apticron report [Fri, 07 Aug 2015 10:48:21 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u3
linux-libc-dev 3.16.7-ckt11-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u3) jessie-security; urgency=high
* path_openat(): fix double fput() (CVE-2015-5706)
* KEYS: ensure we free the assoc array edit if edit is valid (CVE-2015-1333)
* sctp: fix ASCONF list handling (CVE-2015-3212)
* [x86] kvm: fix kvm_apic_has_events to check for NULL pointer (CVE-2015-4692)
* [x86] bpf_jit: fix compilation of large bpf programs (CVE-2015-4700)
* sg_start_req(): make sure that there's not too many elements in iovec
(CVE-2015-5707)
* md: use kzalloc() when bitmap is disabled (CVE-2015-5697)
-- Ben Hutchings <ben(a)decadent.org.uk> Tue, 04 Aug 2015 01:50:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
hexagon.federez.net
--
apticron