apticron report [Wed, 04 Feb 2015 16:44:08 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
krb5-locales 1.10.1+dfsg-5+deb7u3
libgssapi-krb5-2 1.10.1+dfsg-5+deb7u3
libk5crypto3 1.10.1+dfsg-5+deb7u3
libkrb5-3 1.10.1+dfsg-5+deb7u3
libkrb5support0 1.10.1+dfsg-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (krb5-locales libgssapi-krb5-2 libk5crypto3 libkrb5-3
libkrb5support0) ---
krb5 (1.10.1+dfsg-5+deb7u3) stable-security; urgency=high
* MITKRB5-SA-2015-001
- CVE-2014-5352: gss_process_context_token() incorrectly frees context
- CVE-2014-9421: kadmind doubly frees partial deserialization results
- CVE-2014-9422: kadmind incorrectly validates server principal name
- CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
-- Sam Hartman <hartmans(a)debian.org> Tue, 03 Feb 2015 10:50:31 -0500
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron
Afficher les réponses par date