apticron report [Sun, 17 Jun 2018 22:38:07 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libgcrypt20 1.7.6-2+deb9u3
libperl5.24 5.24.1-3+deb9u4
perl 5.24.1-3+deb9u4
perl-base 5.24.1-3+deb9u4
perl-modules-5.24 5.24.1-3+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour libgcrypt20 ---
libgcrypt20 (1.7.6-2+deb9u3) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
* ecc: Add blinding for ECDSA (CVE-2018-0495)
-- Salvatore Bonaccorso <carnil(a)debian.org> Fri, 15 Jun 2018 11:58:05 +0200
--- Modifications pour perl (libperl5.24 perl perl-base perl-modules-5.24) ---
perl (5.24.1-3+deb9u4) stretch-security; urgency=high
* [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
in Archive-Tar (Closes: #900834)
-- Dominic Hargreaves <dom(a)earth.li> Sun, 10 Jun 2018 18:37:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
Execution failed Service mailman
Date: Sun, 17 Jun 2018 06:27:14
Action: alert
Host: quigon.federez.net
Description: failed to start (exit status 0) -- no output
Monit, unique employé de federez,
Does not exist Service mailman
Date: Sun, 17 Jun 2018 06:26:44
Action: restart
Host: quigon.federez.net
Description: process is not running
Monit, unique employé de federez,
apticron report [Sat, 16 Jun 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libperl5.24 5.24.1-3+deb9u4
perl 5.24.1-3+deb9u4
perl-base 5.24.1-3+deb9u4
perl-modules-5.24 5.24.1-3+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour perl (libperl5.24 perl perl-base perl-modules-5.24) ---
perl (5.24.1-3+deb9u4) stretch-security; urgency=high
* [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
in Archive-Tar (Closes: #900834)
-- Dominic Hargreaves <dom(a)earth.li> Sun, 10 Jun 2018 18:37:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
apticron report [Fri, 15 Jun 2018 22:38:05 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libperl5.24 5.24.1-3+deb9u4
perl 5.24.1-3+deb9u4
perl-base 5.24.1-3+deb9u4
perl-modules-5.24 5.24.1-3+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour perl (libperl5.24 perl perl-base perl-modules-5.24) ---
perl (5.24.1-3+deb9u4) stretch-security; urgency=high
* [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
in Archive-Tar (Closes: #900834)
-- Dominic Hargreaves <dom(a)earth.li> Sun, 10 Jun 2018 18:37:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
apticron report [Thu, 14 Jun 2018 22:38:06 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libperl5.24 5.24.1-3+deb9u4
perl 5.24.1-3+deb9u4
perl-base 5.24.1-3+deb9u4
perl-modules-5.24 5.24.1-3+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour perl (libperl5.24 perl perl-base perl-modules-5.24) ---
perl (5.24.1-3+deb9u4) stretch-security; urgency=high
* [SECURITY] CVE-2018-12015: fix directory traversal vulnerability
in Archive-Tar (Closes: #900834)
-- Dominic Hargreaves <dom(a)earth.li> Sun, 10 Jun 2018 18:37:28 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron