Package: docker.io Version: 1.3.2~dfsg1-1 Severity: grave Tags: upstream security Justification: user security hole
Dear Maintainers, Long time ago there was a new version - 1.4 (and now 1.4.1) with several security corrections - http://docs.docker.com/v1.4/release-notes/. I suggest to build it ASAP. Best regards, Malaheenee -- System Information: Debian Release: 8.0 APT prefers unstable APT policy: (990, 'unstable'), (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.13-1-amd64 (SMP w/2 CPU cores) Locale: LANG=fr_CA.UTF-8, LC_CTYPE=fr_CA.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to fr_CA.UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages docker.io depends on: ii adduser 3.113+nmu3 ii init-system-helpers 1.22 ii iptables 1.4.21-2+b1 ii libapparmor1 2.9.0-3 ii libc6 2.19-13 ii libdevmapper1.02.1 2:1.02.90-2 ii libsqlite3-0 3.8.7.2-1 ii perl 5.20.1-3 Versions of packages docker.io recommends: pn aufs-tools <none> ii ca-certificates 20141019 pn cgroupfs-mount | cgroup-lite <none> ii git 1:2.1.3-1 ii xz-utils 5.1.1alpha+20120614-2+b3 Versions of packages docker.io suggests: pn btrfs-tools <none> pn debootstrap <none> pn lxc <none> pn rinse <none> -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org