The Wine development release 1.3.10 is now available
What's new in this release (see below for details):
- Support for notification balloons in system tray.
- Obsolete AudioIO sound driver removed.
- More work on ActiveX support.
- Various MSI fixes.
- Preloader now used for 64-bit too.
- Translation updates.
- Various bug fixes.
The source is available from the following locations:
http://ibiblio.org/pub/linux/system/emulators/wine/wine-1.3.10.tar.bz2
http://prdownloads.sourceforge.net/wine/wine-1.3.10.tar.bz2
Binary packages for various distributions will be available from:
http://www.winehq.org/download
You will find documentation on http://www.winehq.org/documentation
You can also get the current source directly from the git
repository. Check http://www.winehq.org/git for details.
Wine is available thanks to the work of many people. See the file
AUTHORS in the distribution for the complete list.
----------------------------------------------------------------
Bugs fixed in 1.3.10:
4432 Blobby Volley - corrupted graphics
7304 WRC (Wine Resource Compiler) preprocessing is buggy
7431 Xilinx picoblaze assembler kcpsm3 crashes
7922 Language settings not found and strange Day Error in EWRevenge (bug in oleaut32)
11449 ExpressPCB 6.1.2 crashes when updating pricing
12744 Steam tray icon doesn't appear if panel hidden in autohide mode
12808 indexed bitmaps support is broken
12828 Arcade Pool 2: Game crashes after several seconds
14922 no ingame sound in drakensang
15003 VB6 crashes when triing enter a program code
15041 Guild Wars: Typing into Char Fields
15257 Changing from OpenGL to Direct3D output in WinUAE results in blank screen
15882 while wine application is running fullscreen ekiga incoming call popup doesn't appare
16489 Falcon 4.0 AF: Updater does not work, check fails
16672 Marie La Cavalière: Unhandled exception
16703 Wineconsole: Fallback from curses to window based backend
16704 wineconsole: Allow specifying the console backend to use when wineconsole is launched implicitly
16914 wrc chokes on a file which is accepted by windows rc
18075 IE8 crashes due to missing urlmon.dll.423 API
18230 Romanian translation wrong
18484 Charma: too slow and there's a problem with the pointer
18497 Gothic 3: Failure at starting new game
18768 Madden NFL 08 regression: program doesn't start
19314 IE8 for Server 2003 refuses to install (Service Pack 2 for Windows Server 2003 install required)
19565 Guitar Hero World Tour does not produces any sound (except videos)
20311 Blitzkrieg game crashes when selecting 'Allies campaign' (failed to save document to IStream)
20552 Memory leak in alloc_thread_tls?
20842 Python: ctrl-c and ctrl-d do not work in wineconsole [dogfood]
21173 choice.exe missing, needed by some cmd scripts
21245 file operations are very slow or hangs solidworks
22487 tray icons broken with ubuntu 10.04 for some users (affects utorrent 2.0.1, autohotkey)
23028 Empire Earth 1.00 and 1.04 mirrored cursor on vertical move
23089 Grass rendering bug in S.T.A.L.K.E.R clear sky/call of pripyat
23378 Desktop launchers generated by new Steam UI are broken
24294 corrupted icons in SolidWorks sketches
24323 Need for speed 3 crashes on startup
24680 loader: segfault after loading krnl386.exe, while LoadLibraryEx for any buildin dll
24866 Unhandled exception in Windows Double Explorer (IExplorerBrowser_fnSetPropertyBag)
25040 Icons in system tray area are blank
25059 dotnet30 install completion window minimized, needs balloon tooltip
25155 Creative Writer 2 only installs in Win9x modes on WoW64
25283 Unimplemented function urlmon.dll.410
25301 Occasional sock_check_pollhup() error on Solaris
25452 office2000 reconfiguration gives msi crash
25484 NewsLeecher 'send to tray' broken
25510 Wine-generated desktop files are not compliant with XDG standard
25513 Wine Software Uninstaller crashes
25529 64-bit Internet Explorer 7/8 refuse to install
25545 64-bit wine loader broken (in win64 mode)
----------------------------------------------------------------
Changes since 1.3.9:
Albert Pool (1):
winecfg: Update Dutch translation.
Alexander Morozov (3):
wincrypt.h: Define PFN_CMSG_IMPORT_KEY_TRANS callback function.
crypt32: Implement decoding enveloped messages.
crypt32: Implement getting content and some parameters from a decoded enveloped message.
Alexandre Julliard (54):
user32: Fix coordinates mapping for the desktop window in the explorer process.
winex11: Fix event coordinates mapping for the root window in the explorer process.
comctl32: Fix positioning of tracking tooltips at the bottom of the screen.
windowscodecs: Convert the coclasses registration to the IRegistrar mechanism.
urlmon: Convert the coclasses registration to the IRegistrar mechanism.
itss: Convert protocol registration to the IRegistrar format.
actxprxy: Convert dll registration to the IRegistrar mechanism.
dispex: Convert dll registration to the IRegistrar mechanism.
qmgrprxy: Convert dll registration to the IRegistrar mechanism.
user32: Don't call GetModuleFileNameW under the user lock.
wineboot: Set the correct architecture in the process identifier variable.
kernel32: Update the environment variables that vary across 32-bit/64-bit/Wow64.
wine.inf: Don't set the ProgramFiles environment variables through the registry.
ntdll: Ensure alignment of static TLS data and free it at thread exit.
krnl386: Fetch version from the PEB to avoid potentially using GetVersionEx before it's initialized.
winex11: Store information needed for the info balloon in the tray icon structure.
winex11: Add support for displaying system tray notification balloons.
winex11: Potentially update the system tray notification position when any foreign window is moved.
explorer: Store information needed for the info balloon in the tray icon structure.
explorer: Add support for displaying system tray notification balloons in desktop mode.
wineboot: Relaunch the 64-bit version of wineboot on Wow64.
winecfg: Relaunch the 64-bit version of winecfg on Wow64.
winecfg: Set Wow64 registry keys as well as the 64-bit ones for version information.
ntdll: Don't worry about the DOS area on non-x86.
loader: Make sure the new stack is 16-byte aligned in the preloader.
loader: Use long instead of int in the preloader for anything that can store a pointer.
loader: Build the preloader for x86-64.
libwine: Use the 64-bit preloader when starting 64-bit wine.
libwine: Reserve memory areas for 64-bit in case we don't have a preloader.
ntdll: Avoid putting the virtual heap in the low 2Gb on 64-bit.
quartz: Convert coclasses registration to the IRegistrar mechanism.
avifil32: Move extension registrations to the rgs file.
widl: Register the PSFactoryBuffer class as factory if it's defined in the idl file.
msi: Convert the dll registration to the IRegistrar mechanism.
loader: Define asm functions instead of inlines for x86-64 syscalls to avoid trouble with register constraints.
wiaservc: Convert coclasses registration to the IRegistrar mechanism.
include: Correctly define the msxml typelib by directly including xmldom.idl and xmldso.idl.
include: Add a couple of missing interfaces in msxml2.idl.
msxml: Add an msxml library that contains the v2.0 msxml typelib.
msxml: Register the v2.0 classes using the IRegistrar mechanism.
msxml2: Add an msxml2 library that contains the v2.6 msxml typelib.
msxml3: Convert dll registration to the IRegistrar mechanism.
loader: Setup the TLS register on x86-64 for stack protector checks.
widl: Allow specifying a version for a coclass independently of its typelib version.
include: Set version to 1.0 for msxml classes.
hhctrl.ocx: Add a typelib and register it.
widl: Don't free the input file name since it's stored in various places in the location info.
widl: Allow specifying a class version outside of a typelib too.
include: Define the Scriptlet class in mshtml.idl.
mshtml: Convert the classes registration to the IRegistrar mechanism.
server: Use the syscall function instead of inline assembly.
ntdll: Use the syscall function instead of inline assembly.
libwine: Use the syscall function instead of inline assembly.
appwiz.cpl: Convert the application list to a standard Wine list.
Anders Jonsson (1):
cmd: Update Swedish translation.
Andrew Bogott (1):
winemenubuilder: In InvokeShellLinkerForURL, better replicate the deferral behavior in InvokeShellLinker.
André Hentschel (22):
msi: Fix test failure on some 2k3 machines.
advapi32: Fix test failure on some NT4 machines.
ntdll: Fix test failure on some NT4 machines.
rsaenh: Fix test failure on some NT4 machines.
wrc: Allow comma after popup name.
shell32: Fix shelllink test to not crash on NT4.
shdocvw: Add Resizer control to the iexplore window.
gphoto2.ds: Fix German translation.
include: Add winhttp secure protocol flags.
msi/tests: Remove superfluous check.
gameux: Fix test failures on Wine wow64.
gameux: Fix Path for the statistics.
sane.ds: Fix translation of microsecond.
wininet: Update German translation.
include: Add ERROR_INTERNET_FORTEZZA_LOGIN_NEEDED for wininet tests.
include: Add new suite masks.
wininet: Fix German translation.
shlwapi/tests: Allow Win7 behaviour for SHFormatDateTimeW.
qmgr/tests: Use a temporary path to avoid failures.
shell32/tests: Fix a typo.
advapi32: Print a FIXME also for the unknown levels.
gameux: Fix another test failure on Wine wow64.
Austin English (4):
ntdll: Bump win2k3 version information to sp2.
urlmon: Add stubs for ordinals 410 and 423.
mscoree/tests: Fix a broken test (LLVM/Clang).
quartz: Avoid %L in traces (LLVM/Clang).
Cheer Xiao (2):
view: Update simplified Chinese translation.
write: Update simplified Chinese translation.
Damian Dixon (1):
advapi32: Added check for NULL pointer being passed to QueryServiceStatus for either parameter.
David Bartley (1):
iphlpapi: Add CancelIPChangeNotify stub.
David Hedberg (14):
urlmon: Set BINDF_NEEDFILE if BINDF_PULLDATA is not specified.
wininet: Respect SECURITY_FLAG_IGNORE_CERT_DATE_INVALID.
wininet: Make module handle scope global.
wininet: Add a simple certificate dialog to InternetErrorDlg.
shell32: Fix ExplorerBrowser::SetRect to work properly when passed a NULL-valued hdwp.
shell32: Return S_OK in ::SetPropertyBag.
include: Add IShellItem2 interface declaration.
shell32: IShellItem::GetAttributes should also work on the desktop shellfolder.
shell32: Add IShellItem2 stub to ShellItem implementation.
include: Add a few INET_E_ defines.
urlmon: Split the code for sending an http request into its own function.
urlmon: Fix return value from QueryService.
shell32: Standardize the COM usage in ebrowser.c.
shell32: Add IInputObject stub to ExplorerBrowser.
Detlef Riekenberg (5):
cmd: Allow GOTO to a label which has a following whitespace, with test.
configure: Ask for the correct development package for gstreamer base plugins.
cmd: Add CHOICE builtin with DOS6 to XP commandline parameter.
cmd: Add german translation for CHOICE.
cmd: Do not reset errorlevel during SET.
Eric Pouech (3):
kernel32: When reading chars out of a bare console, use the Unix API (instead of the Windows one).
kernel32: Proper support for echo-input (enable/disable) when getting console input.
kernel32: In readline, now print control characters with ^ escape.
Eryk Wieliczko (1):
msvcrt/tests: Add _fcvt_s tests.
Francois Gouget (4):
shdocvw: Fix compilation on systems that don't support nameless unions.
mshtml: Fix a typo and remove a space before a 'n' in a FIXME() trace.
msvcrt/tests: Add a trailing 'n' to an ok() call.
Assorted spelling fixes.
Frédéric Delanoy (3):
cmd: Update French translation.
wininet: Update French translation.
wininet: Update French translation.
Greg Geldorp (6):
kernel32/tests: Add tests to verify USERPROFILE and environment variables from registry are present and correct.
rsaenh/tests: CryptGetKeyParam doesn't fail on Win7/Win2K8R2.
kernel32/tests: Quote command line arguments that might contain spaces.
kernel32/tests: Remove check of environment variables against registry.
ntdll/tests: Add alternative results for overlong instructions.
shdocvw/tests: Need to save .url before committing extra props for IE6.
Hans Leidekker (16):
msi: Support MSIRUNMODE_LOGENABLED in MsiGetMode.
rpcrt4: Add a stub implementation of RpcMgmtSetAuthorizationFn.
wineboot: Set the USERDOMAIN environment variable.
msi: Return INSTALLSTATE_UNKNOWN from MsiGetComponentState if the component is disabled.
msi: Rewrite command line parsing to handle quoted values correctly.
msi: Add some traces.
msi: Global and local win32 assembly names are formatted differently.
msi: Don't flag an error in the InstallServices action if the component does not exist.
msi: Remove an incorrect error trace.
uninstaller: Run msiexec if the WindowsInstaller value is set.
uninstaller: Fix a leak.
appwiz.cpl: Run msiexec if the WindowsInstaller value is set.
msi: Set the Preselected property if the default feature selection is modified in a dialog.
msi: Set the install level to the maximum if the requested install state is not the default.
msi: Use a function to determine if a feature is selected.
msi: Change ACTION_UpdateComponentStates to take a feature pointer.
Henri Verbeet (17):
wined3d: Pass an IWineD3DBaseShaderImpl pointer to shader_generate_arb_declarations().
wined3d: Pass an IWineD3DBaseShaderImpl pointer to shader_generate_glsl_declarations().
wined3d: Pass an IWineD3DBaseShaderImpl pointer to shader_destroy().
wined3d: Pass an IWineD3DBaseShaderImpl pointer to shader_cleanup().
wined3d: Avoid some interface pointers in set_glsl_shader_program().
wined3d: Pass implementation pointers to generate_param_reorder_function().
wined3d: Store implementation pointers in struct glsl_shader_prog_link.
wined3d: Store implementation pointers in glsl_program_key_t.
wined3d: Pass implementation pointers to get_glsl_program_entry().
wined3d: Pass an IWineD3DBaseShaderImpl pointer to shader_get_registers_used().
wined3d: Pass an IWineD3DBaseShaderImpl pointer to shader_generate_main().
wined3d: Store an IWineD3DBaseShaderImpl pointer in wined3d_shader_context.
wined3d: Pass an IWineD3DBaseTextureImpl array to pixelshader_update_samplers().
wined3d: Pass an IWineD3DBaseTextureImpl pointer to basetexture_unload().
wined3d: Pass an IWineD3DBaseTextureImpl pointer to basetexture_cleanup().
wined3d: Pass an IWineD3DBaseTextureImpl pointer to basetexture_get_level_count().
kernel32: Fix some memory leaks in set_wow64_environment().
Huw Davies (9):
fonts: Fix the metrics of the extended integral and brace glyphs.
ole32: Rewrite the OleAdviseHolder's STATDATA enumerator to be a generic STATDATA enumerator.
include: Add GLYPHSET flag define.
gdi32: Clear the accel flags.
ole32: Remove some useless comments.
ole32: Use a STATDATA array to hold the connection data.
ole32: Allow the EnumSTATDATA constructor to take a sparse array.
ole32: Implement IDataAdviseHolder_EnumAdvise.
ole32: Standardize the COM usage.
Hwang YunSong (16):
sane.ds: Update Korean resource.
browseui: Update Korean resource.
clock: Update Korean resource.
cmdlgtst: Update Korean resource.
comctl32: Update Korean resource.
comdlg32: Update Korean resource.
credui: Update Korean resource.
crypt32: Update Korean resource.
cryptdlg: Update Korean resource.
cryptui: Update Korean resource.
cmd: Update Korean resource.
gphoto2.ds: Update Korean resource.
hhctl.ocx: Update Korean resource.
iccvid: Update Korean resource.
localspl: Update Korean resource.
localui: Update Korean resource.
Jacek Caban (38):
mshtml: Fixed tests on IEs not supporting INewWindowManager.
mshtml: Call DoVerb on embedded plugin.
mshtml: Added support for plugin in place activation.
mshtml: Deactivate plugin when detaching from document.
mshtml: Added PluginHost::GetWindowContext implementation.
mshtml: Added more plugin in place activation support.
mshtml: Added more ActiveX tests.
mshtml: Added OnUIActivation implementation.
mshtml: Added IOleContainer stub implementation.
mshtml: Added PluginHost::GetContainer implementation.
mshtml: Forward PluginHost's QueryService calls to window object.
mshtml: Fixed tests on some IE6 installations.
mshtml: Removed undocumented, internal stubs exported only by old IEs.
jscript: Move some of registration process to IRegistrar mechanism.
mshtml: IHTMLDocument2 iface handling clean up.
winetest: Make win9x unsupported.
shdocvw: Share get_LocationURL implementation between WebBrowser and InternetExplorer objects.
shdocvw: Moved getting dochost pointer to separated function.
shdocvw: Added support for QueryService(IID_IWebBrowserApp).
mshtml: Added IHTMLObjectElement::get_object implementation.
mshtml: Added support for forwarding object element's DOM calls to ActiveX control.
mshtml: Improved QueryService debug traces.
mshtml: Improved IOmNavigator::javaEnabled stub.
mshtml: Added IHTMLScriptElement::get_scr implementation.
mshtml: Added IHTMLStyleElement::media property implementation.
mshtml: Added IHTMLStyleElement::type property implementation.
appwiz.cpl: Correctly handle NULL params in CPL_STARTWPARAMSW handler.
jscript: Added Date.setYear implementation.
urlmon: Added IUriContainer stub implementation of URLMoniker object.
mshtml: Fixed IOleUndoManager::QueryInterface implementation.
jscript: Exception tests clean up.
aclocal.m4: Recognize mingw-w64 as 32-bit cross compiler.
urlmon: Added more IInternetProtocolEx tests.
mshtml: Added GUID_CUSTOM_CONFIRMOBJECTSAFETY with CONFIRMSAFETYACTION_LOADOBJECT flag tests.
urlmon: Converted more registration process to IRegistrar mechanism.
mshtml: Get rid of no longer used GECKO_DATADIR.
urlmon: Make protocol tests more verbose.
include: Added macros for unions and structs that should remain nameless regardless NONAMELESSUNION/NONAMELESSSTRUCT definition.
Jerome Leclanche (1):
winemenubuilder: Add a trailing semicolon to MimeType in desktop files.
Joel Holdsworth (1):
shdocvw: Added missing rendering directive to ietoolbar.svg.
Juan Lang (1):
crypt32: Accept any matching CN when checking a certificate's name.
Kirill Smelkov (1):
kernel32: Support deleting resources in UpdateResource.
Luca Bennati (2):
cmd: Update Italian translation.
wininet: Update Italian translation.
Maarten Lankhorst (5):
quartz: Handle seeking while running better.
quartz: Fix a race condition in videorenderer endflush.
quartz: Handle EndOfStream more elegantly in dsound renderer.
winegstreamer: Silence a harmless fixme.
winegstreamer: Correct a state transition.
Marcus Meissner (2):
kernel32: Fixed size to GetEnvironmentVariableW.
configure.ac: Add -Wlogical-op, if it's not noisy.
Martin Storsjo (2):
wineconsole: Fallback to window based console if the curses library isn't found.
wineconsole: Don't overwrite the backend selection when parsing --use-event.
Michael Stefaniuc (69):
clock: Add the Malayalam translation.
clock: Add the Telugu translation.
clock: Add the Oriya translation.
clock: Add the Punjabi translation.
oleaut32: Standardize the COM usage in connpt.c.
mmdevapi: Standardize the COM usage in devenum.c.
msctf/tests: Standardize the COM usage in inputprocessor.c.
ole32/tests: Standardize the COM usage in clipboard.c.
shlwapi/tests: Standardize the COM usage in ordinal.c.
oleaut32/tests: Use an iface instead of an vtbl pointer in IRecordInfoImpl.
msi: Use an iface instead of an vtbl pointer in IClassFactoryImpl.
msi: Use an iface instead of a vtbl pointer in msi_custom_remote_impl.
msi: Use an iface instead of a vtbl pointer in msi_remote_package_impl.
msi: Use an iface instead of a vtbl pointer in msi_remote_database_impl.
ole32: Use ifaces instead of vtbl pointers in FTMarshalImpl.
ole32: Standardize the COM usage in moniker.c.
msxml3: Use an iface instead of a vtbl pointer in domattr.
msxml3: Use ifaces instead of vtbl pointers in xmlnodemap.
msxml3: Use an iface instead of a vtbl pointer in domcdata.
msxml3: Use an iface instead of a vtbl pointer in entityref.
msxml3: Use an iface instead of a vtbl pointer in domtext.
msxml3: Use an iface instead of a vtbl pointer in domelem.
msxml3: Use an iface instead of a vtbl pointer in xmlnodelist.
msxml3: Use an iface instead of a vtbl pointer in dom_pi.
msxml3: Use an iface instead of a vtbl pointer in domcomment.
msxml3: Use an iface instead of a vtbl pointer in domimpl.
msxml3: Use an iface instead of a vtbl pointer in domdoctype.
msxml3: Use an iface instead of a vtbl pointer in domfrag.
windowscodecs: Use ifaces instead of vtbl pointers in PngEncoder.
oleaut32: Use ifaces instead of vtbl pointers in OLEFontImpl.
ole32: Standardize the COM usage in clipboard.c.
shell32: Use an iface instead of a vtbl pointer in ShellItem.
winecfg: Remove the support to configure the audioio driver sound.
Remove the audioio sound driver. It is unused.
winapi: Remove support for wineaudioio.drv. wineaudioio.drv is no more.
hnetcfg: Standardize the COM usage in apps.c.
hnetcfg: Use an iface instead of an vtbl pointer in fw_manager.
hnetcfg: Use an iface instead of an vtbl pointer in fw_policy.
hnetcfg: Standardize the COM usage in port.c.
hnetcfg: Use an iface instead of an vtbl pointer in fw_profile.
hnetcfg: Standardize the COM usage in service.c.
d3dx9_36: Use an iface instead of an vtbl pointer in ID3DXLineImpl.
wmiutils: Use an iface instead of an vtbl pointer in status_code.
sane.ds: The Da, En, Fi, Fr, Nl, Pt resources are using UTF-8.
d3dx9_36: Use an iface instead of an vtbl pointer in ID3DXConstantTableImpl.
qcap: Use ifaces instead of vtbl pointers in VfwCapture.
oleaut32/tests: Standardize the COM usage in tmarshal.c.
oleaut32: Standardize the COM usage in tmarshal.c.
ole32: Standardize the COM usage in git.c.
mshtml: COM cleanup for the IHTMLDocument3 iface.
mshtml: COM cleanup for the IHTMLDocument4 iface.
mshtml: COM cleanup for the IHTMLDocument5 iface.
mshtml: COM cleanup for the IHTMLDocument6 iface.
mshtml: COM cleanup for the IPersist* ifaces in HTMLDocument.
msxml3: Use ifaces instead of vtbl pointers in xmldoc.
msxml3: Standardize the COM usage in xmlelem.c.
msctf: Standardize the COM usage in documentmgr.c.
inkobj: Remove inkcollector.c as it is dead code.
avifil32: Use an iface instead of a vtbl pointer in ITmpFileImpl.
wuapi: Use an iface instead of a vtbl pointer in wucf.
mshtml: COM cleanup for the IMonikerProp iface.
mshtml: COM cleanup for the IOleObject iface.
mshtml: COM cleanup for the IOleDocument iface.
mshtml: COM cleanup for the IOleDocumentView iface.
mshtml: COM cleanup for the IOleInPlaceActiveObject iface.
mshtml: COM cleanup for the IViewObjectEx iface.
mshtml: COM cleanup for the IOleInPlaceObjectWindowless iface.
ole32: Use ifaces instead of vtbl pointers in DataCache.
ole32: Standardize the COM usage in defaulthandler.c.
Nikolay Sivov (8):
oleaut32/varformat: Fix day string representation format output.
oleaut32/tests: Test return value without macros.
oleaut32: Basic parameter validation tests for some GetTypeInfo* methods.
oleaut32: Fix GetLibAttr for null argument, plus error handling.
oleaut32: Added ICreateTypeInfo2::SetVarHelpContext().
oleaut32: Fix null parameters handling in ICreateTypeLib2::CreateTypeInfo().
oleaut32: Fix ICreateTypeInfo2::SetVarHelpContext() to iterate properly.
oleaut32: Hide variables and functions count storage details in helpers.
Paul Vriens (1):
shdocvw/tests: Make sure we use a valid temporary directory.
Piotr Caban (4):
sane.ds: Convert Polish translation to UTF-8.
kernel32: Add support for completion routine invocation in ReadDirectoryChangesW.
server: Handle more inotify mask values.
kernel32: Added more ReadDirectoryChangesW tests.
Rico Schüller (14):
d3dcompiler: Handle TAG_OSG5 in D3DGetBlobPart().
wined3d: Fix memset size in IWineD3DVolumeImpl_Unmap.
d3dcompiler: Use an iface instead of a vtbl pointer in d3dcompiler_blob.
d3dcompiler: Use an iface instead of a vtbl pointer in d3dcompiler_shader_reflection.
d3dcompiler: Parse reflection STAT tag.
d3dcompiler: Implement ID3D11ShaderReflection::GetMovInstructionCount().
d3dcompiler: Implement ID3D11ShaderReflection::GetConversionInstructionCount().
d3dcompiler: Parse ISGN in the reflection interface.
d3dcompiler: Properly initialize Stream member of D3D11_SIGNATURE_PARAMETER_DESC.
d3dcompiler: Parse OSGN in the reflection interface.
d3dcompiler: Parse PCSG in the reflection interface.
d3dcompiler: Implement ID3D11ShaderReflection::GetInputParameterDesc().
d3dcompiler: Implement ID3D11ShaderReflection::GetOutputParameterDesc().
d3dcompiler: Implement ID3D11ShaderReflection::GetPatchConstantParameterDesc().
Yaron Shahrabani (1):
shlwapi: Added Hebrew translation.
Åukasz WojniÅowicz (5):
avifile: Update Polish translation.
wininet: Update Polish translation.
taskmgr: Update Polish translation.
cmd: Update Polish translation.
winecfg: Update Polish translation.
Wine release 1.2 Release Candidate 6
VirtualBox 4.0.0 has been released
This version is a major update. The following major new features were added:
Reorganization of VirtualBox into a base package and Extension Packs; see chapter 1.5, Installing VirtualBox and extension packs, see the manual for more information
New settings/disk file layout for VM portability; see chapter 10.1, Where VirtualBox stores its files, see the manual for more information
Major rework of the GUI (now called VirtualBox Manager):
Redesigned user interface with guest window preview (also for screenshots)
New scale display mode with scaled guest display; see chapter 1.8.5, Resizing the machines window, see the manual for more information
Support for creating and starting .vbox desktop shortcuts (bug #1889)
The VM list is now sortable
Machines can now be deleted easily without a trace including snapshots and saved states, and optionally including attached disk images (bug #5511; also, VBoxManage unregistervm --delete can do the same now)
Built-in creation of desktop file shortcuts to start VMs on double click (bug #2322)
VMM: support more than 1.5/2 GB guest RAM on 32-bit hosts
New virtual hardware:
Intel ICH9 chipset with three PCI buses, PCI Express and Message Signaled Interrupts (MSI); see chapter 3.4.1, Motherboard tab, see the manual for more information
Intel HD Audio, for better support of modern guest operating systems (e.g. 64-bit Windows; bug #2785)
Improvements to OVF support (see chapter 1.12, Importing and exporting virtual machines, see the manual for more information):
Open Virtualization Format Archive (OVA) support
Significant performance improvements during export and import
Creation of the manifest file on export is optional now
Imported disks can have formats other than VMDK
Resource control: added support for limiting a VMs CPU time and IO bandwidth; see chapter 5.8, Limiting bandwidth for disk images, see the manual for more information
Storage: support asynchronous I/O for iSCSI, VMDK, VHD and Parallels images
Storage: support for resizing VDI and VHD images; see chapter 8.21, VBoxManage modifyhd, see the manual for more information.
Guest Additions: support for multiple virtual screens in Linux and Solaris guests using X.Org server 1.3 and later
Language bindings: uniform Java bindings for both local (COM/XPCOM) and remote (SOAP) invocation APIs
VirtualBox 4.0.0 released
Mount USB Devices in Virtualbox with Ubuntu
A bind security update has been released for Slackware Linux
New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,
11.0, 12.0, 12.1, 12.2, 13.0, 13.1, and -current to fix security issues that
could allow attackers to successfully query private DNS records, or cause a
denial of service.
Here are the details from the Slackware 13.1 ChangeLog:
+--------------------------+
patches/packages/bind-9.4_ESV_R4-i486-1_slack13.1.txz: Upgraded.
This update fixes some security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/bind-9.4_ESV_R4-i386-1_slack8.1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/bind-9.4_ESV_R4-i386-1_slack9.0.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/bind-9.4_ESV_R4-i486-1_slack9.1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/bind-9.4_ESV_R4-i486-1_slack10.0.tgz
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/bind-9.4_ESV_R4-i486-1_slack10.1.tgz
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/bind-9.4_ESV_R4-i486-1_slack10.2.tgz
Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/bind-9.4_ESV_R4-i486-1_slack11.0.tgz
Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/bind-9.4_ESV_R4-i486-1_slack12.0.tgz
Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/bind-9.4_ESV_R4-i486-1_slack12.1.tgz
Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/bind-9.4_ESV_R4-i486-1_slack12.2.tgz
Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.4_ESV_R4-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.4_ESV_R4-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.4_ESV_R4-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.4_ESV_R4-x86_64-1_slack13.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.7.2_P3-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.7.2_P3-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 8.1 package:
c6558b863b2c06bd860788d2e063d6b1 bind-9.4_ESV_R4-i386-1_slack8.1.tgz
Slackware 9.0 package:
b8017dc56859c7ea12878fd55a139914 bind-9.4_ESV_R4-i386-1_slack9.0.tgz
Slackware 9.1 package:
1c2a32a60d4f2930040d9eb2ff01298c bind-9.4_ESV_R4-i486-1_slack9.1.tgz
Slackware 10.0 package:
07227e76140a50a530b264ceb2209f80 bind-9.4_ESV_R4-i486-1_slack10.0.tgz
Slackware 10.1 package:
842d8a7d2fcba797ba4a0c4b304ebec0 bind-9.4_ESV_R4-i486-1_slack10.1.tgz
Slackware 10.2 package:
07373bf15e27335132bc8c17690134df bind-9.4_ESV_R4-i486-1_slack10.2.tgz
Slackware 11.0 package:
aca01fb99555ccffaa08294f4be13772 bind-9.4_ESV_R4-i486-1_slack11.0.tgz
Slackware 12.0 package:
621703e39b34d091e65084a9c80ac015 bind-9.4_ESV_R4-i486-1_slack12.0.tgz
Slackware 12.1 package:
57664e1beb3b046949fadf4fa48dec8d bind-9.4_ESV_R4-i486-1_slack12.1.tgz
Slackware 12.2 package:
74e1feb7ae425e4f8072cf125f25172f bind-9.4_ESV_R4-i486-1_slack12.2.tgz
Slackware 13.0 package:
eaa9031813f824f93d532a0134b8d6f1 bind-9.4_ESV_R4-i486-1_slack13.0.txz
Slackware x86_64 13.0 package:
7dce1ab33c6cff13b7be0e95cd72da7a bind-9.4_ESV_R4-x86_64-1_slack13.0.txz
Slackware 13.1 package:
c200ff5446cbdbf0ccabdd3b0b085ae4 bind-9.4_ESV_R4-i486-1_slack13.1.txz
Slackware x86_64 13.1 package:
3c49a4f64373cf3c47a4c3ef4e2ac159 bind-9.4_ESV_R4-x86_64-1_slack13.1.txz
Slackware -current package:
c62f701d512980604924dd8b1c022283 bind-9.7.2_P3-i486-1.txz
Slackware x86_64 -current package:
bc32cc42a4dffd1eed0c0a60a52eb147 bind-9.7.2_P3-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg bind-9.4_ESV_R4-i486-1_slack13.1.txz
Then, restart the name server:
# /etc/rc.d/rc.bind restart
+-----+
Slackware Linux Security Team
" onclick="window.open(this.href);return false;">http://slackware.com/gpg-key
Seamonkey Update for Slackware
Howtoforge posted a guide about installing ISPCP Omega 1.0.7 on Ubuntu 10.10
ispCP Omega (to simplify matters often called only ispCP) is a modern hosting Control panel, based on VHCS, that provides continued development. This tutorial shows how to install ispCP Omega on Ubuntu 10.10.
Installing ISPCP Omega 1.0.7 On Ubuntu 10.10
HOW-TO: Install the latest proprietary graphics driver in Ubuntu
A bind security update is available for RHEL 5
=====================================================================
Red Hat Security Advisory
Synopsis: Important: bind security update
Advisory ID: RHSA-2010:0976-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0976.html
Issue date: 2010-12-13
CVE Names: CVE-2010-3613 CVE-2010-3614 CVE-2010-3762
=====================================================================
1. Summary:
Updated bind packages that fix three security issues are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
3. Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
It was discovered that named did not invalidate previously cached RRSIG
records when adding an NCACHE record for the same entry to the cache. A
remote attacker allowed to send recursive DNS queries to named could use
this flaw to crash named. (CVE-2010-3613)
A flaw was found in the DNSSEC validation code in named. If named had
multiple trust anchors configured for a zone, a response to a request for a
record in that zone with a bad signature could cause named to crash.
(CVE-2010-3762)
It was discovered that, in certain cases, named did not properly perform
DNSSEC validation of an NS RRset for zones in the middle of a DNSKEY
algorithm rollover. This flaw could cause the validator to incorrectly
determine that the zone is insecure and not protected by DNSSEC.
(CVE-2010-3614)
All BIND users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. After installing the
update, the BIND daemon (named) will be restarted automatically.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
640730 - CVE-2010-3762 Bind: DoS (assertion failure) via a DNS query with bad signatures
658974 - CVE-2010-3613 bind: failure to clear existing RRSIG records when a NO DATA is negatively cached could DoS named
658977 - CVE-2010-3614 bind: key algorithm rollover may mark secure answers as insecure
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.6-4.P1.el5_5.3.src.rpm
i386:
bind-9.3.6-4.P1.el5_5.3.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libs-9.3.6-4.P1.el5_5.3.i386.rpm
bind-sdb-9.3.6-4.P1.el5_5.3.i386.rpm
bind-utils-9.3.6-4.P1.el5_5.3.i386.rpm
x86_64:
bind-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-libs-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libs-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-sdb-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-utils-9.3.6-4.P1.el5_5.3.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.6-4.P1.el5_5.3.src.rpm
i386:
bind-chroot-9.3.6-4.P1.el5_5.3.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.i386.rpm
bind-devel-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.i386.rpm
caching-nameserver-9.3.6-4.P1.el5_5.3.i386.rpm
x86_64:
bind-chroot-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-devel-9.3.6-4.P1.el5_5.3.i386.rpm
bind-devel-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.x86_64.rpm
caching-nameserver-9.3.6-4.P1.el5_5.3.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/bind-9.3.6-4.P1.el5_5.3.src.rpm
i386:
bind-9.3.6-4.P1.el5_5.3.i386.rpm
bind-chroot-9.3.6-4.P1.el5_5.3.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.i386.rpm
bind-devel-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libs-9.3.6-4.P1.el5_5.3.i386.rpm
bind-sdb-9.3.6-4.P1.el5_5.3.i386.rpm
bind-utils-9.3.6-4.P1.el5_5.3.i386.rpm
caching-nameserver-9.3.6-4.P1.el5_5.3.i386.rpm
ia64:
bind-9.3.6-4.P1.el5_5.3.ia64.rpm
bind-chroot-9.3.6-4.P1.el5_5.3.ia64.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.ia64.rpm
bind-devel-9.3.6-4.P1.el5_5.3.ia64.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.ia64.rpm
bind-libs-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libs-9.3.6-4.P1.el5_5.3.ia64.rpm
bind-sdb-9.3.6-4.P1.el5_5.3.ia64.rpm
bind-utils-9.3.6-4.P1.el5_5.3.ia64.rpm
caching-nameserver-9.3.6-4.P1.el5_5.3.ia64.rpm
ppc:
bind-9.3.6-4.P1.el5_5.3.ppc.rpm
bind-chroot-9.3.6-4.P1.el5_5.3.ppc.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.ppc.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.ppc64.rpm
bind-devel-9.3.6-4.P1.el5_5.3.ppc.rpm
bind-devel-9.3.6-4.P1.el5_5.3.ppc64.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.ppc.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.ppc64.rpm
bind-libs-9.3.6-4.P1.el5_5.3.ppc.rpm
bind-libs-9.3.6-4.P1.el5_5.3.ppc64.rpm
bind-sdb-9.3.6-4.P1.el5_5.3.ppc.rpm
bind-utils-9.3.6-4.P1.el5_5.3.ppc.rpm
caching-nameserver-9.3.6-4.P1.el5_5.3.ppc.rpm
s390x:
bind-9.3.6-4.P1.el5_5.3.s390x.rpm
bind-chroot-9.3.6-4.P1.el5_5.3.s390x.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.s390.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.s390x.rpm
bind-devel-9.3.6-4.P1.el5_5.3.s390.rpm
bind-devel-9.3.6-4.P1.el5_5.3.s390x.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.s390.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.s390x.rpm
bind-libs-9.3.6-4.P1.el5_5.3.s390.rpm
bind-libs-9.3.6-4.P1.el5_5.3.s390x.rpm
bind-sdb-9.3.6-4.P1.el5_5.3.s390x.rpm
bind-utils-9.3.6-4.P1.el5_5.3.s390x.rpm
caching-nameserver-9.3.6-4.P1.el5_5.3.s390x.rpm
x86_64:
bind-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-chroot-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.i386.rpm
bind-debuginfo-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-devel-9.3.6-4.P1.el5_5.3.i386.rpm
bind-devel-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libbind-devel-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-libs-9.3.6-4.P1.el5_5.3.i386.rpm
bind-libs-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-sdb-9.3.6-4.P1.el5_5.3.x86_64.rpm
bind-utils-9.3.6-4.P1.el5_5.3.x86_64.rpm
caching-nameserver-9.3.6-4.P1.el5_5.3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2010-3613.html
https://www.redhat.com/security/data/cve/CVE-2010-3614.html
https://www.redhat.com/security/data/cve/CVE-2010-3762.html
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
RHSA-2010:0979-01: Moderate: openssl security update
An openssl security update is available for RHEL 6
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: openssl security update
Advisory ID: RHSA-2010:0979-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0979.html
Issue date: 2010-12-13
CVE Names: CVE-2010-4180
=====================================================================
1. Summary:
Updated openssl packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.
A ciphersuite downgrade flaw was found in the OpenSSL SSL/TLS server code.
A remote attacker could possibly use this flaw to change the ciphersuite
associated with a cached session stored on the server, if the server
enabled the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option, possibly
forcing the client to use a weaker ciphersuite after resuming the session.
(CVE-2010-4180)
Note: With this update, setting the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
option has no effect and this bug workaround can no longer be enabled.
All OpenSSL users should upgrade to these updated packages, which contain a
backported patch to resolve this issue. For the update to take effect, all
services linked to the OpenSSL library must be restarted, or the system
rebooted.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
659462 - CVE-2010-4180 openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-4.el6_0.2.src.rpm
i386:
openssl-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
x86_64:
openssl-1.0.0-4.el6_0.2.i686.rpm
openssl-1.0.0-4.el6_0.2.x86_64.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/openssl-1.0.0-4.el6_0.2.src.rpm
i386:
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-devel-1.0.0-4.el6_0.2.i686.rpm
openssl-perl-1.0.0-4.el6_0.2.i686.rpm
openssl-static-1.0.0-4.el6_0.2.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.x86_64.rpm
openssl-devel-1.0.0-4.el6_0.2.i686.rpm
openssl-devel-1.0.0-4.el6_0.2.x86_64.rpm
openssl-perl-1.0.0-4.el6_0.2.x86_64.rpm
openssl-static-1.0.0-4.el6_0.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-4.el6_0.2.src.rpm
x86_64:
openssl-1.0.0-4.el6_0.2.i686.rpm
openssl-1.0.0-4.el6_0.2.x86_64.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/openssl-1.0.0-4.el6_0.2.src.rpm
x86_64:
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.x86_64.rpm
openssl-devel-1.0.0-4.el6_0.2.i686.rpm
openssl-devel-1.0.0-4.el6_0.2.x86_64.rpm
openssl-perl-1.0.0-4.el6_0.2.x86_64.rpm
openssl-static-1.0.0-4.el6_0.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-4.el6_0.2.src.rpm
i386:
openssl-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-devel-1.0.0-4.el6_0.2.i686.rpm
ppc64:
openssl-1.0.0-4.el6_0.2.ppc.rpm
openssl-1.0.0-4.el6_0.2.ppc64.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.ppc.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.ppc64.rpm
openssl-devel-1.0.0-4.el6_0.2.ppc.rpm
openssl-devel-1.0.0-4.el6_0.2.ppc64.rpm
s390x:
openssl-1.0.0-4.el6_0.2.s390.rpm
openssl-1.0.0-4.el6_0.2.s390x.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.s390.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.s390x.rpm
openssl-devel-1.0.0-4.el6_0.2.s390.rpm
openssl-devel-1.0.0-4.el6_0.2.s390x.rpm
x86_64:
openssl-1.0.0-4.el6_0.2.i686.rpm
openssl-1.0.0-4.el6_0.2.x86_64.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.x86_64.rpm
openssl-devel-1.0.0-4.el6_0.2.i686.rpm
openssl-devel-1.0.0-4.el6_0.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/openssl-1.0.0-4.el6_0.2.src.rpm
i386:
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-perl-1.0.0-4.el6_0.2.i686.rpm
openssl-static-1.0.0-4.el6_0.2.i686.rpm
ppc64:
openssl-debuginfo-1.0.0-4.el6_0.2.ppc64.rpm
openssl-perl-1.0.0-4.el6_0.2.ppc64.rpm
openssl-static-1.0.0-4.el6_0.2.ppc64.rpm
s390x:
openssl-debuginfo-1.0.0-4.el6_0.2.s390x.rpm
openssl-perl-1.0.0-4.el6_0.2.s390x.rpm
openssl-static-1.0.0-4.el6_0.2.s390x.rpm
x86_64:
openssl-debuginfo-1.0.0-4.el6_0.2.x86_64.rpm
openssl-perl-1.0.0-4.el6_0.2.x86_64.rpm
openssl-static-1.0.0-4.el6_0.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-4.el6_0.2.src.rpm
i386:
openssl-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-devel-1.0.0-4.el6_0.2.i686.rpm
x86_64:
openssl-1.0.0-4.el6_0.2.i686.rpm
openssl-1.0.0-4.el6_0.2.x86_64.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-debuginfo-1.0.0-4.el6_0.2.x86_64.rpm
openssl-devel-1.0.0-4.el6_0.2.i686.rpm
openssl-devel-1.0.0-4.el6_0.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/openssl-1.0.0-4.el6_0.2.src.rpm
i386:
openssl-debuginfo-1.0.0-4.el6_0.2.i686.rpm
openssl-perl-1.0.0-4.el6_0.2.i686.rpm
openssl-static-1.0.0-4.el6_0.2.i686.rpm
x86_64:
openssl-debuginfo-1.0.0-4.el6_0.2.x86_64.rpm
openssl-perl-1.0.0-4.el6_0.2.x86_64.rpm
openssl-static-1.0.0-4.el6_0.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2010-4180.html
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
Red Hat Enterprise Linux 3 - End Of Life
New testing kernels for Proxmox VE (2.6.18 and 2.6.32) are available
We just released two kernel updates to our pvetest repository.
(deb http://download.proxmox.com/debian lenny pvetest)
Release notes:
- pve-kernel-2.6.18 (2.6.18-10)
update to ovzkernel-2.6.18-194.26.1.el5.028stab070.14.src.rpm
http://wiki.openvz.org/Download/kern.../028stab070.14
- pve-kernel-2.6.32 (2.6.32-28)
upgrade to Debian Squeeze kernel 2.6.32-28 (openvz 2.6.32-dzhanibekov)
update Intel igb driver to version 2.4.8
update Intel ixgbe driver to version 3.0.14
Everybody using the 2.6.18 or 2.6.32 kernel branch is encouraged to test and give feedback! These packages are planned for the 1.7 ISO release (ISO will be based on Kernel 2.6.32).
New Testing Kernels for Proxmox VE (2.6.18 and 2.6.32)
Proxmox VE 1.6 (updated) - ISO Installer with 2.6.32 Kernel with OpenVZ including KVM 0.12.5
Unixmen posted a quick screenshot tour of PinguyOS
PinguyOS is for people that have never used Linux before or for people that just want an out-of-the-box working OS without doing all the tweaks and enhancements that everyone seems to do when installing a fresh copy of Ubuntu or other Linux based Distro's.
Pinguy OS is an optimise build of Ubuntu 10.10 Minimal CD with added repositories, tweaks and enhancements that can run as a Live DVD or be installed. It has all the added packages needed for video, music and web content e.g. flash and java, plus a few fixes as well. Like fixing the wireless problems, gwibber's Facebook problem and flash videos in full-screen.
PinguyOS: an optimise build of Ubuntu
Linux Mint 10 Review
Here the latest updates of the CompatDB compatiblity lists. There are today 19 Windows updates
Windows
Applications:
360Amigo System Speedup (360Amigo)
3DMark06 Patch (Futuremark)
Acronis True Image Home 2011 (Acronis)
Advanced SystemCare Free (IObit)
AIDA32 - Personal System Information (Tamas Miklos)
AVG Anti-Virus Updates (Grisoft, Inc.)
FreeRAM XP Pro (YourWare Solutions)
IObit Security 360 (IObit)
IObit Security 360 Offline Database (Corel)
IObit SmartDefrag (IObit.com)
Malwarebytes Anti-Malware (Malwarebytes)
Microsoft Internet Explorer 8 for XP (Microsoft)
NOD32 Antivirus System (Eset s.r.o.)
Nokia PC Suite (Nokia)
Partition Magic 8.0 (Powerquest)
SpywareGuard (Javacool)
Win7codecs (Shark007)
Hardware:
Creative photo album (G DATA Software Sp. z o.o.)
Promise Ultra 100 TX2 (Promise)
CompatDB Updates 11/16/10
Unixmen reports that Grub Customizer 2.0 has been released
Grub Customizer 2.0 released, This new Major release contains an user interface to edit the /etc/default/grub-Settings. You can use it to select the default entry, change the visibility of the menu, timeout, kernel parameters, disable recovery entries, change screen resolution, (GFX_MODE), Menu colors (grub2 only), background image (grub2 only).
Grub Customizer 2.0 released
Impressive Multi Touch Demo on Unity - The New Ubuntu Netbook Interface
Powertop - Monitor the power consumption of your Linux system running on Intel platforms
Linuxers takes a look at Powertop, a tool that monitor the power consumption of your Linux system running on Intel platforms
We all are excited about saving energy and serving the environment but we don't realize that we can start from the things right beside us, for example, the computer. There are a lot of things going on in a computer which keeps consuming power. Based upon the load, the consumption could be high or low, but even when you think that your computer is doing nothing, there could be a hundred of things going on(some could be useless) that consume/waste energy. This specially sucks when your laptop is on battery power. PowerTop, a project to save power on Intel platforms running Linux, lets you know the state of your system w.r.t. power consumption, a sorted list of the most contributing culprits(apps/interrupts) and some suggestions to make your system more eco-friendly.
Not just for increasing battery life, powertop can help you figure out bugs or flaws in the system and fixing them can help you save a lot of energy and in case of large data centers with thousands of machines, it could directly result in significant reduction in costs of electricity and chip heating issues.
Powertop - Monitor the power consumption of your Linux system running on Intel platforms
How To Install Latest Intel Driver 2.12 On Ubuntu 10.04 (Lucid Lynx)
The Mike Galbraith latency patch is now available for SimplyMEPIS 11.0 alpha
The Mike Galbraith latency patch, which is said to improve desktop performance by an order of magnitude, has been backported by Warren to the 2.6.36 kernel, and released for the SimplyMEPIS 11.0 alpha test cycle.
Galbraith Latency Patch Now in MEPIS 11.0 Alpha
openSUSE 11.4 Milestone 2 Review
Tech Drive-In takes a look at 12 open source Android applications worth checking out
There are Android users who don't have the vaguest idea of what open source is or what it stands for. Then there are those open source evangelists who bought Android phone primarily because of the reason that it is open source and based on Linux. This post is especially meant for those who are included in the second category.
12 Open Source Android Applications Worth Checking Out
Applications to make your KDE more powerful and smarter
The following 5 updates has been released for CentOS:
- CESA-2010:0894 Important CentOS 5 i386 systemtap Update
- CESA-2010:0894 Important CentOS 5 x86_64 systemtap Update
- CEBA-2010:0721 CentOS 5 i386 iscsi-initiator-utils Update
- CEBA-2010:0722 CentOS 5 i386 xorg-x11-server Update
- CEBA-2010:0722 CentOS 5 x86_64 xorg-x11-server Update
[CentOS-announce] CESA-2010:0894 Important CentOS 5 i386 systemtap Update
CentOS Errata and Security Advisory 2010:0894 Important
Upstream details at : rhn.redhat.com | Red Hat Support
The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename )
i386:
6357ca5f65da8147da88141c8a770282 systemtap-1.1-3.el5_5.3.i386.rpm
8d6c245f505f7fb362ebc08f75fc3f6f systemtap-client-1.1-3.el5_5.3.i386.rpm
f123452225fb5398138e451835078d2b systemtap-initscript-1.1-3.el5_5.3.i386.rpm
14736564a35297dd0138b3aea089c3a7 systemtap-runtime-1.1-3.el5_5.3.i386.rpm
865c8410791b86d8fabfcf6c29d049b0 systemtap-sdt-devel-1.1-3.el5_5.3.i386.rpm
f16d97e74db95d6c147e276bc3fdcae8 systemtap-server-1.1-3.el5_5.3.i386.rpm
1e3d85eb20703d6e6d4a4caee16f4560 systemtap-testsuite-1.1-3.el5_5.3.i386.rpm
Source:
918513c352bff19c41f659d52fa496ea systemtap-1.1-3.el5_5.3.src.rpm
[CentOS-announce] CESA-2010:0894 Important CentOS 5 x86_64 systemtap Update
CentOS Errata and Security Advisory 2010:0894 Important
Upstream details at : rhn.redhat.com | Red Hat Support
The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename )
x86_64:
15892dfe5e827e853697d7909b0cae5c systemtap-1.1-3.el5_5.3.x86_64.rpm
b2d59183dd6158c008c8ae5b23d09235 systemtap-client-1.1-3.el5_5.3.x86_64.rpm
3a6862d8a2fba984d7dfbdbbf81ecd93 systemtap-initscript-1.1-3.el5_5.3.x86_64.rpm
cc81c2b76d3c1c664696642b6243885e systemtap-runtime-1.1-3.el5_5.3.x86_64.rpm
a7d30d8327666e5466c404ea129888d0 systemtap-sdt-devel-1.1-3.el5_5.3.i386.rpm
d28314cd2ae4a23dfee1837c782def56 systemtap-sdt-devel-1.1-3.el5_5.3.x86_64.rpm
dbc1ae68c3c13800ff93cb4ee677441c systemtap-server-1.1-3.el5_5.3.x86_64.rpm
51fbb88b33906ea339afe1a8558b8f67 systemtap-testsuite-1.1-3.el5_5.3.x86_64.rpm
Source:
918513c352bff19c41f659d52fa496ea systemtap-1.1-3.el5_5.3.src.rpm
[CentOS-announce] CEBA-2010:0721 CentOS 5 i386 iscsi-initiator-utils Update
CentOS Errata and Bugfix Advisory 2010:0721
Upstream details at : rhn.redhat.com | Red Hat Support
The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename )
i386:
f0fd11caa965adf5dbbb9be43706abf4 iscsi-initiator-utils-6.2.0.871-0.20.el5_5.i386.rpm
Source:
e9097f6290fcd8351d8133189689bf54 iscsi-initiator-utils-6.2.0.871-0.20.el5_5.src.rpm
[CentOS-announce] CEBA-2010:0722 CentOS 5 i386 xorg-x11-server Update
CentOS Errata and Bugfix Advisory 2010:0722
Upstream details at : rhn.redhat.com | Red Hat Support
The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename )
i386:
a407ffff7025be189139eb36e349b4fc xorg-x11-server-sdk-1.1.1-48.76.el5_5.2.i386.rpm
99ec7b3b691bbbff43e2f8ca3fbcd4cb xorg-x11-server-Xdmx-1.1.1-48.76.el5_5.2.i386.rpm
ad37f3774274dde14abb22fe542a9c8c xorg-x11-server-Xephyr-1.1.1-48.76.el5_5.2.i386.rpm
c597ca66074b51204264df463d4846fc xorg-x11-server-Xnest-1.1.1-48.76.el5_5.2.i386.rpm
abf4ef7386813096e7a792d088556d67 xorg-x11-server-Xorg-1.1.1-48.76.el5_5.2.i386.rpm
15715aa315f9a9097893e6604265e8ff xorg-x11-server-Xvfb-1.1.1-48.76.el5_5.2.i386.rpm
b8f1303c66cef9ee8e13de4efc79768c xorg-x11-server-Xvnc-source-1.1.1-48.76.el5_5.2.i386.rpm
Source:
6393d13a14ff910279ed79aa1eb43142 xorg-x11-server-1.1.1-48.76.el5_5.2.src.rpm
[CentOS-announce] CEBA-2010:0722 CentOS 5 x86_64 xorg-x11-server Update
CentOS Errata and Bugfix Advisory 2010:0722
Upstream details at : rhn.redhat.com | Red Hat Support
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
348eed0493f33de4fe7ca9b351752b63 xorg-x11-server-sdk-1.1.1-48.76.el5_5.2.x86_64.rpm
80df7710ab1dc409bda2410ecfa9b650 xorg-x11-server-Xdmx-1.1.1-48.76.el5_5.2.x86_64.rpm
0cadf5dfbcbc625776196dede2521ec0 xorg-x11-server-Xephyr-1.1.1-48.76.el5_5.2.x86_64.rpm
4dd0ac1412bfe7ef818c28e480bb997a xorg-x11-server-Xnest-1.1.1-48.76.el5_5.2.x86_64.rpm
d00ea886e5e9b983e1c1b1a3761124b1 xorg-x11-server-Xorg-1.1.1-48.76.el5_5.2.x86_64.rpm
d992d4da461f674806048e61ecd001ec xorg-x11-server-Xvfb-1.1.1-48.76.el5_5.2.x86_64.rpm
c9b825163c2d7c65f1175d72b033aca5 xorg-x11-server-Xvnc-source-1.1.1-48.76.el5_5.2.x86_64.rpm
Source:
6393d13a14ff910279ed79aa1eb43142 xorg-x11-server-1.1.1-48.76.el5_5.2.src.rpm
Pidgin/libbonobo Updates for CentOS 5
Here the latest updates of the CompatDB compatiblity lists. There are today 29 Windows updates.
Windows
Applications:
Advanced SystemCare Free (IObit)
ALi Integrated Driver (ALi Corporaton)
Aqua Dock 1.0 (Unknown)
ASUS SmartDoctor (ASUS)
ATI Catalyst Drivers for Windows XP (ATI Technologies Inc.)
AVG Anti-Virus Updates (Grisoft, Inc.)
BootVis 1.3.37.0 (Microsoft)
Diskeeper Lite (Executive Software)
EVEREST Free Edition 2.20 (Lavalys Consulting Group, Inc.)
HijackThis (Merijn)
Intel Graphics Media Accelerator Driver for Windows XP (Intel Corp.)
Intel Processor Diagnostic Tool (Intel)
Intel Processor Frequency ID Utility (Intel)
IObit Security 360 (IObit)
IObit SmartDefrag (IObit.com)
Malwarebytes Anti-Malware (Malwarebytes)
Microsoft Windows 2000 Service Pack 4 Update Rollup (Microsoft Corp.)
mp3DirectCut (Martin Pesch)
Nero DiscSpeed (Nero AG)
Paint.NET Beta (Rick Brewster)
PC Tools ThreatFire (PC Tools)
Tasker (Vista Software)
The Application Compatibility Toolkit (Microsoft)
Win7codecs (Shark007)
Windows 7 USB/DVD Download Tool (Microsoft Corp.)
Wireless Watch Home (OTO Software)
Hardware:
Creative Sound Blaster Audigy 4 pro (Creative)
D-Link DFE-528TX PCI 10/100 (D-Link)
Matrox Parhelia 128MB/256MB (Matrox)
CompatDB Updates 07/09/10
Tech Drive-In shows you how to use apt-fast to accelerate your apt-get download speeds
If you have ever wished for a much more faster software downloads in Ubuntu, well, apt-fast could possibly make your wishes come true. Apt-fast is a simple bash script that accelerates apt-get download speeds coinsiderably.
Apt-fast and Axel
Apt-fast is a simple command line utility that can make installation and upgrading of softwares in Ubuntu/Debian much faster. Apt-fast make use of
Make apt-get Installations and Upgrades 26x faster with apt-fast
Virtual Users And Domains With Postfix, Courier, MySQL And SquirrelMail (Ubuntu 10.10)
Howtoforge published a tutorial about setting up virtual users and domains with Postfix, Courier, MySQL and SquirrelMail under Ubuntu 10.10
This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses. The resulting Postfix server is capable of SMTP-AUTH and TLS and quota. Passwords are stored in encrypted form in the database. In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses. I will also show how to install SquirrelMail as a webmail interface so that users can read and send emails and change their passwords.
Virtual Users And Domains With Postfix, Courier, MySQL And SquirrelMail (Ubuntu 10.10)
Installing PowerDNS (With MySQL Backend) And Poweradmin On Debian Lenny
Ubuntu Guide posted a tutorial about fixing the left click after upgrading to Ubuntu 10.10 Maverick
If your mouse's left click stopped working after upgrading to Ubuntu 10.10 Maverick, but it was working well on the old Ubuntu. You can try following method to fix the problem. Download an appropriate xsever-xorg-input-uvdev package with the bug fixed from this page. Then double click to install, and finally log-out and back in.
Fix Left Click not working after upgrading to Ubuntu 10.10 Maverick
Ubuntu 10.10 Maverick Meerkat: One Hit, One Miss
Tech Drive-In shows you how to install Macbuntu
Macbuntu is a nice little script that can completely transform your Ubuntu and make it look like Mac OSX. There were other projects like Mac4Lin with similar goals before, but Macbuntu is way better performer in mimicking Mac OSX look and feel.
Macbuntu - Brilliant Transformation of Ubuntu into Mac OSX
Macbuntu does the job. Even the minutest details of a Mac is installed with much finesse. If you like playing around with the look and feel of your Ubuntu, Macbuntu is one script you definitely should try out. Though I have never really used a Mac before, I really liked Macbuntu and the way it transformed my desktop.
Macbuntu - Mac OSX Look and Feel for Ubuntu!
Get a Feel of Firefox 4 in Ubuntu 10.10 Maverick Meerkat
LinuxBSDos.com posted a tutorial about installing Linux Mint 10 on a btrfs file system
Linux Mint 10 is the first version of Linux Mint with built-in support for the B-tree File System (btrfs). Btrfs is one of the newest file systems in the Linux kernel.
How to install Linux Mint 10 on a btrfs file system
Linux Mint 10 Review
openSUSE 11.4 Milestone 3 has been released
eDelayed by a week due to a critical bug that prevented testing, the openSUSE project today announces openSUSE 11.4 Milestone 3 (M3), the third of six milestone releases of what will become openSUSE 11.4. The bug, a crash in the software rasterizer of the Mesa OpenGL stack, was found by our automated test suite and the openSUSE XOrg developers swung into action so that KDE would work on systems without hardware acceleration, which includes most virtual machines.
systemd, the alternative init system, becomes available for testing in M3 with version 11. To test systemd, install it, then reboot with init=/bin/systemd as described by Andreas Jaeger. Otherwise, the existing SysV init is used.
M3 includes Gnome 2.32 on the desktop, including metacontact support in the Empathy instant messenger and Banshee 1.8 with Amazon MP3 store plugin, KDE 4.5.3, and a number of independent updates including version 0.11 of the Arora browser, the chemistry tool Avogadro 1.0.1 and Licq 1.5, introducing XMPP support to this venerable IM client.
On the productivity front, M3 includes LibreOffice 3.2.99, a host of additional optional packages for KOffice such as lcms2 giving better colour management and image processing options, and Digikam 1.5.0 including automated lens correction while batch processing multiple images,
Mono 2.8 replaces Mono 2.6 and adds C# 4.0, an new garbage collector and many performance improvements.
At the lower level, Linux kernel 2.6.36 is in, along with smartmontools 5.40 brings SSD support, and Wireshark 1.4 brings many performance improvements and memory footprint reductions.
Due to a new liblzma, delta ISOs from M2 to M3 must be applied using a new version of deltarpm. Stephan Kulow provides this in his home:coolo Build Service project.
We look forward to your bug reports and test experiences. Automated testing and the openSUSE Factory team have been active to ensure that your download of M3 will be at least minimally functional.
The next milestone is scheduled for November 25. openSUSE 11.4 is planned to be released in March 2011.
openSUSE 11.4 Milestone 3 released
openSUSE 11.4 Milestone 2 Review
Red Hat has released a kernel update for Red Hat Enterprise Linux 3 as part of their Red Hat Enterprise Linux 3 Extended Life Cycle Support (ELS)
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2010:0882-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0882.html
Issue date: 2010-11-12
CVE Names: CVE-2009-3080 CVE-2009-3620 CVE-2009-4536
CVE-2010-1188 CVE-2010-2240 CVE-2010-3081
=====================================================================
1. Summary:
Updated kernel packages that fix several security issues and one bug are
now available for Red Hat Enterprise Linux 3 Extended Life Cycle Support
(ELS).
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (v. 3 ELS) - i386
Red Hat Enterprise Linux ES (v. 3 ELS) - i386
3. Description:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* An array index error was found in the gdth driver in the Linux kernel. A
local user could send a specially-crafted IOCTL request that would cause a
denial of service or, possibly, privilege escalation. (CVE-2009-3080,
Important)
* NULL pointer dereference flaws were found in the r128 driver in the Linux
kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux
kernel. A remote attacker using packets larger than the MTU could bypass
the existing fragment check, resulting in partial, invalid frames being
passed to the network stack. This flaw could also possibly be used to
trigger a remote denial of service. (CVE-2009-4536, Important)
* A use-after-free flaw was found in the tcp_rcv_state_process() function
in the Linux kernel TCP/IP protocol suite implementation. If a system using
IPv6 had the IPV6_PKTINFO option set on a listening socket, a remote
attacker could send an IPv6 packet to that system, causing a kernel panic
(denial of service). (CVE-2010-1188, Important)
* When an application has a stack overflow, the stack could silently
overwrite another memory mapped area instead of a segmentation fault
occurring, which could cause an application to execute arbitrary code,
possibly leading to privilege escalation. It is known that the X Window
System server can be used to trigger this flaw. (CVE-2010-2240, Important)
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel. On 64-bit systems, a
local, unprivileged user could use this flaw to escalate their privileges.
(CVE-2010-3081, Important)
Red Hat would like to thank the X.Org security team for reporting the
CVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the
original reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.
This update also fixes the following bug:
* The RHSA-2009:1550 kernel update introduced a regression that prevented
certain custom kernel modules from loading, failing with "unresolved
symbol" errors. This update corrects this issue, allowing the affected
modules to load as expected. (BZ#556909)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.
5. Bugs fixed (http://bugzilla.redhat.com/):
529597 - CVE-2009-3620 kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised
539414 - CVE-2009-3080 kernel: gdth: Prevent negative offsets in ioctl
552126 - CVE-2009-4536 kernel: e1000 issue reported at 26c3
556909 - unresolved symbol sock_recvmsg_Rsmp_4c34ff14
577711 - CVE-2010-1188 kernel: ipv6: skb is unexpectedly freed
606611 - CVE-2010-2240 kernel: mm: keep a guard page below a grow-down stack segment
634457 - CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow
6. Package List:
Red Hat Enterprise Linux AS (v. 3 ELS):
Source:
kernel-2.4.21-66.EL.src.rpm
i386:
kernel-2.4.21-66.EL.athlon.rpm
kernel-2.4.21-66.EL.i686.rpm
kernel-BOOT-2.4.21-66.EL.i386.rpm
kernel-debuginfo-2.4.21-66.EL.athlon.rpm
kernel-debuginfo-2.4.21-66.EL.i386.rpm
kernel-debuginfo-2.4.21-66.EL.i686.rpm
kernel-doc-2.4.21-66.EL.i386.rpm
kernel-hugemem-2.4.21-66.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-66.EL.i686.rpm
kernel-smp-2.4.21-66.EL.athlon.rpm
kernel-smp-2.4.21-66.EL.i686.rpm
kernel-smp-unsupported-2.4.21-66.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-66.EL.i686.rpm
kernel-source-2.4.21-66.EL.i386.rpm
kernel-unsupported-2.4.21-66.EL.athlon.rpm
kernel-unsupported-2.4.21-66.EL.i686.rpm
Red Hat Enterprise Linux ES (v. 3 ELS):
Source:
kernel-2.4.21-66.EL.src.rpm
i386:
kernel-2.4.21-66.EL.athlon.rpm
kernel-2.4.21-66.EL.i686.rpm
kernel-BOOT-2.4.21-66.EL.i386.rpm
kernel-debuginfo-2.4.21-66.EL.athlon.rpm
kernel-debuginfo-2.4.21-66.EL.i386.rpm
kernel-debuginfo-2.4.21-66.EL.i686.rpm
kernel-doc-2.4.21-66.EL.i386.rpm
kernel-hugemem-2.4.21-66.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-66.EL.i686.rpm
kernel-smp-2.4.21-66.EL.athlon.rpm
kernel-smp-2.4.21-66.EL.i686.rpm
kernel-smp-unsupported-2.4.21-66.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-66.EL.i686.rpm
kernel-source-2.4.21-66.EL.i386.rpm
kernel-unsupported-2.4.21-66.EL.athlon.rpm
kernel-unsupported-2.4.21-66.EL.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2009-3080.html
https://www.redhat.com/security/data/cve/CVE-2009-3620.html
https://www.redhat.com/security/data/cve/CVE-2009-4536.html
https://www.redhat.com/security/data/cve/CVE-2010-1188.html
https://www.redhat.com/security/data/cve/CVE-2010-2240.html
https://www.redhat.com/security/data/cve/CVE-2010-3081.html
http://www.redhat.com/security/updates/classification/#important
https://access.redhat.com/kb/docs/DOC-40265
http://www.redhat.com/rhel/server/extended_lifecycle_support/
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2010 Red Hat, Inc.
Kernel Update for CentOS 5
Archives
-
▼
2010
(391)
-
▼
December
(8)
- Wine release 1.3.10
- VirtualBox 4.0.0 released
- bind (SSA:2010-350-01) update for Slackware
- Installing ISPCP Omega 1.0.7 On Ubuntu 10.10
- RHSA-2010:0976-01: Important: bind security update
- RHSA-2010:0979-01: Moderate: openssl security update
- New Testing Kernels for Proxmox VE (2.6.18 and 2.6...
- PinguyOS: an optimise build of Ubuntu
-
►
November
(30)
- CompatDB Updates 11/19/10
- Grub Customizer 2.0 released
- Powertop - Monitor the power consumption of your L...
- Galbraith Latency Patch Now in MEPIS 11.0 Alpha
- 12 Open Source Android Applications Worth Checking...
- 5 CentOS Updates
- CompatDB Updates 11/16/10
- Apt-Fast Accelerates Your Apt-Get Download Speeds
- Virtual Users And Domains With Postfix, Courier, M...
- Fix Left Click not working after upgrading to Ubun...
- Macbuntu - Mac OSX Look and Feel for Ubuntu!
- How to install Linux Mint 10 on a btrfs file system
- openSUSE 11.4 Milestone 3 released
- Kernel Update for RHEL 3
-
▼
December
(8)