This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
This is the mail system at host quigon.rez-gif.supelec.fr.
####################################################################
# THIS IS A WARNING ONLY. YOU DO NOT NEED TO RESEND YOUR MESSAGE. #
####################################################################
Your message could not be delivered for more than 4 hour(s).
It will be retried until it is 60 day(s) old.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<root(a)quigon.rez-gif.supelec.fr> (expanded from <root>): connect to
127.0.0.1[127.0.0.1]:10024: Connection refused
This is the mail system at host quigon.rez-gif.supelec.fr.
####################################################################
# THIS IS A WARNING ONLY. YOU DO NOT NEED TO RESEND YOUR MESSAGE. #
####################################################################
Your message could not be delivered for more than 4 hour(s).
It will be retried until it is 60 day(s) old.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<logwatch(a)federez.net>: connect to 127.0.0.1[127.0.0.1]:10024: Connection
refused
apticron report [Tue, 31 Jan 2017 09:48:22 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
liblcms2-2 2.6-3+deb8u1
tcpdump 4.9.0-1~deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour lcms2 (liblcms2-2) ---
lcms2 (2.6-3+deb8u1) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Added an extra check to MLU bounds (CVE-2016-10165) (Closes: #852627)
-- Salvatore Bonaccorso <carnil(a)debian.org> Fri, 27 Jan 2017 14:26:09 +0100
--- Modifications pour tcpdump ---
tcpdump (4.9.0-1~deb8u1) jessie-security; urgency=high
* Backport to jessie:
+ Re-enable crypto support.
+ Disable tests that require newer libpcap features: Geneve (1.7) and
file format version checks (1.8), and relax B-D on libpcap0.8-dev.
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 28 Jan 2017 17:11:07 +0100
tcpdump (4.9.0-1) unstable; urgency=high
* New upstream security release, fixing the following:
+ CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
+ CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
+ CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
+ CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
+ CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
+ CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
+ CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
+ CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
+ CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
+ CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
+ CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
+ CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
+ CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
+ CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
+ CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
+ CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
+ CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
+ CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
+ CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
+ CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
+ CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
+ CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
+ CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
+ CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
+ CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
+ CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
+ CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
lightweight resolver protocol, PIM).
+ CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
+ CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
+ CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
+ CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
+ CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
+ CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
+ CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
print-ether.c:ether_print().
+ CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
+ CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
+ CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
+ CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
+ CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
* Re-enable all tests and bump build-dep on libpcap0.8-dev to >= 1.8
accordingly.
* Switch Vcs-Git URL to the https one.
* Adjust lintian override name about dh 9.
-- Romain Francoise <rfrancoise(a)debian.org> Thu, 26 Jan 2017 20:04:11 +0100
tcpdump (4.8.1-2) unstable; urgency=medium
* Disable new HNCP test, which fails on some buildds for some
as-of-yet unexplained reason.
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 29 Oct 2016 19:40:01 +0200
tcpdump (4.8.1-1) unstable; urgency=medium
* New upstream release.
* Re-enable Geneve tests (disabled in 4.7.4-1) and bump build-dep on
libpcap0.8-dev to >= 1.7 accordingly.
* Disable new pcap version tests which require libpcap 1.8+.
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 29 Oct 2016 17:16:06 +0200
tcpdump (4.7.4-3) unstable; urgency=medium
* Use dh-autoreconf instead of calling autoconf directly and patching
config.{guess,sub}.
* Call dh_auto_configure instead of configure in override target, patch
by Helmut Grohne (closes: #837951).
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 17 Sep 2016 11:18:45 +0200
tcpdump (4.7.4-2) unstable; urgency=medium
* Disable crypto support as it causes FTBFS with OpenSSL 1.1.x and we
don't have a working fix upstream yet (closes: #828569).
* Bump Standards-Version to 3.9.8.
* Use cgit URL for Vcs-Browser.
-- Romain Francoise <rfrancoise(a)debian.org> Sun, 28 Aug 2016 18:16:50 +0200
tcpdump (4.7.4-1) unstable; urgency=medium
* New upstream release.
* Disable two geneve tests that require libpcap 1.7+.
* Bump Standards-Version to 3.9.6.
-- Romain Francoise <rfrancoise(a)debian.org> Sat, 23 May 2015 18:25:01 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
This is the mail system at host quigon.rez-gif.supelec.fr.
####################################################################
# THIS IS A WARNING ONLY. YOU DO NOT NEED TO RESEND YOUR MESSAGE. #
####################################################################
Your message could not be delivered for more than 4 hour(s).
It will be retried until it is 60 day(s) old.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<root(a)quigon.rez-gif.supelec.fr> (expanded from <root>): connect to
127.0.0.1[127.0.0.1]:10024: Connection refused