news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
Hardware Canucks is pleased to present our review of Age of Conan Hardware Performance Review *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/8077-age-conan-hardware-performance-review.html *Quote:* *Age of Conan undoubtedly has stunning graphics. The trade off is that unlike others in its genre, playing on a toaster is not possible. Funcom has pegged the bare minimum requirements with hardware that just a few years ago would have been considered high end and even the recommended requirements rival that of touted system killer, Crysis. We will be looking at different requirements of the game along with what types of hardware upgrades should be taken into consideration in order to get the most out of the Age of Conan adventure.* We would appreciate it if you would post this in your news section. Regards, -- Hardware Canucks News Team
-
This is a multi-part message in MIME format... ------------=_1216255241-11275-7433 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2008:109 http://www.mandriva.com/security/ _______________________________________________________________________ Package : timezone Date : July 16, 2008 Affected: 2007.1, 2008.0, 2008.1, Corporate 3.0, Corporate 4.0, Multi Network Firewall 2.0 _______________________________________________________________________ Problem Description: Updated timezone packages are being provided for older Mandriva Linux systems that do not contain the new Daylight Savings Time information for 2008 and later for certain time zones. These updated packages contain the new information. _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.1: 8b336cee174f1e150cd0ff3320684b0d 2007.1/i586/timezone-2008d-1.1mdv2007.1.i586.rpm ede56b08f5dc2cb00558248e1ab409d1 2007.1/SRPMS/timezone-2008d-1.1mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: c970cdb3519f342c13e6f1439a29366f 2007.1/x86_64/timezone-2008d-1.1mdv2007.1.x86_64.rpm ede56b08f5dc2cb00558248e1ab409d1 2007.1/SRPMS/timezone-2008d-1.1mdv2007.1.src.rpm Mandriva Linux 2008.0: 0e66b69c5a9c8f5280fed6d4faf361ac 2008.0/i586/timezone-2008d-1.1mdv2008.0.i586.rpm 9d8cc658f034cf7a1477e61b934fadde 2008.0/i586/timezone-java-2008d-1.1mdv2008.0.i586.rpm ba3f1c916a233909078985e2dec431fc 2008.0/SRPMS/timezone-2008d-1.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: e5c9c93ffe71f5d27885e4eb8901f044 2008.0/x86_64/timezone-2008d-1.1mdv2008.0.x86_64.rpm 21c2db06976fe68ffaca7e8259762098 2008.0/x86_64/timezone-java-2008d-1.1mdv2008.0.x86_64.rpm ba3f1c916a233909078985e2dec431fc 2008.0/SRPMS/timezone-2008d-1.1mdv2008.0.src.rpm Mandriva Linux 2008.1: f7eb3d0dc21655273d45e24274b8f48d 2008.1/i586/timezone-2008d-1.1mdv2008.1.i586.rpm 7bb9b6282011e4610939503f83aa55c3 2008.1/i586/timezone-java-2008d-1.1mdv2008.1.i586.rpm 10dfab25ee040097238f5570dbcf99e5 2008.1/SRPMS/timezone-2008d-1.1mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 3234577cd0c1bed934e034a44564f2bd 2008.1/x86_64/timezone-2008d-1.1mdv2008.1.x86_64.rpm bf9b8ed54aa7ee87fdc11a107889d439 2008.1/x86_64/timezone-java-2008d-1.1mdv2008.1.x86_64.rpm 10dfab25ee040097238f5570dbcf99e5 2008.1/SRPMS/timezone-2008d-1.1mdv2008.1.src.rpm Corporate 3.0: ad960d3ce63f1fd70584c81b0fea6819 corporate/3.0/i586/timezone-2008d-0.1.C30mdk.i586.rpm 720aa10805f7d024af0b92ccc0db1cbf corporate/3.0/SRPMS/timezone-2008d-0.1.C30mdk.src.rpm Corporate 3.0/X86_64: 585406f3ef3f920f0695d13a804e4498 corporate/3.0/x86_64/timezone-2008d-0.1.C30mdk.x86_64.rpm 720aa10805f7d024af0b92ccc0db1cbf corporate/3.0/SRPMS/timezone-2008d-0.1.C30mdk.src.rpm Corporate 4.0: 1422f26f08123325ba161e1a3d5e5642 corporate/4.0/i586/timezone-2008d-0.1.20060mlcs4.i586.rpm 05229e74aa6f6f9b9c83ee78ac3e9a0a corporate/4.0/SRPMS/timezone-2008d-0.1.20060mlcs4.src.rpm Corporate 4.0/X86_64: 8c2cf85e43dff4a37ec535a25eee73b9 corporate/4.0/x86_64/timezone-2008d-0.1.20060mlcs4.x86_64.rpm 05229e74aa6f6f9b9c83ee78ac3e9a0a corporate/4.0/SRPMS/timezone-2008d-0.1.20060mlcs4.src.rpm Multi Network Firewall 2.0: 4d198d2b31ad102fed189e5a0e575aa9 mnf/2.0/i586/timezone-2008d-0.1.M20mdk.i586.rpm 2154e8e2a7b0cd7a359a54cb1247004d mnf/2.0/SRPMS/timezone-2008d-0.1.M20mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIfmjlmqjQ0CJFipgRAkEXAJ9krChuTT730cJFN9CcC/qJsRdqIgCfUH7O +8Slmua1shyz10DwR6pjWr0= =4mWT -----END PGP SIGNATURE----- ------------=_1216255241-11275-7433 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1216255241-11275-7433--
-
Everything You Need to Know About Dual Channel @ Hardware Secrets
news posted a topic in Upcoming News
Hi, We've just posted a new article on our website, Hardware Secrets. Title: Everything You Need to Know About Dual Channel Link: http://www.hardwaresecrets.com/article/133 Category: Tutorials Summary: Everything you need to know about dual channel technology, which is used to double memory transfer rate. Includes how it works, how to set it up, how to calculate transfer speeds and more. Here is a snippet: "The system RAM memory prevents the PC of achieving its maximum capable performance. This happens because the processor (CPU) is faster than RAM memory and usually it has to wait for the RAM memory to deliver data. During this wait time the CPU is idle, doing nothing (that's not absolutely true, but it fits in our explanation). In a perfect computer, the RAM memory would be as fast as the CPU. Dual channel is a technique used to double the communication speed between the memory controller and the RAM memory, and thus improving the system performance. In this tutorial we will explain everything you need to know about dual channel technology: how it works, how to set it up, how to calculate transfer speeds and more." A news post would be highly appreciated. Thanks in advance, Gabriel Torres Editor-in-Chief Hardware Secrets http://www.hardwaresecrets.com --------------------------------------------------------------------- -
Hello, - GamersHell.com Top Spin 3/Alone in the Dark/DBZ: Burst Limit/SoulCalibur IV Contests http://www.gamershell.com/news_55476.html - Age of Armor v1.0.0.31 Client http://www.gamershell.com/news_55470.html - New Games Released via GameTap #32 http://www.gamershell.com/news_55468.html Best Regards, GamersHell.com Staff =============================================================================
-
Hello, - Wario Land: The Shake Dimension E3 2008 Trailer/Screens http://www.gamershell.com/news_55472.html - Geometry Wars: Retro Evolved 2 E3 2008 Trailer #2 http://www.gamershell.com/news_55466.html - Guitar Hero World Tour E3 2008 Trailer #2 and Screens http://www.gamershell.com/news_55464.html Best Regards, GamersHell.com Staff =============================================================================
-
At Intel's Centrino 2 launch, one of the guests asked Mooly Eden, Intel's Vice President and General Manager of its Mobile Platforms Group, "technically this is the fifth generation of Centrino, so why is this one Centrino 2?" The answer, to paraphrase, was that Intel wanted the consumer to know that this is the new stuff. In some ways it is, and one can appreciate Intel's desire to make what amounts to a clean break from the previous four Centrino generations and start fresh. Read on for our notes from Intel's Centrino 2 launch event. http://techreport.com/articles.x/15131 Thanks, Geoff ---- Geoff Gasior The Tech Report http://techreport.com -- To unsubscribe from: TR-News, just follow this link:
-
Hello, - Cooking Guide: Can’t Decide What To Eat? E3 2008 Screens/Trailer http://www.gamershell.com/news_55462.html - Rhythm Heaven E3 2008 Screens/Trailer http://www.gamershell.com/news_55460.html - Kirby Super Star Ultra E3 2008 Screens/Artwork/Trailer http://www.gamershell.com/news_55458.html Best Regards, GamersHell.com Staff =============================================================================
-
Digit-Life Review: i3DSpeed, June 2008 Excerpt: "The i3DSpeed project is dedicated to informing you about performance of a large number of graphics cards under Vista. Traditionally, we offer you performance charts of popular graphics cards and inform about best price/performance deals in the market." Article: http://www.digit-life.com/articles3/i3dspeed/0608/i0608-video-p1.html A post on your website would be appreciated! To exchange news & reviews with Digit-Life, to change subscription address, or to unsubscribe write to cormac ( -at -) ixbt.com. If you post notes about Digit-Life reviews, but don't see me doing the same, please email me as well. Best regards, Artem Pavlenko, www.Digit-Life.com / iXBT.com
-
Hello, - Virgin PLAY and Atari Italy Sign Deal http://www.gamershell.com/news_55450.html - Matching Gems Free Full Game http://www.gamershell.com/news_55448.html - City of Heroes and City of Villains Merge Completed http://www.gamershell.com/news_55446.html - Moven Licensed by Guerrilla and Big Huge Games http://www.gamershell.com/news_55444.html - Neopets Puzzle Adventure E3 2008 Screens/Trailer http://www.gamershell.com/news_55442.html - We Love Golf! in Stores http://www.gamershell.com/news_55434.html - Silkroad Online Becomes GNGWC 2008 Official Game http://www.gamershell.com/news_55430.html Best Regards, GamersHell.com Staff =============================================================================
-
Hello, - Mystery Case Files: MillionHeir E3 2008 Screens/Trailer http://www.gamershell.com/news_55456.html - Pokémon Ranger: Shadows of Almia E3 2008 Screens/Artwork/Trailer http://www.gamershell.com/news_55454.html - LotRO Shadows of Angmar Book 14 Screens #2 http://www.gamershell.com/news_55452.html Best Regards, GamersHell.com Staff =============================================================================
-
P45 head-to-head: MSI P45 Platinum and Asus Maximus II Formula@ Madshrimps
news posted a topic in Upcoming News
Hello, P45 head-to-head: MSI P45 Platinum and Asus Maximus II Formula In this article we'll focus on what the MSI P45 Platinum and Asus Maximus II Formula can bring us in terms of performance, overclocking and the performance gained from overclocking. We'll be giving you basic pointers for obtaining better results and will spend a little time on the energy-saving technology used on these boards. http://www.madshrimps.be/gotoartik.php?articID=848 ____________________________________________________ Thank you in advance for posting, -
Hello, - Combat Mission Shock Force - Marines Gameplay Trailers http://www.gamershell.com/news_55438.html - Street Fighter IV E3 2008 Screens/Trailer http://www.gamershell.com/news_55440.html - Dark Void E3 2008 Screens/Trailers http://www.gamershell.com/news_55422.html Best Regards, GamersHell.com Staff =============================================================================
-
New RapidWeaver theme, Tagg by seyDesign - Published on 07/16/08 Well known theme developer, seyDoggy has recently released a new theme, Tagg, for RapidWeaver 4.0. Tagg is the first in the new Designer theme series that is aimed those who want simple, high style themes without a lot fuss over features. Tagg is a fun and informal web template that would be perfectly suited to a photography site, music site or technology blog. With modern styling, tag will certainly stand out in a crowd. Kitchener, Ontario Canada - Well known theme developer, seyDoggy has recently released a new theme, Tagg, for RapidWeaver 4.0. Tagg is the first in the new Designer theme series that is aimed those who want simple, high style themes without a lot fuss over features. Tagg is a fun and informal web template that would be perfectly suited to a photography site, music site or technology blog. With modern styling, tag will certainly stand out in a crowd. seyDesign is a division of seyDoggy Web and Graphic design and has been in operation developing and distributing cutting edge RapidWeaver themes since 2005. Known for developing the first commercially available theme with split navigation, seyDesign is responsible for continually pushing the limits of RapidWeaver. Pricing and Availability: At $8.24 CAD, Designer themes are also half the price of our regular Pro themes. seyDesign Website: http://www.seydesign.com Tagg RapidWeaver Theme: http://www.seydesign.com/themes/Tagg/ Live Preview: http://www.seydesign.com/showcase/Tagg/ Developer: http://www.seydoggy.com We are a small, yet internationally renowned web and graphic design outfit based in Kitchener, Ontario. Having worked with clients across the UK, Los Angeles, New York, Japan... it's safe to say that seyDoggy's work has touched every corner of the globe with an internet connection. We excel in web design, graphic arts, web themes, template design, photography and digital imagery. Through our daughter site, seyDesign.com, we design and sell thousands of RapidWeaver theme designs for the global market. We also offer consulting services for other companies looking to enter the web design industry or who don't want to hire full time staff to manage their own internet or intranet web systems. ### Adam Merrifield Proprietor 519-489-6033 info ( -at -) seydoggy.com ******* ******* *******
-
Wanted: The Video Game Announced and Screen, Flock E3 2008 Screens/Trailers
news posted a topic in Upcoming News
Hello, - Wanted: The Video Game Announced and Screen http://www.gamershell.com/news_55436.html - Flock E3 2008 Screens/Trailers http://www.gamershell.com/news_55432.html Best Regards, GamersHell.com Staff ============================================================================= -
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Hiper Osiris Aluminum ATX Case Link: http://www.techpowerup.com/reviews/Hiper/Osiris Brief: The Hiper Osiris is the company's newest offering in the crowded case market. It features numerous improvements over the Anubis, while coming in at a lower price point. The case also comes in black or silver and successfully improves on everything we criticized in our Anubis review.
-
Resident Evil 5 E3 2008 Trailer and Screens, MotoGP 08 E3 2008 Screens/Trailer
news posted a topic in Upcoming News
Hello, - MotoGP 08 E3 2008 Screens/Trailer http://www.gamershell.com/news_55428.html - Resident Evil 5 E3 2008 Trailer and Screens http://www.gamershell.com/news_55426.html Best Regards, GamersHell.com Staff ============================================================================= -
*** gtkmm 2.14: gtkmm 2.13 wraps new API in GTK+ 2.13. It will become the API/ABI-stable gtkmm 2.14 when GTK+ 2.14.0 is released. gtkmm 2.13 is API/ABI-compatibile with gtkmm 2.12, 2.10, 2.8, 2.6 and 2.4. It is a version of the gtkmm-2.4 API. gtkmm stays in-sync with GTK+ by following the official GNOME release schedule: http://www.gnome.org/start/unstable/ Bindings for the rest of the GNOME Platform are also available, and are also API-stable. http://www.gtkmm.org *** Changes gtkmm 2.13.4 (unstable); Gtk: * Added the ToolShell interface, though it is not used yet, to avoid breaking ABI. * AccelGroup: Added get_is_locked() and get_modifier_mask(). * CellRendererPixbuf: Added gicon property. * Clipboard: Added request_uris(), wait_for_uris(), wait_is_uris_available(). * Entry: Added get/set_overwrite_mode(). Added overwrite_mode and text_length properties. * Dialog: Reimplemented get_action_area() and get_content_area() with the new accessor functions. * Entry: Reimplemented get_text_length() with the new accessor functions. * HandleBox: Reimplemented is_child_detached() with * IconInfo: Added IconInfo(icon_theme, pixbuf) constructor * Image: Added a set() overload that takes a Gio::Icon. Added get_gicon() and gicon property. * Layout: Reimplemented get_bin_window() with the new accessor function. * Menu: Added get_accel_path() and get_monitor() and many new properties. * MenuItem: Added get_accel_path(). Added right-justified and submenu properties. * MessageDialog: Added get_image(). * Printer: Added get_default_page_size(). * PageSetup: Added load_from_file() and load_from_key_file(). Added create_from_file() and create_from_key_file() * Plug: Added get_embedded() and get_socket_window(). Added embedded and socket_window properties. * PrinterSettings: Added load_from_file() and load_from_key_file(). Added create_from_file() and create_from_key_file(). * ScaleButton: Added set/get_orientation(), get_plus_button(), get_minus_button(), get_popup(). Added orientation property. * SelectionData: Reimplemented get_data(), get_data_type(), get_format(), and get_display() with the new accessor functions. * ScaleButton: Added set/get_orientation(), get_plus_button(), get_minus_button(), get_popup(). Added orientation property. * Settings: Added many properties. * Socket: Added get_plug_window(). * StatusIcon: Added get_x11_window_id(). * Stock: Added PAGE_SETUP, PRINT_ERROR, PRINT_REPORT, PRINT_WARNING. * ToolItem: Added toolbar_reconfigured(). * Tooltip: Added set_icon_from_icon_name(). * TreeViewColumn: Added get_tree_view(). Deprecated the existing cell_get_size() and added another, because the cell_area parameter has changed to a const in gtk_tree_view_column_cell_get_size(). * Widget: Added damage_event signal. Added window property. Added get_snapshot(). Reimplemented get_allocation() and get_window() with the new C accessor functions instead of direct struct field access. *** Development
-
*** About glibmm glibmm is a C++ API for glib, used by gtkmm. glibmm 2.17 wraps new API in glib 2.17, including the gio library, and is API/ABI-compatibile with glibmm 2.16,2.14, 2.12, 2.10, 2.8, 2.6 and 2.4. It is a version of the glibmm-2.4 API. gtkmm and glibmm stay in-sync with GTK+ by following the official GNOME release schedule: http://www.gnome.org/start/unstable/ Bindings for the rest of the GNOME Platform are also available, and are also API-stable. http://www.gtkmm.org *** Development
-
Hello fellow editors! Tech ARP ( http://www.techarp.com/ <http://www.techarp.com/>'>http://www.techarp.com/> ) has just posted the NVIDIA nForce 200 SLI Processor Overview. Quote - "NVIDIA CEO Huang Jen-Hsun must have felt quite sick when Intel announced that they chose to go with ATI's CrossFire X technology in the recently-launched Intel 4 Series Express chipsets and the upcoming Intel X58 Express chipset, instead of NVIDIA's competing SLI technology. Of course, no one expects NVIDIA to take it lying down. As big as Intel is, NVIDIA thinks they can outsmart their erstwhile partners and they may have just done that with their newly-announced nForce 200 SLI processor. What is it?" Direct URL - http://www.techarp.com/showarticle.aspx?artno=567 <http://www.techarp.com/showarticle.aspx?artno=567> Logo URL - http://www.techarp.com/article/NVIDIA/nForce_200_SLI_Processor_Overview/ icon_big.jpg We would appreciate your help in getting the word out. Rest assured that we will reciprocate and post your news with all due haste. If you have any news, please feel free to send it to our news mailbox at news ( -at -) techarp.com. Thanks! Tech ARP http://www.techarp.com/ <http://www.techarp.com/>
-
Hi Editors, Tech-Reviews.co.uk has just posted a news review online. A link or inclusion of the review in a news post would be much appreciated. Title: Coolink Chillaramic Thermal Paste ( -at -) Tech-Reviews.co.uk Briefing: When we think of thermal paste, one product immediately pops into mind, Arctic Silver 5. This paste has always been the leader of the market, but now, many companies are competing with this paste to take throne. One such company striving to take the crown is Coolink with their Chillaramic paste. Read on to see if it lives up to the daddy of thermal pastes. Link: http://tech-reviews.co.uk/reviews/coolink-chillaramic/ Image SRC: http://tech-reviews.co.uk/images/thumbs/chillaramic.jpg Please continue to send us news at the provided address:
-
Hello, - Spider-Man: Web of Shadows E3 2008 Screens http://www.gamershell.com/news_55420.html - MEGA MAN 9 Announced and E3 2008 Screens/Trailer http://www.gamershell.com/news_55418.html - Marvel Ultimate Alliance 2: Fusion E3 2008 Trailer http://www.gamershell.com/news_55416.html Best Regards, GamersHell.com Staff =============================================================================
-
Hello, - Gran Turismo 5 Prologue E3 2008 Trailer and Screens http://www.gamershell.com/news_55414.html - Bionic Commando E3 2008 Screens/Trailer http://www.gamershell.com/news_55412.html - Age of Booty E3 2008 Screens/Trailers http://www.gamershell.com/news_55410.html Best Regards, GamersHell.com Staff =============================================================================
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2008:0597-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0597.html Issue date: 2008-07-16 CVE Names: CVE-2008-2785 CVE-2008-2933 ===================================================================== 1. Summary: Updated firefox packages that fix various security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious web site could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to these updated packages, which contain Firefox 3.0.1 that corrects these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 452204 - CVE-2008-2785 mozilla: CSS reference counter overflow (ZDI-CAN-349) 454697 - CVE-2008-2933 Firefox command line URL launches multi-tabs 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/devhelp-0.12-18.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-3.0.1-1.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9.0.1-1.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/yelp-2.16.0-20.el5.src.rpm i386: devhelp-0.12-18.el5.i386.rpm devhelp-debuginfo-0.12-18.el5.i386.rpm firefox-3.0.1-1.el5.i386.rpm firefox-debuginfo-3.0.1-1.el5.i386.rpm xulrunner-1.9.0.1-1.el5.i386.rpm xulrunner-debuginfo-1.9.0.1-1.el5.i386.rpm yelp-2.16.0-20.el5.i386.rpm yelp-debuginfo-2.16.0-20.el5.i386.rpm x86_64: devhelp-0.12-18.el5.i386.rpm devhelp-0.12-18.el5.x86_64.rpm devhelp-debuginfo-0.12-18.el5.i386.rpm devhelp-debuginfo-0.12-18.el5.x86_64.rpm firefox-3.0.1-1.el5.i386.rpm firefox-3.0.1-1.el5.x86_64.rpm firefox-debuginfo-3.0.1-1.el5.i386.rpm firefox-debuginfo-3.0.1-1.el5.x86_64.rpm xulrunner-1.9.0.1-1.el5.i386.rpm xulrunner-1.9.0.1-1.el5.x86_64.rpm xulrunner-debuginfo-1.9.0.1-1.el5.i386.rpm xulrunner-debuginfo-1.9.0.1-1.el5.x86_64.rpm yelp-2.16.0-20.el5.x86_64.rpm yelp-debuginfo-2.16.0-20.el5.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/devhelp-0.12-18.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9.0.1-1.el5.src.rpm i386: devhelp-debuginfo-0.12-18.el5.i386.rpm devhelp-devel-0.12-18.el5.i386.rpm xulrunner-debuginfo-1.9.0.1-1.el5.i386.rpm xulrunner-devel-1.9.0.1-1.el5.i386.rpm xulrunner-devel-unstable-1.9.0.1-1.el5.i386.rpm x86_64: devhelp-debuginfo-0.12-18.el5.i386.rpm devhelp-debuginfo-0.12-18.el5.x86_64.rpm devhelp-devel-0.12-18.el5.i386.rpm devhelp-devel-0.12-18.el5.x86_64.rpm xulrunner-debuginfo-1.9.0.1-1.el5.i386.rpm xulrunner-debuginfo-1.9.0.1-1.el5.x86_64.rpm xulrunner-devel-1.9.0.1-1.el5.i386.rpm xulrunner-devel-1.9.0.1-1.el5.x86_64.rpm xulrunner-devel-unstable-1.9.0.1-1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/devhelp-0.12-18.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-3.0.1-1.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-1.9.0.1-1.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/yelp-2.16.0-20.el5.src.rpm i386: devhelp-0.12-18.el5.i386.rpm devhelp-debuginfo-0.12-18.el5.i386.rpm devhelp-devel-0.12-18.el5.i386.rpm firefox-3.0.1-1.el5.i386.rpm firefox-debuginfo-3.0.1-1.el5.i386.rpm xulrunner-1.9.0.1-1.el5.i386.rpm xulrunner-debuginfo-1.9.0.1-1.el5.i386.rpm xulrunner-devel-1.9.0.1-1.el5.i386.rpm xulrunner-devel-unstable-1.9.0.1-1.el5.i386.rpm yelp-2.16.0-20.el5.i386.rpm yelp-debuginfo-2.16.0-20.el5.i386.rpm ia64: devhelp-0.12-18.el5.ia64.rpm devhelp-debuginfo-0.12-18.el5.ia64.rpm devhelp-devel-0.12-18.el5.ia64.rpm firefox-3.0.1-1.el5.ia64.rpm firefox-debuginfo-3.0.1-1.el5.ia64.rpm xulrunner-1.9.0.1-1.el5.ia64.rpm xulrunner-debuginfo-1.9.0.1-1.el5.ia64.rpm xulrunner-devel-1.9.0.1-1.el5.ia64.rpm xulrunner-devel-unstable-1.9.0.1-1.el5.ia64.rpm yelp-2.16.0-20.el5.ia64.rpm yelp-debuginfo-2.16.0-20.el5.ia64.rpm ppc: devhelp-0.12-18.el5.ppc.rpm devhelp-debuginfo-0.12-18.el5.ppc.rpm devhelp-devel-0.12-18.el5.ppc.rpm firefox-3.0.1-1.el5.ppc.rpm firefox-debuginfo-3.0.1-1.el5.ppc.rpm xulrunner-1.9.0.1-1.el5.ppc.rpm xulrunner-1.9.0.1-1.el5.ppc64.rpm xulrunner-debuginfo-1.9.0.1-1.el5.ppc.rpm xulrunner-debuginfo-1.9.0.1-1.el5.ppc64.rpm xulrunner-devel-1.9.0.1-1.el5.ppc.rpm xulrunner-devel-1.9.0.1-1.el5.ppc64.rpm xulrunner-devel-unstable-1.9.0.1-1.el5.ppc.rpm yelp-2.16.0-20.el5.ppc.rpm yelp-debuginfo-2.16.0-20.el5.ppc.rpm s390x: devhelp-0.12-18.el5.s390.rpm devhelp-0.12-18.el5.s390x.rpm devhelp-debuginfo-0.12-18.el5.s390.rpm devhelp-debuginfo-0.12-18.el5.s390x.rpm devhelp-devel-0.12-18.el5.s390.rpm devhelp-devel-0.12-18.el5.s390x.rpm firefox-3.0.1-1.el5.s390.rpm firefox-3.0.1-1.el5.s390x.rpm firefox-debuginfo-3.0.1-1.el5.s390.rpm firefox-debuginfo-3.0.1-1.el5.s390x.rpm xulrunner-1.9.0.1-1.el5.s390.rpm xulrunner-1.9.0.1-1.el5.s390x.rpm xulrunner-debuginfo-1.9.0.1-1.el5.s390.rpm xulrunner-debuginfo-1.9.0.1-1.el5.s390x.rpm xulrunner-devel-1.9.0.1-1.el5.s390.rpm xulrunner-devel-1.9.0.1-1.el5.s390x.rpm xulrunner-devel-unstable-1.9.0.1-1.el5.s390x.rpm yelp-2.16.0-20.el5.s390x.rpm yelp-debuginfo-2.16.0-20.el5.s390x.rpm x86_64: devhelp-0.12-18.el5.i386.rpm devhelp-0.12-18.el5.x86_64.rpm devhelp-debuginfo-0.12-18.el5.i386.rpm devhelp-debuginfo-0.12-18.el5.x86_64.rpm devhelp-devel-0.12-18.el5.i386.rpm devhelp-devel-0.12-18.el5.x86_64.rpm firefox-3.0.1-1.el5.i386.rpm firefox-3.0.1-1.el5.x86_64.rpm firefox-debuginfo-3.0.1-1.el5.i386.rpm firefox-debuginfo-3.0.1-1.el5.x86_64.rpm xulrunner-1.9.0.1-1.el5.i386.rpm xulrunner-1.9.0.1-1.el5.x86_64.rpm xulrunner-debuginfo-1.9.0.1-1.el5.i386.rpm xulrunner-debuginfo-1.9.0.1-1.el5.x86_64.rpm xulrunner-devel-1.9.0.1-1.el5.i386.rpm xulrunner-devel-1.9.0.1-1.el5.x86_64.rpm xulrunner-devel-unstable-1.9.0.1-1.el5.x86_64.rpm yelp-2.16.0-20.el5.x86_64.rpm yelp-debuginfo-2.16.0-20.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2933 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIfiv/XlSAg2UNWIIRAvq7AKCNheU6hBjn3hRNYUbmpy+0o3sBIACePTuQ vXCoV0E+gCDqjB8RcL5fZc8= =Oy9Z -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2008:0598-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0598.html Issue date: 2008-07-16 CVE Names: CVE-2008-2785 CVE-2008-2933 ===================================================================== 1. Summary: An updated firefox package that fixes various security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux AS version 4.5.z - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux ES version 4.5.z - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Mozilla Firefox is an open source Web browser. An integer overflow flaw was found in the way Firefox displayed certain web content. A malicious web site could cause Firefox to crash, or execute arbitrary code with the permissions of the user running Firefox. (CVE-2008-2785) A flaw was found in the way Firefox handled certain command line URLs. If another application passed Firefox a malformed URL, it could result in Firefox executing local malicious content with chrome privileges. (CVE-2008-2933) All firefox users should upgrade to this updated package, which contains backported patches that correct these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 452204 - CVE-2008-2785 mozilla: CSS reference counter overflow (ZDI-CAN-349) 454697 - CVE-2008-2933 Firefox command line URL launches multi-tabs 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.5.0.12-0.21.el4.src.rpm i386: firefox-1.5.0.12-0.21.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.21.el4.i386.rpm ia64: firefox-1.5.0.12-0.21.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.ia64.rpm ppc: firefox-1.5.0.12-0.21.el4.ppc.rpm firefox-debuginfo-1.5.0.12-0.21.el4.ppc.rpm s390: firefox-1.5.0.12-0.21.el4.s390.rpm firefox-debuginfo-1.5.0.12-0.21.el4.s390.rpm s390x: firefox-1.5.0.12-0.21.el4.s390x.rpm firefox-debuginfo-1.5.0.12-0.21.el4.s390x.rpm x86_64: firefox-1.5.0.12-0.21.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.x86_64.rpm Red Hat Enterprise Linux AS version 4.5.z: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/4AS-4.5.z/en/os/SRPMS/firefox-1.5.0.12-0.21.el4.src.rpm i386: firefox-1.5.0.12-0.21.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.21.el4.i386.rpm ia64: firefox-1.5.0.12-0.21.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.ia64.rpm ppc: firefox-1.5.0.12-0.21.el4.ppc.rpm firefox-debuginfo-1.5.0.12-0.21.el4.ppc.rpm s390: firefox-1.5.0.12-0.21.el4.s390.rpm firefox-debuginfo-1.5.0.12-0.21.el4.s390.rpm s390x: firefox-1.5.0.12-0.21.el4.s390x.rpm firefox-debuginfo-1.5.0.12-0.21.el4.s390x.rpm x86_64: firefox-1.5.0.12-0.21.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.5.0.12-0.21.el4.src.rpm i386: firefox-1.5.0.12-0.21.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.21.el4.i386.rpm x86_64: firefox-1.5.0.12-0.21.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.5.0.12-0.21.el4.src.rpm i386: firefox-1.5.0.12-0.21.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.21.el4.i386.rpm ia64: firefox-1.5.0.12-0.21.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.ia64.rpm x86_64: firefox-1.5.0.12-0.21.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4.5.z: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/4ES-4.5.z/en/os/SRPMS/firefox-1.5.0.12-0.21.el4.src.rpm i386: firefox-1.5.0.12-0.21.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.21.el4.i386.rpm ia64: firefox-1.5.0.12-0.21.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.ia64.rpm x86_64: firefox-1.5.0.12-0.21.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.5.0.12-0.21.el4.src.rpm i386: firefox-1.5.0.12-0.21.el4.i386.rpm firefox-debuginfo-1.5.0.12-0.21.el4.i386.rpm ia64: firefox-1.5.0.12-0.21.el4.ia64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.ia64.rpm x86_64: firefox-1.5.0.12-0.21.el4.x86_64.rpm firefox-debuginfo-1.5.0.12-0.21.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2933 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIfiwLXlSAg2UNWIIRAuzDAJ9/hIL1wH8Rx8Yrj5ewIaqUE76ZnwCePjlL Hc1vcRZGG9iZHbGcrn+qmMc= =CvOl -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: seamonkey security update Advisory ID: RHSA-2008:0599-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0599.html Issue date: 2008-07-16 CVE Names: CVE-2008-2785 ===================================================================== 1. Summary: Updated seamonkey packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. An integer overflow flaw was found in the way SeaMonkey displayed certain web content. A malicious web site could cause SeaMonkey to crash or execute arbitrary code with the permissions of the user running SeaMonkey. (CVE-2008-2785) All seamonkey users should upgrade to these updated packages, which contain a backported patch to resolve this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 452204 - CVE-2008-2785 mozilla: CSS reference counter overflow (ZDI-CAN-349) 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/seamonkey-1.0.9-0.18.el2.src.rpm i386: seamonkey-1.0.9-0.18.el2.i386.rpm seamonkey-chat-1.0.9-0.18.el2.i386.rpm seamonkey-devel-1.0.9-0.18.el2.i386.rpm seamonkey-dom-inspector-1.0.9-0.18.el2.i386.rpm seamonkey-js-debugger-1.0.9-0.18.el2.i386.rpm seamonkey-mail-1.0.9-0.18.el2.i386.rpm seamonkey-nspr-1.0.9-0.18.el2.i386.rpm seamonkey-nspr-devel-1.0.9-0.18.el2.i386.rpm seamonkey-nss-1.0.9-0.18.el2.i386.rpm seamonkey-nss-devel-1.0.9-0.18.el2.i386.rpm ia64: seamonkey-1.0.9-0.18.el2.ia64.rpm seamonkey-chat-1.0.9-0.18.el2.ia64.rpm seamonkey-devel-1.0.9-0.18.el2.ia64.rpm seamonkey-dom-inspector-1.0.9-0.18.el2.ia64.rpm seamonkey-js-debugger-1.0.9-0.18.el2.ia64.rpm seamonkey-mail-1.0.9-0.18.el2.ia64.rpm seamonkey-nspr-1.0.9-0.18.el2.ia64.rpm seamonkey-nspr-devel-1.0.9-0.18.el2.ia64.rpm seamonkey-nss-1.0.9-0.18.el2.ia64.rpm seamonkey-nss-devel-1.0.9-0.18.el2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/seamonkey-1.0.9-0.18.el2.src.rpm ia64: seamonkey-1.0.9-0.18.el2.ia64.rpm seamonkey-chat-1.0.9-0.18.el2.ia64.rpm seamonkey-devel-1.0.9-0.18.el2.ia64.rpm seamonkey-dom-inspector-1.0.9-0.18.el2.ia64.rpm seamonkey-js-debugger-1.0.9-0.18.el2.ia64.rpm seamonkey-mail-1.0.9-0.18.el2.ia64.rpm seamonkey-nspr-1.0.9-0.18.el2.ia64.rpm seamonkey-nspr-devel-1.0.9-0.18.el2.ia64.rpm seamonkey-nss-1.0.9-0.18.el2.ia64.rpm seamonkey-nss-devel-1.0.9-0.18.el2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/seamonkey-1.0.9-0.18.el2.src.rpm i386: seamonkey-1.0.9-0.18.el2.i386.rpm seamonkey-chat-1.0.9-0.18.el2.i386.rpm seamonkey-devel-1.0.9-0.18.el2.i386.rpm seamonkey-dom-inspector-1.0.9-0.18.el2.i386.rpm seamonkey-js-debugger-1.0.9-0.18.el2.i386.rpm seamonkey-mail-1.0.9-0.18.el2.i386.rpm seamonkey-nspr-1.0.9-0.18.el2.i386.rpm seamonkey-nspr-devel-1.0.9-0.18.el2.i386.rpm seamonkey-nss-1.0.9-0.18.el2.i386.rpm seamonkey-nss-devel-1.0.9-0.18.el2.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/seamonkey-1.0.9-0.18.el2.src.rpm i386: seamonkey-1.0.9-0.18.el2.i386.rpm seamonkey-chat-1.0.9-0.18.el2.i386.rpm seamonkey-devel-1.0.9-0.18.el2.i386.rpm seamonkey-dom-inspector-1.0.9-0.18.el2.i386.rpm seamonkey-js-debugger-1.0.9-0.18.el2.i386.rpm seamonkey-mail-1.0.9-0.18.el2.i386.rpm seamonkey-nspr-1.0.9-0.18.el2.i386.rpm seamonkey-nspr-devel-1.0.9-0.18.el2.i386.rpm seamonkey-nss-1.0.9-0.18.el2.i386.rpm seamonkey-nss-devel-1.0.9-0.18.el2.i386.rpm Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.9-0.22.el3.src.rpm i386: seamonkey-1.0.9-0.22.el3.i386.rpm seamonkey-chat-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-devel-1.0.9-0.22.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.22.el3.i386.rpm seamonkey-mail-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.22.el3.i386.rpm ia64: seamonkey-1.0.9-0.22.el3.ia64.rpm seamonkey-chat-1.0.9-0.22.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.ia64.rpm seamonkey-devel-1.0.9-0.22.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.22.el3.ia64.rpm seamonkey-mail-1.0.9-0.22.el3.ia64.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.ia64.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.22.el3.ia64.rpm ppc: seamonkey-1.0.9-0.22.el3.ppc.rpm seamonkey-chat-1.0.9-0.22.el3.ppc.rpm seamonkey-debuginfo-1.0.9-0.22.el3.ppc.rpm seamonkey-devel-1.0.9-0.22.el3.ppc.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.ppc.rpm seamonkey-js-debugger-1.0.9-0.22.el3.ppc.rpm seamonkey-mail-1.0.9-0.22.el3.ppc.rpm seamonkey-nspr-1.0.9-0.22.el3.ppc.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.ppc.rpm seamonkey-nss-1.0.9-0.22.el3.ppc.rpm seamonkey-nss-devel-1.0.9-0.22.el3.ppc.rpm s390: seamonkey-1.0.9-0.22.el3.s390.rpm seamonkey-chat-1.0.9-0.22.el3.s390.rpm seamonkey-debuginfo-1.0.9-0.22.el3.s390.rpm seamonkey-devel-1.0.9-0.22.el3.s390.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.s390.rpm seamonkey-js-debugger-1.0.9-0.22.el3.s390.rpm seamonkey-mail-1.0.9-0.22.el3.s390.rpm seamonkey-nspr-1.0.9-0.22.el3.s390.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.s390.rpm seamonkey-nss-1.0.9-0.22.el3.s390.rpm seamonkey-nss-devel-1.0.9-0.22.el3.s390.rpm s390x: seamonkey-1.0.9-0.22.el3.s390x.rpm seamonkey-chat-1.0.9-0.22.el3.s390x.rpm seamonkey-debuginfo-1.0.9-0.22.el3.s390.rpm seamonkey-debuginfo-1.0.9-0.22.el3.s390x.rpm seamonkey-devel-1.0.9-0.22.el3.s390x.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.s390x.rpm seamonkey-js-debugger-1.0.9-0.22.el3.s390x.rpm seamonkey-mail-1.0.9-0.22.el3.s390x.rpm seamonkey-nspr-1.0.9-0.22.el3.s390.rpm seamonkey-nspr-1.0.9-0.22.el3.s390x.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.s390x.rpm seamonkey-nss-1.0.9-0.22.el3.s390.rpm seamonkey-nss-1.0.9-0.22.el3.s390x.rpm seamonkey-nss-devel-1.0.9-0.22.el3.s390x.rpm x86_64: seamonkey-1.0.9-0.22.el3.i386.rpm seamonkey-1.0.9-0.22.el3.x86_64.rpm seamonkey-chat-1.0.9-0.22.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.x86_64.rpm seamonkey-devel-1.0.9-0.22.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.22.el3.x86_64.rpm seamonkey-mail-1.0.9-0.22.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.x86_64.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.22.el3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.9-0.22.el3.src.rpm i386: seamonkey-1.0.9-0.22.el3.i386.rpm seamonkey-chat-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-devel-1.0.9-0.22.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.22.el3.i386.rpm seamonkey-mail-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.22.el3.i386.rpm x86_64: seamonkey-1.0.9-0.22.el3.i386.rpm seamonkey-1.0.9-0.22.el3.x86_64.rpm seamonkey-chat-1.0.9-0.22.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.x86_64.rpm seamonkey-devel-1.0.9-0.22.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.22.el3.x86_64.rpm seamonkey-mail-1.0.9-0.22.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.x86_64.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.22.el3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.9-0.22.el3.src.rpm i386: seamonkey-1.0.9-0.22.el3.i386.rpm seamonkey-chat-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-devel-1.0.9-0.22.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.22.el3.i386.rpm seamonkey-mail-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.22.el3.i386.rpm ia64: seamonkey-1.0.9-0.22.el3.ia64.rpm seamonkey-chat-1.0.9-0.22.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.ia64.rpm seamonkey-devel-1.0.9-0.22.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.22.el3.ia64.rpm seamonkey-mail-1.0.9-0.22.el3.ia64.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.ia64.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.22.el3.ia64.rpm x86_64: seamonkey-1.0.9-0.22.el3.i386.rpm seamonkey-1.0.9-0.22.el3.x86_64.rpm seamonkey-chat-1.0.9-0.22.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.x86_64.rpm seamonkey-devel-1.0.9-0.22.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.22.el3.x86_64.rpm seamonkey-mail-1.0.9-0.22.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.x86_64.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.22.el3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.9-0.22.el3.src.rpm i386: seamonkey-1.0.9-0.22.el3.i386.rpm seamonkey-chat-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-devel-1.0.9-0.22.el3.i386.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.i386.rpm seamonkey-js-debugger-1.0.9-0.22.el3.i386.rpm seamonkey-mail-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-devel-1.0.9-0.22.el3.i386.rpm ia64: seamonkey-1.0.9-0.22.el3.ia64.rpm seamonkey-chat-1.0.9-0.22.el3.ia64.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.ia64.rpm seamonkey-devel-1.0.9-0.22.el3.ia64.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.ia64.rpm seamonkey-js-debugger-1.0.9-0.22.el3.ia64.rpm seamonkey-mail-1.0.9-0.22.el3.ia64.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.ia64.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.ia64.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.ia64.rpm seamonkey-nss-devel-1.0.9-0.22.el3.ia64.rpm x86_64: seamonkey-1.0.9-0.22.el3.i386.rpm seamonkey-1.0.9-0.22.el3.x86_64.rpm seamonkey-chat-1.0.9-0.22.el3.x86_64.rpm seamonkey-debuginfo-1.0.9-0.22.el3.i386.rpm seamonkey-debuginfo-1.0.9-0.22.el3.x86_64.rpm seamonkey-devel-1.0.9-0.22.el3.x86_64.rpm seamonkey-dom-inspector-1.0.9-0.22.el3.x86_64.rpm seamonkey-js-debugger-1.0.9-0.22.el3.x86_64.rpm seamonkey-mail-1.0.9-0.22.el3.x86_64.rpm seamonkey-nspr-1.0.9-0.22.el3.i386.rpm seamonkey-nspr-1.0.9-0.22.el3.x86_64.rpm seamonkey-nspr-devel-1.0.9-0.22.el3.x86_64.rpm seamonkey-nss-1.0.9-0.22.el3.i386.rpm seamonkey-nss-1.0.9-0.22.el3.x86_64.rpm seamonkey-nss-devel-1.0.9-0.22.el3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/devhelp-0.10-0.8.1.el4.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/seamonkey-1.0.9-16.4.el4_6.src.rpm i386: devhelp-0.10-0.8.1.el4.i386.rpm devhelp-debuginfo-0.10-0.8.1.el4.i386.rpm devhelp-devel-0.10-0.8.1.el4.i386.rpm seamonkey-1.0.9-16.4.el4_6.i386.rpm seamonkey-chat-1.0.9-16.4.el4_6.i386.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.i386.rpm seamonkey-devel-1.0.9-16.4.el4_6.i386.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.i386.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.i386.rpm seamonkey-mail-1.0.9-16.4.el4_6.i386.rpm ia64: seamonkey-1.0.9-16.4.el4_6.ia64.rpm seamonkey-chat-1.0.9-16.4.el4_6.ia64.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.ia64.rpm seamonkey-devel-1.0.9-16.4.el4_6.ia64.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.ia64.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.ia64.rpm seamonkey-mail-1.0.9-16.4.el4_6.ia64.rpm ppc: devhelp-0.10-0.8.1.el4.ppc.rpm devhelp-debuginfo-0.10-0.8.1.el4.ppc.rpm devhelp-devel-0.10-0.8.1.el4.ppc.rpm seamonkey-1.0.9-16.4.el4_6.ppc.rpm seamonkey-chat-1.0.9-16.4.el4_6.ppc.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.ppc.rpm seamonkey-devel-1.0.9-16.4.el4_6.ppc.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.ppc.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.ppc.rpm seamonkey-mail-1.0.9-16.4.el4_6.ppc.rpm s390: seamonkey-1.0.9-16.4.el4_6.s390.rpm seamonkey-chat-1.0.9-16.4.el4_6.s390.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.s390.rpm seamonkey-devel-1.0.9-16.4.el4_6.s390.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.s390.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.s390.rpm seamonkey-mail-1.0.9-16.4.el4_6.s390.rpm s390x: seamonkey-1.0.9-16.4.el4_6.s390x.rpm seamonkey-chat-1.0.9-16.4.el4_6.s390x.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.s390x.rpm seamonkey-devel-1.0.9-16.4.el4_6.s390x.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.s390x.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.s390x.rpm seamonkey-mail-1.0.9-16.4.el4_6.s390x.rpm x86_64: devhelp-0.10-0.8.1.el4.x86_64.rpm devhelp-debuginfo-0.10-0.8.1.el4.x86_64.rpm devhelp-devel-0.10-0.8.1.el4.x86_64.rpm seamonkey-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-chat-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-devel-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-mail-1.0.9-16.4.el4_6.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/devhelp-0.10-0.8.1.el4.src.rpm ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/seamonkey-1.0.9-16.4.el4_6.src.rpm i386: devhelp-0.10-0.8.1.el4.i386.rpm devhelp-debuginfo-0.10-0.8.1.el4.i386.rpm devhelp-devel-0.10-0.8.1.el4.i386.rpm seamonkey-1.0.9-16.4.el4_6.i386.rpm seamonkey-chat-1.0.9-16.4.el4_6.i386.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.i386.rpm seamonkey-devel-1.0.9-16.4.el4_6.i386.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.i386.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.i386.rpm seamonkey-mail-1.0.9-16.4.el4_6.i386.rpm x86_64: devhelp-0.10-0.8.1.el4.x86_64.rpm devhelp-debuginfo-0.10-0.8.1.el4.x86_64.rpm devhelp-devel-0.10-0.8.1.el4.x86_64.rpm seamonkey-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-chat-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-devel-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-mail-1.0.9-16.4.el4_6.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/devhelp-0.10-0.8.1.el4.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/seamonkey-1.0.9-16.4.el4_6.src.rpm i386: devhelp-0.10-0.8.1.el4.i386.rpm devhelp-debuginfo-0.10-0.8.1.el4.i386.rpm devhelp-devel-0.10-0.8.1.el4.i386.rpm seamonkey-1.0.9-16.4.el4_6.i386.rpm seamonkey-chat-1.0.9-16.4.el4_6.i386.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.i386.rpm seamonkey-devel-1.0.9-16.4.el4_6.i386.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.i386.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.i386.rpm seamonkey-mail-1.0.9-16.4.el4_6.i386.rpm ia64: seamonkey-1.0.9-16.4.el4_6.ia64.rpm seamonkey-chat-1.0.9-16.4.el4_6.ia64.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.ia64.rpm seamonkey-devel-1.0.9-16.4.el4_6.ia64.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.ia64.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.ia64.rpm seamonkey-mail-1.0.9-16.4.el4_6.ia64.rpm x86_64: devhelp-0.10-0.8.1.el4.x86_64.rpm devhelp-debuginfo-0.10-0.8.1.el4.x86_64.rpm devhelp-devel-0.10-0.8.1.el4.x86_64.rpm seamonkey-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-chat-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-devel-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-mail-1.0.9-16.4.el4_6.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/devhelp-0.10-0.8.1.el4.src.rpm ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/seamonkey-1.0.9-16.4.el4_6.src.rpm i386: devhelp-0.10-0.8.1.el4.i386.rpm devhelp-debuginfo-0.10-0.8.1.el4.i386.rpm devhelp-devel-0.10-0.8.1.el4.i386.rpm seamonkey-1.0.9-16.4.el4_6.i386.rpm seamonkey-chat-1.0.9-16.4.el4_6.i386.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.i386.rpm seamonkey-devel-1.0.9-16.4.el4_6.i386.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.i386.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.i386.rpm seamonkey-mail-1.0.9-16.4.el4_6.i386.rpm ia64: seamonkey-1.0.9-16.4.el4_6.ia64.rpm seamonkey-chat-1.0.9-16.4.el4_6.ia64.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.ia64.rpm seamonkey-devel-1.0.9-16.4.el4_6.ia64.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.ia64.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.ia64.rpm seamonkey-mail-1.0.9-16.4.el4_6.ia64.rpm x86_64: devhelp-0.10-0.8.1.el4.x86_64.rpm devhelp-debuginfo-0.10-0.8.1.el4.x86_64.rpm devhelp-devel-0.10-0.8.1.el4.x86_64.rpm seamonkey-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-chat-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-debuginfo-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-devel-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-dom-inspector-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-js-debugger-1.0.9-16.4.el4_6.x86_64.rpm seamonkey-mail-1.0.9-16.4.el4_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2785 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIfiweXlSAg2UNWIIRAlfDAJ4qJmvvv5E0FGfhaU5AWHbAR6AeCQCgu0Dd hXL7oEbtuQnagyHC12/4Pxw= =i/tX -----END PGP SIGNATURE----- --