apticron report [Thu, 09 Feb 2017 09:48:29 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libapache2-mod-php5 5.6.30+dfsg-0+deb8u1
php5 5.6.30+dfsg-0+deb8u1
php5-cli 5.6.30+dfsg-0+deb8u1
php5-common 5.6.30+dfsg-0+deb8u1
php5-curl 5.6.30+dfsg-0+deb8u1
php5-enchant 5.6.30+dfsg-0+deb8u1
php5-gd 5.6.30+dfsg-0+deb8u1
php5-intl 5.6.30+dfsg-0+deb8u1
php5-ldap 5.6.30+dfsg-0+deb8u1
php5-mcrypt 5.6.30+dfsg-0+deb8u1
php5-mysql 5.6.30+dfsg-0+deb8u1
php5-pgsql 5.6.30+dfsg-0+deb8u1
php5-readline 5.6.30+dfsg-0+deb8u1
php5-sqlite 5.6.30+dfsg-0+deb8u1
php-pear 5.6.30+dfsg-0+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour php5 (libapache2-mod-php5 php5 php5-cli php5-common php5-curl
php5-enchant php5-gd php5-intl php5-ldap php5-mcrypt php5-mysql php5-pgsql php5-readline
php5-sqlite php-pear) ---
php5 (5.6.30+dfsg-0+deb8u1) jessie-security; urgency=medium
* Allow relaxed ; priority=<num> parsing (Closes: #783246)
* New upstream version 5.6.30+dfsg
- [CVE-2016-10158] FPE when parsing a tag format.
- [CVE-2016-10159] Crash while loading hostile phar archive
- [CVE-2016-10160] Memory corruption when loading hostile phar
- [CVE-2016-10161] Heap out of bounds read on unserialize in finish_nested_data()
* Rebase patches on top of PHP 5.6.30
-- Ondřej Surý <ondrej(a)debian.org> Wed, 25 Jan 2017 15:19:43 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
hexagon.federez.net
--
apticron