apticron report [Wed, 16 Dec 2015 23:38:17 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u4
bind9-host 1:9.9.5.dfsg-9+deb8u4
bind9utils 1:9.9.5.dfsg-9+deb8u4
dnsutils 1:9.9.5.dfsg-9+deb8u4
libbind9-90 1:9.9.5.dfsg-9+deb8u4
libcupsfilters1 1.0.61-5+deb8u3
libdns100 1:9.9.5.dfsg-9+deb8u4
libdns-export100 1:9.9.5.dfsg-9+deb8u4
libirs-export91 1:9.9.5.dfsg-9+deb8u4
libisc95 1:9.9.5.dfsg-9+deb8u4
libisccc90 1:9.9.5.dfsg-9+deb8u4
libisccfg90 1:9.9.5.dfsg-9+deb8u4
libisccfg-export90 1:9.9.5.dfsg-9+deb8u4
libisc-export95 1:9.9.5.dfsg-9+deb8u4
liblwres90 1:9.9.5.dfsg-9+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add patch to fix CVE-2015-8000.
CVE-2015-8000: Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted, triggering a REQUIRE
failure when those records were subsequently cached.
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 14 Dec 2015 20:02:04 +0100
--- Modifications pour cups-filters (libcupsfilters1) ---
cups-filters (1.0.61-5+deb8u3) jessie-security; urgency=high
* Backport upstream fixes to also consider the semicolon (';') as an illegal
shell escape character (CVE-2015-8560, Closes: #807930)
-- Didier Raboud <odyx(a)debian.org> Tue, 15 Dec 2015 13:23:43 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Wed, 16 Dec 2015 20:44:17 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick.crans.org
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
bind9-host 1:9.9.5.dfsg-9+deb8u4
dnsutils 1:9.9.5.dfsg-9+deb8u4
grub2 2.02~beta2-22+deb8u1
grub2-common 2.02~beta2-22+deb8u1
grub-common 2.02~beta2-22+deb8u1
grub-pc 2.02~beta2-22+deb8u1
grub-pc-bin 2.02~beta2-22+deb8u1
libbind9-90 1:9.9.5.dfsg-9+deb8u4
libdns100 1:9.9.5.dfsg-9+deb8u4
libdns-export100 1:9.9.5.dfsg-9+deb8u4
libirs-export91 1:9.9.5.dfsg-9+deb8u4
libisc95 1:9.9.5.dfsg-9+deb8u4
libisccc90 1:9.9.5.dfsg-9+deb8u4
libisccfg90 1:9.9.5.dfsg-9+deb8u4
libisccfg-export90 1:9.9.5.dfsg-9+deb8u4
libisc-export95 1:9.9.5.dfsg-9+deb8u4
liblwres90 1:9.9.5.dfsg-9+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9-host dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add patch to fix CVE-2015-8000.
CVE-2015-8000: Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted, triggering a REQUIRE
failure when those records were subsequently cached.
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 14 Dec 2015 20:02:04 +0100
--- Modifications pour grub2 (grub2 grub2-common grub-common grub-pc grub-pc-bin) ---
grub2 (2.02~beta2-22+deb8u1) jessie-security; urgency=high
* Non-maintainer upload.
* Fix CVE-2015-8370: buffer overflow when checking password entered during
bootup (Closes: #807614).
-- Santiago Ruano Rincón <santiagorr(a)riseup.net> Sat, 12 Dec 2015 20:18:02 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick.crans.org
--
apticron
apticron report [Wed, 16 Dec 2015 09:48:19 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u4
bind9-host 1:9.9.5.dfsg-9+deb8u4
bind9utils 1:9.9.5.dfsg-9+deb8u4
dnsutils 1:9.9.5.dfsg-9+deb8u4
libbind9-90 1:9.9.5.dfsg-9+deb8u4
libdns100 1:9.9.5.dfsg-9+deb8u4
libdns-export100 1:9.9.5.dfsg-9+deb8u4
libirs-export91 1:9.9.5.dfsg-9+deb8u4
libisc95 1:9.9.5.dfsg-9+deb8u4
libisccc90 1:9.9.5.dfsg-9+deb8u4
libisccfg90 1:9.9.5.dfsg-9+deb8u4
libisccfg-export90 1:9.9.5.dfsg-9+deb8u4
libisc-export95 1:9.9.5.dfsg-9+deb8u4
liblwres90 1:9.9.5.dfsg-9+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add patch to fix CVE-2015-8000.
CVE-2015-8000: Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted, triggering a REQUIRE
failure when those records were subsequently cached.
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 14 Dec 2015 20:02:04 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Tue, 15 Dec 2015 23:38:13 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u4
bind9-host 1:9.9.5.dfsg-9+deb8u4
bind9utils 1:9.9.5.dfsg-9+deb8u4
dnsutils 1:9.9.5.dfsg-9+deb8u4
libbind9-90 1:9.9.5.dfsg-9+deb8u4
libcupsfilters1 1.0.61-5+deb8u3
libdns100 1:9.9.5.dfsg-9+deb8u4
libdns-export100 1:9.9.5.dfsg-9+deb8u4
libirs-export91 1:9.9.5.dfsg-9+deb8u4
libisc95 1:9.9.5.dfsg-9+deb8u4
libisccc90 1:9.9.5.dfsg-9+deb8u4
libisccfg90 1:9.9.5.dfsg-9+deb8u4
libisccfg-export90 1:9.9.5.dfsg-9+deb8u4
libisc-export95 1:9.9.5.dfsg-9+deb8u4
liblwres90 1:9.9.5.dfsg-9+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add patch to fix CVE-2015-8000.
CVE-2015-8000: Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted, triggering a REQUIRE
failure when those records were subsequently cached.
-- Salvatore Bonaccorso <carnil(a)debian.org> Mon, 14 Dec 2015 20:02:04 +0100
--- Modifications pour cups-filters (libcupsfilters1) ---
cups-filters (1.0.61-5+deb8u3) jessie-security; urgency=high
* Backport upstream fixes to also consider the semicolon (';') as an illegal
shell escape character (CVE-2015-8560, Closes: #807930)
-- Didier Raboud <odyx(a)debian.org> Tue, 15 Dec 2015 13:23:43 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
phd start: Unable to start daemons because daemons are already running.
You can view running daemons with 'phd status'.
You can stop running daemons with 'phd stop'.
You can use 'phd restart' to stop all daemons before starting new daemons.
You can force daemons to start anyway with --force.