This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
apticron report [Thu, 09 Feb 2017 09:48:29 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libapache2-mod-php5 5.6.30+dfsg-0+deb8u1
php5 5.6.30+dfsg-0+deb8u1
php5-cli 5.6.30+dfsg-0+deb8u1
php5-common 5.6.30+dfsg-0+deb8u1
php5-curl 5.6.30+dfsg-0+deb8u1
php5-enchant 5.6.30+dfsg-0+deb8u1
php5-gd 5.6.30+dfsg-0+deb8u1
php5-intl 5.6.30+dfsg-0+deb8u1
php5-ldap 5.6.30+dfsg-0+deb8u1
php5-mcrypt 5.6.30+dfsg-0+deb8u1
php5-mysql 5.6.30+dfsg-0+deb8u1
php5-pgsql 5.6.30+dfsg-0+deb8u1
php5-readline 5.6.30+dfsg-0+deb8u1
php5-sqlite 5.6.30+dfsg-0+deb8u1
php-pear 5.6.30+dfsg-0+deb8u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour php5 (libapache2-mod-php5 php5 php5-cli php5-common php5-curl php5-enchant php5-gd php5-intl php5-ldap php5-mcrypt php5-mysql php5-pgsql php5-readline php5-sqlite php-pear) ---
php5 (5.6.30+dfsg-0+deb8u1) jessie-security; urgency=medium
* Allow relaxed ; priority=<num> parsing (Closes: #783246)
* New upstream version 5.6.30+dfsg
- [CVE-2016-10158] FPE when parsing a tag format.
- [CVE-2016-10159] Crash while loading hostile phar archive
- [CVE-2016-10160] Memory corruption when loading hostile phar
- [CVE-2016-10161] Heap out of bounds read on unserialize in finish_nested_data()
* Rebase patches on top of PHP 5.6.30
-- Ondřej Surý <ondrej(a)debian.org> Wed, 25 Jan 2017 15:19:43 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron