apticron report [Wed, 11 Jul 2018 22:38:07 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libcups2 2.2.1-8+deb9u2
libcupsimage2 2.2.1-8+deb9u2
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour cups (libcups2 libcupsimage2) ---
cups (2.2.1-8+deb9u2) stretch-security; urgency=low
* CVE-2018-6553: Fix AppArmor cupsd sandbox bypass due to use of hard links
* Backport upstream fixes for:
- CVE-2018-4180 Local Privilege Escalation to Root in dnssd Backend (CUPS_SERVERBIN)
- CVE-2018-4181 Limited Local File Reads as Root via cupsd.conf Include Directive
- CVE-2018-4182 cups-exec Sandbox Bypass Due to Insecure Error Handling
- CVE-2018-4183 cups-exec Sandbox Bypass Due to Profile Misconfiguration
- CVE-2017-15400: Restrict IPP Everywhere filters to only list supported PDLs
to fix CRLF and Code Injection in Printer Zeroconfig
-- Didier Raboud <odyx(a)debian.org> Wed, 11 Jul 2018 11:29:27 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a0c:700:0:1:200:9ff:fe04:1901] said: 450 4.1.8
<root(a)nonagon.crans.org>: Sender address rejected: Domain not found (in
reply to RCPT TO command)
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a0c:700:0:1:200:9ff:fe04:1901] said: 450 4.1.8
<root(a)nonagon.crans.org>: Sender address rejected: Domain not found (in
reply to RCPT TO command)
Does not exist Service mailman
Date: Mon, 09 Jul 2018 06:28:09
Action: restart
Host: quigon.federez.net
Description: process is not running
Monit, unique employé de federez,
apticron report [Fri, 06 Jul 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libexiv2-14 0.25-3.1+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour exiv2 (libexiv2-14) ---
exiv2 (0.25-3.1+deb9u1) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2018-10958: denial of service through memory exhaustion and
application crash by a crafted PNG image.
* CVE-2018-10999: a heap-based buffer over-read via a crafted PNG image.
* CVE-2018-10998: denial of service through memory exhaustion and
application crash by a crafted image.
* CVE-2018-11531: a heap-based buffer overflow and application crash by a
crafted image.
* CVE-2018-12264: integer overflow leading to out of bounds read by a
crafted image. (Closes: #901707)
* CVE-2018-12265: integer overflow leading to out of bounds read by a
crafted image. (Closes: #901706)
-- Roberto C. Sanchez <roberto(a)debian.org> Wed, 27 Jun 2018 08:09:36 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Thu, 05 Jul 2018 22:38:05 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libexiv2-14 0.25-3.1+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour exiv2 (libexiv2-14) ---
exiv2 (0.25-3.1+deb9u1) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2018-10958: denial of service through memory exhaustion and
application crash by a crafted PNG image.
* CVE-2018-10999: a heap-based buffer over-read via a crafted PNG image.
* CVE-2018-10998: denial of service through memory exhaustion and
application crash by a crafted image.
* CVE-2018-11531: a heap-based buffer overflow and application crash by a
crafted image.
* CVE-2018-12264: integer overflow leading to out of bounds read by a
crafted image. (Closes: #901707)
* CVE-2018-12265: integer overflow leading to out of bounds read by a
crafted image. (Closes: #901706)
-- Roberto C. Sanchez <roberto(a)debian.org> Wed, 27 Jun 2018 08:09:36 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
knot (2.5.4-2) unstable; urgency=medium
The compatibility links with dig and nsupdate has been dropped
in favour of coinstallability with dnsutils (from BIND9).
-- Ondřej Surý <ondrej(a)debian.org> Mon, 18 Sep 2017 07:07:49 +0200
apticron report [Wed, 04 Jul 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libexiv2-14 0.25-3.1+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour exiv2 (libexiv2-14) ---
exiv2 (0.25-3.1+deb9u1) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2018-10958: denial of service through memory exhaustion and
application crash by a crafted PNG image.
* CVE-2018-10999: a heap-based buffer over-read via a crafted PNG image.
* CVE-2018-10998: denial of service through memory exhaustion and
application crash by a crafted image.
* CVE-2018-11531: a heap-based buffer overflow and application crash by a
crafted image.
* CVE-2018-12264: integer overflow leading to out of bounds read by a
crafted image. (Closes: #901707)
* CVE-2018-12265: integer overflow leading to out of bounds read by a
crafted image. (Closes: #901706)
-- Roberto C. Sanchez <roberto(a)debian.org> Wed, 27 Jun 2018 08:09:36 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron