Advertisement
Bienvenido a Squishdot Reportes Anuncios Debian Ciencia Linux
 principal
 nivel superior
 enviar artículo
 buscar
 administrar
 acerca de ...
 rdf
 rss
 main


Reportes!
Anuncios Posted by Jergas on Friday September 08, @12:30AM el 2006
from the de Recursos Humanos! dept.
Bueno! Nadie ha estado haciendo reportes! No crean que el hecho de que los demas no lo esten haciendo los exime (como sea que se escriba esa palabra).
Estoy harto de la responsabilidad de coordinar. Aqui estoy (uds. saben donde), buscando leer algo nuevo en el *--**&^ sitio, y preguntandome para que seguir con la faramaya (como sea que se escriba). Si uds. no pueden responsabilizarse por reportar, porque me voy a esforzar yo por seguir?

Se supone que tienen que cumplir con una cierta cantidad de trabajo a la semana; pero como siempre les digo, ya de perdida, reportar! Supongo que si estuvieran trabajando suficiente, reportarian con un cierto nivel de orgullo, o incluso felicidad.

pagina rosa | Respuesta de reporte  >

 

Related Links
  • Articles on Anuncios
  • Also by Jergas
  • Contact author
  • File Attachment
  • Click to download attachment IMG_0782.JPG
    2260KB (2314548 bytes)

  • The Fine Print: The following comments are owned by whoever posted them.
    ( Reply )

    Re: Reportes!
    by Victor Martinez on Friday September 08, @07:24AM
    Puesto que no he tenido tiempo, aqui va un reporte semanal complementario (whatever that means).

    8/9/2006
    apticron report [Fri, 08 Sep 2006 06:25:51 -0500]
    ==================================================
    ======================

    apticron has detected that some packages need upgrading
    on:

    janus

    The following packages are currently pending an upgrade:

    libgcc1 1:3.4.3-13sarge1
    ethereal 0.10.10-2sarge8
    ethereal-common 0.10.10-2sarge8

    ==================================================
    ======================

    Package Details:

    Reading changelogs...
    --- Changes for ethereal (ethereal ethereal-common) ---
    ethereal (0.10.10-2sarge8) stable-security; urgency=high

    * Non-maintainer upload by the Security Team
    * Memory exhaustion denial of service in Q.2391 dissector
    (CVE-2006-4333)

    -- Moritz Muehlenhoff <jmm@inutil.org> Wed, 6 Sep 2006
    21:53:29 +0000

    ethereal (0.10.10-2sarge7) stable-security; urgency=high

    * Non-maintainer upload by the Security Team
    * Fix a regression in the ASN1 decoder reported by Dann
    Frazier.
    * Backported fixes for several vulnerabilities:
    * Memory exhaustion denial of service in FC-FCS dissector
    (CVE-2006-3241)
    * Memory exhaustion denial of service in RSVP dissector
    (CVE-2006-3241)
    * Memory exhaustion denial of service in ISIS-LSP dissector
    (CVE-2006-3241)
    * Memory corruption denial of service in IrDA dissector
    (CVE-2006-3242)
    * Buffer overflow in SLIMP3 dissector (CVE-2006-3243)
    * Infinite loop denial of service in BER dissector
    (CVE-2006-3244)
    * Infinite loop denial of service in NCP dissector
    (CVE-2005-3246)
    * Infinite loop denial of service in RTnet dissector
    (CVE-2005-3246)
    * Memory exhaustion denial of service in SMB dissector
    (CVE-2006-3242)
    * Divide-through-Zero denial of service in X11 dissector
    (CVE-2005-3248)
    * Buffer overflow in AgentX dissector (CVE-2006-3243)
    * Memory corruption denial of service in IrDA dissector
    (CVE-2006-3249)
    * Memory corruption denial of service in CLNP dissector

    -- Moritz Muehlenhoff <jmm@debian.org> Wed, 23 Aug 2006
    22:03:08 +0000

    --- Changes for gcc-3.4 (libgcc1) ---
    gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high

    * Non-maintainer upload by the Security Team
    * Applied patch by Richard Guenther to prevent directory
    traversal
    [fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch,
    http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359]

    -- Martin Schulze <joey@infodrom.org> Fri, 4 Aug 2006
    14:50:09 +0200

    ==================================================
    ======================

    apticron report [Fri, 08 Sep 2006 06:29:19 -0500]
    ==================================================
    ======================

    apticron has detected that some packages need upgrading
    on:

    linux

    The following packages are currently pending an upgrade:

    tethereal 0.10.10-2sarge8
    ethereal-common 0.10.10-2sarge8

    ==================================================
    ======================

    Package Details:

    Reading changelogs...
    --- Changes for ethereal (tethereal ethereal-common) ---
    ethereal (0.10.10-2sarge8) stable-security; urgency=high

    * Non-maintainer upload by the Security Team
    * Memory exhaustion denial of service in Q.2391 dissector
    (CVE-2006-4333)

    -- Moritz Muehlenhoff <jmm@inutil.org> Wed, 6 Sep 2006
    21:53:29 +0000

    ethereal (0.10.10-2sarge7) stable-security; urgency=high

    * Non-maintainer upload by the Security Team
    * Fix a regression in the ASN1 decoder reported by Dann
    Frazier.
    * Backported fixes for several vulnerabilities:
    * Memory exhaustion denial of service in FC-FCS dissector
    (CVE-2006-3241)
    * Memory exhaustion denial of service in RSVP dissector
    (CVE-2006-3241)
    * Memory exhaustion denial of service in ISIS-LSP dissector
    (CVE-2006-3241)
    * Memory corruption denial of service in IrDA dissector
    (CVE-2006-3242)
    * Buffer overflow in SLIMP3 dissector (CVE-2006-3243)
    * Infinite loop denial of service in BER dissector
    (CVE-2006-3244)
    * Infinite loop denial of service in NCP dissector
    (CVE-2005-3246)
    * Infinite loop denial of service in RTnet dissector
    (CVE-2005-3246)
    * Memory exhaustion denial of service in SMB dissector
    (CVE-2006-3242)
    * Divide-through-Zero denial of service in X11 dissector
    (CVE-2005-3248)
    * Buffer overflow in AgentX dissector (CVE-2006-3243)
    * Memory corruption denial of service in IrDA dissector
    (CVE-2006-3249)
    * Memory corruption denial of service in CLNP dissector

    -- Moritz Muehlenhoff <jmm@debian.org> Wed, 23 Aug 2006
    22:03:08 +0000

    ==================================================
    ======================
    linux
    The following packages will be upgraded:
    ethereal-common tethereal
    2 upgraded, 0 newly installed, 0 to remove and 0 not
    upgraded.
    Need to get 0B/4620kB of archives.

    janus
    The following packages will be upgraded:
    ethereal ethereal-common libgcc1
    3 upgraded, 0 newly installed, 0 to remove and 0 not
    upgraded.
    Need to get 0B/5053kB of archives.

    7/9/2006
    Crear nuevo esquema de rotacion de respaldos de mysql,
    actualmente solo guardamos 24 horas, hacer uno de 5 dias.

    Prepar material.

    avalon:
    The following packages will be upgraded:
    ethereal-common libgcc1 libmysqlclient14 mysql-client-4.1
    mysql-common-4.1
    mysql-server-4.1 tethereal
    7 upgraded, 0 newly installed, 0 to remove and 0 not
    upgraded.

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1171-1
    security@debian.org
    http://www.debian.org/security/ Moritz
    Muehlenhoff
    September 7th, 2006
    http://www.debian.org/security/faq
    - --------------------------------------------------------------------------

    Package : ethereal
    Vulnerability : several
    Problem-Type : remote
    Debian-specific: no
    CVE ID : CVE-2006-4333 CVE-2005-3241
    CVE-2005-3242 CVE-2005-3243 CVE-2005-3244
    CVE-2005-3246 CVE-2005-3248
    Debian Bug : 384528 334880

    Several remote vulnerabilities have been discovered in the
    Ethereal network
    scanner, which may lead to the execution of arbitrary code.
    The Common
    Vulnerabilities and Exposures project identifies the following
    problems:

    CVE-2006-4333

    It was discovered that the Q.2391 dissector is vulnerable to
    denial
    of service caused by memory exhaustion.

    CVE-2005-3241

    It was discovered that the FC-FCS, RSVP and ISIS-LSP
    dissectors are
    vulnerable to denial of service caused by memory
    exhaustion.

    CVE-2005-3242

    It was discovered that the IrDA and SMB dissectors are
    vulnerable to
    denial of service caused by memory corruption.

    CVE-2005-3243

    It was discovered that the SLIMP3 and AgentX dissectors
    are vulnerable
    to code injection caused by buffer overflows.

    CVE-2005-3244

    It was discovered that the BER dissector is vulnerable to
    denial of
    service caused by an infinite loop.

    CVE-2005-3246

    It was discovered that the NCP and RTnet dissectors are
    vulnerable to
    denial of service caused by a null pointer dereference.

    CVE-2005-3248

    It was discovered that the X11 dissector is vulnerable denial
    of service
    caused by a division through zero.

    This update also fixes a 64 bit-specific regression in the
    ASN.1 decoder, which
    has been introduced in a previous DSA.

    For the stable distribution (sarge) these problems have been
    fixed in
    version 0.10.10-2sarge8.

    For the unstable distribution (sid) these problems have been
    fixed in
    version 0.99.2-5.1 of wireshark, the network sniffer formerly
    known as
    ethereal.

    We recommend that you upgrade your ethereal packages.

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1169-1
    security@debian.org
    http://www.debian.org/security/ Martin
    Schulze
    September 5th, 2006
    http://www.debian.org/security/faq
    - --------------------------------------------------------------------------

    Package : mysql-dfsg-4.1
    Vulnerability : several
    Problem type : remote
    Debian-specific: no
    CVE IDs : CVE-2006-4226 CVE-2006-4380
    BugTraq ID : 19559

    Several local vulnerabilities have been discovered in the
    MySQL
    database server. The Common Vulnerabilities and Exposures
    project
    identifies the following problems:

    CVE-2006-4226

    Michal Prokopiuk discovered that remote authenticated
    users are
    permitted to create and access a database if the lowercase
    spelling is the same as one they have been granted access
    to.

    CVE-2006-4380

    Beat Vontobel discovered that certain queries replicated to
    a
    slave could crash the client and thus terminate the
    replication.

    For the stable distribution (sarge) these problems have been
    fixed in
    version 4.1.11a-4sarge7. Version 4.0 is not affected by these
    problems.

    For the unstable distribution (sid) these problems have been
    fixed in
    version 5.0.24-3. The replication problem only exists in
    version 4.1.

    We recommend that you upgrade your mysql-server-4.1
    package.

    6/9/2006
    Trabajo previo para la migracion de BB a Moodle
    http://docs.moodle.org/en/Migration

    http://moodle.org/mod/forum/discuss.php?d=32049

    Se arreglo el script de inicio localservice
    update-rc localservice defaults (igual hay que pasarlo a 99)

    en linux es el script que inicia subversion en modo daemon e
    ifmonitor y en janus inicia ifmonitor.

    Junta -1.05pm=3:10pm
    Rectoria, Cursos / Ilce, UPN, Mesa de ayuda, posible migracion

    Nomas de esta semana, me falta claro como 3 meses que tengo regados en la palm, mis notas locales en janus y mis notas en casa. No me he podido sentar a pasarlas al zentrack.

    Un Saludo.
    [ Reply to this ]
    The Fine Print: The following comments are owned by whoever posted them.
    ( Reply )

    Powered by Zope  Squishdot Powered
      "Any system that depends on reliability is unreliable." -- Nogg's Postulate
    All trademarks and copyrights on this page are owned by their respective companies. Comments are owned by the Poster. The Rest ©1999 Butch Landingin.
    [ home | post article | search | admin ]