apticron report [Thu, 14 Jan 2016 20:44:11 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
openssh-client 1:6.7p1-5+deb8u1
openssh-server 1:6.7p1-5+deb8u1
openssh-sftp-server 1:6.7p1-5+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openssh (openssh-client openssh-server openssh-sftp-server) ---
openssh (1:6.7p1-5+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Disable roaming in openssh client: roaming code is vulnerable to an
information leak (CVE-2016-0777) and heap-based buffer overflow
(CVE-2016-0778).
-- Yves-Alexis Perez <corsac(a)debian.org> Wed, 13 Jan 2016 22:08:52 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Wed, 13 Jan 2016 20:44:12 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
isc-dhcp-client 4.3.1-6+deb8u2
isc-dhcp-common 4.3.1-6+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour isc-dhcp (isc-dhcp-client isc-dhcp-common) ---
isc-dhcp (4.3.1-6+deb8u2) jessie-security; urgency=high
* Fix CVE-2015-8605: maliciously crafted IPv4 packet can cause any of the
running DHCP applications (server, client, or relay) to crash.
-- Michael Gilbert <mgilbert(a)debian.org> Sat, 09 Jan 2016 20:57:22 +0000
isc-dhcp (4.3.1-6+deb8u1) jessie; urgency=medium
[ Michael Gilbert ]
* Fix error when max lease time is used on 64-bit systems (closes: #795227).
-- Bastian Blank <bastian.blank(a)credativ.de> Thu, 08 Oct 2015 11:54:59 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Tue, 12 Jan 2016 09:48:19 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libperl5.20 5.20.2-3+deb8u2
perl 5.20.2-3+deb8u2
perl-base 5.20.2-3+deb8u2
perl-modules 5.20.2-3+deb8u2
sudo 1.8.10p3-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour perl (libperl5.20 perl perl-base perl-modules) ---
perl (5.20.2-3+deb8u2) jessie-security; urgency=high
* [SECURITY] CVE-2015-8607 fix untaint issue with File::Spec::canonpath()
-- Dominic Hargreaves <dom(a)earth.li> Fri, 01 Jan 2016 12:36:39 +0000
--- Modifications pour sudo ---
sudo (1.8.10p3-1+deb8u3) jessie-security; urgency=medium
* Non-maintainer upload
* Disable editing of files via user-controllable symlinks
(Closes: #804149) (CVE-2015-5602)
- sudoedit path restriction bypass using symlinks
- Change warning when user tries to sudoedit a symbolic link
- Open sudoedit files with O_NONBLOCK and fail if they are not regular files
- Remove S_ISREG check from sudo_edit_open(), it is already done in the
caller
- Add directory writability checks for sudoedit
- Fix directory writability checks for sudoedit
- Enable sudoedit directory writability checks by default
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 05 Jan 2016 19:37:34 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Mon, 11 Jan 2016 20:44:11 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libperl5.20 5.20.2-3+deb8u2
perl 5.20.2-3+deb8u2
perl-base 5.20.2-3+deb8u2
perl-modules 5.20.2-3+deb8u2
sudo 1.8.10p3-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour perl (libperl5.20 perl perl-base perl-modules) ---
perl (5.20.2-3+deb8u2) jessie-security; urgency=high
* [SECURITY] CVE-2015-8607 fix untaint issue with File::Spec::canonpath()
-- Dominic Hargreaves <dom(a)earth.li> Fri, 01 Jan 2016 12:36:39 +0000
--- Modifications pour sudo ---
sudo (1.8.10p3-1+deb8u3) jessie-security; urgency=medium
* Non-maintainer upload
* Disable editing of files via user-controllable symlinks
(Closes: #804149) (CVE-2015-5602)
- sudoedit path restriction bypass using symlinks
- Change warning when user tries to sudoedit a symbolic link
- Open sudoedit files with O_NONBLOCK and fail if they are not regular files
- Remove S_ISREG check from sudo_edit_open(), it is already done in the
caller
- Add directory writability checks for sudoedit
- Fix directory writability checks for sudoedit
- Enable sudoedit directory writability checks by default
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 05 Jan 2016 19:37:34 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(226) [Receiver=3.1.1]