐÐ°Ð²Ñ Ð¸Ð· Inria обнаÑÑжил пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð² ÑпоÑобе, иÑполÑзÑемом NSS +(библиоÑека Mozilla Network Security Service) Ð´Ð»Ñ Ð³ÑаммаÑиÑеÑкого ÑазбоÑа даннÑÑ ASN.1, +иÑполÑзÑемÑÑ Ð² подпиÑÑÑ , ÑÑо Ð´ÐµÐ»Ð°ÐµÑ ÑÑÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾ÑÐµÐºÑ ÑÑзвимой к аÑаке ÑеÑез Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÑ Ð¿Ð¾Ð´Ð¿Ð¸Ñи. - -An attacker could craft ASN.1 data to forge RSA certificates with a - -valid certification chain to a trusted CA. +ÐлоÑмÑÑленник Ð¼Ð¾Ð¶ÐµÑ ÑÑоÑмиÑоваÑÑ Ð´Ð°Ð½Ð½Ñе ASN.1 Ð´Ð»Ñ Ð¿Ð¾Ð´Ð´ÐµÐ»ÐºÐ¸ ÑеÑÑиÑикаÑов RSA, имеÑÑÐ¸Ñ +коÑÑекÑнÑÑ ÑепоÑÐºÑ ÑеÑÑиÑикаÑов к довеÑÐµÐ½Ð½Ð¾Ð¼Ñ Ð°Ð²ÑоÑиÑеÑÑ CA. - -This update fixes this issue for the NSS libraries. +Ðанное обновление иÑпÑавлÑÐµÑ ÑказаннÑÑ Ð¿ÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð² библиоÑÐµÐºÐ°Ñ NSS. - -Note that iceweasel, which is also affected by https://security-tracker.debian.org/tracker/CVE-2014-1568;>CVE-2014-1568, however - -has reached end-of-life in Squeeze(-LTS) and thus has not been fixed. +ÐамеÑÑÑе, ÑÑо поддеÑжка веб-бÑаÑзеÑа iceweasel, коÑоÑÑй Ñакже подвеÑжен https://security-tracker.debian.org/tracker/CVE-2014-1568;>CVE-2014-1568, +в Squeeze(-LTS) пÑекÑаÑена, в нÑм ÑÑа оÑибка иÑпÑавлена не бÑдеÑ. - -For Debian 6 Squeeze, these issues have been fixed in nss version 3.12.8-1+squeeze9 +Ð Debian 6 Squeeze ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² пакеÑе nss веÑÑии 3.12.8-1+squeeze9 # do not modify the following line - --- english/security/2014/dla-82.wml 2016-04-09 01:32:22.0 +0500 +++
[DONE] wml://security/2014/dla-{40,96,33}.wml
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - --- english/security/2014/dla-33.wml 2016-04-09 01:32:21.0 +0500 +++ russian/security/2014/dla-33.wml2016-06-22 15:31:14.138317859 +0500 @@ -1,16 +1,17 @@ - -LTS security update +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +обновление безопаÑноÑÑи LTS - -Detailed descriptions of the vulnerabilities can be found at: +ÐодÑобное опиÑание ÑÑзвимоÑÑей можно найÑи по ÑледÑÑÑÐµÐ¼Ñ Ð°Ð´ÑеÑÑ: https://www.openssl.org/news/secadv_20140806.txt;>https://www.openssl.org/news/secadv_20140806.txt - -It's important that you upgrade the libssl0.9.8 package and not just - -the openssl package. +Ðажно, ÑÑÐ¾Ð±Ñ Ð²Ñ Ð¾Ð±Ð½Ð¾Ð²Ð¸Ð»Ð¸ Ð¿Ð°ÐºÐµÑ libssl0.9.8, а не ÑолÑко +Ð¿Ð°ÐºÐµÑ openssl. - -All applications linked to openssl need to be restarted. You can use - -the checkrestart tool from the debian-goodies package to detect - -affected programs. Alternatively, you may reboot your system. +ÐÑе пÑиложениÑ, ÑкомпонованнÑе Ñ openssl, ÑледÑÐµÑ Ð¿ÐµÑезапÑÑÑиÑÑ. ÐÑ Ð¼Ð¾Ð¶ÐµÑе иÑполÑзоваÑÑ +инÑÑÑÑÐ¼ÐµÐ½Ñ checkrestart из пакеÑа debian-goodies Ð´Ð»Ñ Ñого, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ +пÑогÑаммÑ, коÑоÑÑе нÑжно пеÑезапÑÑÑиÑÑ. Ðибо можно пеÑезагÑÑзиÑÑ Ð²ÑÑ ÑиÑÑемÑ. - -For Debian 6 Squeeze, these issues have been fixed in openssl version 0.9.8o-4squeeze17 +Ð Debian 6 Squeeze ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² пакеÑе openssl веÑÑии 0.9.8o-4squeeze17 # do not modify the following line - --- english/security/2014/dla-40.wml 2016-04-09 01:32:21.0 +0500 +++ russian/security/2014/dla-40.wml2016-06-22 15:26:42.055758117 +0500 @@ -1,14 +1,15 @@ - -LTS security update +#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov" +обновление безопаÑноÑÑи LTS - -Multiple security issues (cross-site scripting, missing input sanitizing - -and SQL injection) have been discovered in Cacti, a web interface for - -graphing of monitoring systems. +Ð Cacti, веб-инÑеÑÑейÑе Ð´Ð»Ñ Ð¿Ð¾ÑÑÑÐ¾ÐµÐ½Ð¸Ñ Ð³ÑаÑиков ÑиÑÑем мониÑоÑинга, бÑли +обнаÑÑÐ¶ÐµÐ½Ñ Ð¼Ð½Ð¾Ð³Ð¾ÑиÑленнÑе пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи (межÑайÑовÑй ÑкÑипÑинг, оÑÑÑÑÑÑвие оÑиÑÑки Ð²Ñ Ð¾Ð´Ð½ÑÑ +даннÑÑ Ð¸ SQL-инÑекÑии). - -Furthermore, the fix for https://security-tracker.debian.org/tracker/CVE-2014-4002;>CVE-2014-4002 in the previous security update - -has been brought in-line with the upstream fix as it caused a - -regression for people using the plug-in system. +Ðолее Ñого, иÑпÑавление https://security-tracker.debian.org/tracker/CVE-2014-4002;>CVE-2014-4002 в пÑедÑдÑÑем обновлении безопаÑноÑÑи +бÑло пÑиведено в ÑооÑвеÑÑÑвие Ñ Ð¸ÑпÑавлением из оÑновной веÑки ÑазÑабоÑки, поÑколÑÐºÑ Ð¾Ð½Ð¾ вÑзÑвало +ÑегÑеÑÑÐ¸Ñ Ñ ÑÐµÑ , кÑо иÑполÑзÑÐµÑ ÑиÑÑÐµÐ¼Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ð¹. - -For Debian 6 Squeeze, these issues have been fixed in cacti version 0.8.7g-1+squeeze5 +Ð Debian 6 Squeeze ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² пакеÑе cacti веÑÑии 0.8.7g-1+squeeze5 # do not modify the following line - --- english/security/2014/dla-96.wml 2016-04-08 01:27:55.0 +0500 +++ russian/security/2014/dla-96.wml2016-06-22 15:28:48.380375608 +0500 @@ -1,15 +1,16 @@ - -LTS security update +#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov" +обновление безопаÑноÑÑи LTS - -Several vulnerabilities have been discovered in OpenJDK, an implementation - -of the Oracle Java platform, resulting in the execution of arbitrary code, - -breakouts of the Java sandbox, information disclosure or denial of service. +Ð OpenJDK, ÑеализаÑии плаÑÑоÑÐ¼Ñ Oracle Java, бÑло обнаÑÑжено неÑколÑко +ÑÑзвимоÑÑей, пÑиводÑÑÐ¸Ñ Ðº вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿ÑоизволÑного кода, +вÑÑ Ð¾Ð´Ñ Ð·Ð° пÑÐµÐ´ÐµÐ»Ñ Ð¿ÐµÑоÑниÑÑ Java, ÑаÑкÑÑÑÐ¸Ñ Ð¸Ð½ÑоÑмаÑии или оÑÐºÐ°Ð·Ñ Ð² обÑлÑживании. - -For Debian 6 Squeeze, these problems have been fixed in version +Ð Debian 6 Squeeze ÑÑи пÑÐ¾Ð±Ð»ÐµÐ¼Ñ Ð±Ñли иÑпÑÐ°Ð²Ð»ÐµÐ½Ñ Ð² веÑÑии 6b33-1.13.5-2~deb6u1. - -We recommend that you upgrade your openjdk-6 packages and that you - -subscribe to https://lists.debian.org/debian-lts/;>https://lists.debian.org/debian-lts/ to help test updated - -packages before we release them. +РекомендÑеÑÑÑ
Re: Не работает xbacklight
On 6/21/16, Melleuswrote: > Alexander GQ Gerasiov writes: >> >> xrandr –output DP2 –brightness 0.6 > > Спасибо, конечно. Но инструмент не работает: > > ~/ > xrandr --output DP2 --brightness 0.6 > warning: output DP2 not found; ignoring Ну кагбэ man xrandr помогает. Или вот: xrandr|sed -n '/ connected/ {s/ .*//; p}'