apticron report [Fri, 07 Aug 2015 18:44:12 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u3
linux-libc-dev 3.16.7-ckt11-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u3) jessie-security; urgency=high
* path_openat(): fix double fput() (CVE-2015-5706)
* KEYS: ensure we free the assoc array edit if edit is valid (CVE-2015-1333)
* sctp: fix ASCONF list handling (CVE-2015-3212)
* [x86] kvm: fix kvm_apic_has_events to check for NULL pointer (CVE-2015-4692)
* [x86] bpf_jit: fix compilation of large bpf programs (CVE-2015-4700)
* sg_start_req(): make sure that there's not too many elements in iovec
(CVE-2015-5707)
* md: use kzalloc() when bitmap is disabled (CVE-2015-5697)
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 04 Aug 2015 01:50:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
baldrick.crans.org
--
apticron