This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a0c:700:0:1:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)
apticron report [Sat, 15 Sep 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.20~dfsg-3.2+deb9u4
libgs9 9.20~dfsg-3.2+deb9u4
libgs9-common 9.20~dfsg-3.2+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.20~dfsg-3.2+deb9u4) stretch-security; urgency=medium
* Add additional patch for CVE-2018-16543
* Fix a regression introduced in a054156d425b4dbdaaa9fda4b5f1182b27598c2b,
see https://github.com/apple/cups/issues/5392
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 06 Sep 2018 00:02:35 +0200
ghostscript (9.20~dfsg-3.2+deb9u3) stretch-security; urgency=medium
* Multiple security issues, see Security Tracker for details
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 29 Aug 2018 21:17:15 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Fri, 14 Sep 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.20~dfsg-3.2+deb9u4
libgs9 9.20~dfsg-3.2+deb9u4
libgs9-common 9.20~dfsg-3.2+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.20~dfsg-3.2+deb9u4) stretch-security; urgency=medium
* Add additional patch for CVE-2018-16543
* Fix a regression introduced in a054156d425b4dbdaaa9fda4b5f1182b27598c2b,
see https://github.com/apple/cups/issues/5392
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 06 Sep 2018 00:02:35 +0200
ghostscript (9.20~dfsg-3.2+deb9u3) stretch-security; urgency=medium
* Multiple security issues, see Security Tracker for details
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 29 Aug 2018 21:17:15 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Thu, 13 Sep 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.20~dfsg-3.2+deb9u4
libgs9 9.20~dfsg-3.2+deb9u4
libgs9-common 9.20~dfsg-3.2+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.20~dfsg-3.2+deb9u4) stretch-security; urgency=medium
* Add additional patch for CVE-2018-16543
* Fix a regression introduced in a054156d425b4dbdaaa9fda4b5f1182b27598c2b,
see https://github.com/apple/cups/issues/5392
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 06 Sep 2018 00:02:35 +0200
ghostscript (9.20~dfsg-3.2+deb9u3) stretch-security; urgency=medium
* Multiple security issues, see Security Tracker for details
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 29 Aug 2018 21:17:15 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Wed, 12 Sep 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.20~dfsg-3.2+deb9u4
libgs9 9.20~dfsg-3.2+deb9u4
libgs9-common 9.20~dfsg-3.2+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.20~dfsg-3.2+deb9u4) stretch-security; urgency=medium
* Add additional patch for CVE-2018-16543
* Fix a regression introduced in a054156d425b4dbdaaa9fda4b5f1182b27598c2b,
see https://github.com/apple/cups/issues/5392
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 06 Sep 2018 00:02:35 +0200
ghostscript (9.20~dfsg-3.2+deb9u3) stretch-security; urgency=medium
* Multiple security issues, see Security Tracker for details
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 29 Aug 2018 21:17:15 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Tue, 11 Sep 2018 22:38:07 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.20~dfsg-3.2+deb9u4
libgs9 9.20~dfsg-3.2+deb9u4
libgs9-common 9.20~dfsg-3.2+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.20~dfsg-3.2+deb9u4) stretch-security; urgency=medium
* Add additional patch for CVE-2018-16543
* Fix a regression introduced in a054156d425b4dbdaaa9fda4b5f1182b27598c2b,
see https://github.com/apple/cups/issues/5392
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 06 Sep 2018 00:02:35 +0200
ghostscript (9.20~dfsg-3.2+deb9u3) stretch-security; urgency=medium
* Multiple security issues, see Security Tracker for details
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 29 Aug 2018 21:17:15 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Mon, 10 Sep 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.20~dfsg-3.2+deb9u4
libgs9 9.20~dfsg-3.2+deb9u4
libgs9-common 9.20~dfsg-3.2+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.20~dfsg-3.2+deb9u4) stretch-security; urgency=medium
* Add additional patch for CVE-2018-16543
* Fix a regression introduced in a054156d425b4dbdaaa9fda4b5f1182b27598c2b,
see https://github.com/apple/cups/issues/5392
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 06 Sep 2018 00:02:35 +0200
ghostscript (9.20~dfsg-3.2+deb9u3) stretch-security; urgency=medium
* Multiple security issues, see Security Tracker for details
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 29 Aug 2018 21:17:15 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Sun, 09 Sep 2018 22:38:06 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.20~dfsg-3.2+deb9u4
libgs9 9.20~dfsg-3.2+deb9u4
libgs9-common 9.20~dfsg-3.2+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.20~dfsg-3.2+deb9u4) stretch-security; urgency=medium
* Add additional patch for CVE-2018-16543
* Fix a regression introduced in a054156d425b4dbdaaa9fda4b5f1182b27598c2b,
see https://github.com/apple/cups/issues/5392
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 06 Sep 2018 00:02:35 +0200
ghostscript (9.20~dfsg-3.2+deb9u3) stretch-security; urgency=medium
* Multiple security issues, see Security Tracker for details
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 29 Aug 2018 21:17:15 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Sat, 08 Sep 2018 22:38:04 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ghostscript 9.20~dfsg-3.2+deb9u4
libgs9 9.20~dfsg-3.2+deb9u4
libgs9-common 9.20~dfsg-3.2+deb9u4
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour ghostscript (ghostscript libgs9 libgs9-common) ---
ghostscript (9.20~dfsg-3.2+deb9u4) stretch-security; urgency=medium
* Add additional patch for CVE-2018-16543
* Fix a regression introduced in a054156d425b4dbdaaa9fda4b5f1182b27598c2b,
see https://github.com/apple/cups/issues/5392
-- Moritz Mühlenhoff <jmm(a)debian.org> Thu, 06 Sep 2018 00:02:35 +0200
ghostscript (9.20~dfsg-3.2+deb9u3) stretch-security; urgency=medium
* Multiple security issues, see Security Tracker for details
-- Moritz Mühlenhoff <jmm(a)debian.org> Wed, 29 Aug 2018 21:17:15 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron