apticron report [Sat, 05 Dec 2015 09:48:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libssl1.0.0 1.0.1k-3+deb8u2
libssl-dev 1.0.1k-3+deb8u2
libssl-doc 1.0.1k-3+deb8u2
openssl 1.0.1k-3+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openssl (libssl1.0.0 libssl-dev libssl-doc openssl) ---
openssl (1.0.1k-3+deb8u2) jessie-security; urgency=medium
* Fix CVE-2015-3194
* Fix CVE-2015-3195
* Fix CVE-2015-3196
-- Kurt Roeckx <kurt(a)roeckx.be> Thu, 03 Dec 2015 18:39:46 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Fri, 04 Dec 2015 23:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libssl1.0.0 1.0.1k-3+deb8u2
openssl 1.0.1k-3+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openssl (libssl1.0.0 openssl) ---
openssl (1.0.1k-3+deb8u2) jessie-security; urgency=medium
* Fix CVE-2015-3194
* Fix CVE-2015-3195
* Fix CVE-2015-3196
-- Kurt Roeckx <kurt(a)roeckx.be> Thu, 03 Dec 2015 18:39:46 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Fri, 04 Dec 2015 20:44:17 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libssl1.0.0 1.0.1k-3+deb8u2
libssl-dev 1.0.1k-3+deb8u2
libssl-doc 1.0.1k-3+deb8u2
openssl 1.0.1k-3+deb8u2
redis-server 2:2.8.17-1+deb8u3
redis-tools 2:2.8.17-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour redis (redis-server redis-tools) ---
redis (2:2.8.17-1+deb8u3) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add 06-CVE-2015-8080-Integer-wraparound-in-lua_struct.c-cau.patch patch.
CVE-2015-8080: Integer wraparound in lua_struct.c causing stack-based
buffer overflow. (Closes: #804419)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sat, 28 Nov 2015 16:12:05 +0100
redis (2:2.8.17-1+deb8u2) stable; urgency=medium
* Backport debian/redis-server.tmpfile from unstable so that a valid runtime
directory is created when running under systemd. This ensures that there is
a secure and sensible location for the UNIX socket. (Closes: #803233)
-- Chris Lamb <lamby(a)debian.org> Fri, 30 Oct 2015 18:53:34 +0000
--- Modifications pour openssl (libssl1.0.0 libssl-dev libssl-doc openssl) ---
openssl (1.0.1k-3+deb8u2) jessie-security; urgency=medium
* Fix CVE-2015-3194
* Fix CVE-2015-3195
* Fix CVE-2015-3196
-- Kurt Roeckx <kurt(a)roeckx.be> Thu, 03 Dec 2015 18:39:46 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Fri, 04 Dec 2015 09:48:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libssl1.0.0 1.0.1k-3+deb8u2
libssl-dev 1.0.1k-3+deb8u2
libssl-doc 1.0.1k-3+deb8u2
openssl 1.0.1k-3+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openssl (libssl1.0.0 libssl-dev libssl-doc openssl) ---
openssl (1.0.1k-3+deb8u2) jessie-security; urgency=medium
* Fix CVE-2015-3194
* Fix CVE-2015-3195
* Fix CVE-2015-3196
-- Kurt Roeckx <kurt(a)roeckx.be> Thu, 03 Dec 2015 18:39:46 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 02 Dec 2015 23:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libcupsfilters1 1.0.61-5+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour cups-filters (libcupsfilters1) ---
cups-filters (1.0.61-5+deb8u2) jessie-security; urgency=high
* Backport upstream fixes to also consider the back tick ('`') as an illegal
shell escape character (CVE-2015-8327)
-- Didier Raboud <odyx(a)debian.org> Mon, 30 Nov 2015 21:52:45 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron