apticron report [Fri, 27 Nov 2015 09:48:18 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
dpkg 1.17.26
dpkg-dev 1.17.26
libdpkg-perl 1.17.26
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour dpkg (dpkg dpkg-dev libdpkg-perl) ---
dpkg (1.17.26) jessie-security; urgency=high
[ Guillem Jover ]
* Fix an off-by-one write access in dpkg-deb when parsing the .deb magic.
Reported by Jacek Wielemborek <d33tah(a)gmail.com>. Closes: #798324
* Fix an off-by-one write access in dpkg-deb when parsing the old format
.deb control member size. Thanks to Hanno Böck <hanno(a)hboeck.de>.
Fixes CVE-2015-0860.
* Fix an off-by-one read access in dpkg-deb when parsing ar member names.
Thanks to Hanno Böck <hanno(a)hboeck.de>.
[ Updated programs translations ]
* Catalan (Jordi Mallach).
* Turkish (Mert Dirik). Closes: #785095
[ Updated scripts translations ]
* German (Helge Kreutzmann). (Various fixes)
* Spanish (Santiago Vila). Closes: #799020
[ Updated manpages translations ]
* German (Helge Kreutzmann). (Various fixes)
-- Guillem Jover <guillem(a)debian.org> Wed, 25 Nov 2015 22:54:54 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Thu, 26 Nov 2015 23:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
dpkg 1.17.26
dpkg-dev 1.17.26
libdpkg-perl 1.17.26
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour dpkg (dpkg dpkg-dev libdpkg-perl) ---
dpkg (1.17.26) jessie-security; urgency=high
[ Guillem Jover ]
* Fix an off-by-one write access in dpkg-deb when parsing the .deb magic.
Reported by Jacek Wielemborek <d33tah(a)gmail.com>. Closes: #798324
* Fix an off-by-one write access in dpkg-deb when parsing the old format
.deb control member size. Thanks to Hanno Böck <hanno(a)hboeck.de>.
Fixes CVE-2015-0860.
* Fix an off-by-one read access in dpkg-deb when parsing ar member names.
Thanks to Hanno Böck <hanno(a)hboeck.de>.
[ Updated programs translations ]
* Catalan (Jordi Mallach).
* Turkish (Mert Dirik). Closes: #785095
[ Updated scripts translations ]
* German (Helge Kreutzmann). (Various fixes)
* Spanish (Santiago Vila). Closes: #799020
[ Updated manpages translations ]
* German (Helge Kreutzmann). (Various fixes)
-- Guillem Jover <guillem(a)debian.org> Wed, 25 Nov 2015 22:54:54 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Wed, 18 Nov 2015 23:38:11 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libpng12-0 1.2.50-2+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour libpng (libpng12-0) ---
libpng (1.2.50-2+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2015-7981.patch patch.
CVE-2015-7981: Out-of-bounds read in png_convert_to_rfc1123.
(Closes: #803078)
* Add Prevent-writing-over-length-PLTE-chunk-Cosm.patch patch.
CVE-2015-8126: Multiple buffer overflows in the png_set_PLTE and
png_get_PLTE functions. (Closes: #805113)
* Add Fixed-new-bug-with-CRC-error-after-reading-.patch patch.
Fixed new bug with CRC error after reading an over-length palette.
-- Salvatore Bonaccorso <carnil(a)debian.org> Tue, 17 Nov 2015 19:21:32 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(226) [Receiver=3.1.1]
apticron report [Thu, 12 Nov 2015 23:38:09 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u6
linux-libc-dev 3.16.7-ckt11-1+deb8u6
unzip 6.0-16+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour unzip ---
unzip (6.0-16+deb8u2) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Update 16-fix-integer-underflow-csiz-decrypted patch.
Fix regression in handling 0-byte files. (Closes: #804595)
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 09 Nov 2015 20:49:54 +0100
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u6) jessie-security; urgency=medium
[ Salvatore Bonaccorso ]
* KEYS: Fix race between key destruction and finding a keyring by name
* KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring
(CVE-2015-7872)
* KEYS: Don't permit request_key() to construct a new keyring
[ Ben Hutchings ]
* usbvision: fix overflow of interfaces array (CVE-2015-7833)
* RDS: fix race condition when sending a message on unbound socket
(CVE-2015-7990)
* [x86] KVM: Intercept #AC to avoid guest->host denial-of-service
(CVE-2015-5307)
-- Ben Hutchings <ben(a)decadent.org.uk> Mon, 09 Nov 2015 12:55:27 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Thu, 12 Nov 2015 17:44:11 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u6
linux-libc-dev 3.16.7-ckt11-1+deb8u6
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u6) jessie-security; urgency=medium
[ Salvatore Bonaccorso ]
* KEYS: Fix race between key destruction and finding a keyring by name
* KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring
(CVE-2015-7872)
* KEYS: Don't permit request_key() to construct a new keyring
[ Ben Hutchings ]
* usbvision: fix overflow of interfaces array (CVE-2015-7833)
* RDS: fix race condition when sending a message on unbound socket
(CVE-2015-7990)
* [x86] KVM: Intercept #AC to avoid guest->host denial-of-service
(CVE-2015-5307)
-- Ben Hutchings <ben(a)decadent.org.uk> Mon, 09 Nov 2015 12:55:27 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron