From - Sat Sep 26 19:10:05 2015
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <root@quoservers.eu>
X-Original-To: root@quoservers.eu
Delivered-To: root@quoservers.eu
Received: by lenny.quoservers.info (Postfix, from userid 1004)
	id C128B5FBED; Sat, 26 Sep 2015 14:45:21 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
	lenny.quoservers.info
X-Spam-Level: 
X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00,RP_MATCHES_RCVD
	autolearn=ham autolearn_force=no version=3.4.0
Received: from wraith.quoservers.eu (wraith.quoservers.eu [92.222.36.141])
	by lenny.quoservers.info (Postfix) with ESMTP id 8596D5F81A
	for <root@quoservers.eu>; Sat, 26 Sep 2015 14:45:18 +0300 (EEST)
Received: by wraith.quoservers.eu (Postfix, from userid 0)
	id EDC85C26; Sat, 26 Sep 2015 13:45:17 +0200 (CEST)
To: root@quoservers.eu
Subject: 4 Debian package update(s) for wraith.quoservers.eu
MIME-Version: 1.0
Content-type: text/plain; charset=UTF-8
Content-transfer-encoding: 8bit
Message-Id: <20150926114517.EDC85C26@wraith.quoservers.eu>
Date: Sat, 26 Sep 2015 13:45:17 +0200 (CEST)
From: root@quoservers.eu (root)

apticron report [Sat, 26 Sep 2015 13:45:15 +0200]
========================================================================

apticron has detected that some packages need upgrading on:

	wraith.quoservers.eu 
	[ 127.0.0.2 92.222.36.141 2001:41d0:52:500::122 92.222.36.141 ]
	[ 2001:41d0:52:500::122 ]

The following packages are currently pending an upgrade:

	libsasl2-2 2.1.26.dfsg1-13+deb8u1
	libsasl2-modules-db 2.1.26.dfsg1-13+deb8u1
	linux-libc-dev 3.16.7-ckt11-1+deb8u4
	rpcbind 0.2.1-6+deb8u1

========================================================================

Package Details:

Reading changelogs...
--- Changes for cyrus-sasl2 (libsasl2-2 libsasl2-modules-db) ---
cyrus-sasl2 (2.1.26.dfsg1-13+deb8u1) jessie-security; urgency=high

  * [CVE-2013-4122]: Handle NULL returns from glibc 2.17+ crypt()
    (Closes: #784112)

 -- Ondřej Surý <ondrej@debian.org>  Wed, 23 Sep 2015 14:35:31 +0200

--- Changes for rpcbind ---
rpcbind (0.2.1-6+deb8u1) jessie-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Add CVE-2015-7236.patch patch.
    CVE-2015-7236: Memory corruption in PMAP_CALLIT code leading to denial
    of service. (Closes: #799307)

 -- Salvatore Bonaccorso <carnil@debian.org>  Fri, 18 Sep 2015 18:45:15 +0200

--- Changes for linux (linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u4) jessie-security; urgency=medium

  * ipv6: addrconf: validate new MTU before applying it (CVE-2015-0272)
  * virtio-net: drop NETIF_F_FRAGLIST (CVE-2015-5156)
  * vhost: actually track log eventfd file (CVE-2015-6252)
  * aufs3: mmap: Fix races in madvise_remove() and sys_msync() (Closes: #796036)
  * RDS: verify the underlying transport exists before creating a connection
    (CVE-2015-6937)
  * vfs: Fix possible escape from mount namespace (CVE-2015-2925):
    - namei: lift (open-coded) terminate_walk() in follow_dotdot_rcu() into
      callers
    - dcache: Handle escaped paths in prepend_path
    - vfs: Test for and handle paths that are unreachable from their mnt_root

 -- Ben Hutchings <ben@decadent.org.uk>  Sat, 19 Sep 2015 15:07:53 +0200

========================================================================

You can perform the upgrade by issuing the command:

	apt-get dist-upgrade

as root on wraith.quoservers.eu

--
apticron
From - Sat Sep 26 19:10:05 2015
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <root@quoservers.info>
X-Original-To: root
Delivered-To: root@quoservers.info
Received: by lenny.quoservers.info (Postfix, from userid 0)
	id 852A46105D; Sat, 26 Sep 2015 16:03:20 +0300 (EEST)
To: root@quoservers.info
Subject: 7 Debian package update(s) for lenny.quoservers.info
MIME-Version: 1.0
Content-type: text/plain; charset=UTF-8
Content-transfer-encoding: 8bit
Message-Id: <20150926130320.852A46105D@lenny.quoservers.info>
Date: Sat, 26 Sep 2015 16:03:20 +0300 (EEST)
From: root@quoservers.info (root)

apticron report [Sat, 26 Sep 2015 16:03:16 +0300]
========================================================================

apticron has detected that some packages need upgrading on:

	lenny.quoservers.info 
	[ 213.157.87.66 2001:14b8:1d4:98c::2:9 2001:14b8:1d4:98c::2:8 ]
	[ 2001:14b8:1d4:98c::2:7 2001:14b8:1d4:98c::2:6 ]
	[ 2001:14b8:1d4:98c::2:5 2001:14b8:1d4:98c::2:4 ]
	[ 2001:14b8:1d4:98c::2:3 2001:14b8:1d4:98c::2:2 ]
	[ 2001:14b8:1d4:98c::2:1 2001:14b8:1d4:98c::2:0 ]
	[ 2001:14b8:1d4:98c::1:9 2001:14b8:1d4:98c::1:8 ]
	[ 2001:14b8:1d4:98c::1:7 2001:14b8:1d4:98c::1:6 ]
	[ 2001:14b8:1d4:98c::1:5 2001:14b8:1d4:98c::1:4 ]
	[ 2001:14b8:1d4:98c::1:3 2001:14b8:1d4:98c::1:2 ]
	[ 2001:14b8:1d4:98c::1:1 2001:14b8:1d4:98c::1:0 2001:14b8:1d4:98c::9 ]
	[ 2001:14b8:1d4:98c::8 2001:14b8:1d4:98c::7 2001:14b8:1d4:98c::6 ]
	[ 2001:14b8:1d4:98c::5 2001:14b8:1d4:98c::4 2001:14b8:1d4:98c::3 ]
	[ 2001:14b8:1d4:98c::2 213.157.87.66 2001:14b8:1d4:98c::2:9 ]

The following packages are currently pending an upgrade:

	libsasl2-2 2.1.26.dfsg1-13+deb8u1
	libsasl2-modules 2.1.26.dfsg1-13+deb8u1
	libsasl2-modules-db 2.1.26.dfsg1-13+deb8u1
	linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u4
	linux-libc-dev 3.16.7-ckt11-1+deb8u4
	rpcbind 0.2.1-6+deb8u1
	sasl2-bin 2.1.26.dfsg1-13+deb8u1

========================================================================

Package Details:

Reading changelogs...
--- Changes for cyrus-sasl2 (libsasl2-2 libsasl2-modules libsasl2-modules-db sasl2-bin) ---
cyrus-sasl2 (2.1.26.dfsg1-13+deb8u1) jessie-security; urgency=high

  * [CVE-2013-4122]: Handle NULL returns from glibc 2.17+ crypt()
    (Closes: #784112)

 -- Ondřej Surý <ondrej@debian.org>  Wed, 23 Sep 2015 14:35:31 +0200

--- Changes for rpcbind ---
rpcbind (0.2.1-6+deb8u1) jessie-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Add CVE-2015-7236.patch patch.
    CVE-2015-7236: Memory corruption in PMAP_CALLIT code leading to denial
    of service. (Closes: #799307)

 -- Salvatore Bonaccorso <carnil@debian.org>  Fri, 18 Sep 2015 18:45:15 +0200

--- Changes for linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u4) jessie-security; urgency=medium

  * ipv6: addrconf: validate new MTU before applying it (CVE-2015-0272)
  * virtio-net: drop NETIF_F_FRAGLIST (CVE-2015-5156)
  * vhost: actually track log eventfd file (CVE-2015-6252)
  * aufs3: mmap: Fix races in madvise_remove() and sys_msync() (Closes: #796036)
  * RDS: verify the underlying transport exists before creating a connection
    (CVE-2015-6937)
  * vfs: Fix possible escape from mount namespace (CVE-2015-2925):
    - namei: lift (open-coded) terminate_walk() in follow_dotdot_rcu() into
      callers
    - dcache: Handle escaped paths in prepend_path
    - vfs: Test for and handle paths that are unreachable from their mnt_root

 -- Ben Hutchings <ben@decadent.org.uk>  Sat, 19 Sep 2015 15:07:53 +0200

========================================================================

You can perform the upgrade by issuing the command:

	apt-get dist-upgrade

as root on lenny.quoservers.info

--
apticron
From - Sat Sep 26 19:10:05 2015
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <root@quoservers.ovh>
X-Original-To: root@quoservers.ovh
Delivered-To: root@quoservers.ovh
Received: by lenny.quoservers.info (Postfix, from userid 1004)
	id 1247D61072; Sat, 26 Sep 2015 17:34:20 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
	lenny.quoservers.info
X-Spam-Level: 
X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00,RP_MATCHES_RCVD
	autolearn=ham autolearn_force=no version=3.4.0
Received: from beauharnois.quoservers.ovh (beauharnois.quoservers.ovh [198.50.147.211])
	by lenny.quoservers.info (Postfix) with ESMTP id 9B7AB5FBED
	for <root@quoservers.ovh>; Sat, 26 Sep 2015 17:34:16 +0300 (EEST)
Received: by beauharnois.quoservers.ovh (Postfix, from userid 0)
	id 6429013E; Sat, 26 Sep 2015 10:34:15 -0400 (EDT)
To: root@quoservers.ovh
Subject: 4 Debian package update(s) for beauharnois.quoservers.ovh
MIME-Version: 1.0
Content-type: text/plain; charset=UTF-8
Content-transfer-encoding: 8bit
Message-Id: <20150926143415.6429013E@beauharnois.quoservers.ovh>
Date: Sat, 26 Sep 2015 10:34:15 -0400 (EDT)
From: root@quoservers.ovh (root)

apticron report [Sat, 26 Sep 2015 10:34:13 -0400]
========================================================================

apticron has detected that some packages need upgrading on:

	beauharnois.quoservers.ovh 
	[ 127.0.0.2 198.50.147.211 2607:5300:100::35c 198.50.147.211 ]
	[ 2607:5300:100::35c ]

The following packages are currently pending an upgrade:

	libsasl2-2 2.1.26.dfsg1-13+deb8u1
	libsasl2-modules-db 2.1.26.dfsg1-13+deb8u1
	linux-libc-dev 3.16.7-ckt11-1+deb8u4
	rpcbind 0.2.1-6+deb8u1

========================================================================

Package Details:

Reading changelogs...
--- Changes for cyrus-sasl2 (libsasl2-2 libsasl2-modules-db) ---
cyrus-sasl2 (2.1.26.dfsg1-13+deb8u1) jessie-security; urgency=high

  * [CVE-2013-4122]: Handle NULL returns from glibc 2.17+ crypt()
    (Closes: #784112)

 -- Ondřej Surý <ondrej@debian.org>  Wed, 23 Sep 2015 14:35:31 +0200

--- Changes for rpcbind ---
rpcbind (0.2.1-6+deb8u1) jessie-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Add CVE-2015-7236.patch patch.
    CVE-2015-7236: Memory corruption in PMAP_CALLIT code leading to denial
    of service. (Closes: #799307)

 -- Salvatore Bonaccorso <carnil@debian.org>  Fri, 18 Sep 2015 18:45:15 +0200

--- Changes for linux (linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u4) jessie-security; urgency=medium

  * ipv6: addrconf: validate new MTU before applying it (CVE-2015-0272)
  * virtio-net: drop NETIF_F_FRAGLIST (CVE-2015-5156)
  * vhost: actually track log eventfd file (CVE-2015-6252)
  * aufs3: mmap: Fix races in madvise_remove() and sys_msync() (Closes: #796036)
  * RDS: verify the underlying transport exists before creating a connection
    (CVE-2015-6937)
  * vfs: Fix possible escape from mount namespace (CVE-2015-2925):
    - namei: lift (open-coded) terminate_walk() in follow_dotdot_rcu() into
      callers
    - dcache: Handle escaped paths in prepend_path
    - vfs: Test for and handle paths that are unreachable from their mnt_root

 -- Ben Hutchings <ben@decadent.org.uk>  Sat, 19 Sep 2015 15:07:53 +0200

========================================================================

You can perform the upgrade by issuing the command:

	apt-get dist-upgrade

as root on beauharnois.quoservers.ovh

--
apticron
From - Sat Sep 26 19:10:06 2015
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <root@quoservers.eu>
X-Original-To: root@quoservers.eu
Delivered-To: root@quoservers.eu
Received: by lenny.quoservers.info (Postfix, from userid 1004)
	id 367B561072; Sat, 26 Sep 2015 18:17:52 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
	lenny.quoservers.info
X-Spam-Level: 
X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00,RP_MATCHES_RCVD
	autolearn=ham autolearn_force=no version=3.4.0
Received: from virtualized.quoservers.eu (virtualized.quoservers.eu [46.101.195.212])
	by lenny.quoservers.info (Postfix) with ESMTP id 9E11E5FBED
	for <root@quoservers.eu>; Sat, 26 Sep 2015 18:17:47 +0300 (EEST)
Received: by virtualized.quoservers.eu (Postfix, from userid 0)
	id BFBF16074E; Sat, 26 Sep 2015 11:17:15 -0400 (EDT)
To: root@quoservers.eu
Subject: 6 Debian package update(s) for virtualized.quoservers.eu
MIME-Version: 1.0
Content-type: text/plain; charset=UTF-8
Content-transfer-encoding: 8bit
Message-Id: <20150926151715.BFBF16074E@virtualized.quoservers.eu>
Date: Sat, 26 Sep 2015 11:17:15 -0400 (EDT)
From: root@quoservers.eu (root)

apticron report [Sat, 26 Sep 2015 11:17:09 -0400]
========================================================================

apticron has detected that some packages need upgrading on:

	virtualized.quoservers.eu 
	[ 46.101.195.212 10.135.9.42 2a03:b0c0:3:d0::4b:9000 ]
	[ 2a03:b0c0:3:d0::4b:9001 46.101.195.212 2a03:b0c0:3:d0::4b:9000 ]

The following packages are currently pending an upgrade:

	libsasl2-2 2.1.26.dfsg1-13+deb8u1
	libsasl2-modules 2.1.26.dfsg1-13+deb8u1
	libsasl2-modules-db 2.1.26.dfsg1-13+deb8u1
	linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u4
	linux-libc-dev 3.16.7-ckt11-1+deb8u4
	rpcbind 0.2.1-6+deb8u1

========================================================================

Package Details:

Reading changelogs...
--- Changes for cyrus-sasl2 (libsasl2-2 libsasl2-modules libsasl2-modules-db) ---
cyrus-sasl2 (2.1.26.dfsg1-13+deb8u1) jessie-security; urgency=high

  * [CVE-2013-4122]: Handle NULL returns from glibc 2.17+ crypt()
    (Closes: #784112)

 -- Ondřej Surý <ondrej@debian.org>  Wed, 23 Sep 2015 14:35:31 +0200

--- Changes for rpcbind ---
rpcbind (0.2.1-6+deb8u1) jessie-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Add CVE-2015-7236.patch patch.
    CVE-2015-7236: Memory corruption in PMAP_CALLIT code leading to denial
    of service. (Closes: #799307)

 -- Salvatore Bonaccorso <carnil@debian.org>  Fri, 18 Sep 2015 18:45:15 +0200

--- Changes for linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u4) jessie-security; urgency=medium

  * ipv6: addrconf: validate new MTU before applying it (CVE-2015-0272)
  * virtio-net: drop NETIF_F_FRAGLIST (CVE-2015-5156)
  * vhost: actually track log eventfd file (CVE-2015-6252)
  * aufs3: mmap: Fix races in madvise_remove() and sys_msync() (Closes: #796036)
  * RDS: verify the underlying transport exists before creating a connection
    (CVE-2015-6937)
  * vfs: Fix possible escape from mount namespace (CVE-2015-2925):
    - namei: lift (open-coded) terminate_walk() in follow_dotdot_rcu() into
      callers
    - dcache: Handle escaped paths in prepend_path
    - vfs: Test for and handle paths that are unreachable from their mnt_root

 -- Ben Hutchings <ben@decadent.org.uk>  Sat, 19 Sep 2015 15:07:53 +0200

========================================================================

You can perform the upgrade by issuing the command:

	apt-get dist-upgrade

as root on virtualized.quoservers.eu

--
apticron
From - Sat Sep 26 19:10:06 2015
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <root@quoservers.info>
X-Original-To: root@quoservers.info
Delivered-To: root@quoservers.info
Received: by lenny.quoservers.info (Postfix, from userid 1004)
	id E95C361072; Sat, 26 Sep 2015 18:49:59 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
	lenny.quoservers.info
X-Spam-Level: 
X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00,RP_MATCHES_RCVD
	autolearn=ham autolearn_force=no version=3.4.0
Received: from virtual.quoservers.info (virtual.quoservers.info [88.148.163.57])
	by lenny.quoservers.info (Postfix) with ESMTP id 2500B5FBED
	for <root@quoservers.info>; Sat, 26 Sep 2015 18:49:56 +0300 (EEST)
Received: by virtual.quoservers.info (Postfix, from userid 0)
	id 09A848579A; Sat, 26 Sep 2015 18:50:43 +0300 (EEST)
To: root@quoservers.info
Subject: 9 Debian package update(s) for virtual.quoservers.info
MIME-Version: 1.0
Content-type: text/plain; charset=UTF-8
Content-transfer-encoding: 8bit
Message-Id: <20150926155044.09A848579A@virtual.quoservers.info>
Date: Sat, 26 Sep 2015 18:50:43 +0300 (EEST)
From: root@quoservers.info (root)

apticron report [Sat, 26 Sep 2015 18:50:28 +0300]
========================================================================

apticron has detected that some packages need upgrading on:

	virtual.quoservers.info 
	[ 88.148.163.57 2001:4078:3::1:0:20 2001:4078:3::1:0:19 ]
	[ 2001:4078:3::1:0:18 2001:4078:3::1:0:17 2001:4078:3::1:0:16 ]
	[ 2001:4078:3::1:0:15 2001:4078:3::1:0:14 2001:4078:3::1:0:13 ]
	[ 2001:4078:3::1:0:12 2001:4078:3::1:0:11 2001:4078:3::1:0:10 ]
	[ 2001:4078:3::1:0:9 2001:4078:3::1:0:8 2001:4078:3::1:0:7 ]
	[ 2001:4078:3::1:0:6 2001:4078:3::1:0:5 2001:4078:3::1:0:4 ]
	[ 2001:4078:3::1:0:3 2001:4078:3::1:0:2 2001:4078:3::1:0:1 ]
	[ 88.148.163.57 2001:4078:3::1:0:20 ]

The following packages are currently pending an upgrade:

	iceweasel 38.3.0esr-1~deb8u1
	libsasl2-2 2.1.26.dfsg1-13+deb8u1
	libsasl2-modules 2.1.26.dfsg1-13+deb8u1
	libsasl2-modules-db 2.1.26.dfsg1-13+deb8u1
	linux-image-3.16.0-4-amd64 3.16.7-ckt11-1+deb8u4
	linux-libc-dev 3.16.7-ckt11-1+deb8u4
	mesa-vdpau-drivers 10.3.2-1+deb8u1
	rpcbind 0.2.1-6+deb8u1
	vdpau-va-driver 0.7.4-dmo5

========================================================================

Package Details:

Reading changelogs...
--- Changes for cyrus-sasl2 (libsasl2-2 libsasl2-modules libsasl2-modules-db) ---
cyrus-sasl2 (2.1.26.dfsg1-13+deb8u1) jessie-security; urgency=high

  * [CVE-2013-4122]: Handle NULL returns from glibc 2.17+ crypt()
    (Closes: #784112)

 -- Ondřej Surý <ondrej@debian.org>  Wed, 23 Sep 2015 14:35:31 +0200

--- Changes for rpcbind ---
rpcbind (0.2.1-6+deb8u1) jessie-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Add CVE-2015-7236.patch patch.
    CVE-2015-7236: Memory corruption in PMAP_CALLIT code leading to denial
    of service. (Closes: #799307)

 -- Salvatore Bonaccorso <carnil@debian.org>  Fri, 18 Sep 2015 18:45:15 +0200

--- Changes for iceweasel ---
iceweasel (38.3.0esr-1~deb8u1) stable-security; urgency=medium

  * New upstream release.
  * Fixes for mfsa2015-{96,101,105-106,110-112}, also known as:
    CVE-2015-4500, CVE-2015-4506, CVE-2015-4511, CVE-2015-4509,
    CVE-2015-4519, CVE-2015-4520, CVE-2015-7174.

  * debian/rules, debian/removed_conffiles, debian/browser.postinst.in,
    debian/browser.postrm.in, debian/browser.preinst.in: Remove past conffiles.
    Closes: #795353.

  * config/system-headers: Fix build against latest freetype code. bz#1143411,
    bz#1194520.

 -- Mike Hommey <glandium@debian.org>  Wed, 23 Sep 2015 07:53:47 +0900

--- Changes for linux (linux-image-3.16.0-4-amd64 linux-libc-dev) ---
linux (3.16.7-ckt11-1+deb8u4) jessie-security; urgency=medium

  * ipv6: addrconf: validate new MTU before applying it (CVE-2015-0272)
  * virtio-net: drop NETIF_F_FRAGLIST (CVE-2015-5156)
  * vhost: actually track log eventfd file (CVE-2015-6252)
  * aufs3: mmap: Fix races in madvise_remove() and sys_msync() (Closes: #796036)
  * RDS: verify the underlying transport exists before creating a connection
    (CVE-2015-6937)
  * vfs: Fix possible escape from mount namespace (CVE-2015-2925):
    - namei: lift (open-coded) terminate_walk() in follow_dotdot_rcu() into
      callers
    - dcache: Handle escaped paths in prepend_path
    - vfs: Test for and handle paths that are unreachable from their mnt_root

 -- Ben Hutchings <ben@decadent.org.uk>  Sat, 19 Sep 2015 15:07:53 +0200

--- Changes for vdpau-video-dmo (vdpau-va-driver) ---
vdpau-video-dmo (0.7.4-dmo5) unstable; urgency=medium

  * Also add symlinks for radionsi and r600.

 -- Christian Marillat <marillat@deb-multimedia.org>  Fri, 08 Aug 2014 08:42:22 +0200

vdpau-video-dmo (0.7.4-dmo4) unstable; urgency=medium

  * Add a symlink for the nouveau_drv_video driver.

 -- Christian Marillat <marillat@deb-multimedia.org>  Thu, 07 Aug 2014 18:19:33 +0200

vdpau-video-dmo (0.7.4-dmo3) unstable; urgency=medium

  * New patch 04_sigfpe-crash to fix a possible SIGFPE.

 -- Christian Marillat <marillat@deb-multimedia.org>  Tue, 03 Jun 2014 17:57:57 +0200

vdpau-video-dmo (0.7.4-dmo2) unstable; urgency=medium

  * Must depends on vdpau-driver.
  * New patch 03_cast to fix FTBFS.

 -- Christian Marillat <marillat@deb-multimedia.org>  Thu, 29 May 2014 12:30:35 +0200

vdpau-video-dmo (0.7.4-dmo1) unstable; urgency=medium

  * New upstream release.

 -- Christian Marillat <marillat@deb-multimedia.org>  Wed, 25 Dec 2013 10:54:51 +0100

========================================================================

You can perform the upgrade by issuing the command:

	apt-get dist-upgrade

as root on virtual.quoservers.info

--
apticron
From - Sat Sep 26 19:10:06 2015
X-Mozilla-Status: 0001
X-Mozilla-Status2: 00000000
Return-Path: <quofan@quoservers.fi>
X-Original-To: cypher@quoservers.com
Delivered-To: cypher@quoservers.com
Received: by lenny.quoservers.info (Postfix, from userid 1004)
	id 5F60961072; Sat, 26 Sep 2015 19:00:45 +0300 (EEST)
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
	lenny.quoservers.info
X-Spam-Level: 
X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00
	autolearn=ham autolearn_force=no version=3.4.0
Received: from [192.168.2.30] (87-92-173-233.bb.dnainternet.fi [87.92.173.233])
	by lenny.quoservers.info (Postfix) with ESMTPSA id 6D0045FBED
	for <cypher@quoservers.com>; Sat, 26 Sep 2015 19:00:43 +0300 (EEST)
To: "Ari \"Angelmorphine\" Lammasniemi" <cypher@quoservers.com>
From: Terho Nikkila <quofan@quoservers.fi>
Subject: bnc asetukset
Organization: QuoServers
Message-ID: <5606C12A.6090703@quoservers.fi>
Date: Sat, 26 Sep 2015 19:00:42 +0300
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:38.0) Gecko/20100101
 Thunderbird/38.2.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

ircnet
server virtual.quoservers.info
port 31339
username cypher
password cyph3r3dp4ss

umbrellanet
server midian.quoservers.info
port 65535
username cypher
password cyph3r3dp4ss

stream-portal
server wraith.quoservers.eu
port 65535
username cypher
password cyph3r3dp4ss


Quo


-- 
Terho Nikkila
Taiteilijankatu 4 B 44
FI-28100 PORI
+358 44 290 2749
http://www.quoservers.fi
