No viruses were found.
Banned name: .exe,.exe-ms,2 MEA & EVA COMB SAILING Docs Inv#483099 SKMBT.exe
Content type: Banned
Internal reference code for the message is 02535-04/m4_zwt9D5HlL
First upstream SMTP client IP address: [216.55.167.101] mail.bel.com.bd
According to a 'Received:' trace, the message apparently originated at:
[216.55.167.101], 10-64-1-16.phx.dedicated.codero.com mail.bel.com.bd
[216.55.167.101]
Return-Path: <merchandiser2mkw(a)magpiegroupbd.com>
From: merchandiser2mkw(a)magpiegroupbd.com
Message-ID: <8f93ed779ca92e7962af6ee3d5b18566(a)magpiegroupbd.com>
Subject: FW: AWB:194 Requested for Shipping Loaf Updated MV & consignee
Arrival Notice
The message has been quarantined as: m/banned-m4_zwt9D5HlL
The message WAS NOT relayed to:
<admin(a)federez.net>:
554 5.7.0 Bounce, id=02535-04 - BANNED: .exe,.exe-ms,2 MEA & EVA COMB SAILING Docs Inv#483099 SKMBT.exe
apticron report [Tue, 23 May 2017 00:38:21 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libjbig2dec0 0.13-4~deb8u2
login 1:4.2-3+deb8u4
passwd 1:4.2-3+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour jbig2dec (libjbig2dec0) ---
jbig2dec (0.13-4~deb8u2) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Prevent integer overflow vulnerability (CVE-2017-7885) (Closes: #860460)
* Prevent SEGV due to integer overflow (CVE-2017-7975) (Closes: #860788)
* Bounds check before reading from image source data (CVE-2017-7976)
(Closes: #860787)
-- Salvatore Bonaccorso <carnil(a)debian.org> Tue, 16 May 2017 22:35:00 +0200
--- Modifications pour shadow (login passwd) ---
shadow (1:4.2-3+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Reset pid_child only if waitpid was successful.
This is a regression fix for CVE-2017-2616. If su receives a signal like
SIGTERM, it is not propagated to the child. (Closes: #862806)
-- Salvatore Bonaccorso <carnil(a)debian.org> Wed, 17 May 2017 12:58:54 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron