apticron report [Fri, 24 Jul 2015 00:38:11 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u2
linux-libc-dev 3.16.7-ckt11-1+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u2) jessie-security; urgency=high
* [amd64] Restore "perf/x86: Further optimize copy_from_user_nmi()"
* [amd64] Fix nested NMI handling (CVE-2015-3290, CVE-2015-3291)
- Enable nested do_nmi handling for 64-bit kernels
- Remove asm code that saves cr2
- Switch stacks on userspace NMI entry
- Reorder nested NMI checks
- Use DF to avoid userspace RSP confusing nested NMI detection
-- Ben Hutchings <ben(a)decadent.org.uk> Fri, 17 Jul 2015 21:28:00 +0100
linux (3.16.7-ckt11-1+deb8u1) jessie-security; urgency=medium
* udf: Remove repeated loads blocksize
* udf: Check length of extended attributes and allocation descriptors
(CVE-2015-4167)
* udp: fix behavior of wrong checksums (CVE-2015-5364, CVE-2015-5366)
* [amd64] Revert "perf/x86: Further optimize copy_from_user_nmi()"
(CVE-2015-3290)
-- Ben Hutchings <ben(a)decadent.org.uk> Thu, 16 Jul 2015 20:18:18 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
quigon.federez.net
--
apticron