apticron report [Wed, 07 Oct 2015 18:44:17 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libfreetype6 2.5.2-3+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour freetype (libfreetype6) ---
freetype (2.5.2-3+deb8u1) jessie-security; urgency=high
* Non-maintainer upload.
* CVE-2014-9745: Fix Savannah bug #41590. Protect against invalid number in
t1load.c parse_encoding().
* CVE-2014-9746, CVE-2014-9747: Fix Savannah bug #41309. Correct use of
uninitialized data in t1load.c, cidload.c, t42parse.c and psobjs.c.
-- Santiago Ruano Rincón <santiagorr(a)riseup.net> Mon, 05 Oct 2015 11:35:21 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Wed, 07 Oct 2015 10:48:19 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libfreetype6 2.5.2-3+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour freetype (libfreetype6) ---
freetype (2.5.2-3+deb8u1) jessie-security; urgency=high
* Non-maintainer upload.
* CVE-2014-9745: Fix Savannah bug #41590. Protect against invalid number in
t1load.c parse_encoding().
* CVE-2014-9746, CVE-2014-9747: Fix Savannah bug #41309. Correct use of
uninitialized data in t1load.c, cidload.c, t42parse.c and psobjs.c.
-- Santiago Ruano Rincón <santiagorr(a)riseup.net> Mon, 05 Oct 2015 11:35:21 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 07 Oct 2015 00:38:13 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libfreetype6 2.5.2-3+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour freetype (libfreetype6) ---
freetype (2.5.2-3+deb8u1) jessie-security; urgency=high
* Non-maintainer upload.
* CVE-2014-9745: Fix Savannah bug #41590. Protect against invalid number in
t1load.c parse_encoding().
* CVE-2014-9746, CVE-2014-9747: Fix Savannah bug #41309. Correct use of
uninitialized data in t1load.c, cidload.c, t42parse.c and psobjs.c.
-- Santiago Ruano Rincón <santiagorr(a)riseup.net> Mon, 05 Oct 2015 11:35:21 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(226) [Receiver=3.1.1]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(226) [Receiver=3.1.1]