apticron report [Tue, 07 Apr 2015 16:44:07 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libgd2-xpm 2.0.36~rc1~dfsg-6.1+deb7u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour libgd2 (libgd2-xpm) ---
libgd2 (2.0.36~rc1~dfsg-6.1+deb7u1) wheezy-security; urgency=high
* Fix NULL pointer dereference when reading XPM files with a
crafted color table as per CVE-2014-2497 (Closes: #744719)
* Fix buffer read overflow when reading invalid GIF files
as per CVE-2014-9709
-- Alessandro Ghedini <ghedo(a)debian.org> Wed, 01 Apr 2015 15:50:38 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron
apticron report [Tue, 07 Apr 2015 17:38:13 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
arj 3.10.22-10+deb7u1
mailman 1:2.1.15-1+deb7u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour arj ---
arj (3.10.22-10+deb7u1) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team with patches from Guillem Jover
* Fix buffer overflow from size under user control.
This is causing free() on an invalid pointer.
Fixes: CVE-2015-2782 (Closes: #774015)
* Fix absolute path directory traversal.
Fixes: CVE-2015-0557 (Closes: #774435)
* Fix symlink directory traversal.
Fixes: CVE-2015-0556 (Closes: #774434)
-- Salvatore Bonaccorso <carnil(a)debian.org> Fri, 03 Apr 2015 20:21:46 +0200
--- Modifications pour mailman ---
mailman (1:2.1.15-1+deb7u1) wheezy-security; urgency=high
* Fix security issue: path traversal through local_part.
Affects installations which use an Exim or Postfix transport
instead of fixed aliases; attacker needs to be able to place
files on the local filesystem.
(CVE-2015-2775, Closes: 781626)
-- Thijs Kinkhorst <thijs(a)debian.org> Mon, 06 Apr 2015 18:17:34 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Tue, 07 Apr 2015 10:48:15 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
arj 3.10.22-10+deb7u1
libgd2-xpm 2.0.36~rc1~dfsg-6.1+deb7u1
mailman 1:2.1.15-1+deb7u1
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour arj ---
arj (3.10.22-10+deb7u1) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team with patches from Guillem Jover
* Fix buffer overflow from size under user control.
This is causing free() on an invalid pointer.
Fixes: CVE-2015-2782 (Closes: #774015)
* Fix absolute path directory traversal.
Fixes: CVE-2015-0557 (Closes: #774435)
* Fix symlink directory traversal.
Fixes: CVE-2015-0556 (Closes: #774434)
-- Salvatore Bonaccorso <carnil(a)debian.org> Fri, 03 Apr 2015 20:21:46 +0200
--- Modifications pour libgd2 (libgd2-xpm) ---
libgd2 (2.0.36~rc1~dfsg-6.1+deb7u1) wheezy-security; urgency=high
* Fix NULL pointer dereference when reading XPM files with a
crafted color table as per CVE-2014-2497 (Closes: #744719)
* Fix buffer read overflow when reading invalid GIF files
as per CVE-2014-9709
-- Alessandro Ghedini <ghedo(a)debian.org> Wed, 01 Apr 2015 15:50:38 +0200
--- Modifications pour mailman ---
mailman (1:2.1.15-1+deb7u1) wheezy-security; urgency=high
* Fix security issue: path traversal through local_part.
Affects installations which use an Exim or Postfix transport
instead of fixed aliases; attacker needs to be able to place
files on the local filesystem.
(CVE-2015-2775, Closes: 781626)
-- Thijs Kinkhorst <thijs(a)debian.org> Mon, 06 Apr 2015 18:17:34 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Tue, 31 Mar 2015 16:44:08 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
ldap-utils 2.4.31-2
libldap-2.4-2 2.4.31-2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openldap (ldap-utils libldap-2.4-2) ---
openldap (2.4.31-2) wheezy-security; urgency=high
* Team upload.
[ Ryan Tandy ]
* debian/slapd.init.ldif: Disallow modifying one's own entry by default,
except specific attributes. (CVE-2014-9713) (Closes: #761406)
* debian/slapd.{config,templates}: On upgrade, if an access rule begins with
"to * by self write", show a debconf note warning that it should be
changed.
* debian/slapd.README.debian: Add information about how to remove "to * by
self write" from existing ACLs.
* debian/po/*: Add translations of debconf warning.
* debian/patches/ITS8027-deref-reject-empty-attr-list.patch: Import upstream
patch to fix a crash when a search includes the Deref control with an
empty attribute list. (ITS#8027) (CVE-2015-1545) (Closes: #776988)
* debian/patches/ITS7723-fix-reference-counting.patch: Import upstream patch
to fix a crash in the rwm overlay when a search is immediately followed by
an unbind. (ITS#7723) (CVE-2013-4449) (Closes: #729367)
-- Luca Bruno <lucab(a)debian.org> Mon, 30 Mar 2015 10:03:58 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron
apticron report [Tue, 31 Mar 2015 17:38:12 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ldap-utils 2.4.31-2
libldap-2.4-2 2.4.31-2
slapd 2.4.31-2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openldap (ldap-utils libldap-2.4-2 slapd) ---
openldap (2.4.31-2) wheezy-security; urgency=high
* Team upload.
[ Ryan Tandy ]
* debian/slapd.init.ldif: Disallow modifying one's own entry by default,
except specific attributes. (CVE-2014-9713) (Closes: #761406)
* debian/slapd.{config,templates}: On upgrade, if an access rule begins with
"to * by self write", show a debconf note warning that it should be
changed.
* debian/slapd.README.debian: Add information about how to remove "to * by
self write" from existing ACLs.
* debian/po/*: Add translations of debconf warning.
* debian/patches/ITS8027-deref-reject-empty-attr-list.patch: Import upstream
patch to fix a crash when a search includes the Deref control with an
empty attribute list. (ITS#8027) (CVE-2015-1545) (Closes: #776988)
* debian/patches/ITS7723-fix-reference-counting.patch: Import upstream patch
to fix a crash in the rwm overlay when a search is immediately followed by
an unbind. (ITS#7723) (CVE-2013-4449) (Closes: #729367)
-- Luca Bruno <lucab(a)debian.org> Mon, 30 Mar 2015 10:03:58 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Tue, 31 Mar 2015 10:48:15 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
ldap-utils 2.4.31-2
libldap-2.4-2 2.4.31-2
libldap2-dev 2.4.31-2
slapd 2.4.31-2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour openldap (ldap-utils libldap-2.4-2 libldap2-dev slapd) ---
openldap (2.4.31-2) wheezy-security; urgency=high
* Team upload.
[ Ryan Tandy ]
* debian/slapd.init.ldif: Disallow modifying one's own entry by default,
except specific attributes. (CVE-2014-9713) (Closes: #761406)
* debian/slapd.{config,templates}: On upgrade, if an access rule begins with
"to * by self write", show a debconf note warning that it should be
changed.
* debian/slapd.README.debian: Add information about how to remove "to * by
self write" from existing ACLs.
* debian/po/*: Add translations of debconf warning.
* debian/patches/ITS8027-deref-reject-empty-attr-list.patch: Import upstream
patch to fix a crash when a search includes the Deref control with an
empty attribute list. (ITS#8027) (CVE-2015-1545) (Closes: #776988)
* debian/patches/ITS7723-fix-reference-counting.patch: Import upstream patch
to fix a crash in the rwm overlay when a search is immediately followed by
an unbind. (ITS#7723) (CVE-2013-4449) (Closes: #729367)
-- Luca Bruno <lucab(a)debian.org> Mon, 30 Mar 2015 10:03:58 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
/etc/cron.daily/duplicity-backup:
Exception in thread Thread-1 (most likely raised during interpreter shutdown):
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 552, in __bootstrap_inner
File "/usr/lib/python2.7/dist-packages/paramiko/transport.py", line 1574, in run
<type 'exceptions.AttributeError'>: 'NoneType' object has no attribute 'error'
apticron report [Sun, 29 Mar 2015 16:44:11 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
libapache2-mod-php5 5.4.39-0+deb7u2
php5 5.4.39-0+deb7u2
php5-cgi 5.4.39-0+deb7u2
php5-cli 5.4.39-0+deb7u2
php5-common 5.4.39-0+deb7u2
php5-curl 5.4.39-0+deb7u2
php5-gd 5.4.39-0+deb7u2
php5-intl 5.4.39-0+deb7u2
php5-pgsql 5.4.39-0+deb7u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour php5 (libapache2-mod-php5 php5 php5-cgi php5-cli php5-common php5-curl php5-gd php5-intl php5-pgsql) ---
php5 (5.4.39-0+deb7u2) wheezy-security; urgency=medium
* Fix segfault when using SoapClient::__setSoapHeader (Closes: #781125)
-- Ondřej Surý <ondrej(a)debian.org> Wed, 25 Mar 2015 09:23:26 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron