apticron report [Fri, 21 Apr 2017 00:38:20 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libicu52 52.1-8+deb8u5
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour icu (libicu52) ---
icu (52.1-8+deb8u5) jessie-security; urgency=high
* Backport upstream security fix for CVE-2017-7867 and CVE-2017-7868,
heap-buffer-overflow in utf8TextAccess.
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Mon, 17 Apr 2017 08:41:59 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
apticron report [Thu, 20 Apr 2017 00:38:18 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libicu52 52.1-8+deb8u5
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour icu (libicu52) ---
icu (52.1-8+deb8u5) jessie-security; urgency=high
* Backport upstream security fix for CVE-2017-7867 and CVE-2017-7868,
heap-buffer-overflow in utf8TextAccess.
-- Laszlo Boszormenyi (GCS) <gcs(a)debian.org> Mon, 17 Apr 2017 08:41:59 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron