apticron report [Sun, 22 Feb 2015 16:44:06 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
e2fslibs 1.42.5-1.1+deb7u1
e2fsprogs 1.42.5-1.1+deb7u1
libcomerr2 1.42.5-1.1+deb7u1
libss2 1.42.5-1.1+deb7u1
sudo 1.8.5p2-1+nmu2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour e2fsprogs (e2fslibs e2fsprogs libcomerr2 libss2) ---
e2fsprogs (1.42.5-1.1+deb7u1) stable-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix CVE-2015-0247: buffer overflow in ext file system open/close routines.
* Fix CVE-2015-1572: incomplete fix for CVE-2015-0247.
-- Michael Gilbert <mgilbert(a)debian.org> Sun, 22 Feb 2015 04:11:53 +0000
--- Modifications pour sudo ---
sudo (1.8.5p2-1+nmu2) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2014-9680-1.patch patch.
CVE-2014-9680: unsafe handling of TZ environment variable. (Closes: #772707)
* Add CVE-2014-9680-2.patch patch.
Documents that a leading ':' is skipped when checking TZ for a
fully-qualified path name.
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 15 Feb 2015 16:54:59 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron
apticron report [Sun, 22 Feb 2015 16:38:12 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
e2fslibs 1.42.5-1.1+deb7u1
e2fsprogs 1.42.5-1.1+deb7u1
libcomerr2 1.42.5-1.1+deb7u1
libss2 1.42.5-1.1+deb7u1
sudo 1.8.5p2-1+nmu2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour e2fsprogs (e2fslibs e2fsprogs libcomerr2 libss2) ---
e2fsprogs (1.42.5-1.1+deb7u1) stable-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix CVE-2015-0247: buffer overflow in ext file system open/close routines.
* Fix CVE-2015-1572: incomplete fix for CVE-2015-0247.
-- Michael Gilbert <mgilbert(a)debian.org> Sun, 22 Feb 2015 04:11:53 +0000
--- Modifications pour sudo ---
sudo (1.8.5p2-1+nmu2) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* Add CVE-2014-9680-1.patch patch.
CVE-2014-9680: unsafe handling of TZ environment variable. (Closes: #772707)
* Add CVE-2014-9680-2.patch patch.
Documents that a leading ':' is skipped when checking TZ for a
fully-qualified path name.
-- Salvatore Bonaccorso <carnil(a)debian.org> Sun, 15 Feb 2015 16:54:59 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Sun, 22 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
clamav 0.98.6+dfsg-0+deb7u1
clamav-base 0.98.6+dfsg-0+deb7u1
clamav-daemon 0.98.6+dfsg-0+deb7u1
clamav-freshclam 0.98.6+dfsg-0+deb7u1
e2fslibs 1.42.5-1.1+deb7u1
e2fsprogs 1.42.5-1.1+deb7u1
libclamav6 0.98.6+dfsg-0+deb7u1
libcomerr2 1.42.5-1.1+deb7u1
libss2 1.42.5-1.1+deb7u1
spamc 3.3.2-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour e2fsprogs (e2fslibs e2fsprogs libcomerr2 libss2) ---
e2fsprogs (1.42.5-1.1+deb7u1) stable-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix CVE-2015-0247: buffer overflow in ext file system open/close routines.
* Fix CVE-2015-1572: incomplete fix for CVE-2015-0247.
-- Michael Gilbert <mgilbert(a)debian.org> Sun, 22 Feb 2015 04:11:53 +0000
--- Modifications pour clamav (clamav clamav-base clamav-daemon clamav-freshclam libclamav6) ---
clamav (0.98.6+dfsg-0+deb7u1) stable; urgency=medium
[ Sebastian Andrzej Siewior ]
* New upstream bugfix release
- Library shared object revisions.
- Includes a patch from Sebastian Andrzej Siewior making ClamAV pid files
compatible with systemd.
- Fix a heap out of bounds condition with crafted Yoda's crypter files.
This issue was discovered by Felix Groebert of the Google Security Team.
- Fix a heap out of bounds condition with crafted mew packer files. This
issue was discovered by Felix Groebert of the Google Security Team.
- Fix a heap out of bounds condition with crafted upx packer files. This
issue was discovered by Kevin Szkudlapski of Quarkslab.
- Fix a heap out of bounds condition with crafted upack packer files. This
issue was discovered by Sebastian Andrzej Siewior. CVE-2014-9328.
- Compensate a crash due to incorrect compiler optimization when handling
crafted petite packer files. This issue was discovered by Sebastian
Andrzej Siewior.
* Update embedded libmspack from 0.4alpha to 0.5alpha (security bugfix
release)
* Don't leak return codes from libmspack to clamav API. (Closes: #774686).
[ Andreas Cadhalpun ]
* Drop Workaround-a-bug-in-libc-on-Hurd.patch, because hurd got fixed.
(see #752237)
* Update libclamav6: embedded-library lintian override for new libclamav6
and make it generic
* Update lintian-overrides for unused-file-paragraph-in-dep5-copyright.
* clamav-base.postinst: always chown /var/log/clamav and /var/lib/clamav
to clamav:clamav, not only on fresh installations. (Closes: #775400)
* debian/copyright: drop files from Files-Excluded only present in github
tarballs
* debian/rules: Remove useless --with-system-tommath --without-included-ltdl
configure options.
[ Scott Kitterman ]
* Stop stripping llvm when repacking the tarball as the system llvm on some
releases is too old to use
[ Javier Fernández-Sanguino ]
* Updated Spanish Debconf template translation (Closes: #773563)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Wed, 04 Feb 2015 21:09:25 +0100
clamav (0.98.5+dfsg-0+deb7u3) stable; urgency=medium
* add "mspack-fix-division-by-zero-in-chm-format-handling" to fix divide
by zero in the chm unpacked. Found & patch by Jakub Wilk (Closes: #774766).
* add "mspack-fix-overflow-in-pointer-arithmetic-on-32bit" to avoid overflow
in pointer arithmetic causing a segfault on 32bit (Closes: #774767).
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Wed, 07 Jan 2015 21:56:21 +0100
--- Modifications pour spamassassin (spamc) ---
spamassassin (3.3.2-5+deb7u3) stable; urgency=medium
* Remove references to ahbl.org DNSBL, which has ceased operation.
(Closes: #774768)
-- Noah Meyerhans <noahm(a)debian.org> Sat, 31 Jan 2015 13:32:21 -0800
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Sat, 21 Feb 2015 16:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
clamav 0.98.6+dfsg-0+deb7u1
clamav-base 0.98.6+dfsg-0+deb7u1
clamav-daemon 0.98.6+dfsg-0+deb7u1
clamav-freshclam 0.98.6+dfsg-0+deb7u1
libclamav6 0.98.6+dfsg-0+deb7u1
spamc 3.3.2-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour clamav (clamav clamav-base clamav-daemon clamav-freshclam libclamav6) ---
clamav (0.98.6+dfsg-0+deb7u1) stable; urgency=medium
[ Sebastian Andrzej Siewior ]
* New upstream bugfix release
- Library shared object revisions.
- Includes a patch from Sebastian Andrzej Siewior making ClamAV pid files
compatible with systemd.
- Fix a heap out of bounds condition with crafted Yoda's crypter files.
This issue was discovered by Felix Groebert of the Google Security Team.
- Fix a heap out of bounds condition with crafted mew packer files. This
issue was discovered by Felix Groebert of the Google Security Team.
- Fix a heap out of bounds condition with crafted upx packer files. This
issue was discovered by Kevin Szkudlapski of Quarkslab.
- Fix a heap out of bounds condition with crafted upack packer files. This
issue was discovered by Sebastian Andrzej Siewior. CVE-2014-9328.
- Compensate a crash due to incorrect compiler optimization when handling
crafted petite packer files. This issue was discovered by Sebastian
Andrzej Siewior.
* Update embedded libmspack from 0.4alpha to 0.5alpha (security bugfix
release)
* Don't leak return codes from libmspack to clamav API. (Closes: #774686).
[ Andreas Cadhalpun ]
* Drop Workaround-a-bug-in-libc-on-Hurd.patch, because hurd got fixed.
(see #752237)
* Update libclamav6: embedded-library lintian override for new libclamav6
and make it generic
* Update lintian-overrides for unused-file-paragraph-in-dep5-copyright.
* clamav-base.postinst: always chown /var/log/clamav and /var/lib/clamav
to clamav:clamav, not only on fresh installations. (Closes: #775400)
* debian/copyright: drop files from Files-Excluded only present in github
tarballs
* debian/rules: Remove useless --with-system-tommath --without-included-ltdl
configure options.
[ Scott Kitterman ]
* Stop stripping llvm when repacking the tarball as the system llvm on some
releases is too old to use
[ Javier Fernández-Sanguino ]
* Updated Spanish Debconf template translation (Closes: #773563)
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Wed, 04 Feb 2015 21:09:25 +0100
clamav (0.98.5+dfsg-0+deb7u3) stable; urgency=medium
* add "mspack-fix-division-by-zero-in-chm-format-handling" to fix divide
by zero in the chm unpacked. Found & patch by Jakub Wilk (Closes: #774766).
* add "mspack-fix-overflow-in-pointer-arithmetic-on-32bit" to avoid overflow
in pointer arithmetic causing a segfault on 32bit (Closes: #774767).
-- Sebastian Andrzej Siewior <sebastian(a)breakpoint.cc> Wed, 07 Jan 2015 21:56:21 +0100
--- Modifications pour spamassassin (spamc) ---
spamassassin (3.3.2-5+deb7u3) stable; urgency=medium
* Remove references to ahbl.org DNSBL, which has ceased operation.
(Closes: #774768)
-- Noah Meyerhans <noahm(a)debian.org> Sat, 31 Jan 2015 13:32:21 -0800
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Thu, 19 Feb 2015 16:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
bind9 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
bind9-host 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
bind9utils 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
dnsutils 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libbind9-80 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libdns88 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libisc84 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libisccc80 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libisccfg82 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
liblwres80 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-80 libdns88 libisc84 libisccc80 libisccfg82 liblwres80) ---
bind9 (1:9.8.4.dfsg.P1-6+nmu2+deb7u4) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2015-1349: avoid crash due to managed-key rollover.
Revoking a managed trust anchor and supplying an untrusted replacement
could cause named to crash with an assertion failure.
-- Salvatore Bonaccorso <carnil(a)debian.org> Wed, 18 Feb 2015 08:25:15 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Thu, 19 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
bind9 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
bind9-host 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
bind9utils 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
dnsutils 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libbind9-80 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libdns88 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libisc84 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libisccc80 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
libisccfg82 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
liblwres80 1:9.8.4.dfsg.P1-6+nmu2+deb7u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-80 libdns88 libisc84 libisccc80 libisccfg82 liblwres80) ---
bind9 (1:9.8.4.dfsg.P1-6+nmu2+deb7u4) wheezy-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2015-1349: avoid crash due to managed-key rollover.
Revoking a managed trust anchor and supplying an untrusted replacement
could cause named to crash with an assertion failure.
-- Salvatore Bonaccorso <carnil(a)debian.org> Wed, 18 Feb 2015 08:25:15 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
W: Une erreur s'est produite lors du contrôle de la signature. Le dépôt n'est pas mis à jour et les fichiers d'index précédents seront utilisés. Erreur de GPG : http://http.debian.net wheezy-backports Release : Les signatures suivantes ne sont pas valables : BADSIG 8B48AD6246925553 Debian Archive Automatic Signing Key (7.0/wheezy) <ftpmaster(a)debian.org>
W: Impossible de récupérer http://http.debian.net/debian/dists/wheezy-backports/Release
W: Le téléchargement de quelques fichiers d'index a échoué, ils ont été ignorés, ou les anciens ont été utilisés à la place.
rules: failed to run T_SPF_HELO_PERMERROR test, skipping:
(Can't locate object method "check_for_spf_helo_permerror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 19.
)
rules: failed to run T_SPF_TEMPERROR test, skipping:
(Can't locate object method "check_for_spf_temperror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 664.
)
rules: failed to run T_SPF_PERMERROR test, skipping:
(Can't locate object method "check_for_spf_permerror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 841.
)
rules: failed to run T_SPF_HELO_TEMPERROR test, skipping:
(Can't locate object method "check_for_spf_helo_temperror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 1226.
)
rules: failed to run T_SPF_HELO_PERMERROR test, skipping:
(Can't locate object method "check_for_spf_helo_permerror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 19.
)
rules: failed to run T_SPF_TEMPERROR test, skipping:
(Can't locate object method "check_for_spf_temperror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 664.
)
rules: failed to run T_SPF_PERMERROR test, skipping:
(Can't locate object method "check_for_spf_permerror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 841.
)
rules: failed to run T_SPF_HELO_TEMPERROR test, skipping:
(Can't locate object method "check_for_spf_helo_temperror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 1226.
)
rules: failed to run T_SPF_HELO_PERMERROR test, skipping:
(Can't locate object method "check_for_spf_helo_permerror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 19.
)
rules: failed to run T_SPF_TEMPERROR test, skipping:
(Can't locate object method "check_for_spf_temperror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 664.
)
rules: failed to run T_SPF_PERMERROR test, skipping:
(Can't locate object method "check_for_spf_permerror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 841.
)
rules: failed to run T_SPF_HELO_TEMPERROR test, skipping:
(Can't locate object method "check_for_spf_helo_temperror" via package "Mail::SpamAssassin::PerMsgStatus" at (eval 1189) line 1226.
)