/etc/cron.daily/duplicity-backup:
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
weechat (1.1.1-1) unstable; urgency=medium
Since version 1.1, there is a new format for regexp replacement in
triggers. This format is incompatible with version 1.0. The existing
triggers will not be automatically updated.
See http://www.weechat.org/files/releasenotes/ReleaseNotes-1.1.html
-- Emmanuel Bouthenot <kolter(a)debian.org> Sun, 25 Jan 2015 20:41:50 +0100
/etc/cron.daily/duplicity-backup:
lock failed, could not acquire /var/log/duplicity-backup/backup.lock
lock held by 4277
lock failed, could not acquire /var/log/duplicity-backup/backup.lock
lock held by 4277
run-parts: /etc/cron.daily/duplicity-backup exited with return code 2
/etc/cron.daily/duplicity-backup:
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
apticron report [Sat, 06 Feb 2016 09:48:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libtiff5 4.0.3-12.3+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour tiff (libtiff5) ---
tiff (4.0.3-12.3+deb8u1) jessie-security; urgency=high
* Backport upstream fixes for:
- CVE-2015-8665 an out-of-bound read in TIFFRGBAImage interface
(closes: #808968),
- CVE-2015-8683 an out-of-bounds read in CIE Lab image format
(closes: #809021),
- CVE-2015-8781 out of bounds write at tif_luv.c:208,
- CVE-2015-8782 potential out-of-bound writes in decode,
- CVE-2015-8783 potential out-of-bound reads in case of short input data,
- CVE-2015-8784 potential out-of-bound write in NeXTDecode().
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Sat, 02 Jan 2016 09:18:06 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
/etc/cron.daily/duplicity-backup:
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
apticron report [Fri, 05 Feb 2016 09:48:20 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
krb5-multidev 1.12.1+dfsg-19+deb8u2
libgssapi-krb5-2 1.12.1+dfsg-19+deb8u2
libgssrpc4 1.12.1+dfsg-19+deb8u2
libk5crypto3 1.12.1+dfsg-19+deb8u2
libkadm5clnt-mit9 1.12.1+dfsg-19+deb8u2
libkadm5srv-mit9 1.12.1+dfsg-19+deb8u2
libkdb5-7 1.12.1+dfsg-19+deb8u2
libkrb5-3 1.12.1+dfsg-19+deb8u2
libkrb5-dev 1.12.1+dfsg-19+deb8u2
libkrb5support0 1.12.1+dfsg-19+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (krb5-multidev libgssapi-krb5-2 libgssrpc4 libk5crypto3 libkadm5clnt-mit9 libkadm5srv-mit9 libkdb5-7 libkrb5-3 libkrb5-dev libkrb5support0) ---
krb5 (1.12.1+dfsg-19+deb8u2) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Verify decoded kadmin C strings [CVE-2015-8629]
CVE-2015-8629: An authenticated attacker can cause kadmind to read
beyond the end of allocated memory by sending a string without a
terminating zero byte. Information leakage may be possible for an
attacker with permission to modify the database. (Closes: #813296)
* Check for null kadm5 policy name [CVE-2015-8630]
CVE-2015-8630: An authenticated attacker with permission to modify a
principal entry can cause kadmind to dereference a null pointer by
supplying a null policy value but including KADM5_POLICY in the mask.
(Closes: #813127)
* Fix leaks in kadmin server stubs [CVE-2015-8631]
CVE-2015-8631: An authenticated attacker can cause kadmind to leak
memory by supplying a null principal name in a request which uses one.
Repeating these requests will eventually cause kadmind to exhaust all
available memory. (Closes: #813126)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 31 Jan 2016 11:48:01 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
/etc/cron.daily/duplicity-backup:
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
apticron report [Thu, 04 Feb 2016 23:44:16 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
krb5-locales 1.12.1+dfsg-19+deb8u2
krb5-multidev 1.12.1+dfsg-19+deb8u2
libgssapi-krb5-2 1.12.1+dfsg-19+deb8u2
libgssrpc4 1.12.1+dfsg-19+deb8u2
libk5crypto3 1.12.1+dfsg-19+deb8u2
libkadm5clnt-mit9 1.12.1+dfsg-19+deb8u2
libkadm5srv-mit9 1.12.1+dfsg-19+deb8u2
libkdb5-7 1.12.1+dfsg-19+deb8u2
libkrb5-3 1.12.1+dfsg-19+deb8u2
libkrb5-dev 1.12.1+dfsg-19+deb8u2
libkrb5support0 1.12.1+dfsg-19+deb8u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (krb5-locales krb5-multidev libgssapi-krb5-2 libgssrpc4 libk5crypto3 libkadm5clnt-mit9 libkadm5srv-mit9 libkdb5-7 libkrb5-3 libkrb5-dev libkrb5support0) ---
krb5 (1.12.1+dfsg-19+deb8u2) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Verify decoded kadmin C strings [CVE-2015-8629]
CVE-2015-8629: An authenticated attacker can cause kadmind to read
beyond the end of allocated memory by sending a string without a
terminating zero byte. Information leakage may be possible for an
attacker with permission to modify the database. (Closes: #813296)
* Check for null kadm5 policy name [CVE-2015-8630]
CVE-2015-8630: An authenticated attacker with permission to modify a
principal entry can cause kadmind to dereference a null pointer by
supplying a null policy value but including KADM5_POLICY in the mask.
(Closes: #813127)
* Fix leaks in kadmin server stubs [CVE-2015-8631]
CVE-2015-8631: An authenticated attacker can cause kadmind to leak
memory by supplying a null principal name in a request which uses one.
Repeating these requests will eventually cause kadmind to exhaust all
available memory. (Closes: #813126)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 31 Jan 2016 11:48:01 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
/etc/cron.daily/duplicity-backup:
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line
BackendException: ssh connection to duplicity@138.231.142.239:22 failed: EOF when reading a line