Write failed: Broken pipe
Traceback (most recent call last):
File "/usr/lib/python2.7/dist-packages/cliapp/app.py", line 189, in _run
self.process_args(args)
File "/usr/lib/python2.7/dist-packages/obnamlib/app.py", line 222, in process_args
cliapp.Application.process_args(self, args)
File "/usr/lib/python2.7/dist-packages/cliapp/app.py", line 570, in process_args
method(args[1:])
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/backup_plugin.py", line 162, in backup
self.start_backup()
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/backup_plugin.py", line 201, in start_backup
self.prepare_repository_for_client()
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/backup_plugin.py", line 231, in prepare_repository_for_client
self.repo.lock_client(self.client_name)
File "/usr/lib/python2.7/dist-packages/obnamlib/fmt_6/repo_fmt_6.py", line 290, in lock_client
self._raw_lock_client(client_name)
File "/usr/lib/python2.7/dist-packages/obnamlib/fmt_6/repo_fmt_6.py", line 271, in _raw_lock_client
self._lockmgr.lock([client_dir])
File "/usr/lib/python2.7/dist-packages/obnamlib/lockmgr.py", line 85, in lock
self._lock_one(dirname)
File "/usr/lib/python2.7/dist-packages/obnamlib/lockmgr.py", line 51, in _lock_one
self._fs.lock(lock_name)
File "/usr/lib/python2.7/dist-packages/obnamlib/repo_fs.py", line 58, in lock
return self.fs.lock(lockname)
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/sftp_plugin.py", line 437, in lock
self.write_file(lockname, '')
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/sftp_plugin.py", line 98, in helper
return method(self, filename, *args, **kwargs)
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/sftp_plugin.py", line 613, in write_file
f = self.open(pathname, mode)
File "/usr/lib/python2.7/dist-packages/obnamlib/plugins/sftp_plugin.py", line 558, in open
return self.sftp.file(pathname, mode, bufsize=bufsize)
File "/usr/lib/python2.7/dist-packages/paramiko/sftp_client.py", line 327, in open
t, msg = self._request(CMD_OPEN, filename, imode, attrblock)
File "/usr/lib/python2.7/dist-packages/paramiko/sftp_client.py", line 729, in _request
return self._read_response(num)
File "/usr/lib/python2.7/dist-packages/paramiko/sftp_client.py", line 761, in _read_response
raise SSHException('Server connection dropped: %s' % str(e))
SSHException: Server connection dropped:
apticron report [Fri, 05 May 2017 00:38:21 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libtiff5 4.0.3-12.3+deb8u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour tiff (libtiff5) ---
tiff (4.0.3-12.3+deb8u3) jessie-security; urgency=high
* Backport fix for the following vulnerabilities:
- CVE-2014-8127 and CVE-2016-3658: out-of-bounds read in the tiffset tool,
- CVE-2016-9535: replace assertions by runtime checks to avoid assertions
in debug mode, or buffer overflows in release mode,
- CVE-2016-10266: divide-by-zero in TIFFReadEncodedStrip,
- CVE-2016-10267: divide-by-zero in OJPEGDecodeRaw,
- CVE-2016-10269: heap-based buffer overflow in _TIFFmemcpy,
- CVE-2016-10270: heap-based buffer overflow in TIFFFillStrip,
- CVE-2017-5225: heap buffer overflow via a crafted BitsPerSample value,
- CVE-2017-7592: left-shift undefined behavior issue in putagreytile,
- CVE-2017-7593: unitialized-memory access from tif_rawdata,
- CVE-2017-7594: leak in OJPEGReadHeaderInfoSecTablesAcTable,
- CVE-2017-7595: divide-by-zero in JPEGSetupEncode,
- CVE-2017-7596, CVE-2017-7597, CVE-2017-7598, CVE-2017-7599,
CVE-2017-7600, CVE-2017-7601 and CVE-2017-7602: multiple UBSAN crashes.
* Add required _TIFFcalloc(a)LIBTIFF_4.0 symbol to the libtiff5 package.
[ Tobias Lippert <lippertto_oss(a)fastmail.com> ]
* Fix a regression introduced by patch CVE-2014-8128-5 where enabling
compression of tif files results in corrupt files
(closes: #783555, #818360).
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Fri, 21 Apr 2017 20:22:02 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron