This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a0c:700:0:1:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)
apticron report [Wed, 10 Oct 2018 22:38:08 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
linux-image-4.9.0-8-amd64 4.9.110-3+deb9u6
linux-libc-dev 4.9.110-3+deb9u6
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour linux (linux-image-4.9.0-8-amd64 linux-libc-dev) ---
linux (4.9.110-3+deb9u6) stretch-security; urgency=high
* [arm64] KVM: Tighten guest core register access from userspace
(CVE-2018-18021)
* [arm64] KVM: Sanitize PSTATE.M when being set from userspace
(CVE-2018-18021)
* xen-netback: fix input validation in xenvif_set_hash_mapping()
(CVE-2018-15471)
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 08 Oct 2018 08:05:17 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
apticron report [Tue, 09 Oct 2018 22:38:07 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
linux-image-4.9.0-8-amd64 4.9.110-3+deb9u6
linux-libc-dev 4.9.110-3+deb9u6
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour linux (linux-image-4.9.0-8-amd64 linux-libc-dev) ---
linux (4.9.110-3+deb9u6) stretch-security; urgency=high
* [arm64] KVM: Tighten guest core register access from userspace
(CVE-2018-18021)
* [arm64] KVM: Sanitize PSTATE.M when being set from userspace
(CVE-2018-18021)
* xen-netback: fix input validation in xenvif_set_hash_mapping()
(CVE-2018-15471)
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 08 Oct 2018 08:05:17 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
Execution failed Service mailman
Date: Tue, 09 Oct 2018 06:26:34
Action: alert
Host: quigon.federez.net
Description: failed to start (exit status 0) -- no output
Monit, unique employé de federez,
Does not exist Service mailman
Date: Tue, 09 Oct 2018 06:26:04
Action: restart
Host: quigon.federez.net
Description: process is not running
Monit, unique employé de federez,
apticron report [Sat, 06 Oct 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
git 1:2.11.0-3+deb9u4
git-man 1:2.11.0-3+deb9u4
gitweb 1:2.11.0-3+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour git (git git-man gitweb) ---
git (1:2.11.0-3+deb9u4) stretch-security; urgency=high
* Fix CVE-2018-17456, arbitrary code execution via submodule URLs
and paths in .gitmodules file:
- submodule: ban submodule urls that start with a dash
- submodule: ban submodule paths that start with a dash
- submodule: use "--" to signal end of clone options
- fsck: detect submodule urls that start with a dash
- fsck: detect submodule paths that start with a dash
Thanks to joernchen of Phenoelit for discovering and reporting
this vulnerability and to Jeff King for fixing it.
* Correct incomplete shell command injection fix in git cvsimport in
1:2.11.0-3+deb9u2. A malicious CVS server could trigger
arbitrary code execution by a user running "git cvsimport".
- cvsimport: apply shell-quoting regex globally
Thanks to littlelailo for discovering this vulnerability and to
Jeff King for fixing it.
-- Jonathan Nieder <jrnieder(a)gmail.com> Thu, 27 Sep 2018 19:35:44 -0700
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a0c:700:0:1:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)
apticron report [Fri, 05 Oct 2018 22:38:05 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
git 1:2.11.0-3+deb9u4
git-man 1:2.11.0-3+deb9u4
gitweb 1:2.11.0-3+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour git (git git-man gitweb) ---
git (1:2.11.0-3+deb9u4) stretch-security; urgency=high
* Fix CVE-2018-17456, arbitrary code execution via submodule URLs
and paths in .gitmodules file:
- submodule: ban submodule urls that start with a dash
- submodule: ban submodule paths that start with a dash
- submodule: use "--" to signal end of clone options
- fsck: detect submodule urls that start with a dash
- fsck: detect submodule paths that start with a dash
Thanks to joernchen of Phenoelit for discovering and reporting
this vulnerability and to Jeff King for fixing it.
* Correct incomplete shell command injection fix in git cvsimport in
1:2.11.0-3+deb9u2. A malicious CVS server could trigger
arbitrary code execution by a user running "git cvsimport".
- cvsimport: apply shell-quoting regex globally
Thanks to littlelailo for discovering this vulnerability and to
Jeff King for fixing it.
-- Jonathan Nieder <jrnieder(a)gmail.com> Thu, 27 Sep 2018 19:35:44 -0700
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron