Execution failed Service mailman
Date: Fri, 05 Oct 2018 06:27:11
Action: alert
Host: quigon.federez.net
Description: failed to start (exit status 0) -- no output
Monit, unique employé de federez,
Does not exist Service mailman
Date: Fri, 05 Oct 2018 06:26:41
Action: restart
Host: quigon.federez.net
Description: process is not running
Monit, unique employé de federez,
Execution failed Service mailman
Date: Wed, 03 Oct 2018 01:25:12
Action: alert
Host: quigon.federez.net
Description: failed to start (exit status 0) -- no output
Monit, unique employé de federez,
Does not exist Service mailman
Date: Wed, 03 Oct 2018 01:24:41
Action: restart
Host: quigon.federez.net
Description: process is not running
Monit, unique employé de federez,
apticron report [Tue, 02 Oct 2018 22:38:19 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libarchive-zip-perl 1.59-1+deb9u1
libpython2.7 2.7.13-2+deb9u3
libpython2.7-dev 2.7.13-2+deb9u3
libpython2.7-minimal 2.7.13-2+deb9u3
libpython2.7-stdlib 2.7.13-2+deb9u3
libpython3.5 3.5.3-1+deb9u1
libpython3.5-minimal 3.5.3-1+deb9u1
libpython3.5-stdlib 3.5.3-1+deb9u1
linux-image-4.9.0-8-amd64 4.9.110-3+deb9u5
linux-libc-dev 4.9.110-3+deb9u5
python2.7 2.7.13-2+deb9u3
python2.7-dev 2.7.13-2+deb9u3
python2.7-minimal 2.7.13-2+deb9u3
python3.5 3.5.3-1+deb9u1
python3.5-minimal 3.5.3-1+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour libarchive-zip-perl ---
libarchive-zip-perl (1.59-1+deb9u1) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
* Prevent from traversing symlinks and parent directories when extracting
(CVE-2018-10860) (Closes: #902882)
* Extract test files needed for t/25_traversal.t test.
Add zip files to debian/t/data directory and add them to
debian/sorce/include-binaries to include those in the debian tarball.
Add an override for dh_auto_test to copy debian/t/data/*.zip testfiles
to test directory prior to running the testsuite.
Clean test files needed for t/25_traversal.t in dh_clean
-- Salvatore Bonaccorso <carnil(a)debian.org> Fri, 21 Sep 2018 17:17:23 +0200
--- Modifications pour linux (linux-image-4.9.0-8-amd64 linux-libc-dev) ---
linux (4.9.110-3+deb9u5) stretch-security; urgency=high
[ Salvatore Bonaccorso ]
* irda: Fix memory leak caused by repeated binds of irda socket
(CVE-2018-6554)
* irda: Only insert new objects into the global database via setsockopt
(CVE-2018-6555)
* mm: get rid of vmacache_flush_all() entirely (CVE-2018-17182)
* floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
(CVE-2018-7755)
* Bluetooth: hidp: buffer overflow in hidp_process_report (CVE-2018-9363)
* ALSA: rawmidi: Change resized buffers atomically (CVE-2018-10902)
* scsi: target: iscsi: Use hex2bin instead of a re-implementation
(CVE-2018-14633)
* [x86] entry/64: Remove %ebx handling from error_entry/exit
(CVE-2018-14678)
* infiniband: fix a possible use-after-free bug (CVE-2018-14734)
* [x86] speculation: Protect against userspace-userspace spectreRSB
(CVE-2018-15572)
* [x86] paravirt: Fix spectre-v2 mitigations for paravirt guests
(CVE-2018-15594)
[ Ben Hutchings ]
* mm: Avoid ABI change for CVE-2018-17182 fix
* HID: debug: check length before copy_to_user() (CVE-2018-9516)
* Cipso: cipso_v4_optptr enter infinite loop (CVE-2018-10938)
* f2fs: fix to do sanity check with reserved blkaddr of inline inode
(CVE-2018-13099)
* btrfs: relocation: Only remove reloc rb_trees if reloc control has been
initialized (CVE-2018-14609)
* hfsplus: fix NULL dereference in hfsplus_lookup() (CVE-2018-14617)
* USB: yurex: fix out-of-bounds uaccess in read handler (CVE-2018-16276)
* cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (CVE-2018-16658)
-- Ben Hutchings <ben(a)decadent.org.uk> Sun, 30 Sep 2018 17:37:51 +0100
--- Modifications pour python2.7 (libpython2.7 libpython2.7-dev libpython2.7-minimal libpython2.7-stdlib python2.7 python2.7-dev python2.7-minimal) ---
python2.7 (2.7.13-2+deb9u3) stretch-security; urgency=medium
* CVE-2018-1000802, CVE-2018-1060, CVE-2018-1061, CVE-2018-14647
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 26 Sep 2018 20:42:22 +0200
--- Modifications pour python3.5 (libpython3.5 libpython3.5-minimal libpython3.5-stdlib python3.5 python3.5-minimal) ---
python3.5 (3.5.3-1+deb9u1) stretch-security; urgency=medium
* CVE-2017-1000158 CVE-2018-1060 CVE-2018-1061 CVE-2018-14647
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 27 Sep 2018 19:25:39 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a0c:700:0:1:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)
apticron report [Mon, 01 Oct 2018 22:38:09 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libarchive-zip-perl 1.59-1+deb9u1
libpython2.7 2.7.13-2+deb9u3
libpython2.7-dev 2.7.13-2+deb9u3
libpython2.7-minimal 2.7.13-2+deb9u3
libpython2.7-stdlib 2.7.13-2+deb9u3
libpython3.5 3.5.3-1+deb9u1
libpython3.5-minimal 3.5.3-1+deb9u1
libpython3.5-stdlib 3.5.3-1+deb9u1
linux-image-4.9.0-8-amd64 4.9.110-3+deb9u5
linux-libc-dev 4.9.110-3+deb9u5
python2.7 2.7.13-2+deb9u3
python2.7-dev 2.7.13-2+deb9u3
python2.7-minimal 2.7.13-2+deb9u3
python3.5 3.5.3-1+deb9u1
python3.5-minimal 3.5.3-1+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour libarchive-zip-perl ---
libarchive-zip-perl (1.59-1+deb9u1) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
* Prevent from traversing symlinks and parent directories when extracting
(CVE-2018-10860) (Closes: #902882)
* Extract test files needed for t/25_traversal.t test.
Add zip files to debian/t/data directory and add them to
debian/sorce/include-binaries to include those in the debian tarball.
Add an override for dh_auto_test to copy debian/t/data/*.zip testfiles
to test directory prior to running the testsuite.
Clean test files needed for t/25_traversal.t in dh_clean
-- Salvatore Bonaccorso <carnil(a)debian.org> Fri, 21 Sep 2018 17:17:23 +0200
--- Modifications pour linux (linux-image-4.9.0-8-amd64 linux-libc-dev) ---
linux (4.9.110-3+deb9u5) stretch-security; urgency=high
[ Salvatore Bonaccorso ]
* irda: Fix memory leak caused by repeated binds of irda socket
(CVE-2018-6554)
* irda: Only insert new objects into the global database via setsockopt
(CVE-2018-6555)
* mm: get rid of vmacache_flush_all() entirely (CVE-2018-17182)
* floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
(CVE-2018-7755)
* Bluetooth: hidp: buffer overflow in hidp_process_report (CVE-2018-9363)
* ALSA: rawmidi: Change resized buffers atomically (CVE-2018-10902)
* scsi: target: iscsi: Use hex2bin instead of a re-implementation
(CVE-2018-14633)
* [x86] entry/64: Remove %ebx handling from error_entry/exit
(CVE-2018-14678)
* infiniband: fix a possible use-after-free bug (CVE-2018-14734)
* [x86] speculation: Protect against userspace-userspace spectreRSB
(CVE-2018-15572)
* [x86] paravirt: Fix spectre-v2 mitigations for paravirt guests
(CVE-2018-15594)
[ Ben Hutchings ]
* mm: Avoid ABI change for CVE-2018-17182 fix
* HID: debug: check length before copy_to_user() (CVE-2018-9516)
* Cipso: cipso_v4_optptr enter infinite loop (CVE-2018-10938)
* f2fs: fix to do sanity check with reserved blkaddr of inline inode
(CVE-2018-13099)
* btrfs: relocation: Only remove reloc rb_trees if reloc control has been
initialized (CVE-2018-14609)
* hfsplus: fix NULL dereference in hfsplus_lookup() (CVE-2018-14617)
* USB: yurex: fix out-of-bounds uaccess in read handler (CVE-2018-16276)
* cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status (CVE-2018-16658)
-- Ben Hutchings <ben(a)decadent.org.uk> Sun, 30 Sep 2018 17:37:51 +0100
--- Modifications pour python2.7 (libpython2.7 libpython2.7-dev libpython2.7-minimal libpython2.7-stdlib python2.7 python2.7-dev python2.7-minimal) ---
python2.7 (2.7.13-2+deb9u3) stretch-security; urgency=medium
* CVE-2018-1000802, CVE-2018-1060, CVE-2018-1061, CVE-2018-14647
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 26 Sep 2018 20:42:22 +0200
--- Modifications pour python3.5 (libpython3.5 libpython3.5-minimal libpython3.5-stdlib python3.5 python3.5-minimal) ---
python3.5 (3.5.3-1+deb9u1) stretch-security; urgency=medium
* CVE-2017-1000158 CVE-2018-1060 CVE-2018-1061 CVE-2018-14647
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 27 Sep 2018 19:25:39 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a0c:700:0:1:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)