apticron report [Wed, 12 Aug 2015 18:44:10 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libgnutls-deb0-28 3.3.8-6+deb8u2
libgnutls-openssl27 3.3.8-6+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour gnutls28 (libgnutls-deb0-28 libgnutls-openssl27) ---
gnutls28 (3.3.8-6+deb8u2) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add 47_GNUTLS-SA-2015-3.patch patch.
Fixes double free in DN decoding [GNUTLS-SA-2015-3]. (Closes: #795068)
-- Salvatore Bonaccorso <carnil(a)debian.org> Wed, 12 Aug 2015 10:15:44 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Tue, 11 Aug 2015 18:44:09 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libsvn1 1.8.10-6+deb8u1
libsvn-perl 1.8.10-6+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour subversion (libsvn1 libsvn-perl) ---
subversion (1.8.10-6+deb8u1) jessie-security; urgency=high
* Add (Build-)Depends on apache2 packages necessary for security fixes.
* patches/CVE-2015-3814: Mixed anonymous/authenticated path-based authz with
httpd 2.4
* patches/CVE-2015-3817: svn_repos_trace_node_locations() reveals paths
hidden by authz
-- James McCoy <jamessan(a)debian.org> Sat, 08 Aug 2015 22:32:18 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Sat, 08 Aug 2015 18:44:11 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u3
linux-libc-dev 3.16.7-ckt11-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u3) jessie-security; urgency=high
* path_openat(): fix double fput() (CVE-2015-5706)
* KEYS: ensure we free the assoc array edit if edit is valid (CVE-2015-1333)
* sctp: fix ASCONF list handling (CVE-2015-3212)
* [x86] kvm: fix kvm_apic_has_events to check for NULL pointer (CVE-2015-4692)
* [x86] bpf_jit: fix compilation of large bpf programs (CVE-2015-4700)
* sg_start_req(): make sure that there's not too many elements in iovec
(CVE-2015-5707)
* md: use kzalloc() when bitmap is disabled (CVE-2015-5697)
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 04 Aug 2015 01:50:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Sat, 08 Aug 2015 10:48:19 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u3
linux-libc-dev 3.16.7-ckt11-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u3) jessie-security; urgency=high
* path_openat(): fix double fput() (CVE-2015-5706)
* KEYS: ensure we free the assoc array edit if edit is valid (CVE-2015-1333)
* sctp: fix ASCONF list handling (CVE-2015-3212)
* [x86] kvm: fix kvm_apic_has_events to check for NULL pointer (CVE-2015-4692)
* [x86] bpf_jit: fix compilation of large bpf programs (CVE-2015-4700)
* sg_start_req(): make sure that there's not too many elements in iovec
(CVE-2015-5707)
* md: use kzalloc() when bitmap is disabled (CVE-2015-5697)
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 04 Aug 2015 01:50:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Sat, 08 Aug 2015 00:38:12 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u3
linux-libc-dev 3.16.7-ckt11-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u3) jessie-security; urgency=high
* path_openat(): fix double fput() (CVE-2015-5706)
* KEYS: ensure we free the assoc array edit if edit is valid (CVE-2015-1333)
* sctp: fix ASCONF list handling (CVE-2015-3212)
* [x86] kvm: fix kvm_apic_has_events to check for NULL pointer (CVE-2015-4692)
* [x86] bpf_jit: fix compilation of large bpf programs (CVE-2015-4700)
* sg_start_req(): make sure that there's not too many elements in iovec
(CVE-2015-5707)
* md: use kzalloc() when bitmap is disabled (CVE-2015-5697)
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 04 Aug 2015 01:50:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Fri, 07 Aug 2015 18:44:12 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u3
linux-libc-dev 3.16.7-ckt11-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u3) jessie-security; urgency=high
* path_openat(): fix double fput() (CVE-2015-5706)
* KEYS: ensure we free the assoc array edit if edit is valid (CVE-2015-1333)
* sctp: fix ASCONF list handling (CVE-2015-3212)
* [x86] kvm: fix kvm_apic_has_events to check for NULL pointer (CVE-2015-4692)
* [x86] bpf_jit: fix compilation of large bpf programs (CVE-2015-4700)
* sg_start_req(): make sure that there's not too many elements in iovec
(CVE-2015-5707)
* md: use kzalloc() when bitmap is disabled (CVE-2015-5697)
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 04 Aug 2015 01:50:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Fri, 07 Aug 2015 10:48:21 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u3
linux-libc-dev 3.16.7-ckt11-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u3) jessie-security; urgency=high
* path_openat(): fix double fput() (CVE-2015-5706)
* KEYS: ensure we free the assoc array edit if edit is valid (CVE-2015-1333)
* sctp: fix ASCONF list handling (CVE-2015-3212)
* [x86] kvm: fix kvm_apic_has_events to check for NULL pointer (CVE-2015-4692)
* [x86] bpf_jit: fix compilation of large bpf programs (CVE-2015-4700)
* sg_start_req(): make sure that there's not too many elements in iovec
(CVE-2015-5707)
* md: use kzalloc() when bitmap is disabled (CVE-2015-5697)
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 04 Aug 2015 01:50:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Tue, 04 Aug 2015 00:38:10 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.06~dfsg-2+deb8u1
libgs9 9.06~dfsg-2+deb8u1
libgs9-common 9.06~dfsg-2+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.06~dfsg-2+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2015-3228.patch patch.
CVE-2015-3228: Integer overflow in gs_heap_alloc_bytes() (Closes: #793489)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 26 Jul 2015 14:03:18 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Mon, 03 Aug 2015 00:38:10 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.06~dfsg-2+deb8u1
libgs9 9.06~dfsg-2+deb8u1
libgs9-common 9.06~dfsg-2+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.06~dfsg-2+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2015-3228.patch patch.
CVE-2015-3228: Integer overflow in gs_heap_alloc_bytes() (Closes: #793489)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 26 Jul 2015 14:03:18 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron