apticron report [Sat, 07 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libxml2 2.8.0+dfsg1-7+wheezy3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour libxml2 ---
libxml2 (2.8.0+dfsg1-7+wheezy3) wheezy-security; urgency=high
* Do not fetch external parsed entities unless asked to do so. This
supplements the patch for CVE-2014-0191
* Fix regression introducedd by the patch fixing CVE-2014-3660
(Closes: #768089)
* Set urgency=high accordingly
-- Alessandro Ghedini <ghedo(a)debian.org> Tue, 03 Feb 2015 20:02:14 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Fri, 06 Feb 2015 16:38:09 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
ntp 1:4.2.6.p5+dfsg-2+deb7u2
ntpdate 1:4.2.6.p5+dfsg-2+deb7u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour ntp (ntp ntpdate) ---
ntp (1:4.2.6.p5+dfsg-2+deb7u2) wheezy-security; urgency=medium
* Fix CVE-2014-9297
* Fix CVE-2014-9298
-- Kurt Roeckx <kurt(a)roeckx.be> Wed, 04 Feb 2015 21:07:19 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Fri, 06 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
ntp 1:4.2.6.p5+dfsg-2+deb7u2
ntpdate 1:4.2.6.p5+dfsg-2+deb7u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour ntp (ntp ntpdate) ---
ntp (1:4.2.6.p5+dfsg-2+deb7u2) wheezy-security; urgency=medium
* Fix CVE-2014-9297
* Fix CVE-2014-9298
-- Kurt Roeckx <kurt(a)roeckx.be> Wed, 04 Feb 2015 21:07:19 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Wed, 04 Feb 2015 16:44:08 +0000]
========================================================================
apticron has detected that some packages need upgrading on:
baldrick
[ 138.231.142.239 2a01:240:fe3d:4:62:61ff:fe6c:6401 138.231.142.239 ]
[ 2a01:240:fe3d:4:62:61ff:fe6c:6401 ]
The following packages are currently pending an upgrade:
krb5-locales 1.10.1+dfsg-5+deb7u3
libgssapi-krb5-2 1.10.1+dfsg-5+deb7u3
libk5crypto3 1.10.1+dfsg-5+deb7u3
libkrb5-3 1.10.1+dfsg-5+deb7u3
libkrb5support0 1.10.1+dfsg-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (krb5-locales libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.10.1+dfsg-5+deb7u3) stable-security; urgency=high
* MITKRB5-SA-2015-001
- CVE-2014-5352: gss_process_context_token() incorrectly frees context
- CVE-2014-9421: kadmind doubly frees partial deserialization results
- CVE-2014-9422: kadmind incorrectly validates server principal name
- CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
-- Sam Hartman <hartmans(a)debian.org> Tue, 03 Feb 2015 10:50:31 -0500
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on baldrick
--
apticron
apticron report [Wed, 04 Feb 2015 16:38:10 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
krb5-locales 1.10.1+dfsg-5+deb7u3
libgssapi-krb5-2 1.10.1+dfsg-5+deb7u3
libk5crypto3 1.10.1+dfsg-5+deb7u3
libkrb5-3 1.10.1+dfsg-5+deb7u3
libkrb5support0 1.10.1+dfsg-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (krb5-locales libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.10.1+dfsg-5+deb7u3) stable-security; urgency=high
* MITKRB5-SA-2015-001
- CVE-2014-5352: gss_process_context_token() incorrectly frees context
- CVE-2014-9421: kadmind doubly frees partial deserialization results
- CVE-2014-9422: kadmind incorrectly validates server principal name
- CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
-- Sam Hartman <hartmans(a)debian.org> Tue, 03 Feb 2015 10:50:31 -0500
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Wed, 04 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
libgssapi-krb5-2 1.10.1+dfsg-5+deb7u3
libk5crypto3 1.10.1+dfsg-5+deb7u3
libkrb5-3 1.10.1+dfsg-5+deb7u3
libkrb5support0 1.10.1+dfsg-5+deb7u3
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour krb5 (libgssapi-krb5-2 libk5crypto3 libkrb5-3 libkrb5support0) ---
krb5 (1.10.1+dfsg-5+deb7u3) stable-security; urgency=high
* MITKRB5-SA-2015-001
- CVE-2014-5352: gss_process_context_token() incorrectly frees context
- CVE-2014-9421: kadmind doubly frees partial deserialization results
- CVE-2014-9422: kadmind incorrectly validates server principal name
- CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
-- Sam Hartman <hartmans(a)debian.org> Tue, 03 Feb 2015 10:50:31 -0500
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
apticron report [Tue, 03 Feb 2015 16:38:11 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libdatetime-timezone-perl 1:1.58-1+2015a
unzip 6.0-8+deb7u2
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour unzip ---
unzip (6.0-8+deb7u2) wheezy-security; urgency=high
* Security upload.
* CVE-2014-9636: Fix heap overflow. Ensure that compressed
and uncompressed block sizes match when using STORED method
in extract.c. Closes: #776589.
* CVE-2014-8139: Update patch. The old one was not right
and had regressions with executable jar files. Closes: #775640
-- Santiago Vila <sanvila(a)debian.org> Sun, 01 Feb 2015 23:48:28 +0100
--- Modifications pour libdatetime-timezone-perl ---
libdatetime-timezone-perl (1:1.58-1+2015a) stable-proposed-updates; urgency=medium
* Update to version 2015a of the Olson database.
-- gregor herrmann <gregoa(a)debian.org> Mon, 02 Feb 2015 12:21:23 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
apticron report [Tue, 03 Feb 2015 09:48:15 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
hexagon.federez.net
[ 5.39.82.35 2001:41d0:8:9423::1 5.39.82.35 2001:41d0:8:9423::1 ]
The following packages are currently pending an upgrade:
python-django 1.4.5-1+deb7u9
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour python-django ---
python-django (1.4.5-1+deb7u9) wheezy-security; urgency=high
* New upstream security release:
https://www.djangoproject.com/weblog/2015/jan/13/security/
- WSGI header spoofing via underscore/dash conflation (CVE-2015-0219)
- Possible XSS attack via user-supplied redirect URLs (CVE-2015-0220)
- Denial-of-service attack against django.views.static.serve
(CVE-2015-0221)
Closes: #775375
* Also include a fix for a regression introduced by the patch for
CVE-2015-0221: https://code.djangoproject.com/ticket/24158
-- Raphaël Hertzog <hertzog(a)debian.org> Wed, 28 Jan 2015 10:24:59 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on hexagon.federez.net
--
apticron
/etc/cron.daily/duplicity-backup:
BackendException: ssh connection to hexagon.federez.net:22 failed: timed out
BackendException: ssh connection to hexagon.federez.net:22 failed: timed out
BackendException: ssh connection to quigon.federez.net:22 failed: timed out
BackendException: ssh connection to quigon.federez.net:22 failed: timed out