apticron report [Tue, 01 Nov 2016 23:38:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u8
bind9-host 1:9.9.5.dfsg-9+deb8u8
bind9utils 1:9.9.5.dfsg-9+deb8u8
dnsutils 1:9.9.5.dfsg-9+deb8u8
libbind9-90 1:9.9.5.dfsg-9+deb8u8
libdns100 1:9.9.5.dfsg-9+deb8u8
libdns-export100 1:9.9.5.dfsg-9+deb8u8
libirs-export91 1:9.9.5.dfsg-9+deb8u8
libisc95 1:9.9.5.dfsg-9+deb8u8
libisccc90 1:9.9.5.dfsg-9+deb8u8
libisccfg90 1:9.9.5.dfsg-9+deb8u8
libisccfg-export90 1:9.9.5.dfsg-9+deb8u8
libisc-export95 1:9.9.5.dfsg-9+deb8u8
liblwres90 1:9.9.5.dfsg-9+deb8u8
tar 1.27.1-2+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour tar ---
tar (1.27.1-2+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2016-6321: Bypassing the extract path name.
When extracting, member names containing '..' components are skipped.
(Closes: #842339)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 30 Oct 2016 07:48:55 +0100
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100
libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90
libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u8) jessie-security; urgency=medium
* CVE-2016-8864: Fix assertion failure in DNAME processing with patch
provided by ISC.
-- Florian Weimer <fw(a)deneb.enyo.de> Tue, 01 Nov 2016 17:51:22 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
quigon.federez.net
--
apticron