Does not exist Service spamassasin
Date: Thu, 24 Aug 2017 19:37:04
Action: restart
Host: quigon.federez.net
Description: process is not running
Monit, unique employé de federez,
Does not exist Service amavis
Date: Thu, 24 Aug 2017 19:36:57
Action: restart
Host: quigon.federez.net
Description: process is not running
Monit, unique employé de federez,
Exists Service nslcd
Date: Thu, 24 Aug 2017 14:38:58
Action: alert
Host: quigon.federez.net
Description: process is running with pid 730
Monit, unique employé de federez,
Execution succeeded Service nslcd
Date: Thu, 24 Aug 2017 14:38:58
Action: alert
Host: quigon.federez.net
Description: process is running after previous exec error (slow starting or manually recovered?)
Monit, unique employé de federez,
Execution failed Service nslcd
Date: Thu, 24 Aug 2017 14:37:57
Action: alert
Host: quigon.federez.net
Description: failed to stop (exit status 0) -- no output
Monit, unique employé de federez,
apticron report [Thu, 24 Aug 2017 01:38:18 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
augeas-lenses 1.8.0-1+deb9u1
libaugeas0 1.8.0-1+deb9u1
libxml2 2.9.4+dfsg1-2.2+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour augeas (augeas-lenses libaugeas0) ---
augeas (1.8.0-1+deb9u1) stretch-security; urgency=high
* Add patch to fix CVE-2017-7555 (Closes: #872400)
-- Hilko Bengen <bengen(a)debian.org> Fri, 18 Aug 2017 07:56:15 +0200
--- Modifications pour libxml2 ---
libxml2 (2.9.4+dfsg1-2.2+deb9u1) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
* Increase buffer space for port in HTTP redirect support (CVE-2017-7376)
Incorrect limit was used for port values. (Closes: #870865)
* Prevent unwanted external entity reference (CVE-2017-7375)
Missing validation for external entities in xmlParsePEReference.
(Closes: #870867)
* Fix handling of parameter-entity references (CVE-2017-9049, CVE-2017-9050)
- Heap-based buffer over-read in function xmlDictComputeFastKey
(CVE-2017-9049).
- Heap-based buffer over-read in function xmlDictAddString
(CVE-2017-9050).
(Closes: #863019, #863018)
* Fix buffer size checks in xmlSnprintfElementContent (CVE-2017-9047,
CVE-2017-9048)
- Buffer overflow in function xmlSnprintfElementContent (CVE-2017-9047).
- Stack-based buffer overflow in function xmlSnprintfElementContent
(CVE-2017-9048).
(Closes: #863022, #863021)
* Fix type confusion in xmlValidateOneNamespace (CVE-2017-0663)
Heap buffer overflow in xmlAddID. (Closes: #870870)
-- Salvatore Bonaccorso <carnil(a)debian.org> Sat, 19 Aug 2017 17:36:49 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
No viruses were found.
Content type: Unchecked
Internal reference code for the message is 24323-10/txAsPpTfRCpw
First upstream SMTP client IP address: [127.0.0.1] localhost
Return-Path: <monit(a)quigon.federez.net>
From: monit(a)quigon.federez.net
Message-ID: <1503524955.1570787302(a)quigon.federez.net>
Subject: monit alert -- Connection succeeded sshd
Not quarantined.
The message WILL BE relayed to:
<monitoring(a)federez.net>
No viruses were found.
Content type: Unchecked
Internal reference code for the message is 24323-09/kBjTaAC8EIXk
First upstream SMTP client IP address: [127.0.0.1] localhost
Return-Path: <monit(a)quigon.federez.net>
From: monit(a)quigon.federez.net
Message-ID: <1503524784.88014939(a)quigon.federez.net>
Subject: monit alert -- Connection succeeded sshd
Not quarantined.
The message WILL BE relayed to:
<monitoring(a)federez.net>