Search This Blog

Sunday, February 28, 2010

This Week’s Deals: Smartphones with even Smarter Plans.

To ensure delivery to your inbox, please add to your address book.
To view this e-mail in your Web browser, click here.
RadioShackFind a Store
Phones & Radio Communications Portable Music Cameras & Camcorders Power & Batteries Home Entertainment Cables, Parts & Connectors GPS & Car Home & Office Computers Toys & Games
Shop for great phones and plans at The Shack(SM)
Find us on Facebook Share With a Friend Customer Service

Our records show that you have requested to receive periodic informational and promotional e-mails from RadioShack.

RadioShack has a strict NO SPAM policy.
Unsubscribe | Privacy Policy | Terms and Conditions | 1-800-THE-SHACK®

Please do not reply to this e-mail, as we are not able to respond to messages sent to this address.

This e-mail may be considered an advertising or promotional message. ©2010 RadioShack Corporation. All rights reserved.
RadioShack Riverfront Campus — 300 RadioShack Circle, Fort Worth, TX 76102

[SECURITY] [DSA 2004-1] New Linux 2.6.24 packages fix several vulnerabilities

Hash: SHA1

- ----------------------------------------------------------------------
Debian Security Advisory DSA-2004-1 Dann Frazier
February 27, 2010
- ----------------------------------------------------------------------

Package : linux-2.6.24
Vulnerability : privilege escalation/denial of service/sensitive memory leak
Problem type : local/remote
Debian-specific: no
CVE Id(s) : CVE-2009-2691 CVE-2009-2695 CVE-2009-3080 CVE-2009-3726
CVE-2009-3889 CVE-2009-4005 CVE-2009-4020 CVE-2009-4021
CVE-2009-4138 CVE-2009-4308 CVE-2009-4536 CVE-2009-4538
CVE-2010-0003 CVE-2010-0007 CVE-2010-0291 CVE-2010-0410
CVE-2010-0415 CVE-2010-0622

NOTE: This kernel update marks the final planned kernel security
update for the 2.6.24 kernel in the Debian release 'etch'. Although
security support for 'etch' officially ended on Feburary 15th, 2010,
this update was already in preparation before that date.

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a denial of service, sensitive memory leak or privilege
escalation. The Common Vulnerabilities and Exposures project
identifies the following problems:


Steve Beattie and Kees Cook reported an information leak in the
maps and smaps files available under /proc. Local users may be
able to read this data for setuid processes while the ELF binary
is being loaded.


Eric Paris provided several fixes to increase the protection
provided by the mmap_min_addr tunable against NULL pointer
dereference vulnerabilities.


Dave Jones reported an issue in the gdth SCSI driver. A missing
check for negative offsets in an ioctl call could be exploited by
local users to create a denial of service or potentially gain
elevated privileges.


Trond Myklebust reported an issue where a malicious NFS server
could cause a denial of service condition on its clients by
returning incorrect attributes during an open call.


Joe Malicki discovered an issue in the megaraid_sas driver.
Insufficient permissions on the sysfs dbg_lvl interface allow
local users to modify the debug logging behavior.


Roel Kluin discovered an issue in the hfc_usb driver, an ISDN
driver for Colognechip HFC-S USB chip. A potential read overflow
exists which may allow remote users to cause a denial of service
condition (oops).


Amerigo Wang discovered an issue in the HFS filesystem that would
allow a denial of service by a local user who has sufficient
privileges to mount a specially crafted filesystem.


Anana V. Avati discovered an issue in the fuse subsystem. If the
system is sufficiently low on memory, a local user can cause the
kernel to dereference an invalid pointer resulting in a denial of
service (oops) and potentially an escalation of privileges.


Jay Fenlason discovered an issue in the firewire stack that allows
local users to cause a denial of service (oops or crash) by making
a specially crafted ioctl call.


Ted Ts'o discovered an issue in the ext4 filesystem that allows
local users to cause a denial of service (NULL pointer
dereference). For this to be exploitable, the local user must
have sufficient privileges to mount a filesystem.

CVE-2009-4536 & CVE-2009-4538

Fabian Yamaguchi reported issues in the e1000 and e1000e drivers
for Intel gigabit network adapters which allow remote users to
bypass packet filters using specially crafted Ethernet frames.


Andi Kleen reported a defect which allows local users to gain read
access to memory reachable by the kernel when the
print-fatal-signals option is enabled. This option is disabled by


Florian Westphal reported a lack of capability checking in the
ebtables netfilter subsystem. If the ebtables module is loaded,
local users can add and modify ebtables rules.


Al Viro reported several issues with the mmap/mremap system calls
that allow local users to cause a denial of service (system panic)
or obtain elevated privileges.


Sebastian Krahmer discovered an issue in the netlink connector
subsystem that permits local users to allocate large amounts of
system memory resulting in a denial of service (out of memory).


Ramon de Carvalho Valle discovered an issue in the sys_move_pages
interface, limited to amd64, ia64 and powerpc64 flavors in Debian.
Local users can exploit this issue to cause a denial of service
(system crash) or gain access to sensitive kernel memory.


Jermome Marchand reported an issue in the futex subsystem that
allows a local user to force an invalid futex state which results
in a denial of service (oops).

For the oldstable distribution (etch), this problem has been fixed in
version 2.6.24-6~etchnhalf.9etch3.

We recommend that you upgrade your linux-2.6.24 packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386,
ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
Size/MD5 checksum: 5118 e05bb21e7655cbfa39aed8d4fd6842eb
Size/MD5 checksum: 4099250 127bad8d653046d37fc52115d4e3a332
Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af

Architecture independent packages:
Size/MD5 checksum: 4263554 6c56ff077d17eba766af47544ce0f414
Size/MD5 checksum: 83890 62cfd18ed176359831502e70d80b291a
Size/MD5 checksum: 46871628 328ad30d3c07f90c56d821f76e186b40
Size/MD5 checksum: 1550090 1f114fdc3123f135017dbdcd0e4839c6
Size/MD5 checksum: 1009878 c7b7abff092940a400703b9168e46daa
Size/MD5 checksum: 98248 a2a391008f8855d8358d5f18d9d76044

alpha architecture (DEC Alpha)
Size/MD5 checksum: 329786 a212d2b3a94f8a04611c0f20d3d324b9
Size/MD5 checksum: 27236282 b5bc553c4bf3a49843c45814fab72443
Size/MD5 checksum: 83428 f5f27b9de4905239e6315c77393f1f03
Size/MD5 checksum: 83454 5d152b5b6aa505982ebc7122a770b29b
Size/MD5 checksum: 26641900 c799e7d48937975036b46edf032ecd87
Size/MD5 checksum: 26620162 eb1c3c27f1ac81959dc0f2ab497aee35
Size/MD5 checksum: 3455268 da2d2cc2b7c4253ac408c30fcfddb28f
Size/MD5 checksum: 329788 f589f8815f7adf02f8884e2dd3ac613f
Size/MD5 checksum: 329336 14bf085655b30adc8ab8f6ed4207d415

amd64 architecture (AMD x86_64 (AMD64))
Size/MD5 checksum: 19482308 c49d2962c1a391fb00fb1b5f0598b24e
Size/MD5 checksum: 3656476 f2f5de65037664d03208fcea83bf2ee2
Size/MD5 checksum: 83422 600c7216143f43f9c61b0c2ccd118ea0
Size/MD5 checksum: 83434 36f1d8f21ec39a473536dbeda2332e62
Size/MD5 checksum: 346940 d3f12fdd61f90749fdd08d857b326327

arm architecture (ARM)
Size/MD5 checksum: 9357734 3e1165a0795d7db5f7ed8ef84205064b
Size/MD5 checksum: 298744 50d8bfa3c06134e190409399a36c5aa9
Size/MD5 checksum: 83546 1742ab93afadd1827009bf1d714e76eb
Size/MD5 checksum: 83578 07906e33f9ad267d986991c93eef1048
Size/MD5 checksum: 10778670 cc38a718ad5fd1c6e92d23e416610bd6
Size/MD5 checksum: 308138 34dbc7720b1844833f0b71aa307c37fa
Size/MD5 checksum: 310714 6a2c6fbbc1dd000b8a532227e3b8b5ae
Size/MD5 checksum: 3939512 91c2ba626e754fe407d6dcf3fa01337a
Size/MD5 checksum: 10786892 4d44a4ff751969855a01ad754a7c2b22

hppa architecture (HP PA RISC)
Size/MD5 checksum: 14375048 fe6ed4dea09aa205d801476667ef03cb
Size/MD5 checksum: 13847788 4adc3106a987d84e12215156a379f460
Size/MD5 checksum: 259624 ac09dcabb624984b7321a5f6b6dbef54
Size/MD5 checksum: 83578 e152e18748e5c80b6d06715db836cf83
Size/MD5 checksum: 260838 44bc8ad5796c124b53d85a8c3a4ed912
Size/MD5 checksum: 262420 ff0641f04c409dd606c34373e8e16269
Size/MD5 checksum: 14830990 cce09e8022bee915dcde5dd8b9525428
Size/MD5 checksum: 13333594 a4dc863b0c84b9006c723db9a581c92e
Size/MD5 checksum: 83546 990eb24056c7f6a63a4d55ec39563bae
Size/MD5 checksum: 3446386 6ebfa4544252648df48cfb085cc3d2cc
Size/MD5 checksum: 258962 75184bed1f0b42cd8e002f93ed42198a

i386 architecture (Intel ia32)
Size/MD5 checksum: 3656680 c5499cb98cdcdcadc48e3aa5bdf1d379
Size/MD5 checksum: 19214268 e3f564cae5a85355f4b5a9248a11af98
Size/MD5 checksum: 19148424 dd1d713c896888370a1667a16571c08c
Size/MD5 checksum: 346982 6a6a08f74f9690705e6d770d1f3f2566
Size/MD5 checksum: 359548 b10fe011746b0df5fbd2587292af34ae
Size/MD5 checksum: 19482314 5d9cc150e340aea40e253a757cfdc423
Size/MD5 checksum: 83452 32a1614212e964a4423b161b34cd758d
Size/MD5 checksum: 19213598 4f459c2d2cdb87a6f945cbee7d4500d4
Size/MD5 checksum: 358212 58ba32b0701643f043ab38a487cae609
Size/MD5 checksum: 83424 c1e8493aff96df5b0fe33f5af4686f98
Size/MD5 checksum: 358752 4e3e9ef18a14fd191444591df571f80c

ia64 architecture (Intel ia64)
Size/MD5 checksum: 3569470 9ae824064bfc785f4b3512db78119e46
Size/MD5 checksum: 32206374 badd40dd68e2c6634c65f79d9536e34d
Size/MD5 checksum: 83432 64a48fa9283b1741e22f0a22dbb93b20
Size/MD5 checksum: 83456 235a5572d5e109a4b575080a8262dc57
Size/MD5 checksum: 319938 d7dc0120458e93119879dcdd1e48017e
Size/MD5 checksum: 32025762 7595d7dc21d3273f46b35b8c00b0e195
Size/MD5 checksum: 320226 34731a37b519d726b133093e04d937c3

mips architecture (MIPS (Big Endian))
Size/MD5 checksum: 22243472 532341ea0847ea19414413f7659ff13d
Size/MD5 checksum: 248638 ce9da5c377d6328e9bb9be1c3945fff8
Size/MD5 checksum: 12001172 817c44fd5afbeef1b9f172522ff21bcb
Size/MD5 checksum: 10553972 20ddd95631b93efd52ae0aa38a5cd6d4
Size/MD5 checksum: 83600 a7b66d71779dea207a3d49cb9f692fdb
Size/MD5 checksum: 27858364 54998117445c20f413331d1197355745
Size/MD5 checksum: 17212542 bf6c996fd387eef151e0db60d1bd00f2
Size/MD5 checksum: 313302 314b57dc807eb91f617c10b1497e1617
Size/MD5 checksum: 314602 2c127076bf189be2836a4c3a4c7736af
Size/MD5 checksum: 3804368 fbcb3bdd668db166ad3f08e6dbfbc6e0
Size/MD5 checksum: 17194888 9bce41a8b9936a16a3aa9cca675b9638
Size/MD5 checksum: 83540 8acdb1b4a4bc57f55b9cc5b2b04043a4
Size/MD5 checksum: 229412 0b93c7c909eca04fad4fa45e3e73e96c
Size/MD5 checksum: 248700 13266a2acd5fcbd75d11049dd5e5ad58
Size/MD5 checksum: 218314 4174dec1c73ca114469cbb88fba32926

mipsel architecture (MIPS (Little Endian))
Size/MD5 checksum: 16567710 29d2ab68b4259a1822a2ca19e9494f5d
Size/MD5 checksum: 309868 d69b27ef946f2ac62b115e0200fe8002
Size/MD5 checksum: 26988356 f0d885b353b15dc42e4e76da8a8fb129
Size/MD5 checksum: 248150 7c585f74e0752a631050b13b9740c0c3
Size/MD5 checksum: 13318088 0b0a8b724245ac10817b03c4cf734827
Size/MD5 checksum: 83484 a678208f18017a9c87d45548916fd98e
Size/MD5 checksum: 311392 5b1f0957a2756b04be6c95ae8ca5e2c8
Size/MD5 checksum: 21736368 02da1a4e543b8c5082476b156281cb31
Size/MD5 checksum: 247968 929ca712a0aa0984f9dc2a6f68f405a5
Size/MD5 checksum: 16632240 c9de1dfccb8a5cb5d5d652ca694a7108
Size/MD5 checksum: 3805532 be10a8b64da3adf7ece3846b0b0bf930
Size/MD5 checksum: 83434 ac0cb9b5939e4ea82c3c83a1a1d473ed
Size/MD5 checksum: 248174 50e84058a7d710f013f92e1fe68a705c

powerpc architecture (PowerPC)
Size/MD5 checksum: 322474 2d7e39cf0b78d98125a0baba377f1af0
Size/MD5 checksum: 19195556 bb2bd8e203cee7b3c6739d5c5d11901a
Size/MD5 checksum: 324008 3b021bb4b3dac72dc68e701f4a209939
Size/MD5 checksum: 295928 ca2bf1c3c12f409e469c516877a8e91c
Size/MD5 checksum: 21170062 4022dbff73ebfde3a846ce38896cf09c
Size/MD5 checksum: 322502 4b76cce255e1fcc72cb82053cd34a1a2
Size/MD5 checksum: 17459240 ad749c6e735e58d775b7190ff3d26e50
Size/MD5 checksum: 83466 a041c0fdb383832cf725723ce22e40c0
Size/MD5 checksum: 83430 392d415932625b1a69dc6494d2f737e0
Size/MD5 checksum: 3674486 200fdcca2140a97f961a37d70db620d5
Size/MD5 checksum: 19487244 b42ad8431643d89a1f8b0e6e0aaeb39e

s390 architecture (IBM S/390)
Size/MD5 checksum: 83532 a1c34683fe304f1a86bbc28f6cbc654c
Size/MD5 checksum: 83556 bf7fed1ef4da92d782409fe8345f861a
Size/MD5 checksum: 6976486 5b5db16fea4336068bbcd5bff56ad575
Size/MD5 checksum: 7228452 75c044fa17d6071de36579a1491c2e1b
Size/MD5 checksum: 3431908 18825f85900faca81b21e48d43af6ee7
Size/MD5 checksum: 197006 0a44248e77ec1ff027edd032ebe5b2c6
Size/MD5 checksum: 1503494 bd7f7b7bd4e120472bf60ad0b7d9184e
Size/MD5 checksum: 196810 f03114c2f256a97b15f88d2659f9501b

sparc architecture (Sun SPARC/UltraSPARC)
Size/MD5 checksum: 83428 1ea7179752fbb45e10e731991583db68
Size/MD5 checksum: 263546 ef894d6917cbe692ec9197048538d5e7
Size/MD5 checksum: 3651402 a0194c650712040f81e97d5b3b62bc79
Size/MD5 checksum: 264892 0b642e20f00b52c20b6ae9e0ee1f78b8
Size/MD5 checksum: 83442 6d109d7f131dab564736e2ac6a85dd29
Size/MD5 checksum: 13318532 dbce062bfa560c331b75bed073868e1d
Size/MD5 checksum: 13019464 b0b153fafa43b650e996a9d84bbb26d7

These changes will probably be included in the oldstable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>
Version: GnuPG v1.4.10 (GNU/Linux)


To UNSUBSCRIBE, email to
with a subject of "unsubscribe". Trouble? Contact

[SECURITY] [DSA 2004-1] New samba packages fix several vulnerabilities

Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-2004-1 Moritz Muehlenhoff
February 28, 2010
- ------------------------------------------------------------------------

Package : samba
Vulnerability : several
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2009-3297 CVE-2010-0547

Two local vulnerabilities have been discovered in samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following problems:


Ronald Volgers discovered that a race condition in mount.cifs
allows local users to mount remote filesystems over arbitrary
mount points.


Jeff Layton discovered that missing input sanitising in mount.cifs
allows denial of service by corrupting /etc/mtab.

For the stable distribution (lenny), these problems have been fixed in
version 2:3.2.5-4lenny9.

For the unstable distribution (sid), these problems have been fixed in
version 2:3.4.5~dfsg-2.

We recommend that you upgrade your samba packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
Size/MD5 checksum: 2470 c350b5f777685fe69e0ae2f5dcf810ed
Size/MD5 checksum: 239988 82ad8ff6f28af236b321a7eb50d754c8

Architecture independent packages:
Size/MD5 checksum: 6252746 f7df1cc363fbcd6ce2da61aaaea2e1c5
Size/MD5 checksum: 7950496 68348d1ee83c74096ad02f05ed3b3699

alpha architecture (DEC Alpha)
Size/MD5 checksum: 1463176 dead0cf63a2ea7de8baf562e1867fe10
Size/MD5 checksum: 1333348 80f5022f6b36cab3f2d67bb0ef4b2800
Size/MD5 checksum: 638200 c3467c6d11c4b655cfe31e6a19ff0622
Size/MD5 checksum: 2574222 491cfc0ee9ce90d6c98347467002c7ef
Size/MD5 checksum: 3275458 c3b8ba294354a64c4b7e80ddcd7849cb
Size/MD5 checksum: 1941530 14d2c8ffd8544b448eff0d3790e46621
Size/MD5 checksum: 6950754 58cffb8cebcaf30c8d8e35916a65fffe
Size/MD5 checksum: 3736204 8a467068fa6ff8ef20a61f6277b7d583
Size/MD5 checksum: 81568 c70797d1ea795973e6d6639cfd0410fd
Size/MD5 checksum: 4834334 c4114837ae9245452a8e8752f7b5343a
Size/MD5 checksum: 5733410 59017cdc857eae1a64dcb707365ac78b
Size/MD5 checksum: 1080474 37190dfe1f9c11ba17aeda1377cc0304

amd64 architecture (AMD x86_64 (AMD64))
Size/MD5 checksum: 1992470 93f2f6a501d8b0c354537d143c962794
Size/MD5 checksum: 4781510 b3432114b15d1134e9f88ef8fd5cef8b
Size/MD5 checksum: 7006958 656401f8a9bcebd2e0daf05d009d4adb
Size/MD5 checksum: 1083040 98380f9059424e4b8cbcb56435586467
Size/MD5 checksum: 628388 d5c4908130f2932c7e630bf0fb71868f
Size/MD5 checksum: 1358206 e92b4c3d4ee7a0cb1102808b0f479bcb
Size/MD5 checksum: 5648010 926ac5718d9c7f45491944b9ecddbf32
Size/MD5 checksum: 1955572 6ef5dc332042050c27ce9ab96dd43a0a
Size/MD5 checksum: 3276028 b1527124efde3b2e5551fa9680573207
Size/MD5 checksum: 1494266 185078508720dd3b5930c06465a0995d
Size/MD5 checksum: 80588 f2a8a84e3528b95c65782a3cb34f339b
Size/MD5 checksum: 3740744 f2c56fbf05935f8fdd0a7b1acce61585

arm architecture (ARM)
Size/MD5 checksum: 5041804 17ec9ce0b0e9476f8b98bf36063b5df0
Size/MD5 checksum: 4267870 a5e251c739ff83a838b03f0d6764c399
Size/MD5 checksum: 6177368 d2140c896a2cfa9e8fd7222709ee088e
Size/MD5 checksum: 79528 efce94f03c3257f89cf105a1e943ecba
Size/MD5 checksum: 3353546 0fa90fe9a676418b663ad8892b6afd77
Size/MD5 checksum: 2399034 9e2d664559b76868d0667bead3cad3ce
Size/MD5 checksum: 2892614 441f28084951ef0dea1d8ffa2d6137d2
Size/MD5 checksum: 561446 b8962709de12e2b7e483355019c46a09
Size/MD5 checksum: 1817364 62ced50f9c213a2e8c800bc5352c662f
Size/MD5 checksum: 972544 62f0a623dc4d9354319ffca2421ef16a
Size/MD5 checksum: 1204248 1163a18d6c97e4b46817209c8e2f74fc
Size/MD5 checksum: 1316352 84bbb87072aa207ad4afe5dd88a9f500

armel architecture (ARM EABI)
Size/MD5 checksum: 5071106 97a106d71674be953f17f339083da535
Size/MD5 checksum: 2910800 11d8ddb4557c0fb7372e6cc8343130b0
Size/MD5 checksum: 79132 4add29b5576fe4d30a759e3eba3a93d4
Size/MD5 checksum: 564374 6c5eb08f957c4158d0c31776185740bf
Size/MD5 checksum: 4294734 baa5c610c222fe7b484e461fa20be525
Size/MD5 checksum: 1210740 4f028be63b6e88caf6edfa67bbd6a2ff
Size/MD5 checksum: 1823786 1ef88ad11dbeb601cbb7218ef8446a33
Size/MD5 checksum: 2425120 2e6318bfeba97595191f67f1c5fa5e6f
Size/MD5 checksum: 1324336 428eaf85b5e5454034584401f6d2ce7b
Size/MD5 checksum: 982218 34bd6f03110c66b35a4236331b1499c5
Size/MD5 checksum: 6215120 a721a2bb9e62e291ab83ff26eedaf62d
Size/MD5 checksum: 3372496 db8264837f10ef4764a520c0aebddfb2

hppa architecture (HP PA RISC)
Size/MD5 checksum: 3610420 a5916d3de88d013019156341f54a479b
Size/MD5 checksum: 81108 4240ebdef0a8b22f5d1c6a3379165764
Size/MD5 checksum: 1413152 3554ee16031015b27961935754a47716
Size/MD5 checksum: 2229384 2d97c8ed8b5caf3560c93fcb57ad83d7
Size/MD5 checksum: 5501292 93612983b1e8f04c3e24f72914db7f53
Size/MD5 checksum: 6687792 e7b9d3708978cb2f64dd3929a6fe0a94
Size/MD5 checksum: 1375854 f3ab7208ab858e11cd86f4612124d251
Size/MD5 checksum: 1046668 7b39cf96e77638ee2fb46aaa502a0def
Size/MD5 checksum: 3177818 00faf13a7fbbe1f998f573e068bbe6fa
Size/MD5 checksum: 632108 2703f1403b04dd5f1045fe31ea160edb
Size/MD5 checksum: 2067852 076a6a4d253c0504566f9a94e22c4be6
Size/MD5 checksum: 4653586 a1d4e4f3f67708b63c387099c6626733

i386 architecture (Intel ia32)
Size/MD5 checksum: 1823542 682b1050f232ceadb18dc8979df57570
Size/MD5 checksum: 5068864 f009e30589af4295e040475ca6fd2146
Size/MD5 checksum: 984834 d17d8eb0c46950e7fb3e0ee10bd5d315
Size/MD5 checksum: 3409862 0a9992e1716da1f56276825f81490cec
Size/MD5 checksum: 2928130 4df6e3ce9043c99d8ba859a0ab19efd0
Size/MD5 checksum: 2082664 717349032021d55f05ab2cf5fa1f58f9
Size/MD5 checksum: 1350022 e4c70a2d2a9bf7a023da3d1cf24da8e5
Size/MD5 checksum: 79508 8538f6232741624ee538e5169a2626c1
Size/MD5 checksum: 561468 244bf102790619264bc6d4fce12bf4e8
Size/MD5 checksum: 6304788 ac7f194da34e6363cb8c65a3bb1583f6
Size/MD5 checksum: 1200166 f7ddc5b9a70093bd6163df687eb114a1
Size/MD5 checksum: 4295358 0e3b758dea0f72490bec60dd35d9f160

ia64 architecture (Intel ia64)
Size/MD5 checksum: 84304 0f20e815665230738edda78a2d393275
Size/MD5 checksum: 4386736 44c2bab94b6882e62a4ee77d1cbc1f68
Size/MD5 checksum: 8295058 9f06b80b653b9da0340f4ca6a7c6d6a7
Size/MD5 checksum: 752380 d71e8976ba8d4d3d0b69b158cb37c530
Size/MD5 checksum: 6933780 2724767feaddc313b8391ec8db89ef2a
Size/MD5 checksum: 2401268 c0d04b98213ada6c226bae0796087d8f
Size/MD5 checksum: 5832528 bebeb7c54ede902f9ccf4cb9cd0fbc3f
Size/MD5 checksum: 1280376 c002483dae1dfb2c9e66574a1a54b580
Size/MD5 checksum: 1561426 514ee394b1674db405acac07fbe7161f
Size/MD5 checksum: 1724684 64f04b6f893d499b4004ddd299ffcc50
Size/MD5 checksum: 3915626 ff6374f67ed88d6dc22bc33452fa880b
Size/MD5 checksum: 1939766 e49b157099db2dbb7a1af1f3cdf09c21

mips architecture (MIPS (Big Endian))
Size/MD5 checksum: 1093902 1a9b8c81b21d950382de5dc9dac61ec6
Size/MD5 checksum: 2182482 2637f89bf9108adcdbcf2d99cb8e95df
Size/MD5 checksum: 4998930 48d1409f35e9d2fd0f6f5f0aaf56366a
Size/MD5 checksum: 572986 6aa1e6021995269549f78ed3bcafa08c
Size/MD5 checksum: 2809668 5e9c02e1832a889776b314bbed82a5a3
Size/MD5 checksum: 5841264 eb06b2674383addf8477d9ee2f067241
Size/MD5 checksum: 2507278 892aa8720573e572cc8ff42dd075e8c3
Size/MD5 checksum: 3239124 a4c88a224df61f0bbc54e87dea3e99f8
Size/MD5 checksum: 79594 ce272ecce69206c7bc22c888b359418d
Size/MD5 checksum: 1205806 8611ab7991f6e09121bbda33b092b1ad
Size/MD5 checksum: 4203548 a6dd8ec04f802507d8e51e9f78c26c6b
Size/MD5 checksum: 942366 aabc925238e075f8f3744c7c44b40e4f

mipsel architecture (MIPS (Little Endian))
Size/MD5 checksum: 1082016 f351b94f4de134809f854d2a2941652e
Size/MD5 checksum: 2793406 c8db0453dd55318071d4bcf1252ae633
Size/MD5 checksum: 79514 269977ec2d6a1a9551c0021fab1871e9
Size/MD5 checksum: 5801436 634198ec023c9fb2afba8533d168ec40
Size/MD5 checksum: 937206 a129e3579dca0f2e0b4fa66bfc9df693
Size/MD5 checksum: 2128634 a3b8e9b7d616884e918ee615a9bb2443
Size/MD5 checksum: 2390238 3cd9bf05564f27964232cfb1d35c0944
Size/MD5 checksum: 3219528 f845d56e3b9334401e192fe79f45da9d
Size/MD5 checksum: 1196926 d50e00881b8650b92caf40089b5f6552
Size/MD5 checksum: 4967686 5cdcd7cfec791f472e4f761a1264098a
Size/MD5 checksum: 4178230 4558a771c63c83f92f7276e69fa00dd9
Size/MD5 checksum: 569600 61fbc8a1b21c45e080f7c7253a2bcbd4

powerpc architecture (PowerPC)
Size/MD5 checksum: 2078396 375b7b8719ce7d27a65f4063550068f0
Size/MD5 checksum: 989754 3843d901f44ff4c982b82292c3cf2b4a
Size/MD5 checksum: 2988350 72e1abd2481e5fca5f13ab926e6439c1
Size/MD5 checksum: 1335802 3a0ce75ec8dd000ed1a8a56047b41344
Size/MD5 checksum: 1240416 3e2a10e14a13872718d64e270d2ed36b
Size/MD5 checksum: 1714648 0abc5aebba55ff318bda4cc33fbd6531
Size/MD5 checksum: 5190642 b32cdb5163b7c49923e14e33f993f93d
Size/MD5 checksum: 596034 22ae2b5fa172445e065a820284bae32b
Size/MD5 checksum: 80996 60821ef9894750d967c8b8dfa152771e
Size/MD5 checksum: 4406486 e74c12d39018c5eb918049a9f43f2bd1
Size/MD5 checksum: 6296704 11789a7c80ac1f76f93b66cbc0e25024
Size/MD5 checksum: 3436812 7f637893c3237c1609f8130c740ab444

sparc architecture (Sun SPARC/UltraSPARC)
Size/MD5 checksum: 4321558 45bd9c058b347210a8d073d01dea0d80
Size/MD5 checksum: 978766 a1bbfed8506f7959b8d38dc34d52c4a9
Size/MD5 checksum: 6175646 ccbbef75be06864fa4e6e26a13f6de2e
Size/MD5 checksum: 1202346 565f1b01fc3724198f6ecd52709c6a51
Size/MD5 checksum: 2026382 1da15e63b5f850ac91b266b2917fa865
Size/MD5 checksum: 1304294 8d2dc296f6a1bf3280b26c8bd56f1f05
Size/MD5 checksum: 5115064 d32a60f69d2d8b11c127caf52218c996
Size/MD5 checksum: 581974 1224d3e0c417803ac6bb3bef706a1330
Size/MD5 checksum: 1995210 841952b9e09835556cc9f23e491a8066
Size/MD5 checksum: 2927968 8b5c038a2395f41e2a835182a3d6c98e
Size/MD5 checksum: 3380236 45a49dd8180d36e3f2d9b0313344b42b
Size/MD5 checksum: 79216 4cfbfc843b4fb44adbde9cdb88637404

These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>
Version: GnuPG v1.4.10 (GNU/Linux)


To UNSUBSCRIBE, email to
with a subject of "unsubscribe". Trouble? Contact

Saturday, February 27, 2010

Simplifying Risk Mgt: Is Your Company Measuring Up?

Risk. Security. Business Resiliecny. Cloud Computing.


Simplifying Risk Management: Is Your Company Measuring Up?

Date: Tuesday, March 16, 2010
Time: 12:00pm EST / 9:00am PST

Moderated by CSO Publisher, Bob Bragdon, hear from this esteemed panel as they share practical approaches to simplifying risk. Gain valuable insights from Dr. George Westerman, published author and risk expert from MIT's Sloan School of Management, an IBM CTO and IBM Vice Presidents leading efforts around Security, Business Resiliency and Cloud Computing.  

Download Now
Reserve Your Spot Today >>

Thank you,

Analytics: The Art and Science of Better
Automated analytics tools allow organizations to get ahead - especially in a questionable economy – by taking a more scientific approach to decision-making through observation, experimentation and measurement to improve business processes. The end result? Improved and revenue-generating business processes and better ROI.

Let Computerworld keep you informed about the resources and topics that are most important to you.

Sign up for Computerworld Alerts, and receive customized information on topics including Security, Virtualization, Green IT, Networking, and many more!

SUBSCRIPTION SERVICES - You are currently subscribed as If you do not wish to receive future mailings from Computerworld Online Resources, need to change your email or other preference, please visit:
If the above URL is not enabled as a link, please copy it in to your browser window to access our Subscription Page.

View Computerworld's online privacy policy

Copyright 2010 | Computerworld Inc. | 492 Old Connecticut Path | Framingham MA 01701 |