/etc/cron.weekly/ssl-cert-check:
ERROR: The file named /var/tmp/cert.cqYuuZ is unreadable or doesn't exist
ERROR: Please check to make sure the certificate for ldap-ro.federez.net:636 is valid
apticron report [Sat, 03 Feb 2018 22:38:05 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
clamav 0.99.2+dfsg-6+deb9u1
clamav-base 0.99.2+dfsg-6+deb9u1
clamav-daemon 0.99.2+dfsg-6+deb9u1
clamav-freshclam 0.99.2+dfsg-6+deb9u1
clamdscan 0.99.2+dfsg-6+deb9u1
libclamav7 0.99.2+dfsg-6+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour clamav (clamav clamav-base clamav-daemon clamav-freshclam clamdscan libclamav7) ---
clamav (0.99.2+dfsg-6+deb9u1) stretch; urgency=medium
* Apply security patches from 0.99.3 (Closes: #888484):
- fixes for the following CVE's: CVE-2017-6418, CVE-2017-6420,
CVE-2017-12374, CVE-2017-12375, CVE-2017-12376, CVE-2017-12377,
CVE-2017-12378, CVE-2017-12379, CVE-2017-12380.
* Bump symbol version of cl_retflevel because CL_FLEVEL changed.
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Sat, 27 Jan 2018 00:33:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Fri, 02 Feb 2018 22:38:07 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
clamav 0.99.2+dfsg-6+deb9u1
clamav-base 0.99.2+dfsg-6+deb9u1
clamav-daemon 0.99.2+dfsg-6+deb9u1
clamav-freshclam 0.99.2+dfsg-6+deb9u1
clamdscan 0.99.2+dfsg-6+deb9u1
libclamav7 0.99.2+dfsg-6+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour clamav (clamav clamav-base clamav-daemon clamav-freshclam clamdscan libclamav7) ---
clamav (0.99.2+dfsg-6+deb9u1) stretch; urgency=medium
* Apply security patches from 0.99.3 (Closes: #888484):
- fixes for the following CVE's: CVE-2017-6418, CVE-2017-6420,
CVE-2017-12374, CVE-2017-12375, CVE-2017-12376, CVE-2017-12377,
CVE-2017-12378, CVE-2017-12379, CVE-2017-12380.
* Bump symbol version of cl_retflevel because CL_FLEVEL changed.
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Sat, 27 Jan 2018 00:33:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Thu, 01 Feb 2018 22:38:06 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
clamav 0.99.2+dfsg-6+deb9u1
clamav-base 0.99.2+dfsg-6+deb9u1
clamav-daemon 0.99.2+dfsg-6+deb9u1
clamav-freshclam 0.99.2+dfsg-6+deb9u1
clamdscan 0.99.2+dfsg-6+deb9u1
libclamav7 0.99.2+dfsg-6+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour clamav (clamav clamav-base clamav-daemon clamav-freshclam clamdscan libclamav7) ---
clamav (0.99.2+dfsg-6+deb9u1) stretch; urgency=medium
* Apply security patches from 0.99.3 (Closes: #888484):
- fixes for the following CVE's: CVE-2017-6418, CVE-2017-6420,
CVE-2017-12374, CVE-2017-12375, CVE-2017-12376, CVE-2017-12377,
CVE-2017-12378, CVE-2017-12379, CVE-2017-12380.
* Bump symbol version of cl_retflevel because CL_FLEVEL changed.
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Sat, 27 Jan 2018 00:33:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron