apticron report [Thu, 17 Dec 2015 20:44:09 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libgdk-pixbuf2.0-0 2.31.1-2+deb8u4
libgdk-pixbuf2.0-common 2.31.1-2+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour gdk-pixbuf (libgdk-pixbuf2.0-0 libgdk-pixbuf2.0-common) ---
gdk-pixbuf (2.31.1-2+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add additional patch for CVE-2015-4491.
The n_x variable could be made large enough to overflow, which was
missed in the initial commit upstream.
-- Salvatore Bonaccorso <carnil(a)debian.org> Tue, 15 Dec 2015 19:47:31 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Thu, 17 Dec 2015 09:48:19 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libgdk-pixbuf2.0-0 2.31.1-2+deb8u4
libgdk-pixbuf2.0-common 2.31.1-2+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour gdk-pixbuf (libgdk-pixbuf2.0-0 libgdk-pixbuf2.0-common) ---
gdk-pixbuf (2.31.1-2+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add additional patch for CVE-2015-4491.
The n_x variable could be made large enough to overflow, which was
missed in the initial commit upstream.
-- Salvatore Bonaccorso <carnil(a)debian.org> Tue, 15 Dec 2015 19:47:31 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 16 Dec 2015 23:38:17 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u4
bind9-host 1:9.9.5.dfsg-9+deb8u4
bind9utils 1:9.9.5.dfsg-9+deb8u4
dnsutils 1:9.9.5.dfsg-9+deb8u4
libbind9-90 1:9.9.5.dfsg-9+deb8u4
libcupsfilters1 1.0.61-5+deb8u3
libdns100 1:9.9.5.dfsg-9+deb8u4
libdns-export100 1:9.9.5.dfsg-9+deb8u4
libirs-export91 1:9.9.5.dfsg-9+deb8u4
libisc95 1:9.9.5.dfsg-9+deb8u4
libisccc90 1:9.9.5.dfsg-9+deb8u4
libisccfg90 1:9.9.5.dfsg-9+deb8u4
libisccfg-export90 1:9.9.5.dfsg-9+deb8u4
libisc-export95 1:9.9.5.dfsg-9+deb8u4
liblwres90 1:9.9.5.dfsg-9+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add patch to fix CVE-2015-8000.
CVE-2015-8000: Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted, triggering a REQUIRE
failure when those records were subsequently cached.
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 14 Dec 2015 20:02:04 +0100
--- Modifications pour cups-filters (libcupsfilters1) ---
cups-filters (1.0.61-5+deb8u3) jessie-security; urgency=high
* Backport upstream fixes to also consider the semicolon (';') as an illegal
shell escape character (CVE-2015-8560, Closes: #807930)
-- Didier Raboud <odyx(a)debian.org> Tue, 15 Dec 2015 13:23:43 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Wed, 16 Dec 2015 20:44:17 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
bind9-host 1:9.9.5.dfsg-9+deb8u4
dnsutils 1:9.9.5.dfsg-9+deb8u4
grub2 2.02~beta2-22+deb8u1
grub2-common 2.02~beta2-22+deb8u1
grub-common 2.02~beta2-22+deb8u1
grub-pc 2.02~beta2-22+deb8u1
grub-pc-bin 2.02~beta2-22+deb8u1
libbind9-90 1:9.9.5.dfsg-9+deb8u4
libdns100 1:9.9.5.dfsg-9+deb8u4
libdns-export100 1:9.9.5.dfsg-9+deb8u4
libirs-export91 1:9.9.5.dfsg-9+deb8u4
libisc95 1:9.9.5.dfsg-9+deb8u4
libisccc90 1:9.9.5.dfsg-9+deb8u4
libisccfg90 1:9.9.5.dfsg-9+deb8u4
libisccfg-export90 1:9.9.5.dfsg-9+deb8u4
libisc-export95 1:9.9.5.dfsg-9+deb8u4
liblwres90 1:9.9.5.dfsg-9+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9-host dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add patch to fix CVE-2015-8000.
CVE-2015-8000: Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted, triggering a REQUIRE
failure when those records were subsequently cached.
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 14 Dec 2015 20:02:04 +0100
--- Modifications pour grub2 (grub2 grub2-common grub-common grub-pc grub-pc-bin) ---
grub2 (2.02~beta2-22+deb8u1) jessie-security; urgency=high
* Non-maintainer upload.
* Fix CVE-2015-8370: buffer overflow when checking password entered during
bootup (Closes: #807614).
-- Santiago Ruano Rincón <santiagorr(a)riseup.net> Sat, 12 Dec 2015 20:18:02 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Wed, 16 Dec 2015 09:48:19 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u4
bind9-host 1:9.9.5.dfsg-9+deb8u4
bind9utils 1:9.9.5.dfsg-9+deb8u4
dnsutils 1:9.9.5.dfsg-9+deb8u4
libbind9-90 1:9.9.5.dfsg-9+deb8u4
libdns100 1:9.9.5.dfsg-9+deb8u4
libdns-export100 1:9.9.5.dfsg-9+deb8u4
libirs-export91 1:9.9.5.dfsg-9+deb8u4
libisc95 1:9.9.5.dfsg-9+deb8u4
libisccc90 1:9.9.5.dfsg-9+deb8u4
libisccfg90 1:9.9.5.dfsg-9+deb8u4
libisccfg-export90 1:9.9.5.dfsg-9+deb8u4
libisc-export95 1:9.9.5.dfsg-9+deb8u4
liblwres90 1:9.9.5.dfsg-9+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add patch to fix CVE-2015-8000.
CVE-2015-8000: Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted, triggering a REQUIRE
failure when those records were subsequently cached.
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 14 Dec 2015 20:02:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Tue, 15 Dec 2015 23:38:13 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u4
bind9-host 1:9.9.5.dfsg-9+deb8u4
bind9utils 1:9.9.5.dfsg-9+deb8u4
dnsutils 1:9.9.5.dfsg-9+deb8u4
libbind9-90 1:9.9.5.dfsg-9+deb8u4
libcupsfilters1 1.0.61-5+deb8u3
libdns100 1:9.9.5.dfsg-9+deb8u4
libdns-export100 1:9.9.5.dfsg-9+deb8u4
libirs-export91 1:9.9.5.dfsg-9+deb8u4
libisc95 1:9.9.5.dfsg-9+deb8u4
libisccc90 1:9.9.5.dfsg-9+deb8u4
libisccfg90 1:9.9.5.dfsg-9+deb8u4
libisccfg-export90 1:9.9.5.dfsg-9+deb8u4
libisc-export95 1:9.9.5.dfsg-9+deb8u4
liblwres90 1:9.9.5.dfsg-9+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add patch to fix CVE-2015-8000.
CVE-2015-8000: Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted, triggering a REQUIRE
failure when those records were subsequently cached.
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 14 Dec 2015 20:02:04 +0100
--- Modifications pour cups-filters (libcupsfilters1) ---
cups-filters (1.0.61-5+deb8u3) jessie-security; urgency=high
* Backport upstream fixes to also consider the semicolon (';') as an illegal
shell escape character (CVE-2015-8560, Closes: #807930)
-- Didier Raboud <odyx(a)debian.org> Tue, 15 Dec 2015 13:23:43 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron