Drivers 2999 Published by Philipp Esselbach 0

CentOS Errata and Security Advisory CESA-2006:0515

Important sendmail - security update:
https://rhn.redhat.com/errata/RHSA-2006-0515.html

The following updated files have been uploaded and are currently syncing to the mirrors:

x86_64:
sendmail-8.13.1-3.RHEL4.5.x86_64.rpm
sendmail-cf-8.13.1-3.RHEL4.5.x86_64.rpm
sendmail-devel-8.13.1-3.RHEL4.5.x86_64.rpm
sendmail-doc-8.13.1-3.RHEL4.5.x86_64.rpm

src:
sendmail-8.13.1-3.RHEL4.5.src.rpm

Drivers 2999 Published by Philipp Esselbach 0

nVidia has released new Linux drivers

Release Highlights

* Added OpenGL 2.0 Support.
* Added initial support for Xinerama + OpenGL; see APPENDIX V in the text README.
* Added support for the EXT_framebuffer_object OpenGL extension.
* Added NV-CONTROL support for manipulating DDC/CI settings; see the AllowDDCCI X config option in the text README.
* Added support for GPU clock manipulation; see the "Coolbits" X config option documented in Appendix D.
* Added support for NVIDIA Quadro G-Sync.
* Added support for GeForce 6200 AGP.
* Improved DPMS behavior on flatpanels.
* Removed support for legacy GPUs; please see "Chapter 1. Selecting and Downloading the NVIDIA Packages for Your System" in the README for details.
* Install NVIDIA OpenGL headers by default.

Linux Display Driver - IA32

Linux Display Driver - AMD64/EM64T

Drivers 2999 Published by Philipp Esselbach 0

New CUPS packages are available for Debian GNU/Linux

---------------------------------------------------------------------------
Debian Security Advisory DSA 645-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 19th, 2005 http://www.debian.org/security/faq
---------------------------------------------------------------------------

Package : cupsys
Vulnerability : buffer overflow
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-0064

iDEFENSE has reported a buffer overflow in xpdf, the portable document format (PDF) suite. Similar code is present in the PDF processing part of CUPS. A maliciously crafted PDF file could exploit this problem, resulting in the execution of arbitrary code.

For the stable distribution (woody) this problem has been fixed in version 1.1.14-5woody12.

In the unstable distribution (sid) CUPSYS does not use its own xpdf variant anymore but uses xpdf-utils.

We recommend that you upgrade your cups packages.