apticron report [Sun, 27 Nov 2016 23:38:12 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libicu52 52.1-8+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour icu (libicu52) ---
icu (52.1-8+deb8u4) jessie-security; urgency=high
* Backport upstream fix for CVE-2014-9911: buffer overflow problem in
uresbund.cpp .
* Backport upstream fix for CVE-2015-2632: unspecified vulnerability allows
remote attackers to affect confidentiality via unknown vectors.
* Backport upstream fix for CVE-2015-4844: missing boundary checks in
layout engine.
* Backport upstream fix for CVE-2016-0494: integer signedness issue in
IndicRearrangementProcessor.
* Backport upstream fix for CVE-2016-6293: the uloc_acceptLanguageFromHTTP
function does not ensure that there is a '\0' character at the end of a
certain temporary array.
* Backport upstream fix for CVE-2016-7415: stack-based buffer overflow in
the Locale class via a long locale string (closes: #838694).
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Sat, 10 Sep 2016 12:41:51 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
quigon.federez.net
--
apticron