apticron report [Sat, 31 Mar 2018 23:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libdatetime-timezone-perl 1:2.09-1+2018d
libpam-systemd 232-25+deb9u3
libssl1.0.2 1.0.2l-2+deb9u3
libssl1.1 1.1.0f-3+deb9u2
libssl-dev 1.1.0f-3+deb9u2
libsystemd0 232-25+deb9u3
libudev1 232-25+deb9u3
openssl 1.1.0f-3+deb9u2
systemd 232-25+deb9u3
systemd-sysv 232-25+deb9u3
tzdata 2018d-0+deb9u1
udev 232-25+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour openssl (libssl1.1 libssl-dev openssl) ---
openssl (1.1.0f-3+deb9u2) stretch-security; urgency=high
* CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
* CVE-2018-0733 (Incorrect CRYPTO_memcmp on HP-UX PA-RISC)
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
* Add patches to pass the testsuite:
- Fix-a-Proxy-race-condition.patch
- Fix-race-condition-in-TLSProxy.patch
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 12:51:02 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2l-2+deb9u3) stretch-security; urgency=high
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 13:10:14 +0200
--- Modifications pour libdatetime-timezone-perl ---
libdatetime-timezone-perl (1:2.09-1+2018d) stretch; urgency=medium
* Update to Olson database version 2018d.
This update contains contemporary changes for Palestine and Casey Station.
-- gregor herrmann <gregoa(a)debian.org> Fri, 30 Mar 2018 14:41:11 +0200
--- Modifications pour systemd (libpam-systemd libsystemd0 libudev1 systemd systemd-sysv udev) ---
systemd (232-25+deb9u3) stretch; urgency=medium
[ Cyril Brulebois ]
* networkd-ndisc: Handle missing mtu gracefully.
The previous upload made networkd respect the MTU field in IPv6 RA but
unfortunately broke setups where there's no such field. (Closes: #892794)
-- Michael Biebl <biebl(a)debian.org> Fri, 23 Mar 2018 13:55:43 +0100
--- Modifications pour tzdata ---
tzdata (2018d-0+deb9u1) stretch; urgency=medium
* New upstream version.
-- Clint Adams <clint(a)debian.org> Mon, 26 Mar 2018 18:43:38 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
apticron report [Fri, 30 Mar 2018 23:38:06 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libpam-systemd 232-25+deb9u3
libssl1.0.2 1.0.2l-2+deb9u3
libssl1.1 1.1.0f-3+deb9u2
libssl-dev 1.1.0f-3+deb9u2
libsystemd0 232-25+deb9u3
libudev1 232-25+deb9u3
openssl 1.1.0f-3+deb9u2
systemd 232-25+deb9u3
systemd-sysv 232-25+deb9u3
udev 232-25+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour openssl (libssl1.1 libssl-dev openssl) ---
openssl (1.1.0f-3+deb9u2) stretch-security; urgency=high
* CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
* CVE-2018-0733 (Incorrect CRYPTO_memcmp on HP-UX PA-RISC)
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
* Add patches to pass the testsuite:
- Fix-a-Proxy-race-condition.patch
- Fix-race-condition-in-TLSProxy.patch
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 12:51:02 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2l-2+deb9u3) stretch-security; urgency=high
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 13:10:14 +0200
--- Modifications pour systemd (libpam-systemd libsystemd0 libudev1 systemd systemd-sysv udev) ---
systemd (232-25+deb9u3) stretch; urgency=medium
[ Cyril Brulebois ]
* networkd-ndisc: Handle missing mtu gracefully.
The previous upload made networkd respect the MTU field in IPv6 RA but
unfortunately broke setups where there's no such field. (Closes: #892794)
-- Michael Biebl <biebl(a)debian.org> Fri, 23 Mar 2018 13:55:43 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a06:e042:100:4:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)
apticron report [Thu, 29 Mar 2018 23:38:07 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libpam-systemd 232-25+deb9u3
libssl1.0.2 1.0.2l-2+deb9u3
libssl1.1 1.1.0f-3+deb9u2
libssl-dev 1.1.0f-3+deb9u2
libsystemd0 232-25+deb9u3
libudev1 232-25+deb9u3
openssl 1.1.0f-3+deb9u2
systemd 232-25+deb9u3
systemd-sysv 232-25+deb9u3
udev 232-25+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour openssl (libssl1.1 libssl-dev openssl) ---
openssl (1.1.0f-3+deb9u2) stretch-security; urgency=high
* CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
* CVE-2018-0733 (Incorrect CRYPTO_memcmp on HP-UX PA-RISC)
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
* Add patches to pass the testsuite:
- Fix-a-Proxy-race-condition.patch
- Fix-race-condition-in-TLSProxy.patch
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 12:51:02 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2l-2+deb9u3) stretch-security; urgency=high
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 13:10:14 +0200
--- Modifications pour systemd (libpam-systemd libsystemd0 libudev1 systemd systemd-sysv udev) ---
systemd (232-25+deb9u3) stretch; urgency=medium
[ Cyril Brulebois ]
* networkd-ndisc: Handle missing mtu gracefully.
The previous upload made networkd respect the MTU field in IPv6 RA but
unfortunately broke setups where there's no such field. (Closes: #892794)
-- Michael Biebl <biebl(a)debian.org> Fri, 23 Mar 2018 13:55:43 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
An unexpected error occurred:
ConnectionError: HTTPSConnectionPool(host='acme-v01.api.letsencrypt.org', port=443): Max retries exceeded with url: /directory (Caused by NewConnectionError('<requests.packages.urllib3.connection.VerifiedHTTPSConnection object at 0x7f940b6d6750>: Failed to establish a new connection: [Errno -3] Temporary failure in name resolution',))
Please see the logfiles in /var/log/letsencrypt for more details.
/etc/cron.weekly/ssl-cert-check:
ERROR: The file named /var/tmp/cert.BXIOOm is unreadable or doesn't exist
ERROR: Please check to make sure the certificate for ldap-ro.federez.net:636 is valid
Execution failed Service mailman
Date: Sun, 25 Mar 2018 06:27:21
Action: alert
Host: quigon.federez.net
Description: failed to start (exit status 0) -- no output
Monit, unique employé de federez,