ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
apticron report [Tue, 24 Feb 2015 09:48:16 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
linux-headers-3.2.0-4-amd64 3.2.65-1+deb7u2
linux-headers-3.2.0-4-common 3.2.65-1+deb7u2
linux-image-3.2.0-4-amd64 3.2.65-1+deb7u2
linux-libc-dev 3.2.65-1+deb7u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-headers-3.2.0-4-amd64 linux-headers-3.2.0-4-common linux-image-3.2.0-4-amd64 linux-libc-dev) ---
linux (3.2.65-1+deb7u2) wheezy-security; urgency=medium
* splice: Apply generic position and size checks to each write
(CVE-2014-7822)
* crypto: Fix unprivileged arbitrary module loading (CVE-2013-7421,
CVE-2014-9644)
- prefix module autoloading with "crypto-"
- include crypto- module prefix in template
- add missing crypto module aliases
* netfilter: conntrack: disable generic tracking for known protocols
(CVE-2014-8160)
* [amd64] vdso: Fix the vdso address randomization algorithm (CVE-2014-9585)
* [x86] KVM: x86 emulator: reject SYSENTER in compatibility mode on AMD
guests
* [x86] KVM: SYSENTER emulation is broken (CVE-2015-0239)
* vfs: move d_rcu from overlapping d_child to overlapping d_alias
* aufs: move d_rcu from overlapping d_child to overlapping d_alias
* vfs: deal with deadlock in d_walk() (CVE-2014-8559)
* vfs: read file_handle only once in handle_to_path (CVE-2015-1420)
* ASLR: fix stack randomization on 64-bit systems (CVE-2015-1593)
* vfs: Fix vfsmount_lock imbalance in path_init() (regression in 3.2.64)
* net: sctp: fix slab corruption from use after free on INIT collisions
(CVE-2015-1421)
* Fix regressions caused by CVE-2014-8133 fix:
- [amd64] tls, ldt: Stop checking lm in LDT_empty
- [x86] tls: Interpret an all-zero struct user_desc as "no segment"
* eCryptfs: Remove buggy and unnecessary write in file name decode
routine (CVE-2014-9683)
-- Ben Hutchings <ben(a)decadent.org.uk> Fri, 20 Feb 2015 02:39:08 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Mon, 23 Feb 2015 09:48:17 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libc6 2.13-38+deb7u8
libc6-dev 2.13-38+deb7u8
libc-bin 2.13-38+deb7u8
libc-dev-bin 2.13-38+deb7u8
locales 2.13-38+deb7u8
multiarch-support 2.13-38+deb7u8
nscd 2.13-38+deb7u8
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour eglibc (libc6 libc6-dev libc-bin libc-dev-bin locales multiarch-support nscd) ---
eglibc (2.13-38+deb7u8) wheezy-security; urgency=medium
* debian/patches/any/cvs-wscanf.diff: new patch from upstream to fix a
heap buffer overflow in wscanf (CVE-2015-1472, CVE-2015-1473). Closes:
#777197.
* debian/patches/any/cvs-vfprintf.diff: new patch from ustream to fix a
stack overflow in vfprintf (CVE-2012-3406). Closes: #681888.
* debian/patches/any/cvs-posix_spawn_file_actions_addopen.diff: new patch
from upstream to fix a vulnerability in posix_spawn_file_actions_addopen
(CVE-2014-4043). Closes: #751774.
* debian/patches/any/cvs-getnetbyname.diff: new patch from upstream to fix
an infinite loop in getnetbyname (CVE-2014-9402). Closes: #775572.
* debian/patches/any/cvs-getaddrinfo-idn.diff: new patch from upstream to
fix a invalid-free when using getaddrinfo with IDN (CVE-2013-7424).
-- Aurelien Jarno <aurel32(a)debian.org> Sun, 22 Feb 2015 09:49:50 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
razor2: razor2 check failed: Argument invalide razor2: razor2 had unknown error during get_server_info at /usr/share/perl5/Mail/SpamAssassin/Plugin/Razor2.pm line 187. at /usr/share/perl5/Mail/SpamAssassin/Plugin/Razor2.pm line 330.
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
apticron report [Sun, 22 Feb 2015 16:44:06 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
e2fslibs 1.42.5-1.1+deb7u1
e2fsprogs 1.42.5-1.1+deb7u1
libcomerr2 1.42.5-1.1+deb7u1
libss2 1.42.5-1.1+deb7u1
sudo 1.8.5p2-1+nmu2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour e2fsprogs (e2fslibs e2fsprogs libcomerr2 libss2) ---
e2fsprogs (1.42.5-1.1+deb7u1) stable-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix CVE-2015-0247: buffer overflow in ext file system open/close routines.
* Fix CVE-2015-1572: incomplete fix for CVE-2015-0247.
-- Michael Gilbert <mgilbert(a)debian.org> Sun, 22 Feb 2015 04:11:53 +0000
--- Modifications pour sudo ---
sudo (1.8.5p2-1+nmu2) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2014-9680-1.patch patch.
CVE-2014-9680: unsafe handling of TZ environment variable. (Closes: #772707)
* Add CVE-2014-9680-2.patch patch.
Documents that a leading ':' is skipped when checking TZ for a
fully-qualified path name.
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 15 Feb 2015 16:54:59 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron
apticron report [Sun, 22 Feb 2015 16:38:12 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
e2fslibs 1.42.5-1.1+deb7u1
e2fsprogs 1.42.5-1.1+deb7u1
libcomerr2 1.42.5-1.1+deb7u1
libss2 1.42.5-1.1+deb7u1
sudo 1.8.5p2-1+nmu2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour e2fsprogs (e2fslibs e2fsprogs libcomerr2 libss2) ---
e2fsprogs (1.42.5-1.1+deb7u1) stable-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix CVE-2015-0247: buffer overflow in ext file system open/close routines.
* Fix CVE-2015-1572: incomplete fix for CVE-2015-0247.
-- Michael Gilbert <mgilbert(a)debian.org> Sun, 22 Feb 2015 04:11:53 +0000
--- Modifications pour sudo ---
sudo (1.8.5p2-1+nmu2) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2014-9680-1.patch patch.
CVE-2014-9680: unsafe handling of TZ environment variable. (Closes: #772707)
* Add CVE-2014-9680-2.patch patch.
Documents that a leading ':' is skipped when checking TZ for a
fully-qualified path name.
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 15 Feb 2015 16:54:59 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron