/etc/cron.daily/duplicity-backup:
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
apticron report [Thu, 28 Jan 2016 09:48:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
curl 7.38.0-4+deb8u3
libcurl3 7.38.0-4+deb8u3
libcurl3-gnutls 7.38.0-4+deb8u3
libcurl4-openssl-dev 7.38.0-4+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour curl (curl libcurl3 libcurl3-gnutls libcurl4-openssl-dev) ---
curl (7.38.0-4+deb8u3) jessie-security; urgency=medium
* Fix NTLM credentials not-checked for proxy connection re-use
as per CVE-2016-0755
http://curl.haxx.se/docs/adv_20160127A.htm
-- Alessandro Ghedini <ghedo(a)debian.org> Tue, 26 Jan 2016 22:39:38 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 27 Jan 2016 20:44:13 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 ]
The following packages are currently pending an upgrade:
curl 7.38.0-4+deb8u3
libcurl3 7.38.0-4+deb8u3
libcurl3-gnutls 7.38.0-4+deb8u3
libcurl4-openssl-dev 7.38.0-4+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour curl (curl libcurl3 libcurl3-gnutls libcurl4-openssl-dev) ---
curl (7.38.0-4+deb8u3) jessie-security; urgency=medium
* Fix NTLM credentials not-checked for proxy connection re-use
as per CVE-2016-0755
http://curl.haxx.se/docs/adv_20160127A.htm
-- Alessandro Ghedini <ghedo(a)debian.org> Tue, 26 Jan 2016 22:39:38 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron