apticron report [Tue, 05 May 2015 18:44:06 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libruby2.1 2.1.5-2+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour ruby2.1 (libruby2.1) ---
ruby2.1 (2.1.5-2+deb8u1) jessie-security; urgency=high
* Fix vulnerabiity with overly permissive matching of hostnames in OpenSSL
extension [CVE-2015-1855]
- applied revision 50296 of upstream svn repository.
-- Antonio Terceiro <terceiro(a)debian.org> Fri, 17 Apr 2015 09:26:57 -0300
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Mon, 04 May 2015 18:44:05 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libruby2.1 2.1.5-2+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour ruby2.1 (libruby2.1) ---
ruby2.1 (2.1.5-2+deb8u1) jessie-security; urgency=high
* Fix vulnerabiity with overly permissive matching of hostnames in OpenSSL
extension [CVE-2015-1855]
- applied revision 50296 of upstream svn repository.
-- Antonio Terceiro <terceiro(a)debian.org> Fri, 17 Apr 2015 09:26:57 -0300
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Sun, 03 May 2015 18:44:05 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libruby2.1 2.1.5-2+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour ruby2.1 (libruby2.1) ---
ruby2.1 (2.1.5-2+deb8u1) jessie-security; urgency=high
* Fix vulnerabiity with overly permissive matching of hostnames in OpenSSL
extension [CVE-2015-1855]
- applied revision 50296 of upstream svn repository.
-- Antonio Terceiro <terceiro(a)debian.org> Fri, 17 Apr 2015 09:26:57 -0300
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron