[Admins] Ubuntu Package Updates on infiltrator

root root at stdlib.net
Wed Apr 18 07:35:17 IST 2007


apticron report [Wed, 18 Apr 2007 07:35:10 +0100]
========================================================================

apticron has detected that some packages need upgrading on: 

	infiltrator.gizzard.com 
	[ 127.0.1.1 85.91.5.16 2001:770:100:77::2 ]

The following packages are currently pending an upgrade:

	libfreetype6 2.1.10-1ubuntu2.3
	libfreetype6-dev 2.1.10-1ubuntu2.3
	libkrb53 1.4.3-5ubuntu0.3
	libxfont1 1:1.0.0-0ubuntu3.3
	linux-image-2.6.15-28-sparc64-smp 2.6.15-28.53
	xserver-xorg-core 1:1.0.2-0ubuntu10.6

========================================================================

Package Details:

Reading changelogs...
--- Changes for linux-source-2.6.15 (linux-image-2.6.15-28-sparc64-smp) ---
linux-source-2.6.15 (2.6.15-28.53) dapper-security; urgency=low

  [ Kyle McMartin ]

  * Disable irqs while applying alternative insns (i386/x86_64)

  [ David S. Miller ]

  * Fix mach64 with gcc-4.1 and later...

 -- Kyle McMartin <kyle at ubuntu.com>  Tue, 13 Mar 2007 14:34:21 -0400

linux-source-2.6.15 (2.6.15-28.52) dapper-security; urgency=medium

  [ security ]

  * CVE-2007-0772: Fix a free-wrong-pointer bug in nfs/acl server
  * CVE-2007-0006: Fix key serial number collision handling
  * CVE-2007-0958: [PATCH] core-dumping unreadable binaries via PT_INTERP

 -- Kyle McMartin <kyle at ubuntu.com>  Wed, 28 Feb 2007 11:49:37 -0500

--- Changes for freetype (libfreetype6 libfreetype6-dev) ---
freetype (2.1.10-1ubuntu2.3) dapper-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution via integer overflows.
  * Add debian/patches/404-bdf-integer.patch from upstream changes.
  * References
    CVE-2007-1351

 -- Kees Cook <kees at ubuntu.com>  Mon,  2 Apr 2007 15:52:43 -0700

--- Changes for krb5 (libkrb53) ---
krb5 (1.4.3-5ubuntu0.3) dapper-security; urgency=low

  * SECURITY UPDATE: arbitrary login via telnet, arbitrary code execution
    via syslog buffer overflows, and heap corruption via GSS api.
  * src/appl/telnet/telnetd/{state,sys_term}.c: MIT-SA-2007-1 fix from
    upstream (CVE-2007-0956).
  * src/lib/kadm5/logger.c: MIT-SA-2007-2 fix from Debian, based on
    upstream fixes (CVE-2007-0957).
  * src/lib/gssapi/krb5/k5unseal.c: MIT-SA-2007-3 fix from upstream
    (CVE-2007-1216).
  * References
    http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-001-telnetd.txt
    http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt
    http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-003.txt

 -- Kees Cook <kees at ubuntu.com>  Tue,  3 Apr 2007 15:50:20 -0700

--- Changes for libxfont (libxfont1) ---
libxfont (1:1.0.0-0ubuntu3.3) dapper-security; urgency=low

  * SECURITY UPDATE: root privilege escalation with BDF font overflows.
  * src/bitmap/bdfread.c, src/fontfile/fontdir.c: upstream fixes to stop
    integer overflows.
  * References
    CVE-2007-1351 CVE-2007-1352

 -- Kees Cook <kees at ubuntu.com>  Thu, 29 Mar 2007 18:07:27 -0700

--- Changes for xorg-server (xserver-xorg-core) ---
xorg-server (1:1.0.2-0ubuntu10.6) dapper-security; urgency=low

  * SECURITY UPDATE: arbitrary code execution with root privileges via
    integer overflows in MISC-XC.
  * Add debian/patches/994_misc_xc_overflows.dpatch: upstream fixes.
  * References
    CVE-2007-1003

 -- Kees Cook <kees at ubuntu.com>  Thu, 29 Mar 2007 18:18:37 -0700

========================================================================

You can perform the upgrade by issuing the command:

	apt-get dist-upgrade

as root on infiltrator.gizzard.com

It is recommended that you simulate the upgrade first to confirm that
the actions that would be taken are reasonable. The upgrade may be 
simulated by issuing the command:

	apt-get -s dist-upgrade

-- 
apticron



More information about the Admins mailing list