/etc/cron.daily/spamassassin:
Job for spamassassin.service failed. See 'systemctl status spamassassin.service' and 'journalctl -xn' for details.
invoke-rc.d: initscript spamassassin, action "reload" failed.
apticron report [Sat, 11 Jul 2015 18:44:11 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
iojs 2.3.4-1nodesource1~jessie1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour iojs ---
iojs (2.3.4-1nodesource1~jessie1) jessie; urgency=medium
* 2.3.4 release.
* https://github.com/iojs/io.js/blob/v2.3.4/CHANGELOG.md
-- NodeSource <gpg(a)nodesource.com> Fri, 10 Jul 2015 15:19:00 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Thu, 09 Jul 2015 10:48:18 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
python-django 1.7.7-1+deb8u1
python-django-common 1.7.7-1+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour python-django (python-django python-django-common) ---
python-django (1.7.7-1+deb8u1) jessie-security; urgency=high
* SECURITY UPDATE:
- CVE-2015-5143: possible denial-of-service via session store
- CVE-2015-5144: email header injection via newlines
-- Luke Faraone <lfaraone(a)debian.org> Tue, 07 Jul 2015 05:07:10 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 08 Jul 2015 18:44:09 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
bind9-host 1:9.9.5.dfsg-9+deb8u1
dnsutils 1:9.9.5.dfsg-9+deb8u1
libbind9-90 1:9.9.5.dfsg-9+deb8u1
libdns100 1:9.9.5.dfsg-9+deb8u1
libdns-export100 1:9.9.5.dfsg-9+deb8u1
libirs-export91 1:9.9.5.dfsg-9+deb8u1
libisc95 1:9.9.5.dfsg-9+deb8u1
libisccc90 1:9.9.5.dfsg-9+deb8u1
libisccfg90 1:9.9.5.dfsg-9+deb8u1
libisccfg-export90 1:9.9.5.dfsg-9+deb8u1
libisc-export95 1:9.9.5.dfsg-9+deb8u1
liblwres90 1:9.9.5.dfsg-9+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9-host dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2015-4620: Specially constructed zone data can cause a resolver to
crash when validating.
-- Salvatore Bonaccorso <carnil(a)debian.org> Tue, 30 Jun 2015 17:21:49 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Wed, 08 Jul 2015 10:48:18 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u1
bind9-host 1:9.9.5.dfsg-9+deb8u1
bind9utils 1:9.9.5.dfsg-9+deb8u1
dnsutils 1:9.9.5.dfsg-9+deb8u1
libbind9-90 1:9.9.5.dfsg-9+deb8u1
libdns100 1:9.9.5.dfsg-9+deb8u1
libdns-export100 1:9.9.5.dfsg-9+deb8u1
libirs-export91 1:9.9.5.dfsg-9+deb8u1
libisc95 1:9.9.5.dfsg-9+deb8u1
libisccc90 1:9.9.5.dfsg-9+deb8u1
libisccfg90 1:9.9.5.dfsg-9+deb8u1
libisccfg-export90 1:9.9.5.dfsg-9+deb8u1
libisc-export95 1:9.9.5.dfsg-9+deb8u1
liblwres90 1:9.9.5.dfsg-9+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2015-4620: Specially constructed zone data can cause a resolver to
crash when validating.
-- Salvatore Bonaccorso <carnil(a)debian.org> Tue, 30 Jun 2015 17:21:49 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Tue, 07 Jul 2015 18:38:13 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libcupsfilters1 1.0.61-5+deb8u1
libwmf0.2-7 0.2.8.4-10.3+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour cups-filters (libcupsfilters1) ---
cups-filters (1.0.61-5+deb8u1) jessie-security; urgency=high
* Backport upstream fixes for buffer overflows on size allocation in texttopdf
(CVE-2015-3258, CVE-2015-3279)
-- Didier Raboud <odyx(a)debian.org> Fri, 03 Jul 2015 17:34:15 +0200
--- Modifications pour libwmf (libwmf0.2-7) ---
libwmf (0.2.8.4-10.3+deb8u1) jessie-security; urgency=medium
* CVE-2015-0848 CVE-2015-4588 CVE-2015-4695 CVE-2015-4696
-- Moritz Muehlenhoff <jmm(a)debian.org> Sun, 05 Jul 2015 18:05:57 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron