apticron report [Sun, 02 Aug 2015 00:38:10 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
apache2 2.4.10-10+deb8u1
apache2.2-bin 2.4.10-10+deb8u1
apache2-bin 2.4.10-10+deb8u1
apache2-data 2.4.10-10+deb8u1
apache2-mpm-prefork 2.4.10-10+deb8u1
apache2-utils 2.4.10-10+deb8u1
libicu52 52.1-8+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour icu (libicu52) ---
icu (52.1-8+deb8u2) jessie-security; urgency=high
* Fix security bugs:
- CVE-2014-8146 , a heap overflow,
- CVE-2014-8147 , an integer overflow,
- CVE-2015-4760 , missing boundary checks in layout engine,
- CVE-2014-6585 , finish null pointer checks.
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Thu, 30 Jul 2015 20:45:16 +0000
--- Modifications pour apache2 (apache2 apache2.2-bin apache2-bin apache2-data
apache2-mpm-prefork apache2-utils) ---
apache2 (2.4.10-10+deb8u1) jessie-security; urgency=medium
* CVE-2015-3183: Fix chunk header parsing defect.
* CVE-2015-3185: ap_some_auth_required() broken in apache 2.4 in an
unfixable way. Add a new replacement API ap_some_authn_required()
and ap_force_authn hook.
-- Stefan Fritsch <sf(a)debian.org> Sat, 01 Aug 2015 22:42:35 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
quigon.federez.net
--
apticron