apticron report [Fri, 06 Nov 2015 23:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
krb5-locales 1.12.1+dfsg-19+deb8u1
libgssapi-krb5-2 1.12.1+dfsg-19+deb8u1
libk5crypto3 1.12.1+dfsg-19+deb8u1
libkrb5-3 1.12.1+dfsg-19+deb8u1
libkrb5support0 1.12.1+dfsg-19+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (krb5-locales libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.12.1+dfsg-19+deb8u1) jessie-security; urgency=high
* Import upstream patches for four CVEs:
- CVE-2015-2695: SPNEGO context aliasing during establishment,
Closes: #803083
- CVE-2015-2696: IAKERB context aliasing during establishment,
Closes: #803084
- CVE-2015-2697: unsafe string handling in TGS processing,
Closes: #803088
- CVE-2015-2698: regression (memory corruption) in patch for CVE-2015-2696
* In addition to CVE-2015-2698, the upstream patches for CVE-2015-2695
and CVE-2015-2696 introduced regressions preventing the use of
gss_import_sec_context() with contexts established using IAKERB
or SPNEGO; the fixes for those regressions are included here.
-- Benjamin Kaduk <kaduk(a)mit.edu> Wed, 04 Nov 2015 22:05:10 -0500
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Sun, 01 Nov 2015 23:38:09 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ntp 1:4.2.6.p5+dfsg-7+deb8u1
ntpdate 1:4.2.6.p5+dfsg-7+deb8u1
unzip 6.0-16+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour unzip ---
unzip (6.0-16+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix infinite loop when extracting password-protected archive.
This is CVE-2015-7697. Closes: #802160.
* Fix heap overflow when extracting password-protected archive.
This is CVE-2015-7696. Closes: #802162.
* Fix additional unsigned overflow on invalid input.
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Thu, 22 Oct 2015 12:51:52 +0000
--- Modifications pour ntp (ntp ntpdate) ---
ntp (1:4.2.6.p5+dfsg-7+deb8u1) jessie-security; urgency=medium
* Fix CVE-2015-7850
* Fix CVE-2015-7704
* Fix CVE-2015-7701
* Fix CVE-2015-7852
* Fix CVE-2015-7851
* Fix CVE-2015-7855
* Fix CVE-2015-7871
* Rename CVE-2014-9297.patch to CVE-2014-9750.patch
* Rename CVE-2014-9298.patch to CVE-2014-9751.patch
* Rename bug-2797.patch to CVE-2015-3405.patch
* FIX CVE-2015-5146
* FIX CVE-2015-5194
* FIX CVE-2015-5195
* FIX CVE-2015-7703
* FIX CVE-2015-5219
* FIX CVE-2015-5300
* FIX CVE-2015-7691, CVE-2015-7692, CVE-2015-7702
* Add build-depends on bison since one of the patches update the .y file.
-- Kurt Roeckx <kurt(a)roeckx.be> Wed, 28 Oct 2015 21:05:21 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Sun, 01 Nov 2015 09:48:18 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
unzip 6.0-16+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour unzip ---
unzip (6.0-16+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix infinite loop when extracting password-protected archive.
This is CVE-2015-7697. Closes: #802160.
* Fix heap overflow when extracting password-protected archive.
This is CVE-2015-7696. Closes: #802162.
* Fix additional unsigned overflow on invalid input.
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Thu, 22 Oct 2015 12:51:52 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron