phd start: Unable to start daemons because daemons are already running.
You can view running daemons with 'phd status'.
You can stop running daemons with 'phd stop'.
You can use 'phd restart' to stop all daemons before starting new daemons.
You can force daemons to start anyway with --force.
apticron report [Sat, 05 Dec 2015 09:48:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libssl1.0.0 1.0.1k-3+deb8u2
libssl-dev 1.0.1k-3+deb8u2
libssl-doc 1.0.1k-3+deb8u2
openssl 1.0.1k-3+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openssl (libssl1.0.0 libssl-dev libssl-doc openssl) ---
openssl (1.0.1k-3+deb8u2) jessie-security; urgency=medium
* Fix CVE-2015-3194
* Fix CVE-2015-3195
* Fix CVE-2015-3196
-- Kurt Roeckx <kurt(a)roeckx.be> Thu, 03 Dec 2015 18:39:46 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Fri, 04 Dec 2015 23:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libssl1.0.0 1.0.1k-3+deb8u2
openssl 1.0.1k-3+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openssl (libssl1.0.0 openssl) ---
openssl (1.0.1k-3+deb8u2) jessie-security; urgency=medium
* Fix CVE-2015-3194
* Fix CVE-2015-3195
* Fix CVE-2015-3196
-- Kurt Roeckx <kurt(a)roeckx.be> Thu, 03 Dec 2015 18:39:46 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Fri, 04 Dec 2015 20:44:17 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libssl1.0.0 1.0.1k-3+deb8u2
libssl-dev 1.0.1k-3+deb8u2
libssl-doc 1.0.1k-3+deb8u2
openssl 1.0.1k-3+deb8u2
redis-server 2:2.8.17-1+deb8u3
redis-tools 2:2.8.17-1+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour redis (redis-server redis-tools) ---
redis (2:2.8.17-1+deb8u3) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add 06-CVE-2015-8080-Integer-wraparound-in-lua_struct.c-cau.patch patch.
CVE-2015-8080: Integer wraparound in lua_struct.c causing stack-based
buffer overflow. (Closes: #804419)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sat, 28 Nov 2015 16:12:05 +0100
redis (2:2.8.17-1+deb8u2) stable; urgency=medium
* Backport debian/redis-server.tmpfile from unstable so that a valid runtime
directory is created when running under systemd. This ensures that there is
a secure and sensible location for the UNIX socket. (Closes: #803233)
-- Chris Lamb <lamby(a)debian.org> Fri, 30 Oct 2015 18:53:34 +0000
--- Modifications pour openssl (libssl1.0.0 libssl-dev libssl-doc openssl) ---
openssl (1.0.1k-3+deb8u2) jessie-security; urgency=medium
* Fix CVE-2015-3194
* Fix CVE-2015-3195
* Fix CVE-2015-3196
-- Kurt Roeckx <kurt(a)roeckx.be> Thu, 03 Dec 2015 18:39:46 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Fri, 04 Dec 2015 09:48:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libssl1.0.0 1.0.1k-3+deb8u2
libssl-dev 1.0.1k-3+deb8u2
libssl-doc 1.0.1k-3+deb8u2
openssl 1.0.1k-3+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openssl (libssl1.0.0 libssl-dev libssl-doc openssl) ---
openssl (1.0.1k-3+deb8u2) jessie-security; urgency=medium
* Fix CVE-2015-3194
* Fix CVE-2015-3195
* Fix CVE-2015-3196
-- Kurt Roeckx <kurt(a)roeckx.be> Thu, 03 Dec 2015 18:39:46 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 02 Dec 2015 23:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libcupsfilters1 1.0.61-5+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour cups-filters (libcupsfilters1) ---
cups-filters (1.0.61-5+deb8u2) jessie-security; urgency=high
* Backport upstream fixes to also consider the back tick ('`') as an illegal
shell escape character (CVE-2015-8327)
-- Didier Raboud <odyx(a)debian.org> Mon, 30 Nov 2015 21:52:45 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron