Write failed: Broken pipe
Traceback (most recent call last):
File "/usr/lib/python2.7/dist-packages/cliapp/app.py", line 189, in _run
self.process_args(args)
File "/usr/lib/python2.7/dist-packages/obnamlib/app.py", line 222, in process_args
cliapp.Application.process_args(self, args)
File "/usr/lib/python2.7/dist-packages/cliapp/app.py", line 570, in process_args
method(args[1:])
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/forget_plugin.py", line 78, in forget
self.repo.lock_everything()
File "/usr/lib/python2.7/dist-packages/obnamlib/repo_interface.py", line 425, in lock_everything
self.lock_client(client_name)
File "/usr/lib/python2.7/dist-packages/obnamlib/fmt_6/repo_fmt_6.py", line 290, in lock_client
self._raw_lock_client(client_name)
File "/usr/lib/python2.7/dist-packages/obnamlib/fmt_6/repo_fmt_6.py", line 271, in _raw_lock_client
self._lockmgr.lock([client_dir])
File "/usr/lib/python2.7/dist-packages/obnamlib/lockmgr.py", line 85, in lock
self._lock_one(dirname)
File "/usr/lib/python2.7/dist-packages/obnamlib/lockmgr.py", line 51, in _lock_one
self._fs.lock(lock_name)
File "/usr/lib/python2.7/dist-packages/obnamlib/repo_fs.py", line 58, in lock
return self.fs.lock(lockname)
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/sftp_plugin.py", line 437, in lock
self.write_file(lockname, '')
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/sftp_plugin.py", line 98, in helper
return method(self, filename, *args, **kwargs)
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/sftp_plugin.py", line 613, in write_file
f = self.open(pathname, mode)
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/sftp_plugin.py", line 558, in open
return self.sftp.file(pathname, mode, bufsize=bufsize)
File "/usr/lib/python2.7/dist-packages/paramiko/sftp_client.py", line 327, in open
t, msg = self._request(CMD_OPEN, filename, imode, attrblock)
File "/usr/lib/python2.7/dist-packages/paramiko/sftp_client.py", line 729, in _request
return self._read_response(num)
File "/usr/lib/python2.7/dist-packages/paramiko/sftp_client.py", line 761, in _read_response
raise SSHException('Server connection dropped: %s' % str(e))
SSHException: Server connection dropped:
apticron report [Sat, 06 May 2017 00:38:24 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libtiff5 4.0.3-12.3+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour tiff (libtiff5) ---
tiff (4.0.3-12.3+deb8u3) jessie-security; urgency=high
* Backport fix for the following vulnerabilities:
- CVE-2014-8127 and CVE-2016-3658: out-of-bounds read in the tiffset tool,
- CVE-2016-9535: replace assertions by runtime checks to avoid assertions
in debug mode, or buffer overflows in release mode,
- CVE-2016-10266: divide-by-zero in TIFFReadEncodedStrip,
- CVE-2016-10267: divide-by-zero in OJPEGDecodeRaw,
- CVE-2016-10269: heap-based buffer overflow in _TIFFmemcpy,
- CVE-2016-10270: heap-based buffer overflow in TIFFFillStrip,
- CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value,
- CVE-2017-7592: left-shift undefined behavior issue in putagreytile,
- CVE-2017-7593: unitialized-memory access from tif_rawdata,
- CVE-2017-7594: leak in OJPEGReadHeaderInfoSecTablesAcTable,
- CVE-2017-7595: divide-by-zero in JPEGSetupEncode,
- CVE-2017-7596, CVE-2017-7597, CVE-2017-7598, CVE-2017-7599,
CVE-2017-7600, CVE-2017-7601 and CVE-2017-7602: multiple UBSAN crashes.
* Add required _TIFFcalloc(a)LIBTIFF_4.0 symbol to the libtiff5 package.
[ Tobias Lippert <lippertto_oss(a)fastmail.com> ]
* Fix a regression introduced by patch CVE-2014-8128-5 where enabling
compression of tif files results in corrupt files
(closes: #783555, #818360).
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Fri, 21 Apr 2017 20:22:02 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)