apticron report [Wed, 04 Apr 2018 23:38:06 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
apache2 2.4.25-3+deb9u4
apache2-bin 2.4.25-3+deb9u4
apache2-data 2.4.25-3+deb9u4
apache2-utils 2.4.25-3+deb9u4
libdatetime-timezone-perl 1:2.09-1+2018d
libpam-systemd 232-25+deb9u3
libssl1.0.2 1.0.2l-2+deb9u3
libssl1.1 1.1.0f-3+deb9u2
libssl-dev 1.1.0f-3+deb9u2
libsystemd0 232-25+deb9u3
libudev1 232-25+deb9u3
openssl 1.1.0f-3+deb9u2
systemd 232-25+deb9u3
systemd-sysv 232-25+deb9u3
tzdata 2018d-0+deb9u1
udev 232-25+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour openssl (libssl1.1 libssl-dev openssl) ---
openssl (1.1.0f-3+deb9u2) stretch-security; urgency=high
* CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
* CVE-2018-0733 (Incorrect CRYPTO_memcmp on HP-UX PA-RISC)
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
* Add patches to pass the testsuite:
- Fix-a-Proxy-race-condition.patch
- Fix-race-condition-in-TLSProxy.patch
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 12:51:02 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2l-2+deb9u3) stretch-security; urgency=high
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 13:10:14 +0200
--- Modifications pour apache2 (apache2 apache2-bin apache2-data apache2-utils) ---
apache2 (2.4.25-3+deb9u4) stretch-security; urgency=medium
* CVE-2017-15710: mod_authnz_ldap: Out of bound write in mod_authnz_ldap
when using too small Accept-Language values.
* CVE-2017-15715: <FilesMatch> bypass with a trailing newline in the file
name.
Configure the regular expression engine to match '$' to the end of
the input string only, excluding matching the end of any embedded
newline characters. Behavior can be changed with new directive
'RegexDefaultOptions'.
* CVE-2018-1283: Tampering of mod_session data for CGI applications.
* CVE-2018-1301: Possible out of bound access after failure in reading the
HTTP request
* CVE-2018-1303: Possible out of bound read in mod_cache_socache
* CVE-2018-1312: mod_auth_digest: Weak Digest auth nonce generation
-- Stefan Fritsch <sf(a)debian.org> Sat, 31 Mar 2018 10:47:16 +0200
--- Modifications pour libdatetime-timezone-perl ---
libdatetime-timezone-perl (1:2.09-1+2018d) stretch; urgency=medium
* Update to Olson database version 2018d.
This update contains contemporary changes for Palestine and Casey Station.
-- gregor herrmann <gregoa(a)debian.org> Fri, 30 Mar 2018 14:41:11 +0200
--- Modifications pour systemd (libpam-systemd libsystemd0 libudev1 systemd systemd-sysv udev) ---
systemd (232-25+deb9u3) stretch; urgency=medium
[ Cyril Brulebois ]
* networkd-ndisc: Handle missing mtu gracefully.
The previous upload made networkd respect the MTU field in IPv6 RA but
unfortunately broke setups where there's no such field. (Closes: #892794)
-- Michael Biebl <biebl(a)debian.org> Fri, 23 Mar 2018 13:55:43 +0100
--- Modifications pour tzdata ---
tzdata (2018d-0+deb9u1) stretch; urgency=medium
* New upstream version.
-- Clint Adams <clint(a)debian.org> Mon, 26 Mar 2018 18:43:38 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a06:e042:100:4:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)
apticron report [Tue, 03 Apr 2018 23:38:05 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
apache2 2.4.25-3+deb9u4
apache2-bin 2.4.25-3+deb9u4
apache2-data 2.4.25-3+deb9u4
apache2-utils 2.4.25-3+deb9u4
libdatetime-timezone-perl 1:2.09-1+2018d
libpam-systemd 232-25+deb9u3
libssl1.0.2 1.0.2l-2+deb9u3
libssl1.1 1.1.0f-3+deb9u2
libssl-dev 1.1.0f-3+deb9u2
libsystemd0 232-25+deb9u3
libudev1 232-25+deb9u3
openssl 1.1.0f-3+deb9u2
systemd 232-25+deb9u3
systemd-sysv 232-25+deb9u3
tzdata 2018d-0+deb9u1
udev 232-25+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour openssl (libssl1.1 libssl-dev openssl) ---
openssl (1.1.0f-3+deb9u2) stretch-security; urgency=high
* CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
* CVE-2018-0733 (Incorrect CRYPTO_memcmp on HP-UX PA-RISC)
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
* Add patches to pass the testsuite:
- Fix-a-Proxy-race-condition.patch
- Fix-race-condition-in-TLSProxy.patch
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 12:51:02 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2l-2+deb9u3) stretch-security; urgency=high
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 13:10:14 +0200
--- Modifications pour apache2 (apache2 apache2-bin apache2-data apache2-utils) ---
apache2 (2.4.25-3+deb9u4) stretch-security; urgency=medium
* CVE-2017-15710: mod_authnz_ldap: Out of bound write in mod_authnz_ldap
when using too small Accept-Language values.
* CVE-2017-15715: <FilesMatch> bypass with a trailing newline in the file
name.
Configure the regular expression engine to match '$' to the end of
the input string only, excluding matching the end of any embedded
newline characters. Behavior can be changed with new directive
'RegexDefaultOptions'.
* CVE-2018-1283: Tampering of mod_session data for CGI applications.
* CVE-2018-1301: Possible out of bound access after failure in reading the
HTTP request
* CVE-2018-1303: Possible out of bound read in mod_cache_socache
* CVE-2018-1312: mod_auth_digest: Weak Digest auth nonce generation
-- Stefan Fritsch <sf(a)debian.org> Sat, 31 Mar 2018 10:47:16 +0200
--- Modifications pour libdatetime-timezone-perl ---
libdatetime-timezone-perl (1:2.09-1+2018d) stretch; urgency=medium
* Update to Olson database version 2018d.
This update contains contemporary changes for Palestine and Casey Station.
-- gregor herrmann <gregoa(a)debian.org> Fri, 30 Mar 2018 14:41:11 +0200
--- Modifications pour systemd (libpam-systemd libsystemd0 libudev1 systemd systemd-sysv udev) ---
systemd (232-25+deb9u3) stretch; urgency=medium
[ Cyril Brulebois ]
* networkd-ndisc: Handle missing mtu gracefully.
The previous upload made networkd respect the MTU field in IPv6 RA but
unfortunately broke setups where there's no such field. (Closes: #892794)
-- Michael Biebl <biebl(a)debian.org> Fri, 23 Mar 2018 13:55:43 +0100
--- Modifications pour tzdata ---
tzdata (2018d-0+deb9u1) stretch; urgency=medium
* New upstream version.
-- Clint Adams <clint(a)debian.org> Mon, 26 Mar 2018 18:43:38 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
apticron report [Mon, 02 Apr 2018 23:38:05 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libdatetime-timezone-perl 1:2.09-1+2018d
libpam-systemd 232-25+deb9u3
libssl1.0.2 1.0.2l-2+deb9u3
libssl1.1 1.1.0f-3+deb9u2
libssl-dev 1.1.0f-3+deb9u2
libsystemd0 232-25+deb9u3
libudev1 232-25+deb9u3
openssl 1.1.0f-3+deb9u2
systemd 232-25+deb9u3
systemd-sysv 232-25+deb9u3
tzdata 2018d-0+deb9u1
udev 232-25+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour openssl (libssl1.1 libssl-dev openssl) ---
openssl (1.1.0f-3+deb9u2) stretch-security; urgency=high
* CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
* CVE-2018-0733 (Incorrect CRYPTO_memcmp on HP-UX PA-RISC)
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
* Add patches to pass the testsuite:
- Fix-a-Proxy-race-condition.patch
- Fix-race-condition-in-TLSProxy.patch
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 12:51:02 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2l-2+deb9u3) stretch-security; urgency=high
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 13:10:14 +0200
--- Modifications pour libdatetime-timezone-perl ---
libdatetime-timezone-perl (1:2.09-1+2018d) stretch; urgency=medium
* Update to Olson database version 2018d.
This update contains contemporary changes for Palestine and Casey Station.
-- gregor herrmann <gregoa(a)debian.org> Fri, 30 Mar 2018 14:41:11 +0200
--- Modifications pour systemd (libpam-systemd libsystemd0 libudev1 systemd systemd-sysv udev) ---
systemd (232-25+deb9u3) stretch; urgency=medium
[ Cyril Brulebois ]
* networkd-ndisc: Handle missing mtu gracefully.
The previous upload made networkd respect the MTU field in IPv6 RA but
unfortunately broke setups where there's no such field. (Closes: #892794)
-- Michael Biebl <biebl(a)debian.org> Fri, 23 Mar 2018 13:55:43 +0100
--- Modifications pour tzdata ---
tzdata (2018d-0+deb9u1) stretch; urgency=medium
* New upstream version.
-- Clint Adams <clint(a)debian.org> Mon, 26 Mar 2018 18:43:38 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a06:e042:100:4:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)
No viruses were found.
Banned name: .exe,.exe-ms,Purchase Order.bat
Content type: Banned
Internal reference code for the message is 26339-01/PUMRJLY4DQZu
First upstream SMTP client IP address: [199.168.143.197]
According to a 'Received:' trace, the message apparently originated at:
[199.168.143.197], 199.168.143.197 unknown [199.168.143.197]
Return-Path: <webmaster(a)apk-mod.net>
From: Santana Sarker <webmaster(a)apk-mod.net>
Message-ID: <20180401234512.34EDBBF01D20F0FC(a)apk-mod.net>
Subject: PURCHASE ORDER
The message has been quarantined as: P/banned-PUMRJLY4DQZu
The message WAS NOT relayed to:
<admin(a)federez.net>:
554 5.7.0 Bounce, id=26339-01 - BANNED: .exe,.exe-ms,Purchase Order.bat
apticron report [Sun, 01 Apr 2018 23:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libdatetime-timezone-perl 1:2.09-1+2018d
libpam-systemd 232-25+deb9u3
libssl1.0.2 1.0.2l-2+deb9u3
libssl1.1 1.1.0f-3+deb9u2
libssl-dev 1.1.0f-3+deb9u2
libsystemd0 232-25+deb9u3
libudev1 232-25+deb9u3
openssl 1.1.0f-3+deb9u2
systemd 232-25+deb9u3
systemd-sysv 232-25+deb9u3
tzdata 2018d-0+deb9u1
udev 232-25+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour openssl (libssl1.1 libssl-dev openssl) ---
openssl (1.1.0f-3+deb9u2) stretch-security; urgency=high
* CVE-2017-3738 (rsaz_1024_mul_avx2 overflow bug on x86_64)
* CVE-2018-0733 (Incorrect CRYPTO_memcmp on HP-UX PA-RISC)
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
* Add patches to pass the testsuite:
- Fix-a-Proxy-race-condition.patch
- Fix-race-condition-in-TLSProxy.patch
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 12:51:02 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2l-2+deb9u3) stretch-security; urgency=high
* CVE-2018-0739 (Constructed ASN.1 types with a recursive definition could
exceed the stack)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Thu, 29 Mar 2018 13:10:14 +0200
--- Modifications pour libdatetime-timezone-perl ---
libdatetime-timezone-perl (1:2.09-1+2018d) stretch; urgency=medium
* Update to Olson database version 2018d.
This update contains contemporary changes for Palestine and Casey Station.
-- gregor herrmann <gregoa(a)debian.org> Fri, 30 Mar 2018 14:41:11 +0200
--- Modifications pour systemd (libpam-systemd libsystemd0 libudev1 systemd systemd-sysv udev) ---
systemd (232-25+deb9u3) stretch; urgency=medium
[ Cyril Brulebois ]
* networkd-ndisc: Handle missing mtu gracefully.
The previous upload made networkd respect the MTU field in IPv6 RA but
unfortunately broke setups where there's no such field. (Closes: #892794)
-- Michael Biebl <biebl(a)debian.org> Fri, 23 Mar 2018 13:55:43 +0100
--- Modifications pour tzdata ---
tzdata (2018d-0+deb9u1) stretch; urgency=medium
* New upstream version.
-- Clint Adams <clint(a)debian.org> Mon, 26 Mar 2018 18:43:38 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
/etc/cron.weekly/ssl-cert-check:
ERROR: The file named /var/tmp/cert.Q3t9re is unreadable or doesn't exist
ERROR: Please check to make sure the certificate for ldap-ro.federez.net:636 is valid