apticron report [Thu, 11 Jul 2019 18:49:12 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
nonagon.federez.net
[ 185.230.78.42 2a0c:700:0:23:67:e5ff:fee9:3 ]
The following packages are currently pending an upgrade:
debian-archive-keyring 2017.5+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour debian-archive-keyring ---
debian-archive-keyring (2017.5+deb9u1) stretch; urgency=medium
* Team upload.
[ Philipp Kern ]
* Remove Wheezy's keys (automatic and stable release).
(Closes: #901320)
[ Adam D. Barratt ]
* Add Vcs-* headers.
* Ensure fragments for Wheezy keys are removed.
[ Jonathan Wiltshire ]
* Add my own key to the team-members keyring
* Add Debian Stable Release key (10/buster) (ID: DCC9EFBF77E11517)
(Closes: #917536)
* Add Debian Archive Automatic Signing Key (10/buster)
(ID: BCDDDC30D7C23CBBABEE) and Debian Security Archive Automatic
Signing Key (10/buster) (ID: C5FF4DFAB270CAA96DFA)
(Closes: #917535)
-- Adam D. Barratt <adam(a)adam-barratt.org.uk> Sun, 07 Jul 2019 12:27:51 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on nonagon.federez.net
--
apticron
apticron report [Wed, 10 Jul 2019 18:49:12 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
nonagon.federez.net
[ 185.230.78.42 2a0c:700:0:23:67:e5ff:fee9:3 ]
The following packages are currently pending an upgrade:
debian-archive-keyring 2017.5+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour debian-archive-keyring ---
debian-archive-keyring (2017.5+deb9u1) stretch; urgency=medium
* Team upload.
[ Philipp Kern ]
* Remove Wheezy's keys (automatic and stable release).
(Closes: #901320)
[ Adam D. Barratt ]
* Add Vcs-* headers.
* Ensure fragments for Wheezy keys are removed.
[ Jonathan Wiltshire ]
* Add my own key to the team-members keyring
* Add Debian Stable Release key (10/buster) (ID: DCC9EFBF77E11517)
(Closes: #917536)
* Add Debian Archive Automatic Signing Key (10/buster)
(ID: BCDDDC30D7C23CBBABEE) and Debian Security Archive Automatic
Signing Key (10/buster) (ID: C5FF4DFAB270CAA96DFA)
(Closes: #917535)
-- Adam D. Barratt <adam(a)adam-barratt.org.uk> Sun, 07 Jul 2019 12:27:51 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on nonagon.federez.net
--
apticron
apticron report [Tue, 09 Jul 2019 18:49:09 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
nonagon.federez.net
[ 185.230.78.42 2a0c:700:0:23:67:e5ff:fee9:3 ]
The following packages are currently pending an upgrade:
debian-archive-keyring 2017.5+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour debian-archive-keyring ---
debian-archive-keyring (2017.5+deb9u1) stretch; urgency=medium
* Team upload.
[ Philipp Kern ]
* Remove Wheezy's keys (automatic and stable release).
(Closes: #901320)
[ Adam D. Barratt ]
* Add Vcs-* headers.
* Ensure fragments for Wheezy keys are removed.
[ Jonathan Wiltshire ]
* Add my own key to the team-members keyring
* Add Debian Stable Release key (10/buster) (ID: DCC9EFBF77E11517)
(Closes: #917536)
* Add Debian Archive Automatic Signing Key (10/buster)
(ID: BCDDDC30D7C23CBBABEE) and Debian Security Archive Automatic
Signing Key (10/buster) (ID: C5FF4DFAB270CAA96DFA)
(Closes: #917535)
-- Adam D. Barratt <adam(a)adam-barratt.org.uk> Sun, 07 Jul 2019 12:27:51 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on nonagon.federez.net
--
apticron
apticron report [Mon, 08 Jul 2019 18:49:17 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
nonagon.federez.net
[ 185.230.78.42 2a0c:700:0:23:67:e5ff:fee9:3 ]
The following packages are currently pending an upgrade:
debian-archive-keyring 2017.5+deb9u1
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour debian-archive-keyring ---
debian-archive-keyring (2017.5+deb9u1) stretch; urgency=medium
* Team upload.
[ Philipp Kern ]
* Remove Wheezy's keys (automatic and stable release).
(Closes: #901320)
[ Adam D. Barratt ]
* Add Vcs-* headers.
* Ensure fragments for Wheezy keys are removed.
[ Jonathan Wiltshire ]
* Add my own key to the team-members keyring
* Add Debian Stable Release key (10/buster) (ID: DCC9EFBF77E11517)
(Closes: #917536)
* Add Debian Archive Automatic Signing Key (10/buster)
(ID: BCDDDC30D7C23CBBABEE) and Debian Security Archive Automatic
Signing Key (10/buster) (ID: C5FF4DFAB270CAA96DFA)
(Closes: #917535)
-- Adam D. Barratt <adam(a)adam-barratt.org.uk> Sun, 07 Jul 2019 12:27:51 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on nonagon.federez.net
--
apticron
apticron report [Wed, 03 Jul 2019 18:49:11 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
nonagon.federez.net
[ 185.230.78.42 2a0c:700:0:23:67:e5ff:fee9:3 ]
The following packages are currently pending an upgrade:
libexpat1 2.2.0-2+deb9u2
libexpat1-dev 2.2.0-2+deb9u2
libgssapi-krb5-2 1.17-3
libk5crypto3 1.17-3
libkrb5-3 1.17-3
libkrb5support0 1.17-3
libssl1.0.2 1.0.2s-1~deb9u1
openssl 1.1.0k-1~deb9u1
vim 2:8.0.0197-4+deb9u3
vim-common 2:8.0.0197-4+deb9u3
vim-nox 2:8.0.0197-4+deb9u3
vim-runtime 2:8.0.0197-4+deb9u3
vim-tiny 2:8.0.0197-4+deb9u3
xxd 2:8.0.0197-4+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour expat (libexpat1 libexpat1-dev) ---
expat (2.2.0-2+deb9u2) stretch-security; urgency=high
* Fix extraction of namespace prefix from XML name (CVE-2018-20843)
(closes: #931031).
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Thu, 27 Jun 2019 19:10:58 +0000
--- Modifications pour vim (vim vim-common vim-nox vim-runtime vim-tiny xxd) ---
vim (2:8.0.0197-4+deb9u3) stretch-security; urgency=medium
* Backport patch 8.1.0067 to fix loss of syntax highlighting (Closes: #930718)
+ 8.1.0067: syntax highlighting not working when re-entering a buffer
-- James McCoy <jamessan(a)debian.org> Fri, 21 Jun 2019 00:10:35 -0400
vim (2:8.0.0197-4+deb9u2) stretch-security; urgency=high
* Backport patches to address CVE-2019-12735 (Closes: #930020)
+ 8.0.0649: when opening a help file the filetype is set several times
+ 8.0.0651: build failure without the auto command feature
+ 8.1.0066: nasty autocommand causes using freed memory
+ 8.1.0177: defining function in sandbox is inconsistent
+ 8.1.0189: function defined in sandbox not tested
+ 8.1.0205: invalid memory access with invalid modeline
+ 8.1.0206: duplicate test function name
+ 8.1.0208: file left behind after running individual test
+ 8.1.0506: modelinen test fails when run by root
+ 8.1.0538: evaluating a modeline might invoke using a shell command
+ 8.1.0539: cannot build without the sandbox
+ 8.1.0540: may evaluate insecure value when appending to option
+ 8.1.0544: setting 'filetype' in a modeline causes an error
+ 8.1.0546: modeline test with keymap fails
+ 8.1.0547: modeline test with keymap still fails
+ 8.1.0613: when executing an insecure function the secure flag is stuck
+ 8.1.1046: the "secure" variable is used inconsistently
+ 8.1.1365: source command doesn't check for the sandbox
+ 8.1.1366: using expressions in a modeline is unsafe
+ 8.1.1367: can set 'modelineexpr' in modeline
+ 8.1.1368: modeline test fails with python but without pythonhome
+ 8.1.1382: error when editing test files
+ 8.1.1401: misspelled mkspellmem and makespellmem
* gbp.conf: Set debian-branch to debian/stretch
* gbp.conf: Set upstream-tag to v%(version)s
-- James McCoy <jamessan(a)debian.org> Sun, 16 Jun 2019 13:06:40 -0400
--- Modifications pour krb5 (libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.17-3) unstable; urgency=medium
* Fix memory leak in replay cache type none
* Merge in two upstream documentation changes
-- Sam Hartman <hartmans(a)debian.org> Tue, 18 Jun 2019 08:00:29 -0400
--- Modifications pour openssl ---
openssl (1.1.0k-1~deb9u1) stretch-security; urgency=medium
* Import 1.1.0k
- CVE-2019-1543 (Prevent over long nonces in ChaCha20-Poly1305)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Wed, 26 Jun 2019 18:59:20 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2s-1~deb9u1) stretch-security; urgency=medium
* New upstream version
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Wed, 26 Jun 2019 20:25:01 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on nonagon.federez.net
--
apticron
apticron report [Tue, 02 Jul 2019 18:49:15 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
nonagon.federez.net
[ 185.230.78.42 2a0c:700:0:23:67:e5ff:fee9:3 ]
The following packages are currently pending an upgrade:
libexpat1 2.2.0-2+deb9u2
libexpat1-dev 2.2.0-2+deb9u2
libgssapi-krb5-2 1.17-3
libk5crypto3 1.17-3
libkrb5-3 1.17-3
libkrb5support0 1.17-3
libssl1.0.2 1.0.2s-1~deb9u1
openssl 1.1.0k-1~deb9u1
vim 2:8.0.0197-4+deb9u3
vim-common 2:8.0.0197-4+deb9u3
vim-nox 2:8.0.0197-4+deb9u3
vim-runtime 2:8.0.0197-4+deb9u3
vim-tiny 2:8.0.0197-4+deb9u3
xxd 2:8.0.0197-4+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour expat (libexpat1 libexpat1-dev) ---
expat (2.2.0-2+deb9u2) stretch-security; urgency=high
* Fix extraction of namespace prefix from XML name (CVE-2018-20843)
(closes: #931031).
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Thu, 27 Jun 2019 19:10:58 +0000
--- Modifications pour vim (vim vim-common vim-nox vim-runtime vim-tiny xxd) ---
vim (2:8.0.0197-4+deb9u3) stretch-security; urgency=medium
* Backport patch 8.1.0067 to fix loss of syntax highlighting (Closes: #930718)
+ 8.1.0067: syntax highlighting not working when re-entering a buffer
-- James McCoy <jamessan(a)debian.org> Fri, 21 Jun 2019 00:10:35 -0400
vim (2:8.0.0197-4+deb9u2) stretch-security; urgency=high
* Backport patches to address CVE-2019-12735 (Closes: #930020)
+ 8.0.0649: when opening a help file the filetype is set several times
+ 8.0.0651: build failure without the auto command feature
+ 8.1.0066: nasty autocommand causes using freed memory
+ 8.1.0177: defining function in sandbox is inconsistent
+ 8.1.0189: function defined in sandbox not tested
+ 8.1.0205: invalid memory access with invalid modeline
+ 8.1.0206: duplicate test function name
+ 8.1.0208: file left behind after running individual test
+ 8.1.0506: modelinen test fails when run by root
+ 8.1.0538: evaluating a modeline might invoke using a shell command
+ 8.1.0539: cannot build without the sandbox
+ 8.1.0540: may evaluate insecure value when appending to option
+ 8.1.0544: setting 'filetype' in a modeline causes an error
+ 8.1.0546: modeline test with keymap fails
+ 8.1.0547: modeline test with keymap still fails
+ 8.1.0613: when executing an insecure function the secure flag is stuck
+ 8.1.1046: the "secure" variable is used inconsistently
+ 8.1.1365: source command doesn't check for the sandbox
+ 8.1.1366: using expressions in a modeline is unsafe
+ 8.1.1367: can set 'modelineexpr' in modeline
+ 8.1.1368: modeline test fails with python but without pythonhome
+ 8.1.1382: error when editing test files
+ 8.1.1401: misspelled mkspellmem and makespellmem
* gbp.conf: Set debian-branch to debian/stretch
* gbp.conf: Set upstream-tag to v%(version)s
-- James McCoy <jamessan(a)debian.org> Sun, 16 Jun 2019 13:06:40 -0400
--- Modifications pour krb5 (libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.17-3) unstable; urgency=medium
* Fix memory leak in replay cache type none
* Merge in two upstream documentation changes
-- Sam Hartman <hartmans(a)debian.org> Tue, 18 Jun 2019 08:00:29 -0400
--- Modifications pour openssl ---
openssl (1.1.0k-1~deb9u1) stretch-security; urgency=medium
* Import 1.1.0k
- CVE-2019-1543 (Prevent over long nonces in ChaCha20-Poly1305)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Wed, 26 Jun 2019 18:59:20 +0200
--- Modifications pour openssl1.0 (libssl1.0.2) ---
openssl1.0 (1.0.2s-1~deb9u1) stretch-security; urgency=medium
* New upstream version
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Wed, 26 Jun 2019 20:25:01 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on nonagon.federez.net
--
apticron
apticron report [Mon, 01 Jul 2019 18:49:14 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
nonagon.federez.net
[ 185.230.78.42 2a0c:700:0:23:67:e5ff:fee9:3 ]
The following packages are currently pending an upgrade:
libexpat1 2.2.0-2+deb9u2
libexpat1-dev 2.2.0-2+deb9u2
libgssapi-krb5-2 1.17-3
libk5crypto3 1.17-3
libkrb5-3 1.17-3
libkrb5support0 1.17-3
vim 2:8.0.0197-4+deb9u3
vim-common 2:8.0.0197-4+deb9u3
vim-nox 2:8.0.0197-4+deb9u3
vim-runtime 2:8.0.0197-4+deb9u3
vim-tiny 2:8.0.0197-4+deb9u3
xxd 2:8.0.0197-4+deb9u3
========================================================================
Package Details:
apt-listchanges : Lecture des fichiers de modifications (« changelog »)...
apt-listchanges : journaux des modifications (« changelogs »)
-------------------------------------------------------------
--- Modifications pour expat (libexpat1 libexpat1-dev) ---
expat (2.2.0-2+deb9u2) stretch-security; urgency=high
* Fix extraction of namespace prefix from XML name (CVE-2018-20843)
(closes: #931031).
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Thu, 27 Jun 2019 19:10:58 +0000
--- Modifications pour vim (vim vim-common vim-nox vim-runtime vim-tiny xxd) ---
vim (2:8.0.0197-4+deb9u3) stretch-security; urgency=medium
* Backport patch 8.1.0067 to fix loss of syntax highlighting (Closes: #930718)
+ 8.1.0067: syntax highlighting not working when re-entering a buffer
-- James McCoy <jamessan(a)debian.org> Fri, 21 Jun 2019 00:10:35 -0400
vim (2:8.0.0197-4+deb9u2) stretch-security; urgency=high
* Backport patches to address CVE-2019-12735 (Closes: #930020)
+ 8.0.0649: when opening a help file the filetype is set several times
+ 8.0.0651: build failure without the auto command feature
+ 8.1.0066: nasty autocommand causes using freed memory
+ 8.1.0177: defining function in sandbox is inconsistent
+ 8.1.0189: function defined in sandbox not tested
+ 8.1.0205: invalid memory access with invalid modeline
+ 8.1.0206: duplicate test function name
+ 8.1.0208: file left behind after running individual test
+ 8.1.0506: modelinen test fails when run by root
+ 8.1.0538: evaluating a modeline might invoke using a shell command
+ 8.1.0539: cannot build without the sandbox
+ 8.1.0540: may evaluate insecure value when appending to option
+ 8.1.0544: setting 'filetype' in a modeline causes an error
+ 8.1.0546: modeline test with keymap fails
+ 8.1.0547: modeline test with keymap still fails
+ 8.1.0613: when executing an insecure function the secure flag is stuck
+ 8.1.1046: the "secure" variable is used inconsistently
+ 8.1.1365: source command doesn't check for the sandbox
+ 8.1.1366: using expressions in a modeline is unsafe
+ 8.1.1367: can set 'modelineexpr' in modeline
+ 8.1.1368: modeline test fails with python but without pythonhome
+ 8.1.1382: error when editing test files
+ 8.1.1401: misspelled mkspellmem and makespellmem
* gbp.conf: Set debian-branch to debian/stretch
* gbp.conf: Set upstream-tag to v%(version)s
-- James McCoy <jamessan(a)debian.org> Sun, 16 Jun 2019 13:06:40 -0400
--- Modifications pour krb5 (libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.17-3) unstable; urgency=medium
* Fix memory leak in replay cache type none
* Merge in two upstream documentation changes
-- Sam Hartman <hartmans(a)debian.org> Tue, 18 Jun 2019 08:00:29 -0400
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on nonagon.federez.net
--
apticron