news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
Hi, XSReviews have posted a new review. Clickshot has reviewed the *Noiseblocker Coolscraper 3.0 CPU Cooler** **Title:* Noiseblocker Coolscraper 3.0 Review ( -at -) XSReviews *Review Link**:* http://www.xsreviews.co.uk/reviews/cpu-coolers/noiseblocker-coolscraper-30/ *Small Thumbnail:* http://www.xsreviews.co.uk/images/thumbs/scrape.jpg *Large Thumnail: *http://www.xsreviews.co.uk/images/thumbs/scrape-l.jpg <http://www.xsreviews.co.uk/images/thumbs/scrape-l.jpg> *Quote:* "Noiseblocker have created some pretty immense coolers in the past, notably among them is the Coolscraper series which combines high performance cooling with ultra silence. Now they've sent me the much anticipated Coolscraper 3. Lets see if it lives up to the high standard that we have come to expect from Coolscraper over the past few years." *A news post on your site would be very much appreciated. We would also love you to add us to your news list, so if you are interested in us posting your news on our site, then please send all news to the email below! If you like our site and would like to swap links and become a site affiliate then please email us as well. RSS Feed: * <http://feeds.xsreviews.co.uk/xsreviews-Our_reviews>http://feeds.xsreviews.co.uk/xsreviews-Our_reviews'>http://feeds.xsreviews.co.uk/xsreviews-Our_reviews>http://feeds.xsreviews.co.uk/xsreviews-Our_reviews <http://feeds.xsreviews.co.uk/xsreviews-Our_reviews>* <http://feeds.xsreviews.co.uk/xsreviews-Our_reviews> *Thanks Jon "Whoopty" Martindale www.xsreviews.co.uk <http://www.xsreviews.co.uk>
-
TinyPlanet Software announces Knapsack 1.1 with iCal synchronization
news posted a topic in Upcoming News
TinyPlanet Software announces Knapsack 1.1 with iCal synchronization - Published on 05/07/08 TinyPlanet Software is excited to announce Knapsack 1.1, the first update to the personal travel organizer for Mac OS X Leopard. Version 1.1 features full iCal synchronization allowing users to take their itineraries and checklists with them on their iPhones or PDAs. Any changes made while traveling are automatically reflected in Knapsack after syncing with iCal. Version 1.1 builds upon Knapsack's original goal of offering users the tools to plan, organize, and relive their travel adventures. San Diego, California - TinyPlanet Software is excited to announce Knapsack 1.1, the first update to the personal travel organizer for Mac OS X Leopard. Version 1.1 features two-way iCal synchronization allowing users to take their carefully crafted itineraries and checklists with them on their iPhones or PDAs or publish to .Mac via iCal. Now, any changes made while traveling are automatically reflected in Knapsack after syncing with iCal. Calendar synchronization builds upon Knapsack's original goal of offering users the tools to plan, organize, and relive their travel adventures. This version also expands Knapsack's exporting capabilities by allowing one-way export to iCal in addition to two-way sync. Knapsack 1.1 allows users to easily sync a trip's itinerary and checklists with iCal. Users have the flexibility to sync with an existing calendar or allow Knapsack to create a new calendar just for that trip. Once a trip is synchronized, any changes made to activities or checklist items in iCal will be automatically reflected in Knapsack. Users can now make plans while on-the-go with their iPhones and sync the changes back to Knapsack. Users will no longer forget a hotel tip offered by a friend over lunch or a restaurant suggestion read while away from their computer. Just as someone might stick a pin on a map to mark a spot they've visited, users can place pins on the world map in Knapsack to represent locations from their trips. Users can revisit all the places they've been simply by clicking on any pin to see a postcard from that location. A single click in the postcard opens a Google map of that place in the world. Reliving trips has never been so fun and organized. Planning a trip is as easy as drag and drop. With flexible itineraries, users can shuffle activities between days or even rearrange entire days. They can copy and paste important activities and checklists within or even between trips. Knapsack also helps simplify planning by allowing users to duplicate one of their existing trips to use as the starting point for a new one. When returning from a trip, users can add notes about what they liked or didn't like and create a memory of their trip. By rating trips from zero to five stars, users can sort their trip library by their favorite trips, keeping their most treasured travel adventures at the top of their list. Users can stay on top of their trip through all stages of travel planning by using checklists to help remember important items before, during, and after a trip. As a trip is planned, users can keep track of all unfinished business by creating checklists for packing, shopping, or lists of things to do. When it's time to depart, users can print professional-looking itineraries to take with them or share with anyone around the world via email. Knapsack is built from the ground up on Apple's latest technology and will continue to advance with every new version of Mac OS X. Version 1.1 is the first update and includes a host of great features: * Flexible Itinerary Planner * World Map with Pins and Postcards * Two-Way iCal Synchronization and One-Way Export to iCal * Sharing via Import/Export or PDF * Professional-Looking Printed Itineraries * Trip Groups * Smart Groups * Sample Trips * Built-in Help Minimum Requirements: * Mac OS X Version 10.5 Leopard or higher Pricing and Availability: Knapsack 1.1 is a free upgrade for existing 1.0 customers. A single-user license is only $39.95 USD, and is available as a 30-day full-featured demo. There is also a five-user Family Pack for $59.95 USD. TinyPlanet Software, LLC: http://tinyplanetsoftware.com/ Download Knapsack 1.1: http://tinyplanetsoftware.com/Knapsack.zip Purchase: https://store.tinyplanetsoftware.com/ Screenshot: http://tinyplanetsoftware.com/images/knapsack-map.jpg Knapsack Icon: http://tinyplanetsoftware.com/knapsack/knapsack-icon.png Headquartered in San Diego, California, TinyPlanet Software is a privately funded LLC co-founded in 2006 by Chris Boykin, Ruby Lee, Brad Willoughby, and Merrilee Willoughby. With a passion for the Mac platform, TinyPlanet Software aims to bring simple, friendly, and easy-to-use applications to the ever-growing world of Mac users. Copyright 2006-2008 TinyPlanet Software LLC. All Rights Reserved. Apple, the Apple logo, are registered trademarks of Apple Computer. Google is a registered trademark of Google Inc. ### Brad Willoughby Co-Founder info ( -at -) tinyplanetsoftware.com ******* -
Hi, It's Kristofer from DragonSteelMods, and I have a new review today that I think your readers might find interesting. Title: Hades Gaming Ares H1 Optical Gaming Mouse ( -at -) DragonSteelMods Review Link: http://www.dragonsteelmods.com/index.php?option=com_content&task=view&id=7455&Itemid=38 Review Snipit: "Gaming mice provide many features that are unavailable in standard mice. These options include higher DPI, the inclusion of counterweights, Teflon feet and precise tracking speeds. The two biggest names in the Gaming Mice arena include Logitech and Razer. Well, move over boys, there is a new contender. Hades Gaming has released the H1 Optical Gaming Mouse and this mouse holds it own against the big boys. " Review Picture(200x150): http://www.dragonsteelmods.com/Images/reviews2/hades-mouse/Hades14.jpg Main site link: http://www.dragonsteelmods.com A post in your news would be greatly appreciated. Any and all news sent to me will be posted! If you would like to be added to our 'News Feeds' page please feel free to send me your http link to the feed and I will gladly add it ASAP. If you'd like to swap links for affiliation, I'd be happy to, just drop me a message...
-
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Valve's Source Engine Coming To Linux ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=12330 Summary: "There have been rumors since last year that Valve may be serious about porting Source games to Linux after Valve Software began seeking a senior software engineer with the responsibility of porting Windows-based games to the Linux platform. Valve Software has yet to officially announce Linux clients for any of its software, but at Phoronix we have received information confirming that Valve is indeed porting its very popular Source engine to the Linux platform." Please feel free to contact us with any questions or comments you may
-
Digit-Life Review: NVIDIA GeForce 9800 GTX Graphics Card Excerpt: "While renaming products to GeForce 9xxx, NVIDIA launched another graphics card based on G92 -- GeForce 9800 GTX. It's the most powerful single-GPU graphics card, designed to replace GeForce 8800 GTX (and probably GeForce 8800 GTS 512MB in the nearest future). However, at this moment GeForce 9800 GTX stands in between GeForce 9800 GX2 and GeForce 8800 GTS 512 MB." Article: http://www.digit-life.com/articles3/video/g92-6-part1.html A post on your website would be appreciated! To exchange news & reviews with Digit-Life, to change subscription address, or to unsubscribe write to cormac ( -at -) ixbt.com. If you post notes about Digit-Life reviews, but don't see me doing the same, please email me as well. Best regards, Artem Pavlenko, www.Digit-Life.com / iXBT.com
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Silverstone Treasure TS01B RFID Enclosure Link: http://www.techpowerup.com/reviews/Silverstone/Treasure_TS01B Brief: The Silverstone Treasure TS01B is a very unique 2.5" SATA hard drive enclosure. You may not only use it as a plain USB 2.0 powered unit, but may also set it up to safely encrypt your hard drive as well. The two included RFID tags then act as keys to gain access to your data.
-
Hi all, We have just published a review of *Gigabyte's X48T-DQ6 motherboard*. If you could post a link on your site that would be very much appreciated. *Link:* http://www.bit-tech.net/hardware/2008/05/07/gigabyte-ga-x48t-dq6-motherboard/1 *Picture:* http://images.bit-tech.net/content_images/2008/05/gigabyte-ga-x48t-dq6-motherboard/fp_img.jpg *Quote: */"On price, we feel the Gigabyte X48T-DQ6 holds its own and but at the same time it's not exceptional -- that said, it is worth the asking price for a premium board that's fully featured and works really very well. The performance is very good, it's easy to work with and while we still don't get on too well with the DES software, the hardware looks good and it works efficiently with finesse in the background. While it hits all the right notes for us (oodles of features, a great layout, a decent bundle and very good performance and ease of use), the Gigabyte GA-X48T-DQ6 isn't a definitive choice, but it is certainly a good one if you're wanting to invest in DDR3 with some upgrade potential." / * *Cheers guys! Tim Smalley www.bit-tech.net
-
http://www.driverheaven.net/gamingreviews.php?reviewid=593 Echochrome is a puzzle game, however it breaks the usual tried and tested mould by letting the gamer change and alter the in game perception to solve the puzzles. These optical illusions are rather unique within the puzzle world and the focus is entirely based on wireframe style graphics. A series of platforms are presented mid air against a backdrop of pure white. In the midst of these platforms is a wire frame persona who continually walks along the current platform, accompanied by four shadowy echoes of that figure in various sections of that particular level. Thanks Craig ______________________________ <http://www.driverheaven.net> DriverHeaven.net - Administrator/Site Designer
-
Today we look at the Wolfking Warrior XXtreme. In today’s gamer-friendly market there seems to be no shortage of gaming peripherals to choose from. Unfortunately for the games, however, not all peripherals are created equal - making it difficult and risky to choose. Today I hope to help with your decision by taking a look at the Wolfking Warrior XXtreme gaming keyboard. As an avid gamer that has always used a basic keyboard, the comparison will prove to be a great test for the latest Wolfking. http://www.bjorn3d.com/read.php?cID=1272 A post on your site would be great if you can. Thank you, Scott -----------------------------------------
-
VL System M-Play Blast LCD Case Display & Remote Control Review @ Tweaknews.net
news posted a topic in Upcoming News
Fellow Webmasters, Site Owners and Newsposters, Tweaknews.net has released yet another review onto the internet. I was wondering if you could please post it in today's news for me. ---------------------------------------------------------------------------------------- Article Name: VL System M-Play Blast LCD Case Display & Remote Control Review ( -at -) Tweaknews.net Article Url: http://www.tweaknews.net/reviews/vl_system_m-play_blast_review/ Article PIC: http://www.tweaknews.net/reviews/vl_system_m-play_blast_review/img/email.jpg Article Snippet: "I always enjoy being surprised by a product and the M-Play Blast was one such device. Not only did it exceed my expectations, it thoroughly impressed me. If you are looking for a remote setup for your media center and want something that looks at home with your VCR and other entertainment systems then the retro look of the M-play Blast should be right up your alley." ------------------------------------------------------------------------------------------ Could you email back saying you posted it, TWEAK IT LIKE YOU MEAN IT!!!! Many Thanks, Nathan Glentworth Owner / Head Editor nathan ( -at -) tweaknews.net www.Tweaknews.net www.Tweaknews.com -
[RHSA-2008:0211-01] Important: kernel security and bug fix update
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2008:0211-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0211.html Issue date: 2008-05-07 CVE Names: CVE-2006-4814 CVE-2007-5001 CVE-2007-6151 CVE-2007-6206 CVE-2008-0007 CVE-2008-1367 CVE-2008-1375 CVE-2008-1669 ===================================================================== 1. Summary: Updated kernel packages that fix various security issues and several bugs are now available for Red Hat Enterprise Linux 3. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * the absence of a protection mechanism when attempting to access a critical section of code has been found in the Linux kernel open file descriptors control mechanism, fcntl. This could allow a local unprivileged user to simultaneously execute code, which would otherwise be protected against parallel execution. As well, a race condition when handling locks in the Linux kernel fcntl functionality, may have allowed a process belonging to a local unprivileged user to gain re-ordered access to the descriptor table. (CVE-2008-1669, Important) * the absence of a protection mechanism when attempting to access a critical section of code, as well as a race condition, have been found in the Linux kernel file system event notifier, dnotify. This could allow a local unprivileged user to get inconsistent data, or to send arbitrary signals to arbitrary system processes. (CVE-2008-1375, Important) Red Hat would like to thank Nick Piggin for responsibly disclosing the following issue: * when accessing kernel memory locations, certain Linux kernel drivers registering a fault handler did not perform required range checks. A local unprivileged user could use this flaw to gain read or write access to arbitrary kernel memory, or possibly cause a kernel crash. (CVE-2008-0007, Important) * a flaw was found when performing asynchronous input or output operations on a FIFO special file. A local unprivileged user could use this flaw to cause a kernel panic. (CVE-2007-5001, Important) * a flaw was found in the way core dump files were created. If a local user could get a root-owned process to dump a core file into a directory, which the user has write access to, they could gain read access to that core file. This could potentially grant unauthorized access to sensitive information. (CVE-2007-6206, Moderate) * a buffer overflow was found in the Linux kernel ISDN subsystem. A local unprivileged user could use this flaw to cause a denial of service. (CVE-2007-6151, Moderate) * a race condition found in the mincore system core could allow a local user to cause a denial of service (system hang). (CVE-2006-4814, Moderate) * it was discovered that the Linux kernel handled string operations in the opposite way to the GNU Compiler Collection (GCC). This could allow a local unprivileged user to cause memory corruption. (CVE-2008-1367, Low) As well, these updated packages fix the following bugs: * a bug, which caused long delays when unmounting mounts containing a large number of unused dentries, has been resolved. * in the previous kernel packages, the kernel was unable to handle certain floating point instructions on Itanium® architectures. * on certain Intel CPUs, the Translation Lookaside Buffer (TLB) was not flushed correctly, which caused machine check errors. Red Hat Enterprise Linux 3 users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 306971 - CVE-2006-4814 kernel Race condition in mincore can cause "ps -ef" to hang 326251 - CVE-2007-5001 kernel asynchronous IO on a FIFO kernel panic 396861 - CVE-2007-6206 Issue with core dump owner 413731 - RHEL3: System hangs at unmount 425111 - CVE-2007-6151 I4L: fix isdn_ioctl memory issue 428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap 437312 - CVE-2008-1367 Kernel doesn't clear DF for signal handlers 439754 - CVE-2008-1375 kernel: race condition in dnotify (local DoS, local roothole possible) 443433 - CVE-2008-1669 kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kernel-2.4.21-57.EL.src.rpm i386: kernel-2.4.21-57.EL.athlon.rpm kernel-2.4.21-57.EL.i686.rpm kernel-BOOT-2.4.21-57.EL.i386.rpm kernel-debuginfo-2.4.21-57.EL.athlon.rpm kernel-debuginfo-2.4.21-57.EL.i386.rpm kernel-debuginfo-2.4.21-57.EL.i686.rpm kernel-doc-2.4.21-57.EL.i386.rpm kernel-hugemem-2.4.21-57.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-57.EL.i686.rpm kernel-smp-2.4.21-57.EL.athlon.rpm kernel-smp-2.4.21-57.EL.i686.rpm kernel-smp-unsupported-2.4.21-57.EL.athlon.rpm kernel-smp-unsupported-2.4.21-57.EL.i686.rpm kernel-source-2.4.21-57.EL.i386.rpm kernel-unsupported-2.4.21-57.EL.athlon.rpm kernel-unsupported-2.4.21-57.EL.i686.rpm ia64: kernel-2.4.21-57.EL.ia64.rpm kernel-debuginfo-2.4.21-57.EL.ia64.rpm kernel-doc-2.4.21-57.EL.ia64.rpm kernel-source-2.4.21-57.EL.ia64.rpm kernel-unsupported-2.4.21-57.EL.ia64.rpm ppc: kernel-2.4.21-57.EL.ppc64iseries.rpm kernel-2.4.21-57.EL.ppc64pseries.rpm kernel-debuginfo-2.4.21-57.EL.ppc64.rpm kernel-debuginfo-2.4.21-57.EL.ppc64iseries.rpm kernel-debuginfo-2.4.21-57.EL.ppc64pseries.rpm kernel-doc-2.4.21-57.EL.ppc64.rpm kernel-source-2.4.21-57.EL.ppc64.rpm kernel-unsupported-2.4.21-57.EL.ppc64iseries.rpm kernel-unsupported-2.4.21-57.EL.ppc64pseries.rpm s390: kernel-2.4.21-57.EL.s390.rpm kernel-debuginfo-2.4.21-57.EL.s390.rpm kernel-doc-2.4.21-57.EL.s390.rpm kernel-source-2.4.21-57.EL.s390.rpm kernel-unsupported-2.4.21-57.EL.s390.rpm s390x: kernel-2.4.21-57.EL.s390x.rpm kernel-debuginfo-2.4.21-57.EL.s390x.rpm kernel-doc-2.4.21-57.EL.s390x.rpm kernel-source-2.4.21-57.EL.s390x.rpm kernel-unsupported-2.4.21-57.EL.s390x.rpm x86_64: kernel-2.4.21-57.EL.ia32e.rpm kernel-2.4.21-57.EL.x86_64.rpm kernel-debuginfo-2.4.21-57.EL.ia32e.rpm kernel-debuginfo-2.4.21-57.EL.x86_64.rpm kernel-doc-2.4.21-57.EL.x86_64.rpm kernel-smp-2.4.21-57.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-57.EL.x86_64.rpm kernel-source-2.4.21-57.EL.x86_64.rpm kernel-unsupported-2.4.21-57.EL.ia32e.rpm kernel-unsupported-2.4.21-57.EL.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kernel-2.4.21-57.EL.src.rpm i386: kernel-2.4.21-57.EL.athlon.rpm kernel-2.4.21-57.EL.i686.rpm kernel-BOOT-2.4.21-57.EL.i386.rpm kernel-debuginfo-2.4.21-57.EL.athlon.rpm kernel-debuginfo-2.4.21-57.EL.i386.rpm kernel-debuginfo-2.4.21-57.EL.i686.rpm kernel-doc-2.4.21-57.EL.i386.rpm kernel-hugemem-2.4.21-57.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-57.EL.i686.rpm kernel-smp-2.4.21-57.EL.athlon.rpm kernel-smp-2.4.21-57.EL.i686.rpm kernel-smp-unsupported-2.4.21-57.EL.athlon.rpm kernel-smp-unsupported-2.4.21-57.EL.i686.rpm kernel-source-2.4.21-57.EL.i386.rpm kernel-unsupported-2.4.21-57.EL.athlon.rpm kernel-unsupported-2.4.21-57.EL.i686.rpm x86_64: kernel-2.4.21-57.EL.ia32e.rpm kernel-2.4.21-57.EL.x86_64.rpm kernel-debuginfo-2.4.21-57.EL.ia32e.rpm kernel-debuginfo-2.4.21-57.EL.x86_64.rpm kernel-doc-2.4.21-57.EL.x86_64.rpm kernel-smp-2.4.21-57.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-57.EL.x86_64.rpm kernel-source-2.4.21-57.EL.x86_64.rpm kernel-unsupported-2.4.21-57.EL.ia32e.rpm kernel-unsupported-2.4.21-57.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kernel-2.4.21-57.EL.src.rpm i386: kernel-2.4.21-57.EL.athlon.rpm kernel-2.4.21-57.EL.i686.rpm kernel-BOOT-2.4.21-57.EL.i386.rpm kernel-debuginfo-2.4.21-57.EL.athlon.rpm kernel-debuginfo-2.4.21-57.EL.i386.rpm kernel-debuginfo-2.4.21-57.EL.i686.rpm kernel-doc-2.4.21-57.EL.i386.rpm kernel-hugemem-2.4.21-57.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-57.EL.i686.rpm kernel-smp-2.4.21-57.EL.athlon.rpm kernel-smp-2.4.21-57.EL.i686.rpm kernel-smp-unsupported-2.4.21-57.EL.athlon.rpm kernel-smp-unsupported-2.4.21-57.EL.i686.rpm kernel-source-2.4.21-57.EL.i386.rpm kernel-unsupported-2.4.21-57.EL.athlon.rpm kernel-unsupported-2.4.21-57.EL.i686.rpm ia64: kernel-2.4.21-57.EL.ia64.rpm kernel-debuginfo-2.4.21-57.EL.ia64.rpm kernel-doc-2.4.21-57.EL.ia64.rpm kernel-source-2.4.21-57.EL.ia64.rpm kernel-unsupported-2.4.21-57.EL.ia64.rpm x86_64: kernel-2.4.21-57.EL.ia32e.rpm kernel-2.4.21-57.EL.x86_64.rpm kernel-debuginfo-2.4.21-57.EL.ia32e.rpm kernel-debuginfo-2.4.21-57.EL.x86_64.rpm kernel-doc-2.4.21-57.EL.x86_64.rpm kernel-smp-2.4.21-57.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-57.EL.x86_64.rpm kernel-source-2.4.21-57.EL.x86_64.rpm kernel-unsupported-2.4.21-57.EL.ia32e.rpm kernel-unsupported-2.4.21-57.EL.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kernel-2.4.21-57.EL.src.rpm i386: kernel-2.4.21-57.EL.athlon.rpm kernel-2.4.21-57.EL.i686.rpm kernel-BOOT-2.4.21-57.EL.i386.rpm kernel-debuginfo-2.4.21-57.EL.athlon.rpm kernel-debuginfo-2.4.21-57.EL.i386.rpm kernel-debuginfo-2.4.21-57.EL.i686.rpm kernel-doc-2.4.21-57.EL.i386.rpm kernel-hugemem-2.4.21-57.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-57.EL.i686.rpm kernel-smp-2.4.21-57.EL.athlon.rpm kernel-smp-2.4.21-57.EL.i686.rpm kernel-smp-unsupported-2.4.21-57.EL.athlon.rpm kernel-smp-unsupported-2.4.21-57.EL.i686.rpm kernel-source-2.4.21-57.EL.i386.rpm kernel-unsupported-2.4.21-57.EL.athlon.rpm kernel-unsupported-2.4.21-57.EL.i686.rpm ia64: kernel-2.4.21-57.EL.ia64.rpm kernel-debuginfo-2.4.21-57.EL.ia64.rpm kernel-doc-2.4.21-57.EL.ia64.rpm kernel-source-2.4.21-57.EL.ia64.rpm kernel-unsupported-2.4.21-57.EL.ia64.rpm x86_64: kernel-2.4.21-57.EL.ia32e.rpm kernel-2.4.21-57.EL.x86_64.rpm kernel-debuginfo-2.4.21-57.EL.ia32e.rpm kernel-debuginfo-2.4.21-57.EL.x86_64.rpm kernel-doc-2.4.21-57.EL.x86_64.rpm kernel-smp-2.4.21-57.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-57.EL.x86_64.rpm kernel-source-2.4.21-57.EL.x86_64.rpm kernel-unsupported-2.4.21-57.EL.ia32e.rpm kernel-unsupported-2.4.21-57.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4814 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5001 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6151 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1669 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIIVShXlSAg2UNWIIRAgmSAKCRogfxBH0zKSSl0LoEU/mX2fM8HACgpUZp ku1MKisAK/HECsk5IhuieJo= =ld1g -----END PGP SIGNATURE----- -- -
[RHSA-2008:0233-01] Important: kernel security and bug fix update
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2008:0233-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0233.html Issue date: 2008-05-07 CVE Names: CVE-2007-5498 CVE-2008-0007 CVE-2008-1367 CVE-2008-1375 CVE-2008-1619 CVE-2008-1669 ===================================================================== 1. Summary: Updated kernel packages that fix various security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * the absence of a protection mechanism when attempting to access a critical section of code has been found in the Linux kernel open file descriptors control mechanism, fcntl. This could allow a local unprivileged user to simultaneously execute code, which would otherwise be protected against parallel execution. As well, a race condition when handling locks in the Linux kernel fcntl functionality, may have allowed a process belonging to a local unprivileged user to gain re-ordered access to the descriptor table. (CVE-2008-1669, Important) * a possible hypervisor panic was found in the Linux kernel. A privileged user of a fully virtualized guest could initiate a stress-test File Transfer Protocol (FTP) transfer between the guest and the hypervisor, possibly leading to hypervisor panic. (CVE-2008-1619, Important) * the absence of a protection mechanism when attempting to access a critical section of code, as well as a race condition, have been found in the Linux kernel file system event notifier, dnotify. This could allow a local unprivileged user to get inconsistent data, or to send arbitrary signals to arbitrary system processes. (CVE-2008-1375, Important) Red Hat would like to thank Nick Piggin for responsibly disclosing the following issue: * when accessing kernel memory locations, certain Linux kernel drivers registering a fault handler did not perform required range checks. A local unprivileged user could use this flaw to gain read or write access to arbitrary kernel memory, or possibly cause a kernel crash. (CVE-2008-0007, Important) * the absence of sanity-checks was found in the hypervisor block backend driver, when running 32-bit paravirtualized guests on a 64-bit host. The number of blocks to be processed per one request from guest to host, or vice-versa, was not checked for its maximum value, which could have allowed a local privileged user of the guest operating system to cause a denial of service. (CVE-2007-5498, Important) * it was discovered that the Linux kernel handled string operations in the opposite way to the GNU Compiler Collection (GCC). This could allow a local unprivileged user to cause memory corruption. (CVE-2008-1367, Low) As well, these updated packages fix the following bugs: * on IBM System z architectures, when running QIOASSIST enabled QDIO devices in an IBM z/VM environment, the output queue stalled under heavy load. This caused network performance to degrade, possibly causing network hangs and outages. * multiple buffer overflows were discovered in the neofb video driver. It was not possible for an unprivileged user to exploit these issues, and as such, they have not been handled as security issues. * when running Microsoft Windows in a HVM, a bug in vmalloc/vfree caused network performance to degrade. * on certain architectures, a bug in the libATA sata_nv driver may have caused infinite reboots, and an "ata1: CPB flags CMD err flags 0x11" error. * repeatedly hot-plugging a PCI Express card may have caused "Bad DLLP" errors. * a NULL pointer dereference in NFS, which may have caused applications to crash, has been resolved. * when attempting to kexec reboot, either manually or via a panic-triggered kdump, the Unisys ES7000/one hanged after rebooting in the new kernel, after printing the "Memory: 32839688k/33685504k available" line. Red Hat Enterprise Linux 5 users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 369531 - CVE-2007-5498 missing sanity check in xen block backend driver 412071 - LTC37008-QDIO based network connections hang with QIOASSIST ON 427400 - CVE-2008-1619 [xen-ia64] Dom0 panic while we run ftp test tool between HVM and Dom0. 428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap 433616 - [Xen] vmalloc/vfree on HVM Guest/IA64 does untolerate performance. 433617 - libata: sata_nv may send commands with duplicate tags [5.1.z] 437312 - CVE-2008-1367 Kernel doesn't clear DF for signal handlers 437770 - CVE-2008-1619 [xen-ia64] Dom0 panic while we run ftp test tool between HVM and Dom0. 439754 - CVE-2008-1375 kernel: race condition in dnotify (local DoS, local roothole possible) 440438 - [5.1] PCI Express hotplug driver problem (Bad DLLP) [rhel-5.1.z] 440447 - 2.6.18-53.1.12 crashes on NULL pointer dereference with NFS on the stack [rhel-5.1.z] 442922 - kexec or kdump hangs on ES7000/ONE 443433 - CVE-2008-1669 kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-53.1.19.el5.src.rpm i386: kernel-2.6.18-53.1.19.el5.i686.rpm kernel-PAE-2.6.18-53.1.19.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-53.1.19.el5.i686.rpm kernel-PAE-devel-2.6.18-53.1.19.el5.i686.rpm kernel-debug-2.6.18-53.1.19.el5.i686.rpm kernel-debug-debuginfo-2.6.18-53.1.19.el5.i686.rpm kernel-debug-devel-2.6.18-53.1.19.el5.i686.rpm kernel-debuginfo-2.6.18-53.1.19.el5.i686.rpm kernel-debuginfo-common-2.6.18-53.1.19.el5.i686.rpm kernel-devel-2.6.18-53.1.19.el5.i686.rpm kernel-headers-2.6.18-53.1.19.el5.i386.rpm kernel-xen-2.6.18-53.1.19.el5.i686.rpm kernel-xen-debuginfo-2.6.18-53.1.19.el5.i686.rpm kernel-xen-devel-2.6.18-53.1.19.el5.i686.rpm noarch: kernel-doc-2.6.18-53.1.19.el5.noarch.rpm x86_64: kernel-2.6.18-53.1.19.el5.x86_64.rpm kernel-debug-2.6.18-53.1.19.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-53.1.19.el5.x86_64.rpm kernel-debug-devel-2.6.18-53.1.19.el5.x86_64.rpm kernel-debuginfo-2.6.18-53.1.19.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-53.1.19.el5.x86_64.rpm kernel-devel-2.6.18-53.1.19.el5.x86_64.rpm kernel-headers-2.6.18-53.1.19.el5.x86_64.rpm kernel-xen-2.6.18-53.1.19.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-53.1.19.el5.x86_64.rpm kernel-xen-devel-2.6.18-53.1.19.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-53.1.19.el5.src.rpm i386: kernel-2.6.18-53.1.19.el5.i686.rpm kernel-PAE-2.6.18-53.1.19.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-53.1.19.el5.i686.rpm kernel-PAE-devel-2.6.18-53.1.19.el5.i686.rpm kernel-debug-2.6.18-53.1.19.el5.i686.rpm kernel-debug-debuginfo-2.6.18-53.1.19.el5.i686.rpm kernel-debug-devel-2.6.18-53.1.19.el5.i686.rpm kernel-debuginfo-2.6.18-53.1.19.el5.i686.rpm kernel-debuginfo-common-2.6.18-53.1.19.el5.i686.rpm kernel-devel-2.6.18-53.1.19.el5.i686.rpm kernel-headers-2.6.18-53.1.19.el5.i386.rpm kernel-xen-2.6.18-53.1.19.el5.i686.rpm kernel-xen-debuginfo-2.6.18-53.1.19.el5.i686.rpm kernel-xen-devel-2.6.18-53.1.19.el5.i686.rpm ia64: kernel-2.6.18-53.1.19.el5.ia64.rpm kernel-debug-2.6.18-53.1.19.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-53.1.19.el5.ia64.rpm kernel-debug-devel-2.6.18-53.1.19.el5.ia64.rpm kernel-debuginfo-2.6.18-53.1.19.el5.ia64.rpm kernel-debuginfo-common-2.6.18-53.1.19.el5.ia64.rpm kernel-devel-2.6.18-53.1.19.el5.ia64.rpm kernel-headers-2.6.18-53.1.19.el5.ia64.rpm kernel-xen-2.6.18-53.1.19.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-53.1.19.el5.ia64.rpm kernel-xen-devel-2.6.18-53.1.19.el5.ia64.rpm noarch: kernel-doc-2.6.18-53.1.19.el5.noarch.rpm ppc: kernel-2.6.18-53.1.19.el5.ppc64.rpm kernel-debug-2.6.18-53.1.19.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-53.1.19.el5.ppc64.rpm kernel-debug-devel-2.6.18-53.1.19.el5.ppc64.rpm kernel-debuginfo-2.6.18-53.1.19.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-53.1.19.el5.ppc64.rpm kernel-devel-2.6.18-53.1.19.el5.ppc64.rpm kernel-headers-2.6.18-53.1.19.el5.ppc.rpm kernel-headers-2.6.18-53.1.19.el5.ppc64.rpm kernel-kdump-2.6.18-53.1.19.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-53.1.19.el5.ppc64.rpm kernel-kdump-devel-2.6.18-53.1.19.el5.ppc64.rpm s390x: kernel-2.6.18-53.1.19.el5.s390x.rpm kernel-debug-2.6.18-53.1.19.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-53.1.19.el5.s390x.rpm kernel-debug-devel-2.6.18-53.1.19.el5.s390x.rpm kernel-debuginfo-2.6.18-53.1.19.el5.s390x.rpm kernel-debuginfo-common-2.6.18-53.1.19.el5.s390x.rpm kernel-devel-2.6.18-53.1.19.el5.s390x.rpm kernel-headers-2.6.18-53.1.19.el5.s390x.rpm x86_64: kernel-2.6.18-53.1.19.el5.x86_64.rpm kernel-debug-2.6.18-53.1.19.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-53.1.19.el5.x86_64.rpm kernel-debug-devel-2.6.18-53.1.19.el5.x86_64.rpm kernel-debuginfo-2.6.18-53.1.19.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-53.1.19.el5.x86_64.rpm kernel-devel-2.6.18-53.1.19.el5.x86_64.rpm kernel-headers-2.6.18-53.1.19.el5.x86_64.rpm kernel-xen-2.6.18-53.1.19.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-53.1.19.el5.x86_64.rpm kernel-xen-devel-2.6.18-53.1.19.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5498 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1619 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1669 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIIV6cXlSAg2UNWIIRAroqAJ9mxmGtFJNNxXGQ1Yv53ROudG4AOgCdEIBH oxXtczRwSakkE0jTk1AnyN4= =WSVP -----END PGP SIGNATURE----- -- -
[RHSA-2008:0237-01] Important: kernel security and bug fix update
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2008:0237-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0237.html Issue date: 2008-05-07 CVE Names: CVE-2005-0504 CVE-2007-6282 CVE-2008-0007 CVE-2008-1375 CVE-2008-1615 CVE-2008-1669 ===================================================================== 1. Summary: Updated kernel packages that fix various security issues and several bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated packages fix the following security issues: * the absence of a protection mechanism when attempting to access a critical section of code has been found in the Linux kernel open file descriptors control mechanism, fcntl. This could allow a local unprivileged user to simultaneously execute code, which would otherwise be protected against parallel execution. As well, a race condition when handling locks in the Linux kernel fcntl functionality, may have allowed a process belonging to a local unprivileged user to gain re-ordered access to the descriptor table. (CVE-2008-1669, Important) * on AMD64 architectures, the possibility of a kernel crash was discovered by testing the Linux kernel process-trace ability. This could allow a local unprivileged user to cause a denial of service (kernel crash). (CVE-2008-1615, Important) * the absence of a protection mechanism when attempting to access a critical section of code, as well as a race condition, have been found in the Linux kernel file system event notifier, dnotify. This could allow a local unprivileged user to get inconsistent data, or to send arbitrary signals to arbitrary system processes. (CVE-2008-1375, Important) Red Hat would like to thank Nick Piggin for responsibly disclosing the following issue: * when accessing kernel memory locations, certain Linux kernel drivers registering a fault handler did not perform required range checks. A local unprivileged user could use this flaw to gain read or write access to arbitrary kernel memory, or possibly cause a kernel crash. (CVE-2008-0007, Important) * the possibility of a kernel crash was found in the Linux kernel IPsec protocol implementation, due to improper handling of fragmented ESP packets. When an attacker controlling an intermediate router fragmented these packets into very small pieces, it would cause a kernel crash on the receiving node during packet reassembly. (CVE-2007-6282, Important) * a flaw in the MOXA serial driver could allow a local unprivileged user to perform privileged operations, such as replacing firmware. (CVE-2005-0504, Important) As well, these updated packages fix the following bugs: * multiple buffer overflows in the neofb driver have been resolved. It was not possible for an unprivileged user to exploit these issues, and as such, they have not been handled as security issues. * a kernel panic, due to inconsistent detection of AGP aperture size, has been resolved. * a race condition in UNIX domain sockets may have caused "recv()" to return zero. In clustered configurations, this may have caused unexpected failovers. * to prevent link storms, network link carrier events were delayed by up to one second, causing unnecessary packet loss. Now, link carrier events are scheduled immediately. * a client-side race on blocking locks caused large time delays on NFS file systems. * in certain situations, the libATA sata_nv driver may have sent commands with duplicate tags, which were rejected by SATA devices. This may have caused infinite reboots. * running the "service network restart" command may have caused networking to fail. * a bug in NFS caused cached information about directories to be stored for too long, causing wrong attributes to be read. * on systems with a large highmem/lowmem ratio, NFS write performance may have been very slow when using small files. * a bug, which caused network hangs when the system clock was wrapped around zero, has been resolved. Red Hat Enterprise Linux 4 users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 404291 - CVE-2007-6282 IPSec ESP kernel panics 423111 - CVE-2005-0504 Buffer overflow in moxa driver 428961 - CVE-2008-0007 kernel: insufficient range checks in fault handlers with mremap 431430 - CVE-2008-1615 kernel: ptrace: Unprivileged crash on x86_64 %cs corruption 435122 - [RHEL4.6] In unix domain sockets, recv() may incorrectly return zero 436102 - Fake ARP dropped after migration leading to loss of network connectivity 436129 - LTC41942-30 second flock() calls against files stored on a NetApp while using NFS 436499 - libata: sata_nv may send commands with duplicate tags 436749 - HP-Japan Network stack hang after service network restart 437788 - NFS: Fix directory caching problem - with test case and patch. 438345 - [2.6.9-55.9] VM pagecache reclaim patch causes high latency on systems with large highmem/lowmem ratios 438477 - Since "Patch2037: linux-2.6.9-vm-balance.patch" my NFS performance is poorly 439754 - CVE-2008-1375 kernel: race condition in dnotify (local DoS, local roothole possible) 443433 - CVE-2008-1669 kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-67.0.15.EL.src.rpm i386: kernel-2.6.9-67.0.15.EL.i686.rpm kernel-debuginfo-2.6.9-67.0.15.EL.i686.rpm kernel-devel-2.6.9-67.0.15.EL.i686.rpm kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm kernel-smp-2.6.9-67.0.15.EL.i686.rpm kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm kernel-xenU-2.6.9-67.0.15.EL.i686.rpm kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm ia64: kernel-2.6.9-67.0.15.EL.ia64.rpm kernel-debuginfo-2.6.9-67.0.15.EL.ia64.rpm kernel-devel-2.6.9-67.0.15.EL.ia64.rpm kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm noarch: kernel-doc-2.6.9-67.0.15.EL.noarch.rpm ppc: kernel-2.6.9-67.0.15.EL.ppc64.rpm kernel-2.6.9-67.0.15.EL.ppc64iseries.rpm kernel-debuginfo-2.6.9-67.0.15.EL.ppc64.rpm kernel-debuginfo-2.6.9-67.0.15.EL.ppc64iseries.rpm kernel-devel-2.6.9-67.0.15.EL.ppc64.rpm kernel-devel-2.6.9-67.0.15.EL.ppc64iseries.rpm kernel-largesmp-2.6.9-67.0.15.EL.ppc64.rpm kernel-largesmp-devel-2.6.9-67.0.15.EL.ppc64.rpm s390: kernel-2.6.9-67.0.15.EL.s390.rpm kernel-debuginfo-2.6.9-67.0.15.EL.s390.rpm kernel-devel-2.6.9-67.0.15.EL.s390.rpm s390x: kernel-2.6.9-67.0.15.EL.s390x.rpm kernel-debuginfo-2.6.9-67.0.15.EL.s390x.rpm kernel-devel-2.6.9-67.0.15.EL.s390x.rpm x86_64: kernel-2.6.9-67.0.15.EL.x86_64.rpm kernel-debuginfo-2.6.9-67.0.15.EL.x86_64.rpm kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-67.0.15.EL.src.rpm i386: kernel-2.6.9-67.0.15.EL.i686.rpm kernel-debuginfo-2.6.9-67.0.15.EL.i686.rpm kernel-devel-2.6.9-67.0.15.EL.i686.rpm kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm kernel-smp-2.6.9-67.0.15.EL.i686.rpm kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm kernel-xenU-2.6.9-67.0.15.EL.i686.rpm kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm noarch: kernel-doc-2.6.9-67.0.15.EL.noarch.rpm x86_64: kernel-2.6.9-67.0.15.EL.x86_64.rpm kernel-debuginfo-2.6.9-67.0.15.EL.x86_64.rpm kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-67.0.15.EL.src.rpm i386: kernel-2.6.9-67.0.15.EL.i686.rpm kernel-debuginfo-2.6.9-67.0.15.EL.i686.rpm kernel-devel-2.6.9-67.0.15.EL.i686.rpm kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm kernel-smp-2.6.9-67.0.15.EL.i686.rpm kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm kernel-xenU-2.6.9-67.0.15.EL.i686.rpm kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm ia64: kernel-2.6.9-67.0.15.EL.ia64.rpm kernel-debuginfo-2.6.9-67.0.15.EL.ia64.rpm kernel-devel-2.6.9-67.0.15.EL.ia64.rpm kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm noarch: kernel-doc-2.6.9-67.0.15.EL.noarch.rpm x86_64: kernel-2.6.9-67.0.15.EL.x86_64.rpm kernel-debuginfo-2.6.9-67.0.15.EL.x86_64.rpm kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-67.0.15.EL.src.rpm i386: kernel-2.6.9-67.0.15.EL.i686.rpm kernel-debuginfo-2.6.9-67.0.15.EL.i686.rpm kernel-devel-2.6.9-67.0.15.EL.i686.rpm kernel-hugemem-2.6.9-67.0.15.EL.i686.rpm kernel-hugemem-devel-2.6.9-67.0.15.EL.i686.rpm kernel-smp-2.6.9-67.0.15.EL.i686.rpm kernel-smp-devel-2.6.9-67.0.15.EL.i686.rpm kernel-xenU-2.6.9-67.0.15.EL.i686.rpm kernel-xenU-devel-2.6.9-67.0.15.EL.i686.rpm ia64: kernel-2.6.9-67.0.15.EL.ia64.rpm kernel-debuginfo-2.6.9-67.0.15.EL.ia64.rpm kernel-devel-2.6.9-67.0.15.EL.ia64.rpm kernel-largesmp-2.6.9-67.0.15.EL.ia64.rpm kernel-largesmp-devel-2.6.9-67.0.15.EL.ia64.rpm noarch: kernel-doc-2.6.9-67.0.15.EL.noarch.rpm x86_64: kernel-2.6.9-67.0.15.EL.x86_64.rpm kernel-debuginfo-2.6.9-67.0.15.EL.x86_64.rpm kernel-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-largesmp-2.6.9-67.0.15.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-smp-2.6.9-67.0.15.EL.x86_64.rpm kernel-smp-devel-2.6.9-67.0.15.EL.x86_64.rpm kernel-xenU-2.6.9-67.0.15.EL.x86_64.rpm kernel-xenU-devel-2.6.9-67.0.15.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6282 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1615 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1669 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIIV8IXlSAg2UNWIIRAlDoAKC/PSOTtgcT/spYH8H43N6cPXTrCQCffa7O M2K5hk4HepnEKsOw5a3q6Y8= =Cab9 -----END PGP SIGNATURE----- -- -
The nForce 780a SLI chipset has been on the verge of release many times over the past several months but there was always something pushing it back. Now NVIDIA is finally ready to unveiling their first updated AMD-platform chipset in years and the ASUS M3N-HT Deluxe is the first board on the chopping block. Can Hybrid Power and other new features save this chipset from mediocre integrated GPU performance? URL: http://www.pcper.com/article.php?aid=557&type=expert Quote: "The drawbacks to the Hybrid Power though outweigh the positives in this current implementation. First, only the 9800 GTX and the 9800 GX2 graphics cards are supported with the 780a SLI chipset - that leaves a whole host of NVIDIA users with 9600 GTs, 8800 GTS and GT cards that probably think they have the right to Hybrid Power technology since their cores are based on the same that rests under the hoods of the 9800 GTX and GX2. Also, the REAL KILLER here is that NVIDIA is promoting the nForce 780a SLI chipset as an enthusiast platform, and pushing Hybrid Power with these high end cards, yet the fact that the motherboard GPU can only output at 1920x1200 resolutions is not-so-cleverly hidden." Thanks for a post! Ryan Shrout Owner - PC Perspective rshrout ( -at -) pcper.com
-
OCZ ReaperX HPC DDR3-1333 2GB Memory Kit Review @ ThinkComputers.org
news posted a topic in Upcoming News
OCZ ReaperX HPC DDR3-1333 2GB Memory Kit Review ( -at -) ThinkComputers.org Review URL: http://www.thinkcomputers.org/index.php?x=reviews <http://www.thinkcomputers.org/index.php?x=reviews&id=757> &id=757 Image URL (336 X 256): http://www.thinkcomputers.org/reviews/ocz_reaperx_hpc_ddr3/email.jpg Alt Image URL (194 X 150): http://www.thinkcomputers.org/reviews/ocz_reaperx_hpc_ddr3/thumbs/14.jpg Quote: "In a few short years, OCZ has really made its mark in the PC enthusiast world. They have branched out into power supplies, CPU coolers, thermal compound, peripherals, flash media, they even have a new phase-change cooler for those extreme overclockers that need sub-zero temps. But, OCZ's forte is still high-performance system memory. Today I will be looking at OCZ's latest offering in the ReaperX series, the ReaperX PC3-1066 (DDR3-1333) 2 gig kit. Will the DDR3 ReaperX prove to be the awesome overclocker that its DDR2 little brother is? Read on and see..." -
Hello News Partner: Benchmark Reviews has released a new article which your readers might enjoy. We would be grateful if you would please share it with them. TITLE: Xigmatek Achilles S1284 HDT CPU Cooler ( -at -) Benchmark Reviews DESCRIPTION: Xigmatek has really made a name for themselves over the past year thanks to the Heat-pipe Direct Touch technology that they have embraced. When Benchmark Reviews originally reviewed the HDT-S1283 cooler we were absolutely astonished by the incredible results. Once again, we are the very first to test the newest hardware, and you'll be impressed to know that this product delivers the performance needed by overclockers while fulfilling the enthusiasts wish list for attractive features. Benchmark Reviews introduces the Xigmatek Achilles S1284 HDT CPU Cooler CAC-SXHH4-U02 and tests the performance against the top competitors. ARTICLE URL: http://benchmarkreviews.com/index.php?option=com_content&task=view&id=151&Itemid=1 IMAGE URL: http://benchmarkreviews.com/images/reviews/cooling/Xigmatek_CAC-SXHH4-U02/Xigmatek_Achilles_S1284_HDT_CPU_Cooler_CAC-SXHH4-U02.jpg Thank you for your being a dependable affiliate and posting our news; we appreciate your support. Olin Coles Owner / Editor Benchmark Reviews
-
Dear Editors A new article has just been posted on the www.ozhardware.com.au website, we would greatly appreciate it if you could post a link to it on your websites news section. The details are: Main Title: Fujitsu LifeBook U1010 (3.5G) Notebook Review ( -at -) OzHardware Brief Intro: The LifeBook U1010 from Fujitsu, an Ultra-Mobile PC (UMPC) claimed by Fujitsu to be the world's smallest Notebook PC. Utilising a mere 5.6" WideScreen LCD and 3.5G Wireless Broadband Connectivity, we see if it's any good. Direct Link: http://www.ozhardware.com.au/Notebook-Reviews/Fujitsu-LifeBook-U1010-3.5G-No tebook-Review.html Thank you from the OzHardware Team.
-
Hello Webmasters and News Posters, NEW CONTENT (Casing & Cooling) - NZXT Tempest ATX Mid Tower Enclosure QUOTE: "Enter the Tempest, an enclosure that claims to be the "Airflow King". This is a mighty tall order to fill considering some of the similar products on the market, so we will take a closer look and see if they can live up to this statement. It will take more than just a couple of extra fans to step up to a statement like this, so we will look at overall design, active fans that come in the standard configuration as well as cooling a high-end rig. Can NZXT manage to really be considered an Airflow King?" For more information, please visit - http://www.tweaktown.com/reviews/1413/nzxt_tempest_atx_mid_tower_enclosure/index.html Best Regards, The TweakTown Team http://www.tweaktown.com
-
A news post would be great. OCC has published a new review on the Thermaltake M9 Here is a quote from the review: Quote: "One word describes my feelings about the Thermaltake M9 VI1000BWS - fantastic! It performed very well in my tests, looks awesome, and the included 120mm fans manage to push a good amount of air while remaining very quiet. The tool-less drive bays and expansion slot retainers were very well made - I didn't even break one! From top to bottom, this is my favorite mid tower so far, and its very reasonable price makes it an even more attractive option." Title: Thermaltake M9 Review Link: http://www.overclockersclub.com/reviews/thermaltake_m9/ Img: http://www.overclockersclub.com/siteimages/articles/thermaltake_m9/24_thumb.jpg
-
Opacity 1.1: A Graphic Editor For the Screen - Published on 05/06/08 Like Thought is proud to announce Opacity 1.1, an update to their innovative editor for screen graphics. Opacity has traditional graphical features like vectors, layers and filters along with exclusive features including variables, templates, factories and much more. Opacity combines all of the tools artists need to create beautiful images for icons, applications and the web. New in 1.1 are support for SVG, an introductory screencast, interface improvements and much more. Richmond, VA - Like Thought is proud to announce Opacity 1.1, a major update to their innovative editor for screen graphics. This update adds SVG support, for creating vector graphics for the web, a screencast showing how to use Opacity, a new Image Fill option, and much more. Opacity requires Mac OS X 10.5.2 Leopard. Opacity has traditional graphical features like vectors, layers and filters along with exclusive features including variables, templates, factories and much more. By leveraging the power of Core Animation and Quartz, Opacity combines all of the tools artists need to create beautiful images for the icons, applications and the web. Opacity has full support for layers, including folder layers. Filters in Opacity are live layers that can be added to images (with a mask and opacity) and dynamically changed at any time. New in Opacity 1.1 is an Inner Shadow effect, joining the existing effects which include Reflection, Glass, Shadow, and more. Opacity 1.1 also includes many interface improvements. The toolbar now uses dynamically generated images to show what new vectors will look like. A new grid is available to help visualize designs, and many more improvements make Opacity even easier to use. Opacity streamlines the image creation workflow by combining a great vector editor and pixel editor with native support for all the formats needed for screen graphics. Vectors make it easy to draw great looking graphics, and a new image fill option gives them even more flexibility. Opacity is also ready for the future with support for easily preparing images for resolution independence-including with the newly added Scaleable Vector Graphics (SVG) support. Opacity also includes many unique new graphic editing features. Previews make it easy to see how an image will look when deployed, featuring faster and more accurate previews new in version 1.1. Opacity's Factories make it a snap to export images with only one click. In Opacity 1.1, Factories now support multi-page PDF images, gamma stripping in PNG images, and automatic uploading with Cyberduck. Factories are now extendable as well, allowing users to add their own Builders (Applications, Scripts, and more) that can process the images. Opacity 1.1 includes four new Templates to facilitate the creation of images suitable for icons, applications, and the web. Opacity requires Mac OS X 10.5.2 Leopard and is a Universal Binary for PowerPC and Intel Macs. A free trial version is available for download. The license cost is $89 USD. Like Thought Website: http://likethought.com/ Opacity Product URL: http://likethought.com/opacity/ Direct Download Link: http://downloads.likethought.com/opacity.zip Purchase Link: http://likethought.com/opacity/buy/ Opacity Screenshot: http://likethought.com/opacity/images/screenshots/screenshot2.png Opacity Icon: http://likethought.com/opacity/images/opacity1x.png Like Thought is a small independent Mac shareware company. It was founded in 2006 by Jacob Godwin-Jones in Richmond, VA. Like Thought has released Lexicon, a language learning application, and Opacity, an editor for screen graphics. Like Thought is dedicated to making high quality, user friendly Mac OS X applications. ### Jacob Godwin-Jones President 757-968-1005 jacob ( -at -) likethought.com *******
-
[Security Announce] [ MDVSA-2008:098 ] - Updated openssh packages fix vulnerability
news posted a topic in Upcoming News
This is a multi-part message in MIME format... ------------=_1210119040-11275-4038 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:098 http://www.mandriva.com/security/ _______________________________________________________________________ Package : openssh Date : May 6, 2008 Affected: 2007.1, 2008.0, 2008.1 _______________________________________________________________________ Problem Description: A vulnerability in OpenSSH 4.4 through 4.8 allowed local attackers to bypass intended security restrictions enabling them to execute commands other than those specified by the ForceCommand directive, provided they are able to modify to ~/.ssh/rc (CVE-2008-1657). The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1657 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.1: 08f6f5bdd307e17c510aa5d100f91ef3 2007.1/i586/openssh-4.6p1-1.3mdv2007.1.i586.rpm 235d55d80b04e360e8d7c5fa94633251 2007.1/i586/openssh-askpass-4.6p1-1.3mdv2007.1.i586.rpm 09d544148faf91e07782b663f7010e51 2007.1/i586/openssh-askpass-common-4.6p1-1.3mdv2007.1.i586.rpm 379538dd86330b4577ee785bcd565962 2007.1/i586/openssh-askpass-gnome-4.6p1-1.3mdv2007.1.i586.rpm e6e85335d7d25e0fd51eaaeedfe8c02a 2007.1/i586/openssh-clients-4.6p1-1.3mdv2007.1.i586.rpm b9ef64c7c673c831dd06ad2191f9c5d7 2007.1/i586/openssh-server-4.6p1-1.3mdv2007.1.i586.rpm 8ea0e336e89c8f2c5a2cc777354a4705 2007.1/SRPMS/openssh-4.6p1-1.3mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: 3c021dffbaa950e10efeefcc5b286fef 2007.1/x86_64/openssh-4.6p1-1.3mdv2007.1.x86_64.rpm ad92d84d606f22f49fa95576d46d3870 2007.1/x86_64/openssh-askpass-4.6p1-1.3mdv2007.1.x86_64.rpm 61aacfe978daa0447306778ed77cc5f0 2007.1/x86_64/openssh-askpass-common-4.6p1-1.3mdv2007.1.x86_64.rpm ad2a37a51549e8d06a0bfc1c71642d46 2007.1/x86_64/openssh-askpass-gnome-4.6p1-1.3mdv2007.1.x86_64.rpm d21605f50fc092f4e8a003a3a6cebaae 2007.1/x86_64/openssh-clients-4.6p1-1.3mdv2007.1.x86_64.rpm 829c6e69c77c06653859e0106f80dece 2007.1/x86_64/openssh-server-4.6p1-1.3mdv2007.1.x86_64.rpm 8ea0e336e89c8f2c5a2cc777354a4705 2007.1/SRPMS/openssh-4.6p1-1.3mdv2007.1.src.rpm Mandriva Linux 2008.0: 1eac74e91da446d6f9e894e3135b6f97 2008.0/i586/openssh-4.7p1-2.3mdv2008.0.i586.rpm 32c9074f32ac7dd8fc984840c8acb6d1 2008.0/i586/openssh-askpass-4.7p1-2.3mdv2008.0.i586.rpm b9bab2a236c21278137259639db8fa8a 2008.0/i586/openssh-askpass-common-4.7p1-2.3mdv2008.0.i586.rpm 393d108b1240c00220ad1b9dc0714b8e 2008.0/i586/openssh-askpass-gnome-4.7p1-2.3mdv2008.0.i586.rpm c0e15a413edaf5fe6a928f8b6768be89 2008.0/i586/openssh-clients-4.7p1-2.3mdv2008.0.i586.rpm 1842ee4e60d22d98e9dfa3df8c217ad2 2008.0/i586/openssh-server-4.7p1-2.3mdv2008.0.i586.rpm 70c9befdfac13b13e875cf28d1a4b20d 2008.0/SRPMS/openssh-4.7p1-2.3mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 1f944839aa880524ae6b0397e938ca60 2008.0/x86_64/openssh-4.7p1-2.3mdv2008.0.x86_64.rpm 9110212034c355a7b1aed824f24b0cd2 2008.0/x86_64/openssh-askpass-4.7p1-2.3mdv2008.0.x86_64.rpm cc1751f3b90e1fe0a2324c32291c6db1 2008.0/x86_64/openssh-askpass-common-4.7p1-2.3mdv2008.0.x86_64.rpm 2b3e84eddd18300eec8678c22f4c6405 2008.0/x86_64/openssh-askpass-gnome-4.7p1-2.3mdv2008.0.x86_64.rpm bc7ad105ab14f63baeb98443583b311c 2008.0/x86_64/openssh-clients-4.7p1-2.3mdv2008.0.x86_64.rpm 7ca607d434d83e127123e7e8ec6d1c61 2008.0/x86_64/openssh-server-4.7p1-2.3mdv2008.0.x86_64.rpm 70c9befdfac13b13e875cf28d1a4b20d 2008.0/SRPMS/openssh-4.7p1-2.3mdv2008.0.src.rpm Mandriva Linux 2008.1: 2400784116e037ec9f6864c6e0a84039 2008.1/i586/openssh-4.7p1-9.1mdv2008.1.i586.rpm 461526e375087387d6d46c4413e54a99 2008.1/i586/openssh-askpass-4.7p1-9.1mdv2008.1.i586.rpm b42eb4cd2e66cad2a3e610458e3d25a9 2008.1/i586/openssh-askpass-common-4.7p1-9.1mdv2008.1.i586.rpm 70ddcfc089436570c498693222248ecb 2008.1/i586/openssh-askpass-gnome-4.7p1-9.1mdv2008.1.i586.rpm 43148a16687a9fe1426e4e1831bbb522 2008.1/i586/openssh-clients-4.7p1-9.1mdv2008.1.i586.rpm 6ef013aabf5d4e46ade484723ca21874 2008.1/i586/openssh-server-4.7p1-9.1mdv2008.1.i586.rpm 4aee9693056b28dc290eddb82d18d9a1 2008.1/SRPMS/openssh-4.7p1-9.1mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 99f925a96953943b0379971f50c7e809 2008.1/x86_64/openssh-4.7p1-9.1mdv2008.1.x86_64.rpm a5c1fc99eb774cebacfa86c9c8670cd7 2008.1/x86_64/openssh-askpass-4.7p1-9.1mdv2008.1.x86_64.rpm d41cea3f2f26c4a0f7669097465c289a 2008.1/x86_64/openssh-askpass-common-4.7p1-9.1mdv2008.1.x86_64.rpm eadfa5c68e192b032dc401835c409b61 2008.1/x86_64/openssh-askpass-gnome-4.7p1-9.1mdv2008.1.x86_64.rpm a3e1001bae15500f892724d1dab797ed 2008.1/x86_64/openssh-clients-4.7p1-9.1mdv2008.1.x86_64.rpm ebb79e86c2428367a967d210ccd197d6 2008.1/x86_64/openssh-server-4.7p1-9.1mdv2008.1.x86_64.rpm 4aee9693056b28dc290eddb82d18d9a1 2008.1/SRPMS/openssh-4.7p1-9.1mdv2008.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIIMfCmqjQ0CJFipgRAsvXAJ43hthPWw77ThUQbEySBoszK7yI8gCg7i1H O249fnGInw9vUIhIU/qE880= =Q3QA -----END PGP SIGNATURE----- ------------=_1210119040-11275-4038 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1210119040-11275-4038-- -
This is a multi-part message in MIME format... ------------=_1210118714-11275-4037 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:097 http://www.mandriva.com/security/ _______________________________________________________________________ Package : kdelibs Date : May 6, 2008 Affected: 2008.0, 2008.1 _______________________________________________________________________ Problem Description: A vulnerability was found in start_kdeinit in KDE 3.5.5 through 3.5.9 where, if it was installed setuid root, it could allow local users to cause a denial of service or possibly execute arbitrary code (CVE-2008-1671). By default, start_kdeinit is not installed setuid root on Mandriva Linux, however updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: 6e9ec4d86831c1de8d97b1143e412094 2008.0/i586/kdelibs-common-3.5.7-43.8mdv2008.0.i586.rpm 13c4540bad80e97dea7d4f0ae0b85e48 2008.0/i586/kdelibs-devel-doc-3.5.7-43.8mdv2008.0.i586.rpm e37ee088e281f3ac22aaa9a2cf967bff 2008.0/i586/libkdecore4-3.5.7-43.8mdv2008.0.i586.rpm 68de2c2c0c4aefaae88598329c4ae842 2008.0/i586/libkdecore4-devel-3.5.7-43.8mdv2008.0.i586.rpm f88003b0ee66bf4bcb456b7352972507 2008.0/SRPMS/kdelibs-3.5.7-43.8mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: f22003b71a01cde99bbec436462d8b89 2008.0/x86_64/kdelibs-common-3.5.7-43.8mdv2008.0.x86_64.rpm d22e1bbc15d300768f58c75d810bb799 2008.0/x86_64/kdelibs-devel-doc-3.5.7-43.8mdv2008.0.x86_64.rpm d52a94a110cd8ccf0611f1c199f0ee91 2008.0/x86_64/lib64kdecore4-3.5.7-43.8mdv2008.0.x86_64.rpm 7fd7f380efa11735eb0b4a174f5c7ade 2008.0/x86_64/lib64kdecore4-devel-3.5.7-43.8mdv2008.0.x86_64.rpm f88003b0ee66bf4bcb456b7352972507 2008.0/SRPMS/kdelibs-3.5.7-43.8mdv2008.0.src.rpm Mandriva Linux 2008.1: 3fdded980feeb40749c9fbef31c8274d 2008.1/i586/kdelibs-common-3.5.9-10.1mdv2008.1.i586.rpm c0bba005dbc4013ff8cbe933ff9e5584 2008.1/i586/kdelibs-devel-doc-3.5.9-10.1mdv2008.1.i586.rpm 8867c7c83437e532b632a3a8f578e39d 2008.1/i586/libkdecore4-3.5.9-10.1mdv2008.1.i586.rpm eec45645cada33b83c4394cdfca05af8 2008.1/i586/libkdecore4-devel-3.5.9-10.1mdv2008.1.i586.rpm 5d6b90aaf30b609c801e6d41727be2a4 2008.1/SRPMS/kdelibs-3.5.9-10.1mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 880a8c5c0efe5688bbbcacda27866b32 2008.1/x86_64/kdelibs-common-3.5.9-10.1mdv2008.1.x86_64.rpm e217bf386a48838736364332c9919639 2008.1/x86_64/kdelibs-devel-doc-3.5.9-10.1mdv2008.1.x86_64.rpm cd18170a8fe9c90e577e2a322f6e6146 2008.1/x86_64/lib64kdecore4-3.5.9-10.1mdv2008.1.x86_64.rpm c28603d515c0d86f5ac782541c5b24a9 2008.1/x86_64/lib64kdecore4-devel-3.5.9-10.1mdv2008.1.x86_64.rpm 5d6b90aaf30b609c801e6d41727be2a4 2008.1/SRPMS/kdelibs-3.5.9-10.1mdv2008.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIIMdZmqjQ0CJFipgRAsGVAKCYNxo0aNExSN2XAHUD+ifw8ha+SACg3wfA /edYIt1LNstGmZtHW0hMW2g= =mQaN -----END PGP SIGNATURE----- ------------=_1210118714-11275-4037 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1210118714-11275-4037--
-
Readdle announces stand-alone iPhone 2.0 application, new storage plans
news posted a topic in Upcoming News
Readdle announces stand-alone iPhone 2.0 application, new storage plans - Published on 05/06/08 Readdle, the leading provider of the book and document reader services for the iPhone and iPod Touch, announces its plans to release a native iPhone application for storing and reading office documents and eBooks on the iPhone and iPod Touch. Readdle is a web-based application that allows transfering, organizing and viewing documents on the iPhone and iPod Touch. Odessa, Ukraine - Readdle, the leading provider of the book and document reader services for the iPhone and iPod Touch, announces its plans to release a native iPhone application for storing and reading office documents and eBooks on the iPhone and iPod Touch. Readdle is a web-based application that allows transfering, organizing and viewing documents on the iPhone and iPod Touch. The upcoming iPhone application will extend service functionality, ensuring seamless storage of files on the device and viewing them with no live Internet connection. The document viewing functionality will feature page-by-page reading, adding bookmarks to the text, iPhone optimized PDF rendering and other options. "Due the iPhone file systems access restrictions, there is no possibility to copy files directly to the iPhone. That's why seamless document management is the crucial part of the document reading application. Readdle is unique for providing the number of handy ways to put files on the device." notes Igor Zhadanov, Readdle CEO. Document management options include loading to Readdle directly from the mail program. Simple forwarding of the email message with attached documents to a special user-dependent email will export it into Readdle. This feature is indispensable as there is no possibility to save attachments to the iPhone. Readdle is web-based book and document reader optimized for using on iPhone and iPod Touch. The service supports PDF, TXT, HTML and PDB(Plucker) files as well as MS Word and MS Excel documents, and provides 50MB free space for book upload per account. More space and additional features available for a small fee. Information about the Readdle could be found at their website. Readdle Website: http://readdle.com Founded in 2007, Readdle.com targets to provide iPhone users with high quality web applications missing in a standard application set. Flagship company offering is Readdle web service, that allows people viewing electronic books, text files and even business documents at any place using their iPhones. ### Igor Zhadanov Readdle CEO +38 (067) 4856961 pr ( -at -) readdle.com ******* ******* ******* -
Hello, OCIA.net has posted their review of the Hanns-G Hi221D 22in Widescreen Display. Below is a direct quote from the review: "Shopping for a monitor isn't exactly straightforward, though. As if picking a size weren't hard enough, you also have to balance your standards for specifications versus price. That's too much work for a lot of people, especially after they just spent a month researching the best hardware to buy, and they stick with the well-known names like Samsung and Viewsonic." Direct Link: http://www.ocia.net/reviews/hi221d/page1.shtml Image Link: http://www.ocia.net/images/icons/289.jpg Site Link: http://www.ocia.net A news posting on your site would be greatly appreciated. Thanks in advance for your support! Thanks, OCIA.net Staff http://www.ocia.net
-
This is a multi-part message in MIME format... ------------=_1210112714-11275-4035 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:096 http://www.mandriva.com/security/ _______________________________________________________________________ Package : emacs Date : May 6, 2008 Affected: 2007.1, 2008.0, 2008.1, Corporate 3.0, Corporate 4.0 _______________________________________________________________________ Problem Description: Steve Grubb found that the vcdiff script in Emacs create temporary files insecurely when used with SCCS. A local user could exploit a race condition to create or overwrite files with the privileges of the user invoking the program (CVE-2008-1694). The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1694 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.1: 860acff5c4b9ab1c1eaf0acef4fba66b 2007.1/i586/emacs-21.4-26.3mdv2007.1.i586.rpm c6234d6a7df7d8055ee1e0564d69d887 2007.1/i586/emacs-doc-21.4-26.3mdv2007.1.i586.rpm 314161c6971dcb7cb9b74a79d1824817 2007.1/i586/emacs-el-21.4-26.3mdv2007.1.i586.rpm 2359d69f340ffa74497d41f323431cf1 2007.1/i586/emacs-leim-21.4-26.3mdv2007.1.i586.rpm 07e1609387915960408eb3c53c4e0523 2007.1/i586/emacs-nox-21.4-26.3mdv2007.1.i586.rpm 70f6305375ed24d4187697e70244d47d 2007.1/i586/emacs-X11-21.4-26.3mdv2007.1.i586.rpm 71055474f01d831c92ffad69e2124b0c 2007.1/SRPMS/emacs-21.4-26.3mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: 7cbf1f306944e9fc743d17eac9a690e3 2007.1/x86_64/emacs-21.4-26.3mdv2007.1.x86_64.rpm a1665ec7e029414dce426d6a0d8860b2 2007.1/x86_64/emacs-doc-21.4-26.3mdv2007.1.x86_64.rpm f5e8f8c007cf6b75eaa82a90c92dcfdb 2007.1/x86_64/emacs-el-21.4-26.3mdv2007.1.x86_64.rpm 7218cb8a51fde73651861426520489f3 2007.1/x86_64/emacs-leim-21.4-26.3mdv2007.1.x86_64.rpm 0511da9605eebab1758384fab2109609 2007.1/x86_64/emacs-nox-21.4-26.3mdv2007.1.x86_64.rpm 9fe75d9966416762cea8e883390920e8 2007.1/x86_64/emacs-X11-21.4-26.3mdv2007.1.x86_64.rpm 71055474f01d831c92ffad69e2124b0c 2007.1/SRPMS/emacs-21.4-26.3mdv2007.1.src.rpm Mandriva Linux 2008.0: c9ba30c103c33e130f5b681d78c8699a 2008.0/i586/emacs-22.1-5.2mdv2008.0.i586.rpm 32bd11050ddacc1ec95e9065cb780e65 2008.0/i586/emacs-common-22.1-5.2mdv2008.0.i586.rpm 9af474b1531f49e224e87d26622bad07 2008.0/i586/emacs-doc-22.1-5.2mdv2008.0.i586.rpm 1f083e4597b6d020e607c7ece58d77de 2008.0/i586/emacs-el-22.1-5.2mdv2008.0.i586.rpm 072eeb95d628132f2fec9221b8ac189f 2008.0/i586/emacs-gtk-22.1-5.2mdv2008.0.i586.rpm 31e7d065766e842bc9cf3c63e4542a10 2008.0/i586/emacs-leim-22.1-5.2mdv2008.0.i586.rpm 345f0b210b4bcb683743d3b0f1cba400 2008.0/i586/emacs-nox-22.1-5.2mdv2008.0.i586.rpm 906b7f584b107ba2b2a841466c0cec2b 2008.0/SRPMS/emacs-22.1-5.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 91d12df0967e218bb45b501331809938 2008.0/x86_64/emacs-22.1-5.2mdv2008.0.x86_64.rpm 4db1ac1b2c134d6213d62f470c71ac14 2008.0/x86_64/emacs-common-22.1-5.2mdv2008.0.x86_64.rpm 4add93abb0f2b7cc35099ec213adba7b 2008.0/x86_64/emacs-doc-22.1-5.2mdv2008.0.x86_64.rpm 83faecb5f1d71c08c21d8273b514ee4a 2008.0/x86_64/emacs-el-22.1-5.2mdv2008.0.x86_64.rpm b23989605afbabd02c492678d3c605ec 2008.0/x86_64/emacs-gtk-22.1-5.2mdv2008.0.x86_64.rpm 0b7e8171ae8a9172ca13f2ef45f50735 2008.0/x86_64/emacs-leim-22.1-5.2mdv2008.0.x86_64.rpm 6307e2d6dc2cc98149889c2dc1c24445 2008.0/x86_64/emacs-nox-22.1-5.2mdv2008.0.x86_64.rpm 906b7f584b107ba2b2a841466c0cec2b 2008.0/SRPMS/emacs-22.1-5.2mdv2008.0.src.rpm Mandriva Linux 2008.1: 647b6641b52789efbd0f85ea3ae387b1 2008.1/i586/emacs-22.1-7.1mdv2008.1.i586.rpm 84d1ee873a006081bf3ed4745ff13878 2008.1/i586/emacs-common-22.1-7.1mdv2008.1.i586.rpm b247778379c2951a47e1782db642aebd 2008.1/i586/emacs-doc-22.1-7.1mdv2008.1.i586.rpm 19fbe6b0cfc7e21dd2dcccb0e6fb7196 2008.1/i586/emacs-el-22.1-7.1mdv2008.1.i586.rpm c1865d49ae83ea15a67b4552f495062f 2008.1/i586/emacs-gtk-22.1-7.1mdv2008.1.i586.rpm f8fd80661b9f9cef08cbfedec671cfdc 2008.1/i586/emacs-leim-22.1-7.1mdv2008.1.i586.rpm 927a81595e5eb745413abcc3bca8917e 2008.1/i586/emacs-nox-22.1-7.1mdv2008.1.i586.rpm e0dc3a39c07232eb5c44775866843cad 2008.1/SRPMS/emacs-22.1-7.1mdv2008.1.src.rpm Mandriva Linux 2008.1/X86_64: 37a105e997167f86a702dc5c659f590a 2008.1/x86_64/emacs-22.1-7.1mdv2008.1.x86_64.rpm d7f4640c1cc272af0b7de8c698348490 2008.1/x86_64/emacs-common-22.1-7.1mdv2008.1.x86_64.rpm 4ecd2e3093d92d002563e4f11ede8eea 2008.1/x86_64/emacs-doc-22.1-7.1mdv2008.1.x86_64.rpm 7b868b093f3b7715d2629b2eb769bcbc 2008.1/x86_64/emacs-el-22.1-7.1mdv2008.1.x86_64.rpm e89feeb2922c69c99cc80b755f280bb7 2008.1/x86_64/emacs-gtk-22.1-7.1mdv2008.1.x86_64.rpm ca1bd2740a25f3bd8714ce61069a9352 2008.1/x86_64/emacs-leim-22.1-7.1mdv2008.1.x86_64.rpm 72a3860bd489a6d7bb6738622cd59472 2008.1/x86_64/emacs-nox-22.1-7.1mdv2008.1.x86_64.rpm e0dc3a39c07232eb5c44775866843cad 2008.1/SRPMS/emacs-22.1-7.1mdv2008.1.src.rpm Corporate 3.0: 5938a7176748d2c054aee8cc26fe99a9 corporate/3.0/i586/emacs-21.3-9.4.C30mdk.i586.rpm f4ba9961d6ab3a13dcfed2f500dc1b64 corporate/3.0/i586/emacs-el-21.3-9.4.C30mdk.i586.rpm 46035ccd6b40df7b806b2fc7f5560eb3 corporate/3.0/i586/emacs-leim-21.3-9.4.C30mdk.i586.rpm 8dec136a6d4eec4045fa18f9102fb229 corporate/3.0/i586/emacs-nox-21.3-9.4.C30mdk.i586.rpm b10cba863838d008b1183e09cae9c968 corporate/3.0/i586/emacs-X11-21.3-9.4.C30mdk.i586.rpm 2a6677d86907231c0ba59f6065864ee2 corporate/3.0/SRPMS/emacs-21.3-9.4.C30mdk.src.rpm Corporate 3.0/X86_64: 66e934780af0a4cc559c4d919f59b58b corporate/3.0/x86_64/emacs-21.3-9.4.C30mdk.x86_64.rpm 33ef8e10456ca3d79a8b6cb272095151 corporate/3.0/x86_64/emacs-el-21.3-9.4.C30mdk.x86_64.rpm 71a2b73b95e5d53fe0d848f2143ca1ca corporate/3.0/x86_64/emacs-leim-21.3-9.4.C30mdk.x86_64.rpm cf2c1f53dd531d8713fe002749892ae1 corporate/3.0/x86_64/emacs-nox-21.3-9.4.C30mdk.x86_64.rpm 79e696a60033b3b2471ba833423323e8 corporate/3.0/x86_64/emacs-X11-21.3-9.4.C30mdk.x86_64.rpm 2a6677d86907231c0ba59f6065864ee2 corporate/3.0/SRPMS/emacs-21.3-9.4.C30mdk.src.rpm Corporate 4.0: 45676adfed25e12b9715885833fcb187 corporate/4.0/i586/emacs-21.4-20.3.20060mlcs4.i586.rpm e90636e8acbb136d88d3d43a488f8da8 corporate/4.0/i586/emacs-doc-21.4-20.3.20060mlcs4.i586.rpm b4853627d21efb6b7ca84d726528eaa5 corporate/4.0/i586/emacs-el-21.4-20.3.20060mlcs4.i586.rpm 1e155750aca968a44604096411e7af48 corporate/4.0/i586/emacs-leim-21.4-20.3.20060mlcs4.i586.rpm 7baf91055dd648878f27a2f9c6cfb830 corporate/4.0/i586/emacs-nox-21.4-20.3.20060mlcs4.i586.rpm 2910ce2399015e5d994a947ea8590c2b corporate/4.0/i586/emacs-X11-21.4-20.3.20060mlcs4.i586.rpm 97fc8b290b3a4398b70804f1e3b35074 corporate/4.0/SRPMS/emacs-21.4-20.3.20060mlcs4.src.rpm Corporate 4.0/X86_64: abd961b76638d924830a1dd8ad042373 corporate/4.0/x86_64/emacs-21.4-20.3.20060mlcs4.x86_64.rpm 892208a32b3fa46b943a7c2b37636d1a corporate/4.0/x86_64/emacs-doc-21.4-20.3.20060mlcs4.x86_64.rpm 3f6059bd8402868f58661b2ef90b4124 corporate/4.0/x86_64/emacs-el-21.4-20.3.20060mlcs4.x86_64.rpm a1707e8d3435c141db73e04458f0e3d6 corporate/4.0/x86_64/emacs-leim-21.4-20.3.20060mlcs4.x86_64.rpm 0535a66c3c41e0fb53ea0ffb448a1f0d corporate/4.0/x86_64/emacs-nox-21.4-20.3.20060mlcs4.x86_64.rpm 13f4349cafa04f5e21fdfb71132454cf corporate/4.0/x86_64/emacs-X11-21.4-20.3.20060mlcs4.x86_64.rpm 97fc8b290b3a4398b70804f1e3b35074 corporate/4.0/SRPMS/emacs-21.4-20.3.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFIIK55mqjQ0CJFipgRAq+ZAJ0fW67aU94XKpMZrLm/p9A742wXeACgx8ko aq13NQvRnmbkA3V4P8brgk4= =Semw -----END PGP SIGNATURE----- ------------=_1210112714-11275-4035 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1210112714-11275-4035--