Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kdegraphics security update Advisory ID: RHSA-2008:0238-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0238.html Issue date: 2008-04-17 CVE Names: CVE-2008-1693 ===================================================================== 1. Summary: Updated kdegraphics packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: The kdegraphics packages contain applications for the K Desktop Environment, including kpdf, a PDF file viewer. Kees Cook discovered a flaw in the way kpdf displayed malformed fonts embedded in PDF files. An attacker could create a malicious PDF file that would cause kpdf to crash, or, potentially, execute arbitrary code when opened. (CVE-2008-1693) All kdegraphics users are advised to upgrade to these updated packages, which contain backported patches to resolve this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kdegraphics-3.3.1-9.el4_6.src.rpm i386: kdegraphics-3.3.1-9.el4_6.i386.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.i386.rpm kdegraphics-devel-3.3.1-9.el4_6.i386.rpm ia64: kdegraphics-3.3.1-9.el4_6.ia64.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.ia64.rpm kdegraphics-devel-3.3.1-9.el4_6.ia64.rpm ppc: kdegraphics-3.3.1-9.el4_6.ppc.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.ppc.rpm kdegraphics-devel-3.3.1-9.el4_6.ppc.rpm s390: kdegraphics-3.3.1-9.el4_6.s390.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.s390.rpm kdegraphics-devel-3.3.1-9.el4_6.s390.rpm s390x: kdegraphics-3.3.1-9.el4_6.s390x.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.s390x.rpm kdegraphics-devel-3.3.1-9.el4_6.s390x.rpm x86_64: kdegraphics-3.3.1-9.el4_6.x86_64.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.x86_64.rpm kdegraphics-devel-3.3.1-9.el4_6.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kdegraphics-3.3.1-9.el4_6.src.rpm i386: kdegraphics-3.3.1-9.el4_6.i386.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.i386.rpm kdegraphics-devel-3.3.1-9.el4_6.i386.rpm x86_64: kdegraphics-3.3.1-9.el4_6.x86_64.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.x86_64.rpm kdegraphics-devel-3.3.1-9.el4_6.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kdegraphics-3.3.1-9.el4_6.src.rpm i386: kdegraphics-3.3.1-9.el4_6.i386.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.i386.rpm kdegraphics-devel-3.3.1-9.el4_6.i386.rpm ia64: kdegraphics-3.3.1-9.el4_6.ia64.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.ia64.rpm kdegraphics-devel-3.3.1-9.el4_6.ia64.rpm x86_64: kdegraphics-3.3.1-9.el4_6.x86_64.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.x86_64.rpm kdegraphics-devel-3.3.1-9.el4_6.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kdegraphics-3.3.1-9.el4_6.src.rpm i386: kdegraphics-3.3.1-9.el4_6.i386.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.i386.rpm kdegraphics-devel-3.3.1-9.el4_6.i386.rpm ia64: kdegraphics-3.3.1-9.el4_6.ia64.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.ia64.rpm kdegraphics-devel-3.3.1-9.el4_6.ia64.rpm x86_64: kdegraphics-3.3.1-9.el4_6.x86_64.rpm kdegraphics-debuginfo-3.3.1-9.el4_6.x86_64.rpm kdegraphics-devel-3.3.1-9.el4_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIB5a/XlSAg2UNWIIRAn0mAJ0brvzS[censored]pPOejAwfsS0pEL02U5QCghQh4 Tor1IWplMDxuAuZIqWinmvQ= =bD5e -----END PGP SIGNATURE----- --
  2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: poppler security update Advisory ID: RHSA-2008:0239-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0239.html Issue date: 2008-04-17 CVE Names: CVE-2008-1693 ===================================================================== 1. Summary: Updated poppler packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: Poppler is a PDF rendering library, used by applications such as Evince. Kees Cook discovered a flaw in the way poppler displayed malformed fonts embedded in PDF files. An attacker could create a malicious PDF file that would cause applications that use poppler -- such as Evince -- to crash, or, potentially, execute arbitrary code when opened. (CVE-2008-1693) Users are advised to upgrade to these updated packages, which contain backported patches to resolve this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/poppler-0.5.4-4.4.el5_1.src.rpm i386: poppler-0.5.4-4.4.el5_1.i386.rpm poppler-debuginfo-0.5.4-4.4.el5_1.i386.rpm poppler-utils-0.5.4-4.4.el5_1.i386.rpm x86_64: poppler-0.5.4-4.4.el5_1.i386.rpm poppler-0.5.4-4.4.el5_1.x86_64.rpm poppler-debuginfo-0.5.4-4.4.el5_1.i386.rpm poppler-debuginfo-0.5.4-4.4.el5_1.x86_64.rpm poppler-utils-0.5.4-4.4.el5_1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/poppler-0.5.4-4.4.el5_1.src.rpm i386: poppler-debuginfo-0.5.4-4.4.el5_1.i386.rpm poppler-devel-0.5.4-4.4.el5_1.i386.rpm x86_64: poppler-debuginfo-0.5.4-4.4.el5_1.i386.rpm poppler-debuginfo-0.5.4-4.4.el5_1.x86_64.rpm poppler-devel-0.5.4-4.4.el5_1.i386.rpm poppler-devel-0.5.4-4.4.el5_1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/poppler-0.5.4-4.4.el5_1.src.rpm i386: poppler-0.5.4-4.4.el5_1.i386.rpm poppler-debuginfo-0.5.4-4.4.el5_1.i386.rpm poppler-devel-0.5.4-4.4.el5_1.i386.rpm poppler-utils-0.5.4-4.4.el5_1.i386.rpm ia64: poppler-0.5.4-4.4.el5_1.ia64.rpm poppler-debuginfo-0.5.4-4.4.el5_1.ia64.rpm poppler-devel-0.5.4-4.4.el5_1.ia64.rpm poppler-utils-0.5.4-4.4.el5_1.ia64.rpm ppc: poppler-0.5.4-4.4.el5_1.ppc.rpm poppler-0.5.4-4.4.el5_1.ppc64.rpm poppler-debuginfo-0.5.4-4.4.el5_1.ppc.rpm poppler-debuginfo-0.5.4-4.4.el5_1.ppc64.rpm poppler-devel-0.5.4-4.4.el5_1.ppc.rpm poppler-devel-0.5.4-4.4.el5_1.ppc64.rpm poppler-utils-0.5.4-4.4.el5_1.ppc.rpm s390x: poppler-0.5.4-4.4.el5_1.s390.rpm poppler-0.5.4-4.4.el5_1.s390x.rpm poppler-debuginfo-0.5.4-4.4.el5_1.s390.rpm poppler-debuginfo-0.5.4-4.4.el5_1.s390x.rpm poppler-devel-0.5.4-4.4.el5_1.s390.rpm poppler-devel-0.5.4-4.4.el5_1.s390x.rpm poppler-utils-0.5.4-4.4.el5_1.s390x.rpm x86_64: poppler-0.5.4-4.4.el5_1.i386.rpm poppler-0.5.4-4.4.el5_1.x86_64.rpm poppler-debuginfo-0.5.4-4.4.el5_1.i386.rpm poppler-debuginfo-0.5.4-4.4.el5_1.x86_64.rpm poppler-devel-0.5.4-4.4.el5_1.i386.rpm poppler-devel-0.5.4-4.4.el5_1.x86_64.rpm poppler-utils-0.5.4-4.4.el5_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIB5bOXlSAg2UNWIIRAh06AKCxjDoSHPIZ7kfW5433YynAAmTvewCeMBHP RcNXmYle0yHw9sYZ9jwaN2g= =rkNa -----END PGP SIGNATURE----- --
  3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: xpdf security update Advisory ID: RHSA-2008:0240-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0240.html Issue date: 2008-04-17 CVE Names: CVE-2008-1693 ===================================================================== 1. Summary: Updated xpdf packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Xpdf is an X Window System-based viewer for Portable Document Format (PDF) files. Kees Cook discovered a flaw in the way xpdf displayed malformed fonts embedded in PDF files. An attacker could create a malicious PDF file that would cause xpdf to crash, or, potentially, execute arbitrary code when opened. (CVE-2008-1693) Users are advised to upgrade to these updated packages, which contain backported patches to resolve this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xpdf-3.00-16.el4.src.rpm i386: xpdf-3.00-16.el4.i386.rpm xpdf-debuginfo-3.00-16.el4.i386.rpm ia64: xpdf-3.00-16.el4.ia64.rpm xpdf-debuginfo-3.00-16.el4.ia64.rpm ppc: xpdf-3.00-16.el4.ppc.rpm xpdf-debuginfo-3.00-16.el4.ppc.rpm s390: xpdf-3.00-16.el4.s390.rpm xpdf-debuginfo-3.00-16.el4.s390.rpm s390x: xpdf-3.00-16.el4.s390x.rpm xpdf-debuginfo-3.00-16.el4.s390x.rpm x86_64: xpdf-3.00-16.el4.x86_64.rpm xpdf-debuginfo-3.00-16.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xpdf-3.00-16.el4.src.rpm i386: xpdf-3.00-16.el4.i386.rpm xpdf-debuginfo-3.00-16.el4.i386.rpm x86_64: xpdf-3.00-16.el4.x86_64.rpm xpdf-debuginfo-3.00-16.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xpdf-3.00-16.el4.src.rpm i386: xpdf-3.00-16.el4.i386.rpm xpdf-debuginfo-3.00-16.el4.i386.rpm ia64: xpdf-3.00-16.el4.ia64.rpm xpdf-debuginfo-3.00-16.el4.ia64.rpm x86_64: xpdf-3.00-16.el4.x86_64.rpm xpdf-debuginfo-3.00-16.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xpdf-3.00-16.el4.src.rpm i386: xpdf-3.00-16.el4.i386.rpm xpdf-debuginfo-3.00-16.el4.i386.rpm ia64: xpdf-3.00-16.el4.ia64.rpm xpdf-debuginfo-3.00-16.el4.ia64.rpm x86_64: xpdf-3.00-16.el4.x86_64.rpm xpdf-debuginfo-3.00-16.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2008 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFIB5beXlSAg2UNWIIRAozuAJoDjuVv2SbsFMb+TjUcF6jA9B9F7ACeIytJ 6chSxJpQR4R6zomrodgwHEg= =y7ls -----END PGP SIGNATURE----- --
  4. Hi, * *Whoopty at XSReviews has written an in-depth article into* 5 game concepts that should be revisited. **Title:* 5 game concepts that should be revisited ( -at -) XSReviews *Article Link**:* http://www.xsreviews.co.uk/editorial/gaming/5-game-concepts-that-should-be-revisited/ *Thumbnail Link:* http://www.xsreviews.co.uk/article_image.php?i=24&s=l <http://www.xsreviews.co.uk/article_image.php?i=24&s=l> <http://www.xsreviews.co.uk/images/thumbs/evog-l.jpg> *Quote:* "The games industry - especially large studios - is often accused of "playing it safe" and sticking to tried and true concepts, leaving independent studios to try out new ideas and new ways of playing. With so many RTS and FPS clones being pumped out every year alongside yet another expansion for the Sims, many are clamouring for something new and fresh. What the studios don't realize, is that they don't need to make something new. There are already plenty of novel game concepts that just need an update, or a bit more developement. With that in mind, here's our top 5 novel game concepts that should be revisited." *A news post on your site would be very much appreciated. We would also love you to add us to your news list, so if you are interested in us posting your news on our site, then please send all news to the email below! If you like our site and would like to swap links and become a site affiliate then please email us as well. RSS Feed: * <http://feeds.xsreviews.co.uk/xsreviews-Our_reviews>http://feeds.xsreviews.co.uk/rss <http://feeds.xsreviews.co.uk/xsreviews-Our_reviews>* *Thanks Jon "Whoopty" Martindale www.xsreviews.co.uk <http://www.xsreviews.co.uk>
  5. Hello Everyone, We're writing to let you all know that we have just posted a new article at HotHardware in which we evaluate the features and performance of Lenovo's sleek ThinkPad X300 ultra portable notebook. According to Lenovo, the ThinkPad X300 was designed to be the most efficient notebook the company has ever offered, with claims of a 25% reduction in power consumption in comparison to previous X-Series models. To achieve this, Lenovo attempted a balancing act of sorts, equipping the X300 with a low power Core 2 Duo CPU, a Solid-State Drive and an LED backlit monitor. The question is, has the focus on low power consumption come at too big a price, both in terms of dollars and overall performance? Head on over to the site and find out... Article URL: http://www.hothardware.com/Articles/Lenovo_ThinkPad_X300_Ultraportable_Noteb ook Site: http://www.hothardware.com/ As always, a link in your news sections would be much appreciated! If you'd like us to return the favor, please don't hesitate to send your press
  6. Bigbruin.com has new content posted... A mention in your site's news section would be greatly appreciated! Title: Thermaltake Xaser VI VG4000BWS Super Tower Chassis URL: http://www.bigbruin.com/2008/xaservi_1 Image URL (150x70 pixels): http://www.bigbruin.com/2008/xaservi/logo.gif Quote: In October 2007 Thermaltake announced that they were working on the sixth edition of the Xaser series. The latest release builds on the success of past models, and includes items such as a removable motherboard tray, 10 expansion slots, a tool-free design, Aluminum construction, e-SATA connectors, and many other features. Thank you. Best regards, Jason www.bigbruin.com
  7. OfficeTime v1.3.1 offers 20 new features for tracking your time - Published on 04/17/08 Mac Time Tracking for Busy People: Busy people will have an easier time tracking their workday, thanks to improvements in OfficeTime. OfficeTime was built by designers who didn't want to waste a single mouse click - it just works, intuitively and elegantly. Version 1.3.1 offers 22 new features and improvements and is a free upgrade for all users. Edmonton, Alberta, Canada - Life just got easier for people trying to keep track of their time across multiple tasks. OfficeTime's improved global quick start menu (one of 22 new features) allows people to easily switch between timed tasks from within any application. OfficeTime 1.3.1 now shows which task is actively being tracked, in the menu bar, and how much time has elapsed - the information is always available, whether you're in an e-mail client, word processor, or other application. One click can switch timing to a new task and automatically pause the timer on your previous task. "We have had many people write in to say they never imagined that a time tracking application could keep up with their hectic day," says Stephen Dodd, Director of Transcena Design, Inc. and creator of OfficeTime. "Now, for the first time, they're able to track every minute of their day without distracting themselves from the task at hand. Busy people don't have time to fill in a dialog box every time they switch tasks or clients." Picture this: You are tracking your time while working on a proposal in Word. The phone rings and now you're on a call with a client. Without leaving Word, you select the client via OfficeTime's global drop-down menu, your Proposal timer pauses, and the new client timer starts. Even a task category is automatically assigned, based on your preferred defaults for this client. Later, when you hang up the phone, you are reminded by the client name in the menu bar that the timer is running. One click and you're back to timing your proposal work, automatically halting the client timer. But what if you forget to switch timers? OfficeTime has that covered too. When you hang up the phone and go back to your computer, OfficeTime reminds you that you've been away (and for how long); you can then move those minutes to one of your client projects or just discard them. "People don't want to think about tracking their time," says Dodd. "They just want to do it. I used to hate tracking my time. Now, I don't even think about it." OfficeTime evolved through daily use in a hectic design agency and was designed from the ground up to be usable amid the chaos and distractions most consultants and office workers face. OfficeTime was built by designers who didn't want to waste a single mouse click - it just works, intuitively and elegantly. "Our customers are always suggesting refinements to OfficeTime and we love it!" says Dodd. "This latest version contains 22 improvements suggested by our fan base and we're releasing it as a free update to thank the OfficeTime community." For a full list of OfficeTime's Features, visit their site. OfficeTime is available for both Mac and Windows machines and data can be moved seamlessly between both platforms. Download a Free Trial of a 21-day unlimited version. Purchase OfficeTime for $39.95 with a 60-Day Satisfaction Guarantee. Mac User Groups may contact OfficeTime's Website for further discounts. Journalists, newsletter publishers, bloggers and others: Get a working version of OfficeTime and reprint any of our Tip of the Day items, with an agreement to review our product and include order information: Visit the site for OfficeTime Screenshots and Press Page. OfficeTime's Features: http://www.officetime.net/features Download a Free Trial of OfficeTime: http://www.officetime.net/download.html Purchase OfficeTime: http://www.officetime.net/buy/ OfficeTime's Press Page and Screenshots: http://www.officetime.net/press.html OfficeTime's Logo: http://www.officetime.net/press/OT_logo_forprint.jpg Visit OfficeTime: http://OfficeTime.net Transcena Design Inc., a busy web and applications development firm, needed to track its employees' time. When they couldn't find a full featured tracking application with ease of use, this 17-year old agency (with a zest for clean design and usable interfaces), decided to build a time-tracker from scratch. OfficeTime is their answer for an intuitive solution. Visit OfficeTime's website. ### Bethany Siegler Marketing 720-771-3271 bethany ( -at -) OfficeTime.net
  8. ======================= * What is gnome-speech? ======================= GNOME-speech provides a simple general API for producing text-to-speech (TTS) output. It also provides drivers for several TTS engines, both commercial and open source. The gnome-speech 0.4.x release series should work on GNOME 2.16.x, GNOME 2.18.x, GNOME 2.20.x, GNOME 2.22.x, and GNOME 2.23.x. ========================================= * What's changed for gnome-speech 0.4.19? ========================================= This is just a maintenance release to make the eSpeak build work better. * configure.in: be smarter about automatically finding espeak * drivers/espeak/Makefile.am: remove libstdc++. It is not needed and makes the Solaris build fail. ===================== * Where can I get it? ===================== Source code: http://download.gnome.org/sources/gnome-speech/0.4/gnome-speech-0.4.19.tar.bz2 http://download.gnome.org/sources/gnome-speech/0.4/gnome-speech-0.4.19.tar.gz Enjoy. Will _______________________________________________
  9. The past week has been rampant with discussion on the new war that is brewing between NVIDIA and Intel but there was one big player left out of the story: AMD. It would seem that both sides seem to have written this competitor out but we think quite the opposite. Yes the company is having financial difficulties that many have used as bait for a potential takeover or buy out, but I am going to spend this time to discuss why I think both Intel and NVIDIA are overlooking a still-competitive opponent which could turn out to be a drastic mistake. URL: http://www.pcper.com/article.php?aid=547 Quote: "Of the three companies in this debate today, Intel, AMD and NVIDIA, only one is balanced in the vision that both NVIDIA and Intel supposedly see for the industry. AMD has both a CPU and GPU that are competitive in today's market; not leaders in any definitive way but right up there none the less. Thanks to the acquisition of ATI by AMD nearly two years ago the combined organization seems poised to capitalize on the shifting dynamics in the designs of both processing dynamics. And much of what Intel and NVIDIA are doing today is actually vali[censored] what AMD has done over the past 24 months." Thanks for a post! Ryan Shrout Owner - PC Perspective rshrout ( -at -) pcper.com
  10. TechwareLabs has published a Wireless Security Guide. Here's a clip from the guide: Quote: Almost anyone can purchase and use a wireless gateway or router in their home or office. The setup of these devices often come with a wizard to step you through and get the device working. The problem is that most of these wizards disregard common security holes and leave you open to hackers and even your neighbors accessing your data. How do you plug these holes and how does wireless work? We answer these questions in our simple guide to wireless security. LINK: http://www.techwarelabs.com/articles/other/wireless_security/ Title: Wireless Security Guide ( -at -) TechwareLabs Image: http://www.techwarelabs.com/articles/other/wireless_security/images/cube-waves.jpg Please Digg: http://digg.com/security/Wireless_Security_Guide A news post would be greatly appreciated!
  11. Photos: http://www.thomas-pr.com/136/photos/corsairmacpackage.html http://www.thomas-pr.com/136/photos/corsairmacpro.html Release: http://www.thomas-pr.com/pressreleases/corsairhighdensityrelease.html FOR IMMEDIATE RELEASE Contact: Ruby Lin Corsair (510) 657-8747 press ( -at -) corsairmemory.com CORSAIR ANNOUNCES HIGH-DENSITY MEMORY LINE FOR MAC PRO DESKTOP SYSTEMS New Fully Buffered 2GB & 4GB DIMM Kits Added to Corsair Mac Memory Line Fremont, CA, April 17, 2008 - Corsair® www.corsair.com, a worldwide leader in high performance computer and flash memory products, announced today the launch of their new Corsair high-density Memory Line for Mac Pro desktop systems. Made especially for the high performance demands of the Mac market, the new Corsair Mac Pro Memory Kits are fully buffered 667MHz solutions, available immediately in 2GB (2 x 1GB modules) and 4GB (2 x 2GB modules) DIMM kits. Mac Pro Memory is 100% Apple Compatible - Lifetime Warranty The Corsair Mac Pro memory modules are qualified at the Apple Test Labs in California and are 100% compatibility guaranteed with a lifetime warranty. "We are excited to extend our Corsair memory solutions to support the high performance Mac Pro Desktop Systems," said John Beekley, VP of Applications at Corsair. "These modules offer end users the ability to greatly maximize the amount of memory in their Mac Pro," added Beekley. Corsair Mac Pro fully-buffered Memory Modules are immediately available: VSA2GBFBKIT667D2 - 2GB Kit (2 x 1GB modules): $165 USD MSRP VSA4GBKITFB667D2 - 4GB Kit (2 x 2GB modules): $225 USD MSRP Corsair Mac Laptop Memory Line In addition to the new Corsair Mac Pro desktop line of memory products, Corsair also recently launched the first high performance memory modules made especially for Mac laptops. The new Corsair memory modules are the industry's first low latency modules specifically tuned for the new Apple MacBook and MacBook Pro laptop computers. Pricing & Availability The new Corsair Memory Line for the Mac Pro is immediately available through Corsair's authorized distributors and resellers world-wide priced at $165 for the 2GB kit and $225 for the 4GB kit. Corsair memory products are backed by a Limited Lifetime Warranty. Complete customer support via telephone, email, forum and Technical Service Xpress is also available. For more information on the Corsair memory products, please visit www.corsair.com. About Corsair www.corsair.com Corsair, Inc. has earned a reputation as being the first to market performance leader with cutting-edge products for the PC enthusiasts. Corsair supplies DRAM Memory, Flash Memory, Power Supplies and Water-cooling solutions for high-performance gaming systems, mission critical servers and portable notebooks. Performance, Reliability and Innovation - It is Corsair. # # # Copyright © 2008 Corsair. All rights reserved. All company and/or product names may be trade names, trademarks and/or registered trademarks of the respective owners with which they are associated. Features, pricing, availability, and specifications are subject to change without notice. Latin America Contact Jackie Lin Telephone +1 510 657 8747 jackiel ( -at -) corsair.com UK, Scandinavia and Benelux Contact Gareth Ogden Telephone +44 1462 888 072 gareth.ogden ( -at -) corsair.com Germany, Austria and Switzerland Contact Alex Ruedinger Telephone +49 761 707 5815 alex.muedinger ( -at -) corsair.com France, Greece, Turkey and Israel Contact Christian Olivieri Telephone +33 1 30 50 46 69 christian.olivieri ( -at -) corsair.com Italy Contact Fabrizio Vianu Telephone +39 236 585 562 fabrizio.vianu ( -at -) corsair.com Spain and Portugal Contact Jean-Luc Sigonney Telephone +33 1 34 61 75 59 jean-luc.sigonney ( -at -) corsair.com Poland, Czech Rep, Romania, Baltic and Balkan Contact Arek Ostrowski Telephone +48 22 244 2692 arek.ostrowski ( -at -) corsair.com Russia, Ukraine, CIS, Middle East and North Africa Contact Philip Bakhramov Telephone +7 495 508 1011 philip.bakhramov ( -at -) corsair.com Malaysia, Thailand, South Africa, Vietnam, India and Pakistan Contact Shane Dennison Mobile: +88 69 3077 5300 shaned ( -at -) corsair.com Australia, Indonesia, Japan, New Zealand and Singapore Contact Jeannie Khoo Telephone: +1 510 657 8747 jeanniek ( -at -) corsair.com Taiwan, China, Korea and Hong Kong Contact Jevon Yeh Telephone +88 62 2765 5045 jevony ( -at -) corsair.com
  12. If the news suits your site a post in your news section would be greatly appreciated. Iron Man Comic-con Trailer ( -at -) BiTTDaily.com Link: http://bittdaily.com/HDmedia/560/3521/ And Iron Man Behind the scenes video (2 of 5) ( -at -) BiTTDaily.com Link: http://bittdaily.com/HDmedia/560/3514/ ........................................................................................................................................
  13. BitBlasters Software releases Virtual Dashboard 1.3.4 for Mac OS X - Published on 04/17/08 BitBlasters Software is delighted to announce Virtual Dashboard 1.3.4, their incredibly useful Dashboard enhancement utility for Mac OS X. Acting as an intermediary between the user and Dashboard, Virtual Dashboard solves the problem with the number of widgets that can viewed on the screen at one time. With Virtual Dashboard, users can create widget sets that can be switched in and out either through a menu or keyboard shortcuts. Version 1.3.4 adds many improvements and bug fixes. Wellington, Colorado - BitBlasters Software is delighted to announce Virtual Dashboard 1.3.4, their incredibly useful Dashboard enhancement utility for Mac OS X. A potential problem with Dashboard is the number of widgets that can viewed at one time is limited to the amount of viewable screen space the user has. Acting as an intermediary between the user and Dashboard, Virtual Dashboard solves this problem with the number of widgets that can viewed on the screen at one time. With Virtual Dashboard, users can create widget sets that can be switched in and out either through a menu or keyboard shortcuts. Users may create as many sets as they desire, with easy access to hundreds, if not thousands, of widgets right at their fingertips. Virtual Dashboard also remembers where widgets are placed on the screen the next time a set is displayed. And sets can be edited after they are created too. Users may add and/or remove widgets in already created sets, allowing users to set up widget sets for games, utilities, weather or news, for example. The possibilities are endless. Version 1.3.4 adds many improvements and bug fixes and is a recommended update for all customers. * No longer shows no update available window if no update available * Fixed small problem with some widgets not showing in selection of widgets window Minimum Requirements: * Mac OS X Version 10.4 Tiger or later * Universal Binary for PowerPC and Intel * 2.1 MB Hard Drive space Pricing and Availability: Virtual Dashboard may be purchased for $10.00 USD and is a free update to all 1.x customers. A 30-day demo is available for download. BitBlasters Software: http://www.bitblasters.com/ Download Virtual Dashboard 1.3.4: http://www.bitblasters.com/downloads/Virtual_Dashboard_1.3.4.dmg Purchase: http://order.kagi.com/cgi-bin/store.cgi?storeID=JBK Based in Wellington, Colorado, BitBlasters Software is a privately funded company founded in 1993 by Scott Mitchell. With a focus on total customer satisfaction, BitBlasters' aim is to develop state-of-the-art software for the Macintosh platform. Copyright 1993-2008 BitBlasters Software. All Rights Reserved. Apple, the Apple logo, and Dashboard are registered trademarks of Apple Computer in the U.S. and/or other countries. ### Scott Mitchell Owner 970-568-9410 support ( -at -) bitblasters.com ******* Member wishes to have this product reviewed by the media ******* ******* Trackback URL: http://prmac.com/release-trackback.php?id=1837&a=ODM= Link To Article: http://prmac.com/release-id-1837.htm *******
  14. Hi Webmasters =26 News Posters=2C Overclock3D have just published a new article titled=3A Corsair XMS2 DHX PC= 2-6400 4GB Kit =2E Posting this news on your site would be much appreciated= =2E Quote=3A =22A further addition to the DDR2 market=2C the XMS2 DHX kit steps= up to try push the tech that little bit further=2E=22 Link=3A http=3A//www=2Eoverclock3d=2Enet/reviews=2Ephp=3F/memory/corsair=5F= xms2=5Fdhx=5Fpc2-6400=5F4gb=5Fkit/1 Best Regards=2C Overclock3D=2ENet Overclock3D Limited - Technology News=2C Reviews and Articles - Registered= company=3A 05844225
  15. Okami was originally released for the Playstation 2 two years ago and it has been recently released on the Nintendo Wii. The big question however, can Capcom make this port as enjoyable as the excellent original? Interestingly Okami was destined for the Wii at the same time development occurred for the PS2, however this release is over a year late. Okami creator Clover Studios dissolved so it was up to Capcom to find a suitable replacement to handle the Wii version. Developer Ready At Dawn were drafted to handle the coding duties from remnants of half finished code. http://www.driverheaven.net/gamingreviews.php?reviewid=584 ______________________________ Gaming Heaven News Mailer
  16. Dear Media friends, APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! * Title: Vizo Propeller II PCI Slot Fan ( -at -) APH Networks * Description: Over the last couple of years, the computer market has become fierce and intense in all areas. The tight competition between processor makers AMD and Intel, as well as the graphics card front on the ATI/AMD and NVIDIA side, we have come to expect more powerful processors and video cards to do various tasks -- whether it's to play the latest DX10 games such as Company of Heroes, to something that simply pushes our graphics cards to the limit such as Crysis. Of course, there is a price to pay for this rapid increase in graphics performance. According to Murphy's Law, "If anything can go wrong, it will", there will always be one outcome that becomes detriment to the overall product. This is especially true in graphics cards; as seen with the increase of graphics performance, it tends to produce more heat. According to our previous tests, this application is true when it comes to the 8800GTS G92 running at a whopping 84 degrees on load. It could be cooled with an additional case fan or an improved heatsink, but what if you are tight on space? Well, then you are in luck, because today, we will review an affordable product that not only provides cooling in congested areas -- the Vizo Propeller II PCI slot cooler with direct heat exhaust. * Link: http://aphnetworks.com/reviews/vizo_propeller_ii * Image: http://aphnetworks.com/review/vizo_propeller_ii/003.jpg
  17. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Lamptron Aluminum Case Handles Link: http://www.techpowerup.com/reviews/Lamptron/Lamptron_Case_Handles Brief: In a world where case modding is becoming increasingly more popular, Lamptron focuses on giving modders and enthusiasts alike what they are asking for in accessories. The Aluminum Case Handles that we are taking a look at today have style with their custom CNC milled design and smooth elegant finish. The aluminum construction is solid yet very light weight and will certainly please anyone who wants to add portability to their case as well as looks provided that you are willing to spend a little extra money for the quality.
  18. Hello Webmasters and News Posters, NEW CONTENT (Digital Lounge) - Hands On With DTS HD Master Audio QUOTE: "Yesterday, Sony Computer Entertainment finally gave home theatre fanatics what they had been clamouring for since late 2006, when the PlayStation 3 console launched. With the delivery of the latest console firmware, version 2.30, owners whom have an amplifier capable of outputting PCM sound will benefit from improved sound with Blu-ray movies encoded in DTS HD Master Audio. The days of lossy audio in home theatre are over; now the onus is on home theatre fans to embrace these new technologies, and if they truly love the art form, there is absolutely no reason why they shouldn’t." For more information, please visit - http://www.tweaktown.com/articles/1392/hands_on_with_dts_hd_master_audio/index.html Best Regards, The TweakTown Team http://www.tweaktown.com
  19. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200804-18:02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Poppler: User-assisted execution of arbitrary code Date: April 17, 2008 Updated: April 17, 2008 Bugs: #216850 ID: 200804-18:02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Poppler does not handle fonts inside PDF files safely, allowing for execution of arbitrary code. Background ========== Poppler is a cross-platform PDF rendering library originally based on Xpdf. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-text/poppler < 0.6.3 >= 0.6.3 Description =========== Kees Cook from the Ubuntu Security Team reported that the CairoFont::create() function in the file CairoFontEngine.cc does not verify the type of an embedded font object inside a PDF file before dereferencing a function pointer from it. Impact ====== A remote attacker could entice a user to open a specially crafted PDF file with a Poppler-based PDF viewer such as Gentoo's Xpdf, Epdfview, or Evince, potentially resulting in the execution of arbitrary code with the privileges of the user running the application. Workaround ========== There is no known workaround at this time. Resolution ========== All Poppler users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/poppler-0.6.3" References ========== [ 1 ] CVE-2008-1693 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200804-18.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security ( -at -) gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
  20. MacUpdate Parallels bundle $64.99 (retail $474.76) - Published on 04/17/08 MacUpdate has released the MacUpdate Parallels bundle. It is a software bundle that includes Parallels and 9+ more top Mac apps. You can purchase the bundle of software for $64.99 (retails at $474.76), which is less than the price of Parallels by itself. This event is time limited and runs April 16-29th. In 2007, MacUpdate sold over 27,000 bundles, reaching record numbers for that year. This year, we fully expect this bundle event to be the biggest online Mac software event ever. Traverse City, MI - MacUpdate has launched the MacUpdate Parallels bundle, which is expected to become the largest online Mac software event ever. For a limited time (April 16-29th) you can buy Parallels and 9+ more top Mac apps for only $64.99, saving over $409 on this group of software. The bundle includes: * Parallels Desktop* - Run Windows OS and apps from within Mac OS X. * BannerZest* - Flash presentation software for pro and amateur web designers. * Sound Studio* - Audio recording and editing tool with automator Monbots. * DVDRemaster Pro - Duplicate, burn or convert DVD movies for iPod, iPhone or Apple * Typinator - Types repeating texts and pictures for you. * Novel writing software. * Leap - New Spotlight interface with tagging. * MenuCalendarClock - Menu item calendar/clock with iCal integration. * Art Text - Create high quality headings, logos, icons, banners and buttons. * Hazel - Your personal Mac OS X housekeeper. As with most of these bundle events, there are 3 unlock milestones. As the Mac community hits each of these goals, Sound Studio, BannerZest and Parallels will be unlocked into the bundle for free. Because of the success of users spreading the word during the last 2-event, we fully expect to unlock all of the top tier apps into the bundle this time as well. Visit MUPromo and be sure to check out the fantastic movie that highlights each of the apps in the bundle. Then take part in the event and purchase the bundle for less than the cost of Parallels by itself. MacUpdate Promo: http://www.mupromo.com/ MacUpdate LLC was founded in 1997 by Joel Mueller while he was in high school. It has since grown into one of the largest online Macintosh communities on the Internet, and the most popular Mac-only software site on the net. All Material and Software © 1997-2007 MacUpdate LLC / All Rights Reserved. Apple, the Apple logo, iPod, the iPod logo, are registered trademarks of Apple Computer in the U.S. and/or other countries. ### Joel Mueller GM 269-873-1357 macupdate ( -at -) macupdate.com ******* Member wishes to have this product reviewed by the media *******
  21. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200804-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Speex: User-assisted execution of arbitrary code Date: April 17, 2008 Bugs: #217715 ID: 200804-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Improper input validation in Speex might lead to array indexing vulnerabilities in multiple player applications. Background ========== Speex is an audio compression format designed for speech that is free of patent restrictions. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-libs/speex < 1.2_beta3_p2 >= 1.2_beta3_p2 Description =========== oCERT reported that the Speex library does not properly validate the "mode" value it derives from Speex streams, allowing for array indexing vulnerabilities inside multiple player applications. Within Gentoo, xine-lib, VLC, gst-plugins-speex from the GStreamer Good Plug-ins, vorbis-tools, libfishsound, Sweep, SDL_sound, and speexdec were found to be vulnerable. Impact ====== A remote attacker could entice a user to open a specially crafted Speex file or network stream with an application listed above. This might lead to the execution of arbitrary code with privileges of the user playing the file. Workaround ========== There is no known workaround at this time. Resolution ========== All Speex users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/speex-1.2_beta3_p2" References ========== [ 1 ] CVE-2008-1686 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200804-17.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security ( -at -) gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
  22. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200804-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: rsync: Execution of arbitrary code Date: April 17, 2008 Bugs: #216887 ID: 200804-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A buffer overflow in rsync might lead to the remote execution of arbitrary code when extended attributes are being used. Background ========== rsync is a file transfer program to keep remote directories synchronized. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/rsync < 2.6.9-r6 >= 2.6.9-r6 Description =========== Sebastian Krahmer of SUSE reported an integer overflow in the expand_item_list() function in the file util.c which might lead to a heap-based buffer overflow when extended attribute (xattr) support is enabled. Impact ====== A remote attacker could send a file containing specially crafted extended attributes to an rsync deamon, or entice a user to sync from an rsync server containing specially crafted files, possibly leading to the execution of arbitrary code. Please note that extended attributes are only enabled when USE="acl" is enabled, which is the default setting. Workaround ========== Disable extended attributes in the rsync daemon by setting "refuse options = xattrs" in the file "/etc/rsyncd.conf" (or append "xattrs" to an existing "refuse" statement). When synchronizing to a server, do not provide the "-X" parameter to rsync. You can also disable the "acl" USE flag for rsync and recompile the package. Resolution ========== All rsync users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.9-r6" References ========== [ 1 ] CVE-2008-1720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1720 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200804-16.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security ( -at -) gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
  23. Hi, We’ve just posted our latest review and would love it if you linked it. TIA! “The Pegasus 210 (from £799) is a 12-inch ultra-portable laptop designed to meet the everyday demands of business professionals. The machine pretty much sucks at running games and high-end multimedia, but for number crunchers who can’t afford a ThinkPad it might be just the ticket. In fact, if it wasn’t for the jaw-dropping ThinkPad X300 (from £1790), the Pegasus 210 might actually be a contender for your cash.” http://www.biosmagazine.co.uk/rev.php?id=729 _____ Christian Harris Editor/Publisher BIOS (http://www.biosmagazine.co.uk) _____
  24. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1547-1 security ( -at -) debian.org http://www.debian.org/security/ Martin Schulze April 17th, 2008 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : openoffice.org Vulnerability : several Problem type : local (remote) Debian-specific: no CVE IDs : CVE-2007-5745 CVE-2007-5746 CVE-2007-5747 CVE-2008-0320 Several security related problems have been discovered in OpenOffice.org, the free office suite. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5745, CVE-2007-5747 Several bugs have been discovered in the way OpenOffice.org parses Quattro Pro files that may lead to a overflow in the heap potentially leading to the execution of arbitrary code. CVE-2007-5746 Specially crafted EMF files can trigger a buffer overflow in the heap that may lead to the execution of arbitrary code. CVE-2008-0320 A bug has been discovered in the processing of OLE files that can cause a buffer overflow in the heap potentially leading to the execution of arbitrary code. Recently reported problems in the ICU library are fixed in separate libicu packages with DSA 1511 against which OpenOffice.org is linked. For the old stable distribution (sarge) these problems have been fixed in version 1.1.3-9sarge9. For the stable distribution (etch) these problems have been fixed in version 2.0.4.dfsg.2-7etch5. For the testing (lenny) and unstable (sid) distributions these problems have been fixed in version 2.4.0~ooh680m5-1. We recommend that you upgrade your openoffice.org packages. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org_1.1.3-9sarge9.dsc Size/MD5 checksum: 2878 8b2bf5fad94194078687afd08a774051 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org_1.1.3-9sarge9.diff.gz Size/MD5 checksum: 4663713 95fc9e73f779d582edd4df28c5bdc265 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org_1.1.3.orig.tar.gz Size/MD5 checksum: 166568714 5250574bad9906b38ce032d04b765772 Architecture independent components: http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-af_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2648250 4c65359ce6ee948e155c3200435e3882 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ar_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2700940 f0f7cd9f4e836f69cb01d9b414a7dd8f http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ca_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2697858 8f73d02ce7e1801f9c50e7625324b780 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-cs_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3607590 f50b4014d8141f064b281b0cb8d9c115 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-cy_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2664720 61b0feccf81710f128111fe1caab6773 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-da_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3604230 bb6543e7dfd37b8b6751eb199450cae2 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-de_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3491518 cd0c55f2d047f03e1ca1b4167fea7f0e http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-el_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2746570 6cd2c910bd469e26d7fcb37dff4512f5 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-en_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3558088 9b1510871540ac5dcc350ea0ad4b3a6b http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-es_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3598796 d0ea026676b3084deb1fc3a77c687e53 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-et_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2650338 c3db9bce36a17a0776381942063e4ea4 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-eu_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2673950 11f1d3bc2f9dfed0387db69e88cacd8a http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-fi_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2678370 08c3410411e90aaa4cbcfe3b348bd564 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-fr_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3527784 edf85ee62d864bff9fecce72918968fb http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-gl_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2661824 69f49be0b36bb236143dd3a3ed74ebec http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-he_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2662348 cffb7ccf6cd197a1ead235e1d8a7112c http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-hi_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2700566 bb47a62c2dab1a654c8995e140d06947 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-hu_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2779548 a330138f5694ab92a369f1aae880ce48 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-it_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3594366 6544ac0a084f616267bf6e26488846cc http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ja_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3643250 e22f73ec6636bb4f449728b172a6fe9b http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-kn_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2689190 8c2a361be69b3d0b5360e4784ce8a3b8 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ko_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3636720 a220dbf54d3488ea5b4d8179dc865fa9 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-lt_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2675632 74ffc44a546392ee017143b810e2637a http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-nb_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2664412 80f44508a3c1bd73f07ae8f1168aee9f http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-nl_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3584972 9585878dcd03acd5cca586d783068513 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-nn_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2668424 c0e53624c2f532037a33353728b31472 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ns_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2669552 15973f4307b67114d0e6ffef39c94ac3 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-pl_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3257540 60fac5847fa0dc2a72b1b4d7a2e254aa http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-pt-br_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3551028 fb66d3e185265f62b5c7551d5b0e619e http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-pt_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3188384 dc986ef3047a21382ca645a16e08aeb5 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ru_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3343672 489c9c620ba33bd30ed5b955dc47b4bd http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-sk_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3625882 45f92dd0bc1b1f0b8cee1ae3ae4d3c34 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-sl_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3618560 3debcc4500711e31046b2228c8974bd1 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-sv_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3582306 af1a4707c7368ab938ceec7a8464250a http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-th_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2690850 82f2b167acf2ffbf372644ae41a22f3e http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-tn_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2652690 0f13b84421818a3b098ddd6300092d98 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-tr_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2896992 f3b61fe725ac1f6c9691151919b2b87f http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-zh-cn_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3643262 81b8ac903faca7cf271e1d1d049d99f1 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-zh-tw_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3637634 90968a3b5c05e73b479ae7d2d97949f0 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-zu_1.1.3-9sarge9_all.deb Size/MD5 checksum: 2676948 406db0488e4938b9c8194740e1181e94 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-mimelnk_1.1.3-9sarge9_all.deb Size/MD5 checksum: 67562 af9dd86905013d56b19ecb45d9807697 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-thesaurus-en-us_1.1.3-9sarge9_all.deb Size/MD5 checksum: 3132566 4e9e65cb3e82df2493bd744b0c4f0d93 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org_1.1.3-9sarge9_all.deb Size/MD5 checksum: 7146178 bb4f42ae475454e2bb05cd9f21175b66 http://security.debian.org/pool/updates/main/o/openoffice.org/ttf-opensymbol_1.1.3-9sarge9_all.deb Size/MD5 checksum: 137494 089763974406307a610b7f7d9968b8fd Intel IA-32 architecture: http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-bin_1.1.3-9sarge9_i386.deb Size/MD5 checksum: 41479514 4ff235b42e36015cc514056632b2b780 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-dev_1.1.3-9sarge9_i386.deb Size/MD5 checksum: 1959698 a3c27a471d382f27a19b6b7fb32387a2 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-evolution_1.1.3-9sarge9_i386.deb Size/MD5 checksum: 164924 c5d8904cf797a225f3099794a76bd290 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-gtk-gnome_1.1.3-9sarge9_i386.deb Size/MD5 checksum: 160820 ae643bab2a6ef81e4cdf7057ab5074cd http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-kde_1.1.3-9sarge9_i386.deb Size/MD5 checksum: 144648 bb099fdf0f46b31e82049889eac2ca91 PowerPC architecture: http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-bin_1.1.3-9sarge9_powerpc.deb Size/MD5 checksum: 39930094 e3e0898389dc1e70d29793a27edc96b1 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-dev_1.1.3-9sarge9_powerpc.deb Size/MD5 checksum: 1866048 0d8b1fa229ca2156b5ee93f9ff0f7aa5 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-evolution_1.1.3-9sarge9_powerpc.deb Size/MD5 checksum: 161972 5aad796fa5ed7d5f2782a048eb7fcc4d http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-gtk-gnome_1.1.3-9sarge9_powerpc.deb Size/MD5 checksum: 159138 2067a482e159b75263de951a1925e2aa http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-kde_1.1.3-9sarge9_powerpc.deb Size/MD5 checksum: 142698 399debc43173f9d1a19b66097692a9b8 IBM S/390 architecture: http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-bin_1.1.3-9sarge9_s390.deb Size/MD5 checksum: 42754002 b7ac71a3488d3d16fe9245dd0d07b102 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-dev_1.1.3-9sarge9_s390.deb Size/MD5 checksum: 1852898 c9bd57e7d7390e155930105b4206dee6 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-evolution_1.1.3-9sarge9_s390.deb Size/MD5 checksum: 167208 6e65ced0dc2a37a792795ef944235986 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-gtk-gnome_1.1.3-9sarge9_s390.deb Size/MD5 checksum: 167052 832cc733fe684aab82a62892fd55f840 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-kde_1.1.3-9sarge9_s390.deb Size/MD5 checksum: 145698 52c2eaf796a09ff0b330cb6276bcb399 Sun Sparc architecture: http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-bin_1.1.3-9sarge9_sparc.deb Size/MD5 checksum: 40805052 5eb512efe5edfbd01bdd971398dc041c http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-dev_1.1.3-9sarge9_sparc.deb Size/MD5 checksum: 1850062 3a4ff90b40c593527313da3b12f2423b http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-evolution_1.1.3-9sarge9_sparc.deb Size/MD5 checksum: 168240 8cf2b8b96acefe5130acd05d8e0c7f7d http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-gtk-gnome_1.1.3-9sarge9_sparc.deb Size/MD5 checksum: 158706 8409da76ce82967d39df682aa5a0e339 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-kde_1.1.3-9sarge9_sparc.deb Size/MD5 checksum: 140224 3482782ec4a80f226904f5bb7fbd8955 Debian GNU/Linux 4.0 alias etch - ------------------------------- Source archives: http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org_2.0.4.dfsg.2-7etch5.dsc Size/MD5 checksum: 7250 d2b005cb68eeb1b7aea5a99464276809 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org_2.0.4.dfsg.2-7etch5.diff.gz Size/MD5 checksum: 76910312 72ae64e516b0f4e7b40627ce7b05d56d http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org_2.0.4.dfsg.2.orig.tar.gz Size/MD5 checksum: 232674922 2f1a5d92188639d3634bd6d1b1c29038 Architecture independent components: http://security.debian.org/pool/updates/main/o/openoffice.org/broffice.org_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 460286 0e423ed9108ae76e16ed3f5cdeb421e8 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-common_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 27205374 e132480db338215920c81424447b6680 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-dev-doc_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 5548772 78092b363fa91eb6849ec9d3c04ba5c8 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-dtd-officedocument1.0_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 251340 6a649787fe4c90e1707e228d139594a3 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-filter-mobiledev_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 310076 c551435c9fc0556ad8afb601719cf2a4 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-cs_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 11861792 acefda32f8236f3c63a63634f375c08a http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-da_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 11823678 37247ba8343f0a1ca96fff83910e4fa2 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-de_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12654294 d4b7df67081fa008385203e1f3a3bf3e http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-dz_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 15044784 6ada5b969bbb40bdda051ba744ca88a4 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-en-gb_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 11374890 d9e64d85a57f03c9a4d05ea2196cda41 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-en-us_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 11319338 78bf228b5ea75c2f3175539323562ffa http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-en_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 213420 dc547ef897303b63c8d7c3485a5fca25 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-es_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12049450 5247977b1bdac89c67e7be04d1b55d5c http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-et_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 11976250 765e674605924ce002e221002712c99b http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-fr_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12330680 6664efd183d6a64906876343fafe7746 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-hi-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 13162136 11eaba83d6f69fc9fc4c1c1bb737ac95 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-hu_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12582866 dffcffc68b9c9eba40e38ea019e3243b http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-it_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12105400 1f18bb440408360863889f54c46c1146 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-ja_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12778604 149495b0847e3c963b5be4e275239552 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-km_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 14429418 ebc7630ee0690e63adb359a92e369cba http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-ko_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 11952606 14d9c4fd6d366df72f9808e2baa1419d http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-nl_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12322752 d9b115b667b3ef09088edc154a3e0c18 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-pl_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12283812 e742a3988ffe57e4e1c916c18f5da09f http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-pt-br_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12064744 6d16e0e92cb85c0861ad780a85fa3e24 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-ru_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 13187324 6cb12c367fa73c459cd7f19af8aaeb24 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-sl_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12055014 b4c3da0d293e83af5ba26bc44519fe61 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-sv_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 11812038 38313cf548775b1ca8b64a9054134ad9 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-zh-cn_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12080038 d4a8e66676481dd34edec014bd743cfb http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-help-zh-tw_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 12203304 41da46a7a3ecb0c25464d571fcb28b16 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-java-common_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 3006630 7edc3951ed26d724f63a1a8489978e63 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-af_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 855740 f56304420b4e5861cb40ded3464b600a http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-as-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 912008 15ee52d855a1efb8b86055e5e09bfc39 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-be-by_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 912540 a8c5cc93def0912da0158ae01186cd09 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-bg_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2093134 38f6afb5c9aee3e2f453a2b9be03caaf http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-bn_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 852610 a0e63d60b3ef079551895e4e74b56543 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-br_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 863916 9789a95d7eb1248159e8f7cbe124b299 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-bs_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 858086 c1029ce1ae686c46ec7617c93d4074b1 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ca_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 874602 8ec64b897e69e26008321e82319d9597 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-cs_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2047438 a15a226bab22ca683675293453918e69 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-cy_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 851122 db96626c677f3e23afd9f7fd7c6a3a79 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-da_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1986126 6448ca7a5ffd3e4c88ec8ff1e4b01efb http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-de_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1982736 559cca05135865303b0218121b886ae1 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-dz_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 957358 1f65a4f80d81031550dcf2101b24c69d http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-el_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 958344 5cfa32a5c488ee13b2fb044372bdd140 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-en-gb_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2016890 c557542cb74484c762e7b691c1788273 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-en-za_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 809302 b3742eaec2d233996f8dc78b79f96b1f http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-eo_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 854384 7dfc578a0fec2adeb7b7fb3f2c2a6318 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-es_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1983662 cd07ca4e11a1fde455b0ca728f05fece http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-et_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 853756 954fc89b3c9acef3645a69bef1ce031c http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-fa_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 877200 847b02b21431b6e694d05db4f52876da http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-fi_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 865840 aad8fc6f9d2241b976255bd7ec4fa365 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-fr_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1969278 9b44df89040cf6e898676ef27b49cb76 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ga_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 881394 cec2f049b430760a35d4ae2607c02226 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-gu-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 932080 34b0f7fd78fb0e1bed6d4cae83009d26 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-he_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 883968 9f00ba5889f1bd9a53e6629f3889e192 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-hi-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 939764 c31690ae636c068176de4328152e7a53 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-hi_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 213420 a491bc89478786b4ea65495b1c772ed9 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-hr_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 866820 eac356d6865a9e653bee484f0eec9668 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-hu_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2076318 c830fbc4ff7d5884f75d1e63324591ee http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 213532 9d5882b3efd16ecf5fdaada03561c654 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-it_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1977904 fc538f3fcadefc6ddbeabf5877f32511 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ja_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2142686 890ab4f0b403e60eedd122f6b0a82869 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ka_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 908228 f874e47725ac2facd1947a356d904ff5 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-km_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2136756 bcb46b9141ada1e55c6eaed876374ea1 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ko_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2031532 fdcb44c6d7a5c1030fd2fc12af6842a6 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ku_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 885196 47c10ff923ff81bd5fe2ecbbb1f05db8 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-lo_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 902906 7753e857909aaae641f8c75dd5159930 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-lt_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 873996 dfc78a622fa2602098502433943ee839 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-lv_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 869138 773ebbb94f0ab7937e11b47e0a41a12d http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-mk_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 918232 5e0108ba542167f6d407d4d377ac6550 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ml-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 924508 28e209be2403b9e9049bb998765ab9c9 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-nb_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 848722 1d532dfe7fcceea116a6c41059f96e2e http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ne_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 922470 90831bd88bcea8b2a23a839bfda5da9c http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-nl_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2033772 097c9b52f7f66451d2c22760f4fc290f http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-nn_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 853958 0a53e611fe0fdc727e8dedd527e977b4 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-nr_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 886252 5475a6a8a3059c506ae1933c74d953ac http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ns_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 877852 3810f09f38cec857078b06c52cb78bef http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-or-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 917402 f60d2aa129a51d7f028fd0490a69df49 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-pa-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 901138 3b29b5eeb851924b57421e2ff20314f5 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-pl_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2004308 a0e32498e670ec1c0006f5c1311a9d03 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-pt-br_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1967170 5b0f02ab24bf60f9813537ba34be36b0 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-pt_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1050482 8ba05f878623b13eecdeb3e2f2950285 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ru_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2025582 25cb917a0b037c2ae657c9c06e6c5e20 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-rw_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 864288 044efcb3d7e0aa52ce9fcf5c225b31b5 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-sk_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2051754 47759413755a9b12a4916735de49449d http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-sl_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2041062 4ba675f8118b03e8ee7d17e9bc2b3615 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-sr-cs_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 912344 094968a6c10c16dc81c4a8f702a902a6 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ss_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 878622 dad8fdb2ec078c877141264c11e8805c http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-st_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 877704 cba08b5519f25f9f274884987d04d62f http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-sv_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1957660 4c4a8d4fc99a0f81383bfc8443b4f292 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ta-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 909232 9490342d16636563f1893225d84d30cf http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-te-in_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 929430 59f4ca42a8ec4c163f0c681f72e86780 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-tg_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 903430 f09fafe1ca81da6e3d9deec54488bf4a http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-th_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 931108 51ed45221ea9e5b3f4408ac912374847 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-tn_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 822670 6c81e7127447c31ea4159edcd8cf70ca http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-tr_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 1384858 cf7baa4236de6b0cd21230cb2d053afa http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ts_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 877482 5cabbcf2d23352936f3a4a5841ede8c8 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-uk_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 916202 aa6d6882fbb5320e2e6e0674f00c0aa8 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-ve_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 886482 36b3f8af4adb006dbc483feef6a258ea http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-vi_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 870564 488141c919851b4351158236feb2f767 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-xh_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 898104 e48c3f181c74cbb8938306bf22abeffc http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-za_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 213520 6d0f80582be78b810d58492857a87ded http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-zh-cn_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2107392 7e7f908d8cea9777c1c03e97b6900268 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-zh-tw_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2103436 7942c04e88daf75b31ae5ae458636606 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-l10n-zu_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 887020 92f1fd63c2c1507a233ea6bcb1e763e0 http://security.debian.org/pool/updates/main/o/openoffice.org/openoffice.org-qa-api-tests_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 2455558 06c74eb48b43556a27e6faf914c476c7 http://security.debian.org/pool/updates/main/o/openoffice.org/ttf-opensymbol_2.0.4.dfsg.2-7etch5_all.deb Size/MD5 checksum: 285366 16a73047dd46bb6eade9ba647b590e93 Alpha architecture:
  25. Hi all, We have just published a review of *rock's Xtreme 770 X9000-8800* gaming notebook, featuring a Core 2 Extreme X9000 and a GeForce 8800M GTX - if you could post a link on your site that would be very much appreciated. *Link:* http://www.bit-tech.net/hardware/2008/04/17/rock_xtreme_770_gaming_laptop/1 *Picture:* http://images.bit-tech.net/content_images/2008/04/rock_xtreme_770_gaming_laptop/fp_img.jpg *Quote: */"Honestly, my feelings about the rock Xtreme 770 are a bit mixed. On the one hand, the Xtreme 770 offers very good gaming performance, application performance and comes with some nice extras and a good warranty. Even the bag that comes bundled with the laptop is nice, though the laptop itself is quite heavy---but that's to be expected. On the other hand though, the battery life won't let you even get through one two hour film and I still feel that the concept of a gaming laptop is one that hasn't been explored properly yet. Just because it doesn't have a separate monitor, keyboard and speakers doesn't mean that this 17-inch beast suddenly becomes portable! In the end, for me, it's the gaming performance and overall feel of the Xtreme 770 that makes this laptop a winner -- this is a machine which feels good to use and some obvious care and attention has obviously gone into the design. rock has even spaced out the USB ports so you can fit multiple devices in without making it a squeeze. The laptop as a whole feels good to use and the gaming performance, while maybe not as good as we had hoped, is more than enough for modern gaming. It may be expensive and many //bit-tech readers may guffaw and pledge continued, undying loyalty to their desktop machines, but the reality is that the rock Xtreme 770 is a very tempting piece of kit and more than capable of any task you might care to throw at it."/ * *Cheers guys! Tim Smalley www.bit-tech.net
×