apticron report [Fri, 22 Jan 2016 20:44:11 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libfuse2 2.9.3-15+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour fuse (libfuse2) ---
fuse (2.9.3-15+deb8u2) jessie-security; urgency=high
* Fix permissions on cuse character device to be accessible by root only.
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Wed, 20 Jan 2016 19:58:39 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Fri, 22 Jan 2016 09:48:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libfuse2 2.9.3-15+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour fuse (libfuse2) ---
fuse (2.9.3-15+deb8u2) jessie-security; urgency=high
* Fix permissions on cuse character device to be accessible by root only.
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Wed, 20 Jan 2016 19:58:39 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 20 Jan 2016 09:48:21 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u5
bind9-host 1:9.9.5.dfsg-9+deb8u5
bind9utils 1:9.9.5.dfsg-9+deb8u5
dnsutils 1:9.9.5.dfsg-9+deb8u5
libbind9-90 1:9.9.5.dfsg-9+deb8u5
libdns100 1:9.9.5.dfsg-9+deb8u5
libdns-export100 1:9.9.5.dfsg-9+deb8u5
libirs-export91 1:9.9.5.dfsg-9+deb8u5
libisc95 1:9.9.5.dfsg-9+deb8u5
libisccc90 1:9.9.5.dfsg-9+deb8u5
libisccfg90 1:9.9.5.dfsg-9+deb8u5
libisccfg-export90 1:9.9.5.dfsg-9+deb8u5
libisc-export95 1:9.9.5.dfsg-9+deb8u5
liblwres90 1:9.9.5.dfsg-9+deb8u5
linux-image-3.16.0-4-amd64 3.16.7-ckt20-1+deb8u3
linux-libc-dev 3.16.7-ckt20-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u5) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2015-8704: Specific APL data could trigger an INSIST in apl_42.c.
A buffer size check used to guard against overflow could cause named to
exit with an INSIST failure In apl_42.c.
-- Salvatore Bonaccorso <carnil(a)debian.org> Sat, 16 Jan 2016 10:51:37 +0100
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt20-1+deb8u3) jessie-security; urgency=high
[ Ben Hutchings ]
* usb: serial: visor: fix crash on detecting device without write_urbs
(CVE-2015-7566)
* sctp: Prevent soft lockup when sctp_accept() is called during a timeout event
(CVE-2015-8767)
* tty: Fix unsafe ldisc reference via ioctl(TIOCGETD) (CVE-2016-0723)
[ Salvatore Bonaccorso ]
* unix: properly account for FDs passed over unix sockets (CVE-2013-4312)
* KEYS: Fix keyring ref leak in join_session_keyring() (CVE-2016-0728)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 17 Jan 2016 20:07:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Tue, 19 Jan 2016 20:44:29 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt20-1+deb8u3
linux-libc-dev 3.16.7-ckt20-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt20-1+deb8u3) jessie-security; urgency=high
[ Ben Hutchings ]
* usb: serial: visor: fix crash on detecting device without write_urbs
(CVE-2015-7566)
* sctp: Prevent soft lockup when sctp_accept() is called during a timeout event
(CVE-2015-8767)
* tty: Fix unsafe ldisc reference via ioctl(TIOCGETD) (CVE-2016-0723)
[ Salvatore Bonaccorso ]
* unix: properly account for FDs passed over unix sockets (CVE-2013-4312)
* KEYS: Fix keyring ref leak in join_session_keyring() (CVE-2016-0728)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 17 Jan 2016 20:07:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron