apticron report [Sat, 26 Sep 2015 10:48:18 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libsasl2-2 2.1.26.dfsg1-13+deb8u1
libsasl2-modules 2.1.26.dfsg1-13+deb8u1
libsasl2-modules-db 2.1.26.dfsg1-13+deb8u1
sasl2-bin 2.1.26.dfsg1-13+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour cyrus-sasl2 (libsasl2-2 libsasl2-modules libsasl2-modules-db sasl2-bin) ---
cyrus-sasl2 (2.1.26.dfsg1-13+deb8u1) jessie-security; urgency=high
* [CVE-2013-4122]: Handle NULL returns from glibc 2.17+ crypt()
(Closes: #784112)
-- Ondřej Surý <ondrej(a)debian.org> Wed, 23 Sep 2015 14:35:31 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Sat, 26 Sep 2015 00:38:14 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libsasl2-2 2.1.26.dfsg1-13+deb8u1
libsasl2-modules 2.1.26.dfsg1-13+deb8u1
libsasl2-modules-db 2.1.26.dfsg1-13+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour cyrus-sasl2 (libsasl2-2 libsasl2-modules libsasl2-modules-db) ---
cyrus-sasl2 (2.1.26.dfsg1-13+deb8u1) jessie-security; urgency=high
* [CVE-2013-4122]: Handle NULL returns from glibc 2.17+ crypt()
(Closes: #784112)
-- Ondřej Surý <ondrej(a)debian.org> Wed, 23 Sep 2015 14:35:31 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Fri, 25 Sep 2015 18:44:14 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libsasl2-2 2.1.26.dfsg1-13+deb8u1
libsasl2-modules 2.1.26.dfsg1-13+deb8u1
libsasl2-modules-db 2.1.26.dfsg1-13+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour cyrus-sasl2 (libsasl2-2 libsasl2-modules libsasl2-modules-db) ---
cyrus-sasl2 (2.1.26.dfsg1-13+deb8u1) jessie-security; urgency=high
* [CVE-2013-4122]: Handle NULL returns from glibc 2.17+ crypt()
(Closes: #784112)
-- Ondřej Surý <ondrej(a)debian.org> Wed, 23 Sep 2015 14:35:31 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Tue, 22 Sep 2015 00:38:11 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u4
linux-libc-dev 3.16.7-ckt11-1+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u4) jessie-security; urgency=medium
* ipv6: addrconf: validate new MTU before applying it (CVE-2015-0272)
* virtio-net: drop NETIF_F_FRAGLIST (CVE-2015-5156)
* vhost: actually track log eventfd file (CVE-2015-6252)
* aufs3: mmap: Fix races in madvise_remove() and sys_msync() (Closes: #796036)
* RDS: verify the underlying transport exists before creating a connection
(CVE-2015-6937)
* vfs: Fix possible escape from mount namespace (CVE-2015-2925):
- namei: lift (open-coded) terminate_walk() in follow_dotdot_rcu() into
callers
- dcache: Handle escaped paths in prepend_path
- vfs: Test for and handle paths that are unreachable from their mnt_root
-- Ben Hutchings <ben(a)decadent.org.uk> Sat, 19 Sep 2015 15:07:53 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Wed, 16 Sep 2015 10:48:19 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libicu52 52.1-8+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour icu (libicu52) ---
icu (52.1-8+deb8u3) jessie-security; urgency=high
* Fix CVE-2015-1270 - uninitialized memory read (closes: #798647).
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Mon, 14 Sep 2015 17:24:55 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 16 Sep 2015 00:38:12 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libicu52 52.1-8+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour icu (libicu52) ---
icu (52.1-8+deb8u3) jessie-security; urgency=high
* Fix CVE-2015-1270 - uninitialized memory read (closes: #798647).
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Mon, 14 Sep 2015 17:24:55 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron