principal
nivel superior
enviar artículo
buscar
administrar
acerca de ...
rdf
rss
main
|
Posted by Jergas on Friday September 08, @12:30AM el 2006
from the de Recursos Humanos! dept.
Bueno! Nadie ha estado haciendo reportes! No crean que el hecho de que los demas no lo esten haciendo los exime (como sea que se escriba esa palabra).
Estoy harto de la responsabilidad de coordinar. Aqui estoy (uds. saben donde), buscando leer algo nuevo en el *--**&^ sitio, y preguntandome para que seguir con la faramaya (como sea que se escriba). Si uds. no pueden responsabilizarse por reportar, porque me voy a esforzar yo por seguir?
Se supone que tienen que cumplir con una cierta cantidad de trabajo a la semana; pero como siempre les digo, ya de perdida, reportar! Supongo que si estuvieran trabajando suficiente, reportarian con un cierto nivel de orgullo, o incluso felicidad.
<
pagina rosa
|
Respuesta de reporte
>
|
|
The Fine Print: The following comments
are owned by whoever posted them.
( Reply )
|
Re: Reportes!
by Victor Martinez on Friday September 08, @07:24AM
|
Puesto que no he tenido tiempo, aqui va un reporte semanal complementario (whatever that means).
8/9/2006
apticron report [Fri, 08 Sep 2006 06:25:51 -0500]
==================================================
======================
apticron has detected that some packages need upgrading
on:
janus
The following packages are currently pending an upgrade:
libgcc1 1:3.4.3-13sarge1
ethereal 0.10.10-2sarge8
ethereal-common 0.10.10-2sarge8
==================================================
======================
Package Details:
Reading changelogs...
--- Changes for ethereal (ethereal ethereal-common) ---
ethereal (0.10.10-2sarge8) stable-security; urgency=high
* Non-maintainer upload by the Security Team
* Memory exhaustion denial of service in Q.2391 dissector
(CVE-2006-4333)
-- Moritz Muehlenhoff <jmm@inutil.org> Wed, 6 Sep 2006
21:53:29 +0000
ethereal (0.10.10-2sarge7) stable-security; urgency=high
* Non-maintainer upload by the Security Team
* Fix a regression in the ASN1 decoder reported by Dann
Frazier.
* Backported fixes for several vulnerabilities:
* Memory exhaustion denial of service in FC-FCS dissector
(CVE-2006-3241)
* Memory exhaustion denial of service in RSVP dissector
(CVE-2006-3241)
* Memory exhaustion denial of service in ISIS-LSP dissector
(CVE-2006-3241)
* Memory corruption denial of service in IrDA dissector
(CVE-2006-3242)
* Buffer overflow in SLIMP3 dissector (CVE-2006-3243)
* Infinite loop denial of service in BER dissector
(CVE-2006-3244)
* Infinite loop denial of service in NCP dissector
(CVE-2005-3246)
* Infinite loop denial of service in RTnet dissector
(CVE-2005-3246)
* Memory exhaustion denial of service in SMB dissector
(CVE-2006-3242)
* Divide-through-Zero denial of service in X11 dissector
(CVE-2005-3248)
* Buffer overflow in AgentX dissector (CVE-2006-3243)
* Memory corruption denial of service in IrDA dissector
(CVE-2006-3249)
* Memory corruption denial of service in CLNP dissector
-- Moritz Muehlenhoff <jmm@debian.org> Wed, 23 Aug 2006
22:03:08 +0000
--- Changes for gcc-3.4 (libgcc1) ---
gcc-3.4 (3.4.3-13sarge1) stable-security; urgency=high
* Non-maintainer upload by the Security Team
* Applied patch by Richard Guenther to prevent directory
traversal
[fastjar/jartool.c, debian/patches/CVE-2006-3619.dpatch,
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=28359]
-- Martin Schulze <joey@infodrom.org> Fri, 4 Aug 2006
14:50:09 +0200
==================================================
======================
apticron report [Fri, 08 Sep 2006 06:29:19 -0500]
==================================================
======================
apticron has detected that some packages need upgrading
on:
linux
The following packages are currently pending an upgrade:
tethereal 0.10.10-2sarge8
ethereal-common 0.10.10-2sarge8
==================================================
======================
Package Details:
Reading changelogs...
--- Changes for ethereal (tethereal ethereal-common) ---
ethereal (0.10.10-2sarge8) stable-security; urgency=high
* Non-maintainer upload by the Security Team
* Memory exhaustion denial of service in Q.2391 dissector
(CVE-2006-4333)
-- Moritz Muehlenhoff <jmm@inutil.org> Wed, 6 Sep 2006
21:53:29 +0000
ethereal (0.10.10-2sarge7) stable-security; urgency=high
* Non-maintainer upload by the Security Team
* Fix a regression in the ASN1 decoder reported by Dann
Frazier.
* Backported fixes for several vulnerabilities:
* Memory exhaustion denial of service in FC-FCS dissector
(CVE-2006-3241)
* Memory exhaustion denial of service in RSVP dissector
(CVE-2006-3241)
* Memory exhaustion denial of service in ISIS-LSP dissector
(CVE-2006-3241)
* Memory corruption denial of service in IrDA dissector
(CVE-2006-3242)
* Buffer overflow in SLIMP3 dissector (CVE-2006-3243)
* Infinite loop denial of service in BER dissector
(CVE-2006-3244)
* Infinite loop denial of service in NCP dissector
(CVE-2005-3246)
* Infinite loop denial of service in RTnet dissector
(CVE-2005-3246)
* Memory exhaustion denial of service in SMB dissector
(CVE-2006-3242)
* Divide-through-Zero denial of service in X11 dissector
(CVE-2005-3248)
* Buffer overflow in AgentX dissector (CVE-2006-3243)
* Memory corruption denial of service in IrDA dissector
(CVE-2006-3249)
* Memory corruption denial of service in CLNP dissector
-- Moritz Muehlenhoff <jmm@debian.org> Wed, 23 Aug 2006
22:03:08 +0000
==================================================
======================
linux
The following packages will be upgraded:
ethereal-common tethereal
2 upgraded, 0 newly installed, 0 to remove and 0 not
upgraded.
Need to get 0B/4620kB of archives.
janus
The following packages will be upgraded:
ethereal ethereal-common libgcc1
3 upgraded, 0 newly installed, 0 to remove and 0 not
upgraded.
Need to get 0B/5053kB of archives.
7/9/2006
Crear nuevo esquema de rotacion de respaldos de mysql,
actualmente solo guardamos 24 horas, hacer uno de 5 dias.
Prepar material.
avalon:
The following packages will be upgraded:
ethereal-common libgcc1 libmysqlclient14 mysql-client-4.1
mysql-common-4.1
mysql-server-4.1 tethereal
7 upgraded, 0 newly installed, 0 to remove and 0 not
upgraded.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1171-1
security@debian.org
http://www.debian.org/security/ Moritz
Muehlenhoff
September 7th, 2006
http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : ethereal
Vulnerability : several
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2006-4333 CVE-2005-3241
CVE-2005-3242 CVE-2005-3243 CVE-2005-3244
CVE-2005-3246 CVE-2005-3248
Debian Bug : 384528 334880
Several remote vulnerabilities have been discovered in the
Ethereal network
scanner, which may lead to the execution of arbitrary code.
The Common
Vulnerabilities and Exposures project identifies the following
problems:
CVE-2006-4333
It was discovered that the Q.2391 dissector is vulnerable to
denial
of service caused by memory exhaustion.
CVE-2005-3241
It was discovered that the FC-FCS, RSVP and ISIS-LSP
dissectors are
vulnerable to denial of service caused by memory
exhaustion.
CVE-2005-3242
It was discovered that the IrDA and SMB dissectors are
vulnerable to
denial of service caused by memory corruption.
CVE-2005-3243
It was discovered that the SLIMP3 and AgentX dissectors
are vulnerable
to code injection caused by buffer overflows.
CVE-2005-3244
It was discovered that the BER dissector is vulnerable to
denial of
service caused by an infinite loop.
CVE-2005-3246
It was discovered that the NCP and RTnet dissectors are
vulnerable to
denial of service caused by a null pointer dereference.
CVE-2005-3248
It was discovered that the X11 dissector is vulnerable denial
of service
caused by a division through zero.
This update also fixes a 64 bit-specific regression in the
ASN.1 decoder, which
has been introduced in a previous DSA.
For the stable distribution (sarge) these problems have been
fixed in
version 0.10.10-2sarge8.
For the unstable distribution (sid) these problems have been
fixed in
version 0.99.2-5.1 of wireshark, the network sniffer formerly
known as
ethereal.
We recommend that you upgrade your ethereal packages.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1169-1
security@debian.org
http://www.debian.org/security/ Martin
Schulze
September 5th, 2006
http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : mysql-dfsg-4.1
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2006-4226 CVE-2006-4380
BugTraq ID : 19559
Several local vulnerabilities have been discovered in the
MySQL
database server. The Common Vulnerabilities and Exposures
project
identifies the following problems:
CVE-2006-4226
Michal Prokopiuk discovered that remote authenticated
users are
permitted to create and access a database if the lowercase
spelling is the same as one they have been granted access
to.
CVE-2006-4380
Beat Vontobel discovered that certain queries replicated to
a
slave could crash the client and thus terminate the
replication.
For the stable distribution (sarge) these problems have been
fixed in
version 4.1.11a-4sarge7. Version 4.0 is not affected by these
problems.
For the unstable distribution (sid) these problems have been
fixed in
version 5.0.24-3. The replication problem only exists in
version 4.1.
We recommend that you upgrade your mysql-server-4.1
package.
6/9/2006
Trabajo previo para la migracion de BB a Moodle
http://docs.moodle.org/en/Migration
http://moodle.org/mod/forum/discuss.php?d=32049
Se arreglo el script de inicio localservice
update-rc localservice defaults (igual hay que pasarlo a 99)
en linux es el script que inicia subversion en modo daemon e
ifmonitor y en janus inicia ifmonitor.
Junta -1.05pm=3:10pm
Rectoria, Cursos / Ilce, UPN, Mesa de ayuda, posible migracion
Nomas de esta semana, me falta claro como 3 meses que tengo regados en la palm, mis notas locales en janus y mis notas en casa. No me he podido sentar a pasarlas al zentrack.
Un Saludo.
|
[
Reply to this ] |
The Fine Print: The following
comments are owned by whoever posted them.
( Reply )
|
|