/etc/cron.daily/duplicity-backup:
Exception in thread Thread-1 (most likely raised during interpreter shutdown):
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 552, in __bootstrap_inner
File "/usr/lib/python2.7/dist-packages/paramiko/transport.py", line 1574, in run
<type 'exceptions.AttributeError'>: 'NoneType' object has no attribute 'error'
W: Impossible de récupérer http://ftp.fr.debian.org/debian/dists/wheezy/Release.gpg Impossible d'initialiser la connexion à ftp.fr.debian.org: 80 (2a01:e0c:1:1598::2). - connect (101: Le réseau n'est pas accessible) [IP : 2a01:e0c:1:1598::2 80]
W: Impossible de récupérer http://ftp.fr.debian.org/debian/dists/wheezy-updates/Release.gpg Impossible d'initialiser la connexion à ftp.fr.debian.org: 80 (2a01:e0c:1:1598::2). - connect (101: Le réseau n'est pas accessible) [IP : 2a01:e0c:1:1598::2 80]
W: Le téléchargement de quelques fichiers d'index a échoué, ils ont été ignorés, ou les anciens ont été utilisés à la place.
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]
apticron report [Tue, 24 Feb 2015 09:48:16 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
linux-headers-3.2.0-4-amd64 3.2.65-1+deb7u2
linux-headers-3.2.0-4-common 3.2.65-1+deb7u2
linux-image-3.2.0-4-amd64 3.2.65-1+deb7u2
linux-libc-dev 3.2.65-1+deb7u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour linux (linux-headers-3.2.0-4-amd64 linux-headers-3.2.0-4-common linux-image-3.2.0-4-amd64 linux-libc-dev) ---
linux (3.2.65-1+deb7u2) wheezy-security; urgency=medium
* splice: Apply generic position and size checks to each write
(CVE-2014-7822)
* crypto: Fix unprivileged arbitrary module loading (CVE-2013-7421,
CVE-2014-9644)
- prefix module autoloading with "crypto-"
- include crypto- module prefix in template
- add missing crypto module aliases
* netfilter: conntrack: disable generic tracking for known protocols
(CVE-2014-8160)
* [amd64] vdso: Fix the vdso address randomization algorithm (CVE-2014-9585)
* [x86] KVM: x86 emulator: reject SYSENTER in compatibility mode on AMD
guests
* [x86] KVM: SYSENTER emulation is broken (CVE-2015-0239)
* vfs: move d_rcu from overlapping d_child to overlapping d_alias
* aufs: move d_rcu from overlapping d_child to overlapping d_alias
* vfs: deal with deadlock in d_walk() (CVE-2014-8559)
* vfs: read file_handle only once in handle_to_path (CVE-2015-1420)
* ASLR: fix stack randomization on 64-bit systems (CVE-2015-1593)
* vfs: Fix vfsmount_lock imbalance in path_init() (regression in 3.2.64)
* net: sctp: fix slab corruption from use after free on INIT collisions
(CVE-2015-1421)
* Fix regressions caused by CVE-2014-8133 fix:
- [amd64] tls, ldt: Stop checking lm in LDT_empty
- [x86] tls: Interpret an all-zero struct user_desc as "no segment"
* eCryptfs: Remove buggy and unnecessary write in file name decode
routine (CVE-2014-9683)
-- Ben Hutchings <ben(a)decadent.org.uk> Fri, 20 Feb 2015 02:39:08 +0000
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Mon, 23 Feb 2015 09:48:17 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libc6 2.13-38+deb7u8
libc6-dev 2.13-38+deb7u8
libc-bin 2.13-38+deb7u8
libc-dev-bin 2.13-38+deb7u8
locales 2.13-38+deb7u8
multiarch-support 2.13-38+deb7u8
nscd 2.13-38+deb7u8
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour eglibc (libc6 libc6-dev libc-bin libc-dev-bin locales multiarch-support nscd) ---
eglibc (2.13-38+deb7u8) wheezy-security; urgency=medium
* debian/patches/any/cvs-wscanf.diff: new patch from upstream to fix a
heap buffer overflow in wscanf (CVE-2015-1472, CVE-2015-1473). Closes:
#777197.
* debian/patches/any/cvs-vfprintf.diff: new patch from ustream to fix a
stack overflow in vfprintf (CVE-2012-3406). Closes: #681888.
* debian/patches/any/cvs-posix_spawn_file_actions_addopen.diff: new patch
from upstream to fix a vulnerability in posix_spawn_file_actions_addopen
(CVE-2014-4043). Closes: #751774.
* debian/patches/any/cvs-getnetbyname.diff: new patch from upstream to fix
an infinite loop in getnetbyname (CVE-2014-9402). Closes: #775572.
* debian/patches/any/cvs-getaddrinfo-idn.diff: new patch from upstream to
fix a invalid-free when using getaddrinfo with IDN (CVE-2013-7424).
-- Aurelien Jarno <aurel32(a)debian.org> Sun, 22 Feb 2015 09:49:50 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
razor2: razor2 check failed: Argument invalide razor2: razor2 had unknown error during get_server_info at /usr/share/perl5/Mail/SpamAssassin/Plugin/Razor2.pm line 187. at /usr/share/perl5/Mail/SpamAssassin/Plugin/Razor2.pm line 330.
ssh: connect to host hexagon.federez.net port 22: Network is unreachable
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(605) [Receiver=3.0.9]