apticron report [Sun, 22 Feb 2015 16:44:06 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
e2fslibs 1.42.5-1.1+deb7u1
e2fsprogs 1.42.5-1.1+deb7u1
libcomerr2 1.42.5-1.1+deb7u1
libss2 1.42.5-1.1+deb7u1
sudo 1.8.5p2-1+nmu2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour e2fsprogs (e2fslibs e2fsprogs libcomerr2 libss2) ---
e2fsprogs (1.42.5-1.1+deb7u1) stable-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix CVE-2015-0247: buffer overflow in ext file system open/close routines.
* Fix CVE-2015-1572: incomplete fix for CVE-2015-0247.
-- Michael Gilbert <mgilbert(a)debian.org> Sun, 22 Feb 2015 04:11:53 +0000
--- Modifications pour sudo ---
sudo (1.8.5p2-1+nmu2) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2014-9680-1.patch patch.
CVE-2014-9680: unsafe handling of TZ environment variable. (Closes: #772707)
* Add CVE-2014-9680-2.patch patch.
Documents that a leading ':' is skipped when checking TZ for a
fully-qualified path name.
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 15 Feb 2015 16:54:59 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron
Afficher les réponses par date