Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. Hello Again, Futurelooks continues scooping on all the stuff you should care about at COMPUTEX 2008... COMPUTEX 2008 Spotlight - The Evolution of NZXT. NZXT. was at COMPUTEX 2008 in Taipei and had a lot of really interesting things to show us this year. It was at COMPUTEX 2006 that we originally ran into this promising young company and it doesn’t look like they are showing any signs of slowing down. In our original interview with Johnny Hou, NZXT.’s head product honcho, he eluded to a few things that the company was looking at in the future. It appears that the future is rolling out here at COMPUTEX 2008. Direct Link: http://www.futurelooks.com/computex-2008-spotlight-the-evolution-of-nzxt/ A post to your news would be most appreciated! Regards, -The Futurelooks Team- www.futurelooks.com
  2. Heatpipe CPU cooler roundup <http://www.guru3d.com/article/heatpipe-cpu-cooler-roundup-review/>'>http://www.guru3d.com/article/heatpipe-cpu-cooler-roundup-review/> Guru3D reviews five heatpipe based CPU coolers from Noctua, CoolerMaster , Tuniq, OCZ and Coolink. Over the past month or six several new heatpipe based coolers where introduced onto the market. And I already can disclose this .. not one single cooler was doing a below average result. So for this test they decided to go a little more extreme. They crank up the usual system requirements a notch by using a fairly high-end PC as we take a Core 2 Duo Q6600 Quad Core processor and then overclock it to 3600 MHz to see how well these coolers still do. Check out the review here: http://www.guru3d.com/article/heatpipe-cpu-cooler-roundup-review/ <http://www.guru3d.com/article/heatpipe-cpu-cooler-roundup-review/> --
  3. Title: Eagle Tech Consus L-Series External HDD Enclosure Review ( -at -) HardwareLogic Quote: "Eagle Tech Inc., based in City of Industry, California, has cultivated a strong following among the OEM market, providing vendors with a staggering array of products that run the gamut from power supplies and chassis's, to external storage devices and enclosures. With customer service and support as their number one priority, Eagle Tech is committed to providing enthusiasts and mainstream users with quality products that are highly functional and rugged, yet remain stylish and affordable at the same time." Link: http://www.hardwarelogic.com/news/138/ARTICLE/3843/2008-06-12.html
  4. Hello Webmasters and News Posters, NEW CONTENT (Casing & Cooling) - E-Power Thunder EP-650-TD1 3-in-1 PSU QUOTE: "Enter E-Power, a company that has been around since 1990 but is not one of the big contenders. This company has a goal of creating high quality at an affordable price, and today we will take a peek at one of their moderate level power supplies to see if they have managed to pull this off. While the power port and toggle switch appear pretty normal, there is an added port on this unit that resembles a PCI-E plug. Though that is not what it really is, it does add to the feature list and is where they get the “3-in-1” label. Let’s take a quick look at what plugs into this port and then we will see what we have." For more information, please visit - http://www.tweaktown.com/reviews/1459/e_power_thunder_ep_650_td1_3_in_1_psu/index.html Best Regards, The TweakTown Team http://www.tweaktown.com
  5. Hello News Partner: Benchmark Reviews has released a new article which your readers might enjoy. We would be grateful if you would please share it with them. TITLE: Silverstone KL03B-W Kublai Mid Tower Case ( -at -) Benchmark Reviews DESCRIPTION: Silverstone's third Kublai mid tower chassis is made for aficionados and serious computer enthusiasts that require a high level component with no trade-offs for cooling and quietness. Following the designing concept of previous chassis from Kublai series, the KL03 also possess many features borrowed from the Temjin series. Constructed using steel and aluminum, this chassis strikes a great balance between external aesthetics and excellent structural rigidity. Benchmark Reviews tests the Silverstone Kublai KL03B-W mid-tower ATX computer case in this article. ARTICLE URL: http://benchmarkreviews.com/index.php?option=com_content&task=view&id=185&Itemid=1 IMAGE URL: http://benchmarkreviews.com/images/reviews/cases/silverstone_kl03b-w/Silverstone_KL03B-W_Kublai_Case.jpg Thank you for your being a dependable affiliate and posting our news; we appreciate your support. Olin Coles Owner / Editor Benchmark Reviews Change your subscription ( http://benchmarkreviews.com/index.php?option=com_acajoom&Itemid=1&act=change&subscriber=352&cle=7356a875fb9b610758ab537caceaa9b6&listid=1 ) Unsubscribe ( http://benchmarkreviews.com/index.php?option=com_acajoom&Itemid=1&act=unsubscribe&subscriber=352&cle=7356a875fb9b610758ab537caceaa9b6&listid=1 )
  6. AMD just announced that they are working with Havok on physics acceleration, but probably not how you thought. Nope, nothing about GPUs and Havok working together again, it seems that ship has sailed. But did you know that Havok's APIs work with CPUs too?? All kidding aside, the article is a pretty deep analysis of what AMD is attempting to say in their PR and a good look and update at the current state of accelerated physics in general. URL: http://www.pcper.com/article.php?aid=574 Quote: "It's this next line that really puzzles me: "The two companies will also investigate the use of AMD's massively parallel ATI Radeon GPUs to manage appropriate aspects of physical world simulation in the future." So...what they are saying is that AMD and Havok WILL look into ways that the GPU can help with physics simulations; NOT that they already have investigated or that they successfully found some areas that can utilize Havok on the GPU or anything like that at all. Instead, we are supposed to gobble up a news release that says 'we'll get to it, maybe, if it makes sense.'" Thanks for a post! Ryan Shrout Owner - PC Perspective rshrout ( -at -) pcper.com
  7. Computex 2008 - Thermaltake ( -at -) ThinkComputers.org Article URL: http://www.thinkcomputers.org/index.php?x=articles <http://www.thinkcomputers.org/index.php?x=articles&id=84> &id=84 Image URL (336 X 256): http://www.thinkcomputers.org/articles/tt_computex08/email.jpg Alt Image URL (194 X 150): http://www.thinkcomputers.org/articles/tt_computex08/front.jpg Quote: "Although we were unable to make it out to Taipei for Computex this year our friends at Thermaltake were nice enough to give us all the information on their new cases, power supplies, and coolers. Although they did not announce as many products as they did during CES they still had some really cool new products. Let's take a look and see what Thermaltake has in store for us!"
  8. A news post would be great. OCC has published a new review on the Atrix 500T Extreme 650W Here is a quote from the review: Quote: "If you are in the market for a power supply in the 650W range, I certainly could not recommend this one for a high performance system. Like its name suggests (Atrix 500T), 500W is probably a more realistic maximum than the stated 650W. The efficiency and power factor are very poor and the failure of the unit to maintain the 3V3 and 5V0 lines at heavy loads, just reinforces my case. I should also bring to your attention a really irritating noise coming from the unit at high load - a sure sign of a stressed out low-end power supply. I am convinced this unit would fail within a short period of time if constantly loaded above 500W. The casing of the power supply got far warmer than the temperature of the air leaving the enclosure suggested, but with such a poor efficiency of 57.7%, this is not surprising." Title: Atrix 500T Extreme 650W Review Link: http://www.overclockersclub.com/reviews/atrix_500t/ Img: http://www.overclockersclub.com/siteimages/articles/atrix_500t/outside1_thumb.jpg
  9. Good day, Today Neoseeker takes a look at the VR920 video eyewear from Vuzix. Head tracking and 3D support is part of the package for these funky cyber-glasses: URL: http://www.neoseeker.com/Articles/Hardware/Reviews/vr920/ "It's strange to think that while computer hardware has gone developed in leaps and bounds during the last, say, twenty years, but the act of playing a game on your computer has hardly changed at all. The guy who played King's Quest IV on his 4 MHz computer back in 1988, is not doing all that much different than a guy playing Devil May Cry on his 4 GHz computer in 2008. Sure, the games have changed dramatically; but at the end of the day, playing the game -- plunking yourself in front of your monitor, moving your mouse, banging keys, has not really changed all that much." Thanks for any links, Kevin Spiess Editor, Neoseeker.com
  10. This is a multi-part message in MIME format... ------------=_1213228833-11275-6081 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2008:093 http://www.mandriva.com/security/ _______________________________________________________________________ Package : kdesdk Date : June 11, 2008 Affected: 2008.0, 2008.1 _______________________________________________________________________ Problem Description: kdesdk packages in Mandriva Linux 2008 and 2008 Spring had packaging bugs which led to the subversion ioslave to not build and thus not be provided. The updated packages fixed the bugs and provide the subversion access ioslave. _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: 468ce2783ccca071dfbc75dd1b7bdd54 2008.0/i586/kdesdk-3.5.7-3.2mdv2008.0.i586.rpm 49babf8424a02c4c094460f34c8524d4 2008.0/i586/kdesdk-cervisia-3.5.7-3.2mdv2008.0.i586.rpm 5cab87c628236cce236db49724017384 2008.0/i586/kdesdk-kbabel-3.5.7-3.2mdv2008.0.i586.rpm 4e24a74be5173a0ea6d70ebc76fee97f 2008.0/i586/kdesdk-kcachegrind-3.5.7-3.2mdv2008.0.i586.rpm e1b5f96ddba8ba77be5dcf8f59c2a906 2008.0/i586/kdesdk-kompare-3.5.7-3.2mdv2008.0.i586.rpm d4496e87d7510ddd6286d2ba1ee9fa55 2008.0/i586/kdesdk-po2xml-3.5.7-3.2mdv2008.0.i586.rpm d98de658ffebd24aef9cb6d62fc3382b 2008.0/i586/kdesdk-umbrello-3.5.7-3.2mdv2008.0.i586.rpm 7dc4bb78f5baa77d1c935efc5ed7bbab 2008.0/i586/libkdesdk1-3.5.7-3.2mdv2008.0.i586.rpm 5207d4cb5bfb25106c852b80759d04f2 2008.0/i586/libkdesdk1-cervisia-3.5.7-3.2mdv2008.0.i586.rpm 5e51e40776fefb1360360ef615f52ec3 2008.0/i586/libkdesdk1-cervisia-devel-3.5.7-3.2mdv2008.0.i586.rpm c6a4e26e6c7a2e6b0ba65af7f3c43b54 2008.0/i586/libkdesdk1-devel-3.5.7-3.2mdv2008.0.i586.rpm 69b4027a6b1116124a44044300690b60 2008.0/i586/libkdesdk1-kbabel-3.5.7-3.2mdv2008.0.i586.rpm c9ad1baf3a991b76e04806f883522dee 2008.0/i586/libkdesdk1-kbabel-devel-3.5.7-3.2mdv2008.0.i586.rpm 9ef1b020be7f7027e2ed203b6ebdf473 2008.0/SRPMS/kdesdk-3.5.7-3.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: d142c82762b2d2b4d63379b2c817389e 2008.0/x86_64/kdesdk-3.5.7-3.2mdv2008.0.x86_64.rpm f8d76f18b95893a5951a2650cfe880b4 2008.0/x86_64/kdesdk-cervisia-3.5.7-3.2mdv2008.0.x86_64.rpm 83a2f7719cc92867bc4a14a2017199b4 2008.0/x86_64/kdesdk-kbabel-3.5.7-3.2mdv2008.0.x86_64.rpm 2f4af6faa0ae1cefd96de328e1bded96 2008.0/x86_64/kdesdk-kcachegrind-3.5.7-3.2mdv2008.0.x86_64.rpm 92009712aa8647d3ef2905829d1d8702 2008.0/x86_64/kdesdk-kompare-3.5.7-3.2mdv2008.0.x86_64.rpm 2d1729e12d83ab0bfb28c5534ca2e5e1 2008.0/x86_64/kdesdk-po2xml-3.5.7-3.2mdv2008.0.x86_64.rpm 10b9318e4c915b242f84ee2501a8de19 2008.0/x86_64/kdesdk-umbrello-3.5.7-3.2mdv2008.0.x86_64.rpm 9c5e3f1e763399c5cacaab8bb7004946 2008.0/x86_64/lib64kdesdk1-3.5.7-3.2mdv2008.0.x86_64.rpm 132fd9396fcba79a6a1047f0ddaa71e8 2008.0/x86_64/lib64kdesdk1-cervisia-3.5.7-3.2mdv2008.0.x86_64.rpm 4a1a3dce0dca50f4149a5b1602f13677 2008.0/x86_64/lib64kdesdk1-cervisia-devel-3.5.7-3.2mdv2008.0.x86_64.rpm ab4c7a36069b87746f0ac9150b641d99 2008.0/x86_64/lib64kdesdk1-devel-3.5.7-3.2mdv2008.0.x86_64.rpm a4b491252833ecca8eaf333097a7546e 2008.0/x86_64/lib64kdesdk1-kbabel-3.5.7-3.2mdv2008.0.x86_64.rpm 95c58236cffd2c2d38445729bfd5fdbe 2008.0/x86_64/lib64kdesdk1-kbabel-devel-3.5.7-3.2mdv2008.0.x86_64.rpm 9ef1b020be7f7027e2ed203b6ebdf473 2008.0/SRPMS/kdesdk-3.5.7-3.2mdv2008.0.src.rpm Mandriva Linux 2008.1: 279c9e33358194bee750eb4ebbe28c0e 2008.1/i586/kdesdk-3.5.9-4.2mdv2008.1.i586.rpm 5279a01d612d0fc77401cbf38ecdbeb3 2008.1/i586/kdesdk-cervisia-3.5.9-4.2mdv2008.1.i586.rpm 3fad6cf7f15772869821a3295e739ad3 2008.1/i586/kdesdk-devel-3.5.9-4.2mdv2008.1.i586.rpm 3e0ad87e1451545b2ed42c773dec4ccd 2008.1/i586/kdesdk-kbabel-3.5.9-4.2mdv2008.1.i586.rpm df1becd019ae12580aac291b6d06aaec 2008.1/i586/kdesdk-kcachegrind-3.5.9-4.2mdv2008.1.i586.rpm 2d89b94abf9e54c445c319aa7255aa8c 2008.1/i586/kdesdk-kompare-3.5.9-4.2mdv2008.1.i586.rpm 84eebad7d3d2f9df6fb47bc6c9a23952 2008.1/i586/kdesdk-po2xml-3.5.9-4.2mdv2008.1.i586.rpm 1c65516ae39d76c976e9bc77b3a7649c 2008.1/i586/kdesdk-umbrello-3.5.9-4.2mdv2008.1.i586.rpm 6e3e94bffafa863b6377e797077eb882 2008.1/i586/libkdesdk1-3.5.9-4.2mdv2008.1.i586.rpm 5cb3c0a3be4be07084253a25dc2a9288 2008.1/i586/libkdesdk1-cervisia-3.5.9-4.2mdv2008.1.i586.rpm 1cd3267941a1bb8bb9308515a643010c 2008.1/i586/libkdesdk1-kbabel-3.5.9-4.2mdv2008.1.i586.rpm 6c8355c13e21c4600585c5cea0d57a02 2008.1/SRPMS/kdesdk-3.5.9-4.2mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 8ff1170d8b49eb0860bb56545bbe50d8 2008.1/x86_64/kdesdk-3.5.9-4.2mdv2008.1.x86_64.rpm bf6e405383923e2a0c46d37091bf89b1 2008.1/x86_64/kdesdk-cervisia-3.5.9-4.2mdv2008.1.x86_64.rpm cf6a2745ce7ab42003a716849c350ce2 2008.1/x86_64/kdesdk-devel-3.5.9-4.2mdv2008.1.x86_64.rpm 672cc5a7fbf7ef7964fc5155ce4de9c4 2008.1/x86_64/kdesdk-kbabel-3.5.9-4.2mdv2008.1.x86_64.rpm 3d06ae1ed6da622f36cbd03248d9eac7 2008.1/x86_64/kdesdk-kcachegrind-3.5.9-4.2mdv2008.1.x86_64.rpm 5f3d65030f70cd7ac8e72450843f89b1 2008.1/x86_64/kdesdk-kompare-3.5.9-4.2mdv2008.1.x86_64.rpm 1dce0bea841b0f277963df1f147436a6 2008.1/x86_64/kdesdk-po2xml-3.5.9-4.2mdv2008.1.x86_64.rpm e5f234298f382e16c421af891b066a2f 2008.1/x86_64/kdesdk-umbrello-3.5.9-4.2mdv2008.1.x86_64.rpm 3f641d402ba0f5c8eb9d01eaac3178e4 2008.1/x86_64/lib64kdesdk1-3.5.9-4.2mdv2008.1.x86_64.rpm 2e0de6af799412954ab0f19267998788 2008.1/x86_64/lib64kdesdk1-cervisia-3.5.9-4.2mdv2008.1.x86_64.rpm 861d989eb4b3adafe894ed11ac645cb6 2008.1/x86_64/lib64kdesdk1-kbabel-3.5.9-4.2mdv2008.1.x86_64.rpm 6c8355c13e21c4600585c5cea0d57a02 2008.1/SRPMS/kdesdk-3.5.9-4.2mdv2008.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIUDyMmqjQ0CJFipgRAu/bAJ9YNhBwD+PyitBK/qfxWkmbUjG8/wCfRn2S KgKxjttdjPQl3ChuMawLRl0= =161U -----END PGP SIGNATURE----- ------------=_1213228833-11275-6081 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1213228833-11275-6081--
  11. Hello, - Warfare New Trailers http://www.gamershell.com/news_52746.html - The Conduit Screens http://www.gamershell.com/news_52744.html Best Regards, GamersHell.com Staff =============================================================================
  12. Hello, - Supreme Ruler 2020 Demo http://www.gamershell.com/news_52742.html - Fireteam Reloaded Released http://www.gamershell.com/news_52740.html - Help from Hell - 11 June 2008 - Ninja Gaiden II: FAQ/Walkthrough http://www.gamershell.com/news_52738.html - Penny Arcade Adventures Episode One Released on Steam http://www.gamershell.com/news_52736.html - New Games Released via GameTap #27 http://www.gamershell.com/news_52734.html Best Regards, GamersHell.com Staff =============================================================================
  13. This is a multi-part message in MIME format... ------------=_1213223134-11275-6080 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2008:092 http://www.mandriva.com/security/ _______________________________________________________________________ Package : python-sip Date : June 11, 2008 Affected: 2008.0 _______________________________________________________________________ Problem Description: The python-sip package in Mandriva Linux 2008.0 release contained a packaging bug, making it fail to obsolete old package names. That would lead to an upgrade failure, and python-devel would not install due to unsatisfied dependencies. This update fixes that issue. _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: 371ea7474740db7826cfaafd48e215d7 2008.0/i586/python-sip-4.7-1.3mdv2008.0.i586.rpm 0deaf4236ebdca24004ba6cc4b1acde5 2008.0/SRPMS/python-sip-4.7-1.3mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 9ff8adb1f1007d7963ae9df8f94fd65b 2008.0/x86_64/python-sip-4.7-1.3mdv2008.0.x86_64.rpm 0deaf4236ebdca24004ba6cc4b1acde5 2008.0/SRPMS/python-sip-4.7-1.3mdv2008.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIUCW7mqjQ0CJFipgRAnAbAJ0fDrESMPrOBWi/c7bP14FwpfSdxQCfdRY5 3+kZtMfaUkrn2YIxccQC9fc= =5tJ7 -----END PGP SIGNATURE----- ------------=_1213223134-11275-6080 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1213223134-11275-6080--
  14. TechwareLabs has published a review of the VOX V1 External Hard Drive. Here's a clip from the review: Quote: External hard drives seem to flood the market these days, but how many come with an automatic backup utility? Of those, how many are plasticky? Today, Justin looks at a strudy metal external, the new V1 external Hard Drive by VOX. LINK: http://www.techwarelabs.com/reviews/storage/VOX_V1_500GB/ Title: VOX V1 External Hard Drive ( -at -) TechwareLabsLabs Image: http://www.techwarelabs.com/reviews/storage/VOX_V1_500GB/images/Vox_V1_External_Hard_Drive_0.jpg A news post would be greatly appreciated!
  15. A news post would be great. OCC has published a new article on our new Power Supply Testing Methodology Here is a quote from the article: Quote: "Electrical safety is hardly, if ever, given a thought in power supply reviews, but I think it's important. Why shouldn't a power supply meet the requirements for electrical safety and why is it never tested? Most if not all power supplies sold in the UK will carry the CE mark, amongst others, which implies it was designed to meet the requirements of IEC60950 (Safety of Information Technology Equipment). I will say however, that failures are very, very rare and some will say that this test is unnecessary." Title: OCC ATX Power Supply Testing Methodology Link: http://www.overclockersclub.com/guides/atx_test_guide/
  16. This is a multi-part message in MIME format... ------------=_1213219535-11275-6079 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2008:091 http://www.mandriva.com/security/ _______________________________________________________________________ Package : gnome-panel Date : June 11, 2008 Affected: 2008.1 _______________________________________________________________________ Problem Description: The clock applet in GNOME could crash when using some specific locations or when using updated timezone data. The Recent Documents menu was not always able to start the right application for a specific document. Updated packages for gnome-panel, libgweather, and gnome-applets fix these issues and include many other bug fixes and translation updates from GNOME 2.22.2. _______________________________________________________________________ References: http://qa.mandriva.com/show_bug.cgi?id=39983 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.1: d00590f8f31cc8d187d6584914184042 2008.1/i586/gnome-applets-2.22.2-1.1mdv2008.1.i586.rpm 22c51016813e28569087b32238f37def 2008.1/i586/gnome-panel-2.22.2-1.1mdv2008.1.i586.rpm df9c854801b7f652dfea305c16a8a50d 2008.1/i586/libgweather1-2.22.2-1.1mdv2008.1.i586.rpm 1d3b25b3835f799dfa1dde42e85750f9 2008.1/i586/libgweather-2.22.2-1.1mdv2008.1.i586.rpm 5d2dbd6d488f9fbe0be4e34982324a45 2008.1/i586/libgweather-devel-2.22.2-1.1mdv2008.1.i586.rpm 3545f52b85f28a8ced82e680e53d8406 2008.1/i586/libpanel-applet-2_0-2.22.2-1.1mdv2008.1.i586.rpm e8e9ca0b4fc8af2ffe5207245dcf4d6e 2008.1/i586/libpanel-applet-2-devel-2.22.2-1.1mdv2008.1.i586.rpm 0aa3be049c8168d1e7b010e5c732c2a5 2008.1/SRPMS/gnome-applets-2.22.2-1.1mdv2008.1.src.rpm 44ee6192fb65ea7e741f4383ef6a2bd2 2008.1/SRPMS/gnome-panel-2.22.2-1.1mdv2008.1.src.rpm ddeab405a92bf9c9bc040d5dfae363c2 2008.1/SRPMS/libgweather-2.22.2-1.1mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 5effd886d6e88f659521543d5333ece4 2008.1/x86_64/gnome-applets-2.22.2-1.1mdv2008.1.x86_64.rpm a06f8e0a2247a211a18614af3a606e2c 2008.1/x86_64/gnome-panel-2.22.2-1.1mdv2008.1.x86_64.rpm c8138c6caa5e28e21806072c3f3c4937 2008.1/x86_64/lib64gweather1-2.22.2-1.1mdv2008.1.x86_64.rpm a3e3af7ad54b2b454c681e5168219cdb 2008.1/x86_64/lib64gweather-devel-2.22.2-1.1mdv2008.1.x86_64.rpm 1d84b9241f7a67aa5286aa8eba98b018 2008.1/x86_64/lib64panel-applet-2_0-2.22.2-1.1mdv2008.1.x86_64.rpm 4a9a02525a8e067ebe1f116eeb6e1a36 2008.1/x86_64/lib64panel-applet-2-devel-2.22.2-1.1mdv2008.1.x86_64.rpm a57dd610b3021ae882e66c48b551307a 2008.1/x86_64/libgweather-2.22.2-1.1mdv2008.1.x86_64.rpm 0aa3be049c8168d1e7b010e5c732c2a5 2008.1/SRPMS/gnome-applets-2.22.2-1.1mdv2008.1.src.rpm 44ee6192fb65ea7e741f4383ef6a2bd2 2008.1/SRPMS/gnome-panel-2.22.2-1.1mdv2008.1.src.rpm ddeab405a92bf9c9bc040d5dfae363c2 2008.1/SRPMS/libgweather-2.22.2-1.1mdv2008.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIUBgHmqjQ0CJFipgRAtm4AJsH1hhSK9jut2DXdliaEALdlqeLrgCfUQjK q/fZ5o+SlFKn1VXPrOew154= =O7Kh -----END PGP SIGNATURE----- ------------=_1213219535-11275-6079 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1213219535-11275-6079--
  17. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: XFree86 security update Advisory ID: RHSA-2008:0502-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0502.html Issue date: 2008-06-11 CVE Names: CVE-2008-1377 CVE-2008-1379 CVE-2008-2360 CVE-2008-2361 ===================================================================== 1. Summary: Updated XFree86 packages that fix several security issues are now available for Red Hat Enterprise Linux 3. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Description: XFree86 is an implementation of the X Window System, which provides the core functionality for the Linux graphical desktop. An input validation flaw was discovered in X.org's Security and Record extensions. A malicious authorized client could exploit this issue to cause a denial of service (crash) or, potentially, execute arbitrary code with root privileges on the X.Org server. (CVE-2008-1377) Multiple integer overflow flaws were found in X.org's Render extension. A malicious authorized client could exploit these issues to cause a denial of service (crash) or, potentially, execute arbitrary code with root privileges on the X.Org server. (CVE-2008-2360, CVE-2008-2361) An input validation flaw was discovered in X.org's MIT-SHM extension. A client connected to the X.org server could read arbitrary server memory. This could result in the sensitive data of other users of the X.org server being disclosed. (CVE-2008-1379) Users of XFree86 are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 445403 - CVE-2008-1377 X.org Record and Security extensions memory corruption 445414 - CVE-2008-1379 X.org MIT-SHM extension arbitrary memory read 448783 - CVE-2008-2360 X.org Render extension AllocateGlyph() heap buffer overflow 448784 - CVE-2008-2361 X.org Render extension ProcRenderCreateCursor() crash 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/XFree86-4.3.0-128.EL.src.rpm i386: XFree86-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-4.3.0-128.EL.i386.rpm XFree86-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Xnest-4.3.0-128.EL.i386.rpm XFree86-Xvfb-4.3.0-128.EL.i386.rpm XFree86-base-fonts-4.3.0-128.EL.i386.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.i386.rpm XFree86-devel-4.3.0-128.EL.i386.rpm XFree86-doc-4.3.0-128.EL.i386.rpm XFree86-font-utils-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-data-4.3.0-128.EL.i386.rpm XFree86-sdk-4.3.0-128.EL.i386.rpm XFree86-syriac-fonts-4.3.0-128.EL.i386.rpm XFree86-tools-4.3.0-128.EL.i386.rpm XFree86-truetype-fonts-4.3.0-128.EL.i386.rpm XFree86-twm-4.3.0-128.EL.i386.rpm XFree86-xauth-4.3.0-128.EL.i386.rpm XFree86-xdm-4.3.0-128.EL.i386.rpm XFree86-xfs-4.3.0-128.EL.i386.rpm ia64: XFree86-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-4.3.0-128.EL.ia64.rpm XFree86-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.ia64.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.ia64.rpm XFree86-Xnest-4.3.0-128.EL.ia64.rpm XFree86-Xvfb-4.3.0-128.EL.ia64.rpm XFree86-base-fonts-4.3.0-128.EL.ia64.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.ia64.rpm XFree86-devel-4.3.0-128.EL.ia64.rpm XFree86-doc-4.3.0-128.EL.ia64.rpm XFree86-font-utils-4.3.0-128.EL.ia64.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.ia64.rpm XFree86-libs-data-4.3.0-128.EL.ia64.rpm XFree86-sdk-4.3.0-128.EL.ia64.rpm XFree86-syriac-fonts-4.3.0-128.EL.ia64.rpm XFree86-tools-4.3.0-128.EL.ia64.rpm XFree86-truetype-fonts-4.3.0-128.EL.ia64.rpm XFree86-twm-4.3.0-128.EL.ia64.rpm XFree86-xauth-4.3.0-128.EL.ia64.rpm XFree86-xdm-4.3.0-128.EL.ia64.rpm XFree86-xfs-4.3.0-128.EL.ia64.rpm ppc: XFree86-100dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-4.3.0-128.EL.ppc.rpm XFree86-75dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.ppc.rpm XFree86-Mesa-libGL-4.3.0-128.EL.ppc.rpm XFree86-Mesa-libGL-4.3.0-128.EL.ppc64.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.ppc.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.ppc64.rpm XFree86-Xnest-4.3.0-128.EL.ppc.rpm XFree86-Xvfb-4.3.0-128.EL.ppc.rpm XFree86-base-fonts-4.3.0-128.EL.ppc.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.ppc.rpm XFree86-devel-4.3.0-128.EL.ppc.rpm XFree86-devel-4.3.0-128.EL.ppc64.rpm XFree86-doc-4.3.0-128.EL.ppc.rpm XFree86-font-utils-4.3.0-128.EL.ppc.rpm XFree86-libs-4.3.0-128.EL.ppc.rpm XFree86-libs-4.3.0-128.EL.ppc64.rpm XFree86-libs-data-4.3.0-128.EL.ppc.rpm XFree86-sdk-4.3.0-128.EL.ppc.rpm XFree86-syriac-fonts-4.3.0-128.EL.ppc.rpm XFree86-tools-4.3.0-128.EL.ppc.rpm XFree86-truetype-fonts-4.3.0-128.EL.ppc.rpm XFree86-twm-4.3.0-128.EL.ppc.rpm XFree86-xauth-4.3.0-128.EL.ppc.rpm XFree86-xdm-4.3.0-128.EL.ppc.rpm XFree86-xfs-4.3.0-128.EL.ppc.rpm s390: XFree86-100dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-4.3.0-128.EL.s390.rpm XFree86-75dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.s390.rpm XFree86-Mesa-libGL-4.3.0-128.EL.s390.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.s390.rpm XFree86-Xnest-4.3.0-128.EL.s390.rpm XFree86-Xvfb-4.3.0-128.EL.s390.rpm XFree86-base-fonts-4.3.0-128.EL.s390.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.s390.rpm XFree86-devel-4.3.0-128.EL.s390.rpm XFree86-font-utils-4.3.0-128.EL.s390.rpm XFree86-libs-4.3.0-128.EL.s390.rpm XFree86-libs-data-4.3.0-128.EL.s390.rpm XFree86-syriac-fonts-4.3.0-128.EL.s390.rpm XFree86-tools-4.3.0-128.EL.s390.rpm XFree86-truetype-fonts-4.3.0-128.EL.s390.rpm XFree86-twm-4.3.0-128.EL.s390.rpm XFree86-xauth-4.3.0-128.EL.s390.rpm XFree86-xdm-4.3.0-128.EL.s390.rpm XFree86-xfs-4.3.0-128.EL.s390.rpm s390x: XFree86-100dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-4.3.0-128.EL.s390x.rpm XFree86-75dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.s390x.rpm XFree86-Mesa-libGL-4.3.0-128.EL.s390.rpm XFree86-Mesa-libGL-4.3.0-128.EL.s390x.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.s390.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.s390x.rpm XFree86-Xnest-4.3.0-128.EL.s390x.rpm XFree86-Xvfb-4.3.0-128.EL.s390x.rpm XFree86-base-fonts-4.3.0-128.EL.s390x.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.s390x.rpm XFree86-devel-4.3.0-128.EL.s390.rpm XFree86-devel-4.3.0-128.EL.s390x.rpm XFree86-font-utils-4.3.0-128.EL.s390x.rpm XFree86-libs-4.3.0-128.EL.s390.rpm XFree86-libs-4.3.0-128.EL.s390x.rpm XFree86-libs-data-4.3.0-128.EL.s390x.rpm XFree86-syriac-fonts-4.3.0-128.EL.s390x.rpm XFree86-tools-4.3.0-128.EL.s390x.rpm XFree86-truetype-fonts-4.3.0-128.EL.s390x.rpm XFree86-twm-4.3.0-128.EL.s390x.rpm XFree86-xauth-4.3.0-128.EL.s390x.rpm XFree86-xdm-4.3.0-128.EL.s390x.rpm XFree86-xfs-4.3.0-128.EL.s390x.rpm x86_64: XFree86-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-4.3.0-128.EL.x86_64.rpm XFree86-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.x86_64.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.x86_64.rpm XFree86-Xnest-4.3.0-128.EL.x86_64.rpm XFree86-Xvfb-4.3.0-128.EL.x86_64.rpm XFree86-base-fonts-4.3.0-128.EL.x86_64.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.x86_64.rpm XFree86-devel-4.3.0-128.EL.i386.rpm XFree86-devel-4.3.0-128.EL.x86_64.rpm XFree86-doc-4.3.0-128.EL.x86_64.rpm XFree86-font-utils-4.3.0-128.EL.x86_64.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.x86_64.rpm XFree86-libs-data-4.3.0-128.EL.x86_64.rpm XFree86-sdk-4.3.0-128.EL.x86_64.rpm XFree86-syriac-fonts-4.3.0-128.EL.x86_64.rpm XFree86-tools-4.3.0-128.EL.x86_64.rpm XFree86-truetype-fonts-4.3.0-128.EL.x86_64.rpm XFree86-twm-4.3.0-128.EL.x86_64.rpm XFree86-xauth-4.3.0-128.EL.x86_64.rpm XFree86-xdm-4.3.0-128.EL.x86_64.rpm XFree86-xfs-4.3.0-128.EL.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/XFree86-4.3.0-128.EL.src.rpm i386: XFree86-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-4.3.0-128.EL.i386.rpm XFree86-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Xnest-4.3.0-128.EL.i386.rpm XFree86-Xvfb-4.3.0-128.EL.i386.rpm XFree86-base-fonts-4.3.0-128.EL.i386.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.i386.rpm XFree86-devel-4.3.0-128.EL.i386.rpm XFree86-doc-4.3.0-128.EL.i386.rpm XFree86-font-utils-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-data-4.3.0-128.EL.i386.rpm XFree86-sdk-4.3.0-128.EL.i386.rpm XFree86-syriac-fonts-4.3.0-128.EL.i386.rpm XFree86-tools-4.3.0-128.EL.i386.rpm XFree86-truetype-fonts-4.3.0-128.EL.i386.rpm XFree86-twm-4.3.0-128.EL.i386.rpm XFree86-xauth-4.3.0-128.EL.i386.rpm XFree86-xdm-4.3.0-128.EL.i386.rpm XFree86-xfs-4.3.0-128.EL.i386.rpm x86_64: XFree86-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-4.3.0-128.EL.x86_64.rpm XFree86-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.x86_64.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.x86_64.rpm XFree86-Xnest-4.3.0-128.EL.x86_64.rpm XFree86-Xvfb-4.3.0-128.EL.x86_64.rpm XFree86-base-fonts-4.3.0-128.EL.x86_64.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.x86_64.rpm XFree86-devel-4.3.0-128.EL.i386.rpm XFree86-devel-4.3.0-128.EL.x86_64.rpm XFree86-doc-4.3.0-128.EL.x86_64.rpm XFree86-font-utils-4.3.0-128.EL.x86_64.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.x86_64.rpm XFree86-libs-data-4.3.0-128.EL.x86_64.rpm XFree86-sdk-4.3.0-128.EL.x86_64.rpm XFree86-syriac-fonts-4.3.0-128.EL.x86_64.rpm XFree86-tools-4.3.0-128.EL.x86_64.rpm XFree86-truetype-fonts-4.3.0-128.EL.x86_64.rpm XFree86-twm-4.3.0-128.EL.x86_64.rpm XFree86-xauth-4.3.0-128.EL.x86_64.rpm XFree86-xdm-4.3.0-128.EL.x86_64.rpm XFree86-xfs-4.3.0-128.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/XFree86-4.3.0-128.EL.src.rpm i386: XFree86-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-4.3.0-128.EL.i386.rpm XFree86-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Xnest-4.3.0-128.EL.i386.rpm XFree86-Xvfb-4.3.0-128.EL.i386.rpm XFree86-base-fonts-4.3.0-128.EL.i386.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.i386.rpm XFree86-devel-4.3.0-128.EL.i386.rpm XFree86-doc-4.3.0-128.EL.i386.rpm XFree86-font-utils-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-data-4.3.0-128.EL.i386.rpm XFree86-sdk-4.3.0-128.EL.i386.rpm XFree86-syriac-fonts-4.3.0-128.EL.i386.rpm XFree86-tools-4.3.0-128.EL.i386.rpm XFree86-truetype-fonts-4.3.0-128.EL.i386.rpm XFree86-twm-4.3.0-128.EL.i386.rpm XFree86-xauth-4.3.0-128.EL.i386.rpm XFree86-xdm-4.3.0-128.EL.i386.rpm XFree86-xfs-4.3.0-128.EL.i386.rpm ia64: XFree86-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-4.3.0-128.EL.ia64.rpm XFree86-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.ia64.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.ia64.rpm XFree86-Xnest-4.3.0-128.EL.ia64.rpm XFree86-Xvfb-4.3.0-128.EL.ia64.rpm XFree86-base-fonts-4.3.0-128.EL.ia64.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.ia64.rpm XFree86-devel-4.3.0-128.EL.ia64.rpm XFree86-doc-4.3.0-128.EL.ia64.rpm XFree86-font-utils-4.3.0-128.EL.ia64.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.ia64.rpm XFree86-libs-data-4.3.0-128.EL.ia64.rpm XFree86-sdk-4.3.0-128.EL.ia64.rpm XFree86-syriac-fonts-4.3.0-128.EL.ia64.rpm XFree86-tools-4.3.0-128.EL.ia64.rpm XFree86-truetype-fonts-4.3.0-128.EL.ia64.rpm XFree86-twm-4.3.0-128.EL.ia64.rpm XFree86-xauth-4.3.0-128.EL.ia64.rpm XFree86-xdm-4.3.0-128.EL.ia64.rpm XFree86-xfs-4.3.0-128.EL.ia64.rpm x86_64: XFree86-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-4.3.0-128.EL.x86_64.rpm XFree86-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.x86_64.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.x86_64.rpm XFree86-Xnest-4.3.0-128.EL.x86_64.rpm XFree86-Xvfb-4.3.0-128.EL.x86_64.rpm XFree86-base-fonts-4.3.0-128.EL.x86_64.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.x86_64.rpm XFree86-devel-4.3.0-128.EL.i386.rpm XFree86-devel-4.3.0-128.EL.x86_64.rpm XFree86-doc-4.3.0-128.EL.x86_64.rpm XFree86-font-utils-4.3.0-128.EL.x86_64.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.x86_64.rpm XFree86-libs-data-4.3.0-128.EL.x86_64.rpm XFree86-sdk-4.3.0-128.EL.x86_64.rpm XFree86-syriac-fonts-4.3.0-128.EL.x86_64.rpm XFree86-tools-4.3.0-128.EL.x86_64.rpm XFree86-truetype-fonts-4.3.0-128.EL.x86_64.rpm XFree86-twm-4.3.0-128.EL.x86_64.rpm XFree86-xauth-4.3.0-128.EL.x86_64.rpm XFree86-xdm-4.3.0-128.EL.x86_64.rpm XFree86-xfs-4.3.0-128.EL.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/XFree86-4.3.0-128.EL.src.rpm i386: XFree86-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-4.3.0-128.EL.i386.rpm XFree86-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Xnest-4.3.0-128.EL.i386.rpm XFree86-Xvfb-4.3.0-128.EL.i386.rpm XFree86-base-fonts-4.3.0-128.EL.i386.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.i386.rpm XFree86-devel-4.3.0-128.EL.i386.rpm XFree86-doc-4.3.0-128.EL.i386.rpm XFree86-font-utils-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-data-4.3.0-128.EL.i386.rpm XFree86-sdk-4.3.0-128.EL.i386.rpm XFree86-syriac-fonts-4.3.0-128.EL.i386.rpm XFree86-tools-4.3.0-128.EL.i386.rpm XFree86-truetype-fonts-4.3.0-128.EL.i386.rpm XFree86-twm-4.3.0-128.EL.i386.rpm XFree86-xauth-4.3.0-128.EL.i386.rpm XFree86-xdm-4.3.0-128.EL.i386.rpm XFree86-xfs-4.3.0-128.EL.i386.rpm ia64: XFree86-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-4.3.0-128.EL.ia64.rpm XFree86-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.ia64.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.ia64.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.ia64.rpm XFree86-Xnest-4.3.0-128.EL.ia64.rpm XFree86-Xvfb-4.3.0-128.EL.ia64.rpm XFree86-base-fonts-4.3.0-128.EL.ia64.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.ia64.rpm XFree86-devel-4.3.0-128.EL.ia64.rpm XFree86-doc-4.3.0-128.EL.ia64.rpm XFree86-font-utils-4.3.0-128.EL.ia64.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.ia64.rpm XFree86-libs-data-4.3.0-128.EL.ia64.rpm XFree86-sdk-4.3.0-128.EL.ia64.rpm XFree86-syriac-fonts-4.3.0-128.EL.ia64.rpm XFree86-tools-4.3.0-128.EL.ia64.rpm XFree86-truetype-fonts-4.3.0-128.EL.ia64.rpm XFree86-twm-4.3.0-128.EL.ia64.rpm XFree86-xauth-4.3.0-128.EL.ia64.rpm XFree86-xdm-4.3.0-128.EL.ia64.rpm XFree86-xfs-4.3.0-128.EL.ia64.rpm x86_64: XFree86-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-4.3.0-128.EL.x86_64.rpm XFree86-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-14-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-14-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-15-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-15-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-2-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-2-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-9-100dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-ISO8859-9-75dpi-fonts-4.3.0-128.EL.x86_64.rpm XFree86-Mesa-libGL-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGL-4.3.0-128.EL.x86_64.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.i386.rpm XFree86-Mesa-libGLU-4.3.0-128.EL.x86_64.rpm XFree86-Xnest-4.3.0-128.EL.x86_64.rpm XFree86-Xvfb-4.3.0-128.EL.x86_64.rpm XFree86-base-fonts-4.3.0-128.EL.x86_64.rpm XFree86-cyrillic-fonts-4.3.0-128.EL.x86_64.rpm XFree86-devel-4.3.0-128.EL.i386.rpm XFree86-devel-4.3.0-128.EL.x86_64.rpm XFree86-doc-4.3.0-128.EL.x86_64.rpm XFree86-font-utils-4.3.0-128.EL.x86_64.rpm XFree86-libs-4.3.0-128.EL.i386.rpm XFree86-libs-4.3.0-128.EL.x86_64.rpm XFree86-libs-data-4.3.0-128.EL.x86_64.rpm XFree86-sdk-4.3.0-128.EL.x86_64.rpm XFree86-syriac-fonts-4.3.0-128.EL.x86_64.rpm XFree86-tools-4.3.0-128.EL.x86_64.rpm XFree86-truetype-fonts-4.3.0-128.EL.x86_64.rpm XFree86-twm-4.3.0-128.EL.x86_64.rpm XFree86-xauth-4.3.0-128.EL.x86_64.rpm XFree86-xdm-4.3.0-128.EL.x86_64.rpm XFree86-xfs-4.3.0-128.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIUC/EXlSAg2UNWIIRAgCsAJ90+D/jS3SXNoCoJ1GsLdtDe257vQCeIUAa c+KtwIhQJWJJl/jLe2wZaKA= =0lW5 -----END PGP SIGNATURE----- --
  18. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: xorg-x11 security update Advisory ID: RHSA-2008:0503-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0503.html Issue date: 2008-06-11 CVE Names: CVE-2008-1377 CVE-2008-1379 CVE-2008-2360 CVE-2008-2361 ===================================================================== 1. Summary: Updated xorg-x11 packages that fix several security issues are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: The xorg-x11 packages contain X.Org, an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. An input validation flaw was discovered in X.org's Security and Record extensions. A malicious authorized client could exploit this issue to cause a denial of service (crash) or, potentially, execute arbitrary code with root privileges on the X.Org server. (CVE-2008-1377) Multiple integer overflow flaws were found in X.org's Render extension. A malicious authorized client could exploit these issues to cause a denial of service (crash) or, potentially, execute arbitrary code with root privileges on the X.Org server. (CVE-2008-2360, CVE-2008-2361) An input validation flaw was discovered in X.org's MIT-SHM extension. A client connected to the X.org server could read arbitrary server memory. This could result in the sensitive data of other users of the X.org server being disclosed. (CVE-2008-1379) Users of xorg-x11 should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 445403 - CVE-2008-1377 X.org Record and Security extensions memory corruption 445414 - CVE-2008-1379 X.org MIT-SHM extension arbitrary memory read 448783 - CVE-2008-2360 X.org Render extension AllocateGlyph() heap buffer overflow 448784 - CVE-2008-2361 X.org Render extension ProcRenderCreateCursor() crash 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.33.0.4.src.rpm i386: xorg-x11-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.i386.rpm ia64: xorg-x11-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.ia64.rpm ppc: xorg-x11-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.ppc64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.ppc64.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.ppc64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.ppc64.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.ppc64.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.ppc64.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.ppc.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.ppc.rpm s390: xorg-x11-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.s390.rpm s390x: xorg-x11-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.s390.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.s390x.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.s390x.rpm x86_64: xorg-x11-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xorg-x11-6.8.2-1.EL.33.0.4.src.rpm i386: xorg-x11-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.i386.rpm x86_64: xorg-x11-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xorg-x11-6.8.2-1.EL.33.0.4.src.rpm i386: xorg-x11-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.i386.rpm ia64: xorg-x11-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.ia64.rpm x86_64: xorg-x11-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.33.0.4.src.rpm i386: xorg-x11-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.i386.rpm ia64: xorg-x11-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.ia64.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.ia64.rpm x86_64: xorg-x11-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGL-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-Mesa-libGLU-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xdmx-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xnest-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-Xvfb-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-deprecated-libs-devel-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-devel-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-doc-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-font-utils-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.i386.rpm xorg-x11-libs-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-sdk-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-tools-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-twm-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xauth-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xdm-6.8.2-1.EL.33.0.4.x86_64.rpm xorg-x11-xfs-6.8.2-1.EL.33.0.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIUC/7XlSAg2UNWIIRAmnHAJsEoZJwCajPN9PYczhwUjk966fGZgCfW40W N5jxo3SY4hWSFRe8QdKCInI= =Iq6f -----END PGP SIGNATURE----- --
  19. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: xorg-x11-server security update Advisory ID: RHSA-2008:0504-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0504.html Issue date: 2008-06-11 CVE Names: CVE-2008-1377 CVE-2008-1379 CVE-2008-2360 CVE-2008-2361 CVE-2008-2362 ===================================================================== 1. Summary: Updated xorg-x11-server packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: X.Org is an open source implementation of the X Window System. It provides basic low-level functionality that full-fledged graphical user interfaces are designed upon. An input validation flaw was discovered in X.org's Security and Record extensions. A malicious authorized client could exploit this issue to cause a denial of service (crash) or, potentially, execute arbitrary code with root privileges on the X.Org server. (CVE-2008-1377) Multiple integer overflow flaws were found in X.org's Render extension. A malicious authorized client could exploit these issues to cause a denial of service (crash) or, potentially, execute arbitrary code with root privileges on the X.Org server. (CVE-2008-2360, CVE-2008-2361, CVE-2008-2362) An input validation flaw was discovered in X.org's MIT-SHM extension. A client connected to the X.org server could read arbitrary server memory. This could result in the sensitive data of other users of the X.org server being disclosed. (CVE-2008-1379) Users of xorg-x11-server should upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 445403 - CVE-2008-1377 X.org Record and Security extensions memory corruption 445414 - CVE-2008-1379 X.org MIT-SHM extension arbitrary memory read 448783 - CVE-2008-2360 X.org Render extension AllocateGlyph() heap buffer overflow 448784 - CVE-2008-2361 X.org Render extension ProcRenderCreateCursor() crash 448785 - CVE-2008-2362 X.org Render extension input validation flaw causing memory corruption 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm i386: xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.i386.rpm x86_64: xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm i386: xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.i386.rpm x86_64: xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xorg-x11-server-1.1.1-48.41.el5_2.1.src.rpm i386: xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.i386.rpm xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.i386.rpm ia64: xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.ia64.rpm xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.ia64.rpm xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.ia64.rpm xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.ia64.rpm xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.ia64.rpm xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.ia64.rpm xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.ia64.rpm xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.ia64.rpm ppc: xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.ppc.rpm xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.ppc.rpm xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.ppc.rpm xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.ppc.rpm xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.ppc.rpm xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.ppc.rpm xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.ppc.rpm xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.ppc.rpm s390x: xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.s390x.rpm xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.s390x.rpm xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.s390x.rpm xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.s390x.rpm x86_64: xorg-x11-server-Xdmx-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-Xephyr-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-Xnest-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-Xorg-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-Xvfb-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-debuginfo-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-randr-source-1.1.1-48.41.el5_2.1.x86_64.rpm xorg-x11-server-sdk-1.1.1-48.41.el5_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIUDAVXlSAg2UNWIIRAspeAJ9oyf8NUJ2SR6i1rLOE0oaLEpyOYwCeNBxU hz3OUxmpOGdsQB04Ve2lAZA= =Nv9q -----END PGP SIGNATURE----- --
  20. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: XFree86 security update Advisory ID: RHSA-2008:0512-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0512.html Issue date: 2008-06-11 CVE Names: CVE-2008-1377 CVE-2008-1379 CVE-2008-2360 ===================================================================== 1. Summary: Updated XFree86 packages that fix several security issues are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 3. Description: XFree86 is an implementation of the X Window System, which provides the core functionality for the Linux graphical desktop. An input validation flaw was discovered in X.org's Security and Record extensions. A malicious authorized client could exploit this issue to cause a denial of service (crash) or, potentially, execute arbitrary code with root privileges on the X.Org server. (CVE-2008-1377) An integer overflow flaw was found in X.org's Render extension. A malicious authorized client could exploit this issue to cause a denial of service (crash) or, potentially, execute arbitrary code with root privileges on the X.Org server. (CVE-2008-2360) An input validation flaw was discovered in X.org's MIT-SHM extension. A client connected to the X.org server could read arbitrary server memory. This could result in the sensitive data of other users of the X.org server being disclosed. (CVE-2008-1379) Users of XFree86 are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 445403 - CVE-2008-1377 X.org Record and Security extensions memory corruption 445414 - CVE-2008-1379 X.org MIT-SHM extension arbitrary memory read 448783 - CVE-2008-2360 X.org Render extension AllocateGlyph() heap buffer overflow 6. Package List: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 : Source: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/XFree86-4.1.0-88.EL.src.rpm i386: XFree86-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-4.1.0-88.EL.i386.rpm XFree86-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-15-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-15-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-2-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-2-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-9-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-9-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-Xnest-4.1.0-88.EL.i386.rpm XFree86-Xvfb-4.1.0-88.EL.i386.rpm XFree86-cyrillic-fonts-4.1.0-88.EL.i386.rpm XFree86-devel-4.1.0-88.EL.i386.rpm XFree86-doc-4.1.0-88.EL.i386.rpm XFree86-libs-4.1.0-88.EL.i386.rpm XFree86-tools-4.1.0-88.EL.i386.rpm XFree86-twm-4.1.0-88.EL.i386.rpm XFree86-xdm-4.1.0-88.EL.i386.rpm XFree86-xf86cfg-4.1.0-88.EL.i386.rpm XFree86-xfs-4.1.0-88.EL.i386.rpm ia64: XFree86-100dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-4.1.0-88.EL.ia64.rpm XFree86-75dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-15-100dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-15-75dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-2-100dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-2-75dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-9-100dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-9-75dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-Xnest-4.1.0-88.EL.ia64.rpm XFree86-Xvfb-4.1.0-88.EL.ia64.rpm XFree86-cyrillic-fonts-4.1.0-88.EL.ia64.rpm XFree86-devel-4.1.0-88.EL.ia64.rpm XFree86-doc-4.1.0-88.EL.ia64.rpm XFree86-libs-4.1.0-88.EL.ia64.rpm XFree86-tools-4.1.0-88.EL.ia64.rpm XFree86-twm-4.1.0-88.EL.ia64.rpm XFree86-xdm-4.1.0-88.EL.ia64.rpm XFree86-xfs-4.1.0-88.EL.ia64.rpm Red Hat Linux Advanced Workstation 2.1: Source: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/XFree86-4.1.0-88.EL.src.rpm ia64: XFree86-100dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-4.1.0-88.EL.ia64.rpm XFree86-75dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-15-100dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-15-75dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-2-100dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-2-75dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-9-100dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-ISO8859-9-75dpi-fonts-4.1.0-88.EL.ia64.rpm XFree86-Xnest-4.1.0-88.EL.ia64.rpm XFree86-Xvfb-4.1.0-88.EL.ia64.rpm XFree86-cyrillic-fonts-4.1.0-88.EL.ia64.rpm XFree86-devel-4.1.0-88.EL.ia64.rpm XFree86-doc-4.1.0-88.EL.ia64.rpm XFree86-libs-4.1.0-88.EL.ia64.rpm XFree86-tools-4.1.0-88.EL.ia64.rpm XFree86-twm-4.1.0-88.EL.ia64.rpm XFree86-xdm-4.1.0-88.EL.ia64.rpm XFree86-xfs-4.1.0-88.EL.ia64.rpm Red Hat Enterprise Linux ES version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/XFree86-4.1.0-88.EL.src.rpm i386: XFree86-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-4.1.0-88.EL.i386.rpm XFree86-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-15-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-15-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-2-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-2-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-9-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-9-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-Xnest-4.1.0-88.EL.i386.rpm XFree86-Xvfb-4.1.0-88.EL.i386.rpm XFree86-cyrillic-fonts-4.1.0-88.EL.i386.rpm XFree86-devel-4.1.0-88.EL.i386.rpm XFree86-doc-4.1.0-88.EL.i386.rpm XFree86-libs-4.1.0-88.EL.i386.rpm XFree86-tools-4.1.0-88.EL.i386.rpm XFree86-twm-4.1.0-88.EL.i386.rpm XFree86-xdm-4.1.0-88.EL.i386.rpm XFree86-xf86cfg-4.1.0-88.EL.i386.rpm XFree86-xfs-4.1.0-88.EL.i386.rpm Red Hat Enterprise Linux WS version 2.1: Source: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/XFree86-4.1.0-88.EL.src.rpm i386: XFree86-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-4.1.0-88.EL.i386.rpm XFree86-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-15-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-15-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-2-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-2-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-9-100dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-ISO8859-9-75dpi-fonts-4.1.0-88.EL.i386.rpm XFree86-Xnest-4.1.0-88.EL.i386.rpm XFree86-Xvfb-4.1.0-88.EL.i386.rpm XFree86-cyrillic-fonts-4.1.0-88.EL.i386.rpm XFree86-devel-4.1.0-88.EL.i386.rpm XFree86-doc-4.1.0-88.EL.i386.rpm XFree86-libs-4.1.0-88.EL.i386.rpm XFree86-tools-4.1.0-88.EL.i386.rpm XFree86-twm-4.1.0-88.EL.i386.rpm XFree86-xdm-4.1.0-88.EL.i386.rpm XFree86-xf86cfg-4.1.0-88.EL.i386.rpm XFree86-xfs-4.1.0-88.EL.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIUDAmXlSAg2UNWIIRAo2AAKCS1+awAoswLIPtmfjln+wIOq+4+wCfeBiM KYAHfMpLWNzo5EsykwT7JUU= =KQnY -----END PGP SIGNATURE----- --
  21. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: perl security update Advisory ID: RHSA-2008:0522-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0522.html Issue date: 2008-06-11 CVE Names: CVE-2008-1927 ===================================================================== 1. Summary: Updated perl packages that fix a security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Perl is a high-level programming language commonly used for system administration utilities and Web programming. A flaw was found in Perl's regular expression engine. A specially crafted regular expression with Unicode characters could trigger a buffer overflow, causing Perl to crash, or possibly execute arbitrary code with the privileges of the user running Perl. (CVE-2008-1927) Users of perl are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 443928 - CVE-2008-1927 perl: heap corruption by regular expressions with utf8 characters 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/perl-5.8.0-98.EL3.src.rpm i386: perl-5.8.0-98.EL3.i386.rpm perl-CGI-2.89-98.EL3.i386.rpm perl-CPAN-1.61-98.EL3.i386.rpm perl-DB_File-1.806-98.EL3.i386.rpm perl-debuginfo-5.8.0-98.EL3.i386.rpm perl-suidperl-5.8.0-98.EL3.i386.rpm ia64: perl-5.8.0-98.EL3.ia64.rpm perl-CGI-2.89-98.EL3.ia64.rpm perl-CPAN-1.61-98.EL3.ia64.rpm perl-DB_File-1.806-98.EL3.ia64.rpm perl-debuginfo-5.8.0-98.EL3.ia64.rpm perl-suidperl-5.8.0-98.EL3.ia64.rpm ppc: perl-5.8.0-98.EL3.ppc.rpm perl-CGI-2.89-98.EL3.ppc.rpm perl-CPAN-1.61-98.EL3.ppc.rpm perl-DB_File-1.806-98.EL3.ppc.rpm perl-debuginfo-5.8.0-98.EL3.ppc.rpm perl-suidperl-5.8.0-98.EL3.ppc.rpm s390: perl-5.8.0-98.EL3.s390.rpm perl-CGI-2.89-98.EL3.s390.rpm perl-CPAN-1.61-98.EL3.s390.rpm perl-DB_File-1.806-98.EL3.s390.rpm perl-debuginfo-5.8.0-98.EL3.s390.rpm perl-suidperl-5.8.0-98.EL3.s390.rpm s390x: perl-5.8.0-98.EL3.s390x.rpm perl-CGI-2.89-98.EL3.s390x.rpm perl-CPAN-1.61-98.EL3.s390x.rpm perl-DB_File-1.806-98.EL3.s390x.rpm perl-debuginfo-5.8.0-98.EL3.s390x.rpm perl-suidperl-5.8.0-98.EL3.s390x.rpm x86_64: perl-5.8.0-98.EL3.x86_64.rpm perl-CGI-2.89-98.EL3.x86_64.rpm perl-CPAN-1.61-98.EL3.x86_64.rpm perl-DB_File-1.806-98.EL3.x86_64.rpm perl-debuginfo-5.8.0-98.EL3.x86_64.rpm perl-suidperl-5.8.0-98.EL3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/perl-5.8.0-98.EL3.src.rpm i386: perl-5.8.0-98.EL3.i386.rpm perl-CGI-2.89-98.EL3.i386.rpm perl-CPAN-1.61-98.EL3.i386.rpm perl-DB_File-1.806-98.EL3.i386.rpm perl-debuginfo-5.8.0-98.EL3.i386.rpm perl-suidperl-5.8.0-98.EL3.i386.rpm x86_64: perl-5.8.0-98.EL3.x86_64.rpm perl-CGI-2.89-98.EL3.x86_64.rpm perl-CPAN-1.61-98.EL3.x86_64.rpm perl-DB_File-1.806-98.EL3.x86_64.rpm perl-debuginfo-5.8.0-98.EL3.x86_64.rpm perl-suidperl-5.8.0-98.EL3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/perl-5.8.0-98.EL3.src.rpm i386: perl-5.8.0-98.EL3.i386.rpm perl-CGI-2.89-98.EL3.i386.rpm perl-CPAN-1.61-98.EL3.i386.rpm perl-DB_File-1.806-98.EL3.i386.rpm perl-debuginfo-5.8.0-98.EL3.i386.rpm perl-suidperl-5.8.0-98.EL3.i386.rpm ia64: perl-5.8.0-98.EL3.ia64.rpm perl-CGI-2.89-98.EL3.ia64.rpm perl-CPAN-1.61-98.EL3.ia64.rpm perl-DB_File-1.806-98.EL3.ia64.rpm perl-debuginfo-5.8.0-98.EL3.ia64.rpm perl-suidperl-5.8.0-98.EL3.ia64.rpm x86_64: perl-5.8.0-98.EL3.x86_64.rpm perl-CGI-2.89-98.EL3.x86_64.rpm perl-CPAN-1.61-98.EL3.x86_64.rpm perl-DB_File-1.806-98.EL3.x86_64.rpm perl-debuginfo-5.8.0-98.EL3.x86_64.rpm perl-suidperl-5.8.0-98.EL3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/perl-5.8.0-98.EL3.src.rpm i386: perl-5.8.0-98.EL3.i386.rpm perl-CGI-2.89-98.EL3.i386.rpm perl-CPAN-1.61-98.EL3.i386.rpm perl-DB_File-1.806-98.EL3.i386.rpm perl-debuginfo-5.8.0-98.EL3.i386.rpm perl-suidperl-5.8.0-98.EL3.i386.rpm ia64: perl-5.8.0-98.EL3.ia64.rpm perl-CGI-2.89-98.EL3.ia64.rpm perl-CPAN-1.61-98.EL3.ia64.rpm perl-DB_File-1.806-98.EL3.ia64.rpm perl-debuginfo-5.8.0-98.EL3.ia64.rpm perl-suidperl-5.8.0-98.EL3.ia64.rpm x86_64: perl-5.8.0-98.EL3.x86_64.rpm perl-CGI-2.89-98.EL3.x86_64.rpm perl-CPAN-1.61-98.EL3.x86_64.rpm perl-DB_File-1.806-98.EL3.x86_64.rpm perl-debuginfo-5.8.0-98.EL3.x86_64.rpm perl-suidperl-5.8.0-98.EL3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/perl-5.8.5-36.el4_6.3.src.rpm i386: perl-5.8.5-36.el4_6.3.i386.rpm perl-debuginfo-5.8.5-36.el4_6.3.i386.rpm perl-suidperl-5.8.5-36.el4_6.3.i386.rpm ia64: perl-5.8.5-36.el4_6.3.ia64.rpm perl-debuginfo-5.8.5-36.el4_6.3.ia64.rpm perl-suidperl-5.8.5-36.el4_6.3.ia64.rpm ppc: perl-5.8.5-36.el4_6.3.ppc.rpm perl-debuginfo-5.8.5-36.el4_6.3.ppc.rpm perl-suidperl-5.8.5-36.el4_6.3.ppc.rpm s390: perl-5.8.5-36.el4_6.3.s390.rpm perl-debuginfo-5.8.5-36.el4_6.3.s390.rpm perl-suidperl-5.8.5-36.el4_6.3.s390.rpm s390x: perl-5.8.5-36.el4_6.3.s390x.rpm perl-debuginfo-5.8.5-36.el4_6.3.s390x.rpm perl-suidperl-5.8.5-36.el4_6.3.s390x.rpm x86_64: perl-5.8.5-36.el4_6.3.x86_64.rpm perl-debuginfo-5.8.5-36.el4_6.3.x86_64.rpm perl-suidperl-5.8.5-36.el4_6.3.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/perl-5.8.5-36.el4_6.3.src.rpm i386: perl-5.8.5-36.el4_6.3.i386.rpm perl-debuginfo-5.8.5-36.el4_6.3.i386.rpm perl-suidperl-5.8.5-36.el4_6.3.i386.rpm x86_64: perl-5.8.5-36.el4_6.3.x86_64.rpm perl-debuginfo-5.8.5-36.el4_6.3.x86_64.rpm perl-suidperl-5.8.5-36.el4_6.3.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/perl-5.8.5-36.el4_6.3.src.rpm i386: perl-5.8.5-36.el4_6.3.i386.rpm perl-debuginfo-5.8.5-36.el4_6.3.i386.rpm perl-suidperl-5.8.5-36.el4_6.3.i386.rpm ia64: perl-5.8.5-36.el4_6.3.ia64.rpm perl-debuginfo-5.8.5-36.el4_6.3.ia64.rpm perl-suidperl-5.8.5-36.el4_6.3.ia64.rpm x86_64: perl-5.8.5-36.el4_6.3.x86_64.rpm perl-debuginfo-5.8.5-36.el4_6.3.x86_64.rpm perl-suidperl-5.8.5-36.el4_6.3.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/perl-5.8.5-36.el4_6.3.src.rpm i386: perl-5.8.5-36.el4_6.3.i386.rpm perl-debuginfo-5.8.5-36.el4_6.3.i386.rpm perl-suidperl-5.8.5-36.el4_6.3.i386.rpm ia64: perl-5.8.5-36.el4_6.3.ia64.rpm perl-debuginfo-5.8.5-36.el4_6.3.ia64.rpm perl-suidperl-5.8.5-36.el4_6.3.ia64.rpm x86_64: perl-5.8.5-36.el4_6.3.x86_64.rpm perl-debuginfo-5.8.5-36.el4_6.3.x86_64.rpm perl-suidperl-5.8.5-36.el4_6.3.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/perl-5.8.8-10.el5_2.3.src.rpm i386: perl-5.8.8-10.el5_2.3.i386.rpm perl-debuginfo-5.8.8-10.el5_2.3.i386.rpm perl-suidperl-5.8.8-10.el5_2.3.i386.rpm x86_64: perl-5.8.8-10.el5_2.3.i386.rpm perl-5.8.8-10.el5_2.3.x86_64.rpm perl-debuginfo-5.8.8-10.el5_2.3.i386.rpm perl-debuginfo-5.8.8-10.el5_2.3.x86_64.rpm perl-suidperl-5.8.8-10.el5_2.3.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/perl-5.8.8-10.el5_2.3.src.rpm i386: perl-5.8.8-10.el5_2.3.i386.rpm perl-debuginfo-5.8.8-10.el5_2.3.i386.rpm perl-suidperl-5.8.8-10.el5_2.3.i386.rpm ia64: perl-5.8.8-10.el5_2.3.ia64.rpm perl-debuginfo-5.8.8-10.el5_2.3.ia64.rpm perl-suidperl-5.8.8-10.el5_2.3.ia64.rpm ppc: perl-5.8.8-10.el5_2.3.ppc.rpm perl-debuginfo-5.8.8-10.el5_2.3.ppc.rpm perl-suidperl-5.8.8-10.el5_2.3.ppc.rpm s390x: perl-5.8.8-10.el5_2.3.s390x.rpm perl-debuginfo-5.8.8-10.el5_2.3.s390x.rpm perl-suidperl-5.8.8-10.el5_2.3.s390x.rpm x86_64: perl-5.8.8-10.el5_2.3.x86_64.rpm perl-debuginfo-5.8.8-10.el5_2.3.x86_64.rpm perl-suidperl-5.8.8-10.el5_2.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIUDCkXlSAg2UNWIIRAseEAJ9XHUh3vfBT5ywOj4NrOPtu7ZbKowCeJIQE o3kb87TCMm2B2mWYaGvK2eU= =8XND -----END PGP SIGNATURE----- --
  22. Hello, - Caffeinated Games Formed http://www.gamershell.com/news_52730.html - Sins of a Solar Empire UK Demo http://www.gamershell.com/news_52732.html - Major League Eating Watermelon Competition Details Announced http://www.gamershell.com/news_52728.html - Ignition Entertainment Relocating to Glendale http://www.gamershell.com/news_52726.html - Disgaea 3 Bonus Soundtrack Voting Started http://www.gamershell.com/news_52724.html Best Regards, GamersHell.com Staff =============================================================================
  23. Hello Technology News Community, I4U NEWS published a review of Mass Effect for PC video game. Quote from the review: "Today we are checking out the recently released Mass Effect PC game. Mass Effect is an immensely fun and deep game that virtually all PC gamers will find something to like in. You could literally write a book about Mass Effect giving away plot details as you go along. If you are a fan of sci-fi role playing or shooter games you simply must add Mass Effect to your library. Mass Effect is simply one of the best PC games I have ever played." Full Review: http://www.i4u.com/full-review-440.html Photo: http://www.i4u.com/images/2007/masseffect-stock.jpg Homepage Link: http://www.i4u.com We would very much appreciate if you post this news story/review on your site. As always I4U News is open to cross-post your technology stories. Please visit http://www.i4u.com for more stories. As long as you provide credits and links to the original story on I4U News we appreciate any cross-posting of our content. If you don't want to receive review and news submissions from I4U News please just reply to this email indicating that or use the unsubscribe link below. We appreciate giving us a chance to inform you about our latest reviews and please apologize if this email reaches you in error or does not meet your interest. best regards, Chief Editor Luigi Lugmayr :: I4U Technology News Network :: http://www.i4u.com - Technology News http://shop.i4u.com - I4U Shop http://pricewatch.i4u.com - Shopping Guide http://www.wristdreams.com - Technology Wrist Watches :::
  24. Hello, OCIA.net has posted their June Forum Contest with a chance to win a brand new Tagan CS-Monolize Case! : "As many of you know, we just launched a new feature on the site / forum, our Member Photo Gallery. We have several categories where you can share photos of your computer, hardware, tech toys, cars, anything you want really (within reason, of course). To help celebrate the opening of our photo gallery and stir up some excitement, we have teamed up with Tagan to give away one of their CS-Monolize Super Tower Cases!" Direct Link: http://forums.ocia.net/showthread.php?t=3711 Site Link: http://www.ocia.net A news posting on your site would be greatly appreciated. Thanks in advance for your support! Thanks, OCIA.net Staff http://www.ocia.net
  25. Axiotron Receives Conditional Approval to Go Public - Published on 06/11/08 Modbook manufacturer Axiotron, Inc. announced today that the TSX Venture Exchange has conditionally approved a proposed transaction that would raise at least $5 million and authorize shares in the El Segundo, California-based company to trade publicly. Net proceeds from the proposed transaction would be used to finance continued production of the Modbook, Axiotron's award-winning tablet Mac computer, and for other business purposes. El Segundo, CA - High-tech solution hardware provider Axiotron, Inc. ("Axiotron") announced today that the TSX Venture Exchange has conditionally approved a proposed transaction with Toronto-based Vendome Capital Corp. ("Vendome") that, subject to the deal's closure, would raise at least $5 million and authorize Axiotron's shares to trade publicly at the TSX Venture Exchange in Toronto, Ontario. Under the proposed transaction, the operations of Axiotron would be folded into Vendome - a capital pool company with cash assets but no operations - and the resulting company would be renamed Axiotron Corp. Shares of Axiotron Corp. would then be listed on the TSX Venture Exchange, one of Canada's two major stock exchanges. Axiotron anticipates the proposed transaction will close by June 30, 2008, conditioned on final approval from the TSX Venture Exchange. Axiotron Corp.'s operations and corporate headquarters would remain at their current location in El Segundo, California. Net proceeds from the proposed transaction would be used to finance continued production of the Modbook - Axiotron's award-winning tablet Mac computer - and for general working capital purposes and product development initiatives. Providing continuation of the vision and leadership that has guided Axiotron for over three years, Andreas E. Haas, the founder and current chief executive officer of Axiotron, would become the CEO of Axiotron Corp. Claude Ayache, the current president and chief financial officer of Vendome, would be appointed as the CFO of Axiotron Corp. Both Mr. Haas and Mr. Ayache would also serve on Axiotron Corp.'s board of directors. Mark Lawrence - the managing partner of the Toronto and Ottawa, Ontario-based business advisory and corporate finance firm NorthCrest Partners Inc. - would become chairman of the board of directors of Axiotron Corp. As part of the proposed transaction, Axiotron has engaged Toronto, Ontario-based investment dealer Fraser Mackenzie Limited as the lead agent to raise at least $5 million in a concurrent private placement. Also participating in the concurrent private placement are Toronto, Ontario-based investment banks Dominick & Dominick Securities Inc., and M Partners Inc. Interested parties wishing to get more information about the concurrent private placement should contact Philip W. Benson of Fraser Mackenzie Limited at (416) 955-0990, ext. 233. Documents relevant to the proposed transaction can be found under Vendome Capital Corp. at SEDAR, the document filing and retrieval website for Canadian public companies. The TSX Venture Exchange Inc., has in no way passed upon the merits of the proposed transaction and has neither approved nor disapproved of the contents of this news release. This news release does not constitute an offer to sell or the solicitation of any offer to buy any securities of Axiotron, Inc. or Vendome Capital Corp. in any jurisdiction or to any person to whom it is or would be unlawful to make such offer or solicitation. Any securities that may be offered will not be and have not been registered under the Securities Act of 1933 or qualified under applicable state securities laws and may not be offered or sold nor distributed in the United States or to residents of the United States. Axiotron, Inc.: http://www.axiotron.com/ SEDAR: http://www.sedar.com/ A high-tech solution hardware manufacturing company and an Apple Premier Developer, Axiotron, Inc., is the maker of the Modbook, the one and only tablet Mac solution. Following its unique vision of Customizing Your World, Axiotron is dedicated to becoming a leading high-tech innovator through the conception and development of intriguing digital lifestyle products. In addition, Axiotron offers its product development expertise to companies in need of custom hardware solutions. Founded in January 2005 and privately held, Axiotron is a Delaware corporation headquartered in El Segundo, California, USA. ### Mark Perlstein Marketing Communications Manager 310-426-2670 mark ( -at -) axiotron.com ******* ******* *******
×