apticron report [Fri, 06 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
ntp 1:4.2.6.p5+dfsg-2+deb7u2
ntpdate 1:4.2.6.p5+dfsg-2+deb7u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour ntp (ntp ntpdate) ---
ntp (1:4.2.6.p5+dfsg-2+deb7u2) wheezy-security; urgency=medium
* Fix CVE-2014-9297
* Fix CVE-2014-9298
-- Kurt Roeckx <kurt(a)roeckx.be> Wed, 04 Feb 2015 21:07:19 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 04 Feb 2015 16:44:08 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
krb5-locales 1.10.1+dfsg-5+deb7u3
libgssapi-krb5-2 1.10.1+dfsg-5+deb7u3
libk5crypto3 1.10.1+dfsg-5+deb7u3
libkrb5-3 1.10.1+dfsg-5+deb7u3
libkrb5support0 1.10.1+dfsg-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (krb5-locales libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.10.1+dfsg-5+deb7u3) stable-security; urgency=high
* MITKRB5-SA-2015-001
- CVE-2014-5352: gss_process_context_token() incorrectly frees context
- CVE-2014-9421: kadmind doubly frees partial deserialization results
- CVE-2014-9422: kadmind incorrectly validates server principal name
- CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
-- Sam Hartman <hartmans(a)debian.org> Tue, 03 Feb 2015 10:50:31 -0500
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron
apticron report [Wed, 04 Feb 2015 16:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
krb5-locales 1.10.1+dfsg-5+deb7u3
libgssapi-krb5-2 1.10.1+dfsg-5+deb7u3
libk5crypto3 1.10.1+dfsg-5+deb7u3
libkrb5-3 1.10.1+dfsg-5+deb7u3
libkrb5support0 1.10.1+dfsg-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (krb5-locales libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.10.1+dfsg-5+deb7u3) stable-security; urgency=high
* MITKRB5-SA-2015-001
- CVE-2014-5352: gss_process_context_token() incorrectly frees context
- CVE-2014-9421: kadmind doubly frees partial deserialization results
- CVE-2014-9422: kadmind incorrectly validates server principal name
- CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
-- Sam Hartman <hartmans(a)debian.org> Tue, 03 Feb 2015 10:50:31 -0500
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Wed, 04 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libgssapi-krb5-2 1.10.1+dfsg-5+deb7u3
libk5crypto3 1.10.1+dfsg-5+deb7u3
libkrb5-3 1.10.1+dfsg-5+deb7u3
libkrb5support0 1.10.1+dfsg-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.10.1+dfsg-5+deb7u3) stable-security; urgency=high
* MITKRB5-SA-2015-001
- CVE-2014-5352: gss_process_context_token() incorrectly frees context
- CVE-2014-9421: kadmind doubly frees partial deserialization results
- CVE-2014-9422: kadmind incorrectly validates server principal name
- CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
-- Sam Hartman <hartmans(a)debian.org> Tue, 03 Feb 2015 10:50:31 -0500
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Tue, 03 Feb 2015 16:38:11 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libdatetime-timezone-perl 1:1.58-1+2015a
unzip 6.0-8+deb7u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour unzip ---
unzip (6.0-8+deb7u2) wheezy-security; urgency=high
* Security upload.
* CVE-2014-9636: Fix heap overflow. Ensure that compressed
and uncompressed block sizes match when using STORED method
in extract.c. Closes: #776589.
* CVE-2014-8139: Update patch. The old one was not right
and had regressions with executable jar files. Closes: #775640
-- Santiago Vila <sanvila(a)debian.org> Sun, 01 Feb 2015 23:48:28 +0100
--- Modifications pour libdatetime-timezone-perl ---
libdatetime-timezone-perl (1:1.58-1+2015a) stable-proposed-updates; urgency=medium
* Update to version 2015a of the Olson database.
-- gregor herrmann <gregoa(a)debian.org> Mon, 02 Feb 2015 12:21:23 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Tue, 03 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
python-django 1.4.5-1+deb7u9
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour python-django ---
python-django (1.4.5-1+deb7u9) wheezy-security; urgency=high
* New upstream security release:
https://www.djangoproject.com/weblog/2015/jan/13/security/
- WSGI header spoofing via underscore/dash conflation (CVE-2015-0219)
- Possible XSS attack via user-supplied redirect URLs (CVE-2015-0220)
- Denial-of-service attack against django.views.static.serve
(CVE-2015-0221)
Closes: #775375
* Also include a fix for a regression introduced by the patch for
CVE-2015-0221: https://code.djangoproject.com/ticket/24158
-- Raphaël Hertzog <hertzog(a)debian.org> Wed, 28 Jan 2015 10:24:59 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
/etc/cron.daily/duplicity-backup:
BackendException: ssh connection to hexagon.federez.net:22 failed: timed out
BackendException: ssh connection to hexagon.federez.net:22 failed: timed out
BackendException: ssh connection to quigon.federez.net:22 failed: timed out
BackendException: ssh connection to quigon.federez.net:22 failed: timed out
W: Une erreur s'est produite lors du contrôle de la signature. Le dépôt n'est pas mis à jour et les fichiers d'index précédents seront utilisés. Erreur de GPG : http://http.debian.net wheezy-backports Release : Les signatures suivantes ne sont pas valables : BADSIG 8B48AD6246925553 Debian Archive Automatic Signing Key (7.0/wheezy) <ftpmaster(a)debian.org>
W: Impossible de récupérer http://http.debian.net/debian/dists/wheezy-backports/Release
W: Le téléchargement de quelques fichiers d'index a échoué, ils ont été ignorés, ou les anciens ont été utilisés à la place.
apticron report [Mon, 02 Feb 2015 09:48:14 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
tzdata 2015a-0wheezy1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour tzdata ---
tzdata (2015a-0wheezy1) stable; urgency=medium
* New upstream version.
- New DST for Cancun (Mexico).
- New DST for Chile.
- New leap second 2015-06-30 23:59:60 UTC (closes: #775161).
-- Aurelien Jarno <aurel32(a)debian.org> Sun, 01 Feb 2015 11:41:18 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron