apticron report [Thu, 12 Nov 2015 17:44:11 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u6
linux-libc-dev 3.16.7-ckt11-1+deb8u6
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u6) jessie-security; urgency=medium
[ Salvatore Bonaccorso ]
* KEYS: Fix race between key destruction and finding a keyring by name
* KEYS: Fix crash when attempt to garbage collect an uninstantiated keyring
(CVE-2015-7872)
* KEYS: Don't permit request_key() to construct a new keyring
[ Ben Hutchings ]
* usbvision: fix overflow of interfaces array (CVE-2015-7833)
* RDS: fix race condition when sending a message on unbound socket
(CVE-2015-7990)
* [x86] KVM: Intercept #AC to avoid guest->host denial-of-service
(CVE-2015-5307)
-- Ben Hutchings <ben(a)decadent.org.uk> Mon, 09 Nov 2015 12:55:27 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on
baldrick.crans.org
--
apticron