Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. Title: Sandberg PowerBank 18200 Review ( -at -) NikKTech Description: With a high capacity of 18.200mAh, three output ports, built-in LED torch and several electrical protections the budget-friendly PowerBank 18200 by Sandberg may just be what you've been looking for to keep your portable/mobile devices running when not at home or the office. Article Link: http://www.nikktech.com/main/articles/gadgets/portable-batteries/7470-sandbe rg-powerbank-18200-review Image Link: http://www.nikktech.com/main/images/pics/reviews/sandberg/powerbank_18200/sa ndberg_powerbank_18200b.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  2. openSUSE Security Update: Security update for opus ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0510-1 Rating: important References: #1020102 Cross-References: CVE-2017-0381 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for opus fixes the following issues: - CVE-2017-0381: Fixed a remote code execution vulnerability in silk/NLSF_stabilize.c when playing certain media files (bsc#1020102) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-277=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-277=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): libopus-devel-1.1-6.1 libopus-devel-static-1.1-6.1 libopus0-1.1-6.1 libopus0-debuginfo-1.1-6.1 opus-debugsource-1.1-6.1 - openSUSE Leap 42.2 (x86_64): libopus0-32bit-1.1-6.1 libopus0-debuginfo-32bit-1.1-6.1 - openSUSE Leap 42.1 (i586 x86_64): libopus-devel-1.1-5.1 libopus-devel-static-1.1-5.1 libopus0-1.1-5.1 libopus0-debuginfo-1.1-5.1 opus-debugsource-1.1-5.1 - openSUSE Leap 42.1 (x86_64): libopus0-32bit-1.1-5.1 libopus0-debuginfo-32bit-1.1-5.1 References: https://www.suse.com/security/cve/CVE-2017-0381.html https://bugzilla.suse.com/1020102 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  3. openSUSE Security Update: Security update of chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0499-1 Rating: important References: #1022049 Cross-References: CVE-2017-5006 CVE-2017-5007 CVE-2017-5008 CVE-2017-5009 CVE-2017-5010 CVE-2017-5011 CVE-2017-5012 CVE-2017-5013 CVE-2017-5014 CVE-2017-5015 CVE-2017-5016 CVE-2017-5017 CVE-2017-5018 CVE-2017-5019 CVE-2017-5020 CVE-2017-5021 CVE-2017-5022 CVE-2017-5023 CVE-2017-5024 CVE-2017-5025 CVE-2017-5026 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 21 vulnerabilities is now available. Description: Google chromium was updated to 56.0.2924.87: * Various small fixes * Disabled option to enable/disable plugins in the chrome://plugins - Changed the build requirement of libavformat to library version 57.41.100, as included in ffmpeg 3.1.1, as only this version properly supports the public AVStream API 'codecpar'. It also contains the version update to 56.0.2924.76 (bsc#1022049): - CVE-2017-5007: Universal XSS in Blink - CVE-2017-5006: Universal XSS in Blink - CVE-2017-5008: Universal XSS in Blink - CVE-2017-5010: Universal XSS in Blink - CVE-2017-5011: Unauthorised file access in Devtools - CVE-2017-5009: Out of bounds memory access in WebRTC - CVE-2017-5012: Heap overflow in V8 - CVE-2017-5013: Address spoofing in Omnibox - CVE-2017-5014: Heap overflow in Skia - CVE-2017-5015: Address spoofing in Omnibox - CVE-2017-5019: Use after free in Renderer - CVE-2017-5016: UI spoofing in Blink - CVE-2017-5017: Uninitialised memory access in webm video - CVE-2017-5018: Universal XSS in chrome://apps - CVE-2017-5020: Universal XSS in chrome://downloads - CVE-2017-5021: Use after free in Extensions - CVE-2017-5022: Bypass of Content Security Policy in Blink - CVE-2017-5023: Type confusion in metrics - CVE-2017-5024: Heap overflow in FFmpeg - CVE-2017-5025: Heap overflow in FFmpeg - CVE-2017-5026: UI spoofing. Credit to Ronni Skansing - Enable VAAPI hardware accelerated video decoding. - Chromium 55.0.2883.87: * various fixes for crashes and specific wesites * update Google pinned certificates Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-273=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-273=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): harfbuzz-debugsource-1.4.2-3.1 harfbuzz-devel-1.4.2-3.1 harfbuzz-tools-1.4.2-3.1 harfbuzz-tools-debuginfo-1.4.2-3.1 libharfbuzz-icu0-1.4.2-3.1 libharfbuzz-icu0-debuginfo-1.4.2-3.1 libharfbuzz0-1.4.2-3.1 libharfbuzz0-debuginfo-1.4.2-3.1 - openSUSE Leap 42.2 (x86_64): chromedriver-56.0.2924.87-102.1 chromedriver-debuginfo-56.0.2924.87-102.1 chromium-56.0.2924.87-102.1 chromium-debuginfo-56.0.2924.87-102.1 chromium-debugsource-56.0.2924.87-102.1 libharfbuzz-icu0-32bit-1.4.2-3.1 libharfbuzz-icu0-debuginfo-32bit-1.4.2-3.1 libharfbuzz0-32bit-1.4.2-3.1 libharfbuzz0-debuginfo-32bit-1.4.2-3.1 - openSUSE Leap 42.1 (i586 x86_64): ffmpeg3-3.2.2-2.1 ffmpeg3-debuginfo-3.2.2-2.1 ffmpeg3-debugsource-3.2.2-2.1 libavcodec-devel-3.2.2-2.1 libavcodec57-3.2.2-2.1 libavcodec57-debuginfo-3.2.2-2.1 libavdevice-devel-3.2.2-2.1 libavdevice57-3.2.2-2.1 libavdevice57-debuginfo-3.2.2-2.1 libavfilter-devel-3.2.2-2.1 libavfilter6-3.2.2-2.1 libavfilter6-debuginfo-3.2.2-2.1 libavformat-devel-3.2.2-2.1 libavformat57-3.2.2-2.1 libavformat57-debuginfo-3.2.2-2.1 libavresample-devel-3.2.2-2.1 libavresample3-3.2.2-2.1 libavresample3-debuginfo-3.2.2-2.1 libavutil-devel-3.2.2-2.1 libavutil55-3.2.2-2.1 libavutil55-debuginfo-3.2.2-2.1 libpostproc-devel-3.2.2-2.1 libpostproc54-3.2.2-2.1 libpostproc54-debuginfo-3.2.2-2.1 libswresample-devel-3.2.2-2.1 libswresample2-3.2.2-2.1 libswresample2-debuginfo-3.2.2-2.1 libswscale-devel-3.2.2-2.1 libswscale4-3.2.2-2.1 libswscale4-debuginfo-3.2.2-2.1 - openSUSE Leap 42.1 (x86_64): chromedriver-56.0.2924.87-102.1 chromedriver-debuginfo-56.0.2924.87-102.1 chromium-56.0.2924.87-102.1 chromium-debuginfo-56.0.2924.87-102.1 chromium-debugsource-56.0.2924.87-102.1 libavcodec57-32bit-3.2.2-2.1 libavcodec57-debuginfo-32bit-3.2.2-2.1 libavdevice57-32bit-3.2.2-2.1 libavdevice57-debuginfo-32bit-3.2.2-2.1 libavfilter6-32bit-3.2.2-2.1 libavfilter6-debuginfo-32bit-3.2.2-2.1 libavformat57-32bit-3.2.2-2.1 libavformat57-debuginfo-32bit-3.2.2-2.1 libavresample3-32bit-3.2.2-2.1 libavresample3-debuginfo-32bit-3.2.2-2.1 libavutil55-32bit-3.2.2-2.1 libavutil55-debuginfo-32bit-3.2.2-2.1 libpostproc54-32bit-3.2.2-2.1 libpostproc54-debuginfo-32bit-3.2.2-2.1 libswresample2-32bit-3.2.2-2.1 libswresample2-debuginfo-32bit-3.2.2-2.1 libswscale4-32bit-3.2.2-2.1 libswscale4-debuginfo-32bit-3.2.2-2.1 References: https://www.suse.com/security/cve/CVE-2017-5006.html https://www.suse.com/security/cve/CVE-2017-5007.html https://www.suse.com/security/cve/CVE-2017-5008.html https://www.suse.com/security/cve/CVE-2017-5009.html https://www.suse.com/security/cve/CVE-2017-5010.html https://www.suse.com/security/cve/CVE-2017-5011.html https://www.suse.com/security/cve/CVE-2017-5012.html https://www.suse.com/security/cve/CVE-2017-5013.html https://www.suse.com/security/cve/CVE-2017-5014.html https://www.suse.com/security/cve/CVE-2017-5015.html https://www.suse.com/security/cve/CVE-2017-5016.html https://www.suse.com/security/cve/CVE-2017-5017.html https://www.suse.com/security/cve/CVE-2017-5018.html https://www.suse.com/security/cve/CVE-2017-5019.html https://www.suse.com/security/cve/CVE-2017-5020.html https://www.suse.com/security/cve/CVE-2017-5021.html https://www.suse.com/security/cve/CVE-2017-5022.html https://www.suse.com/security/cve/CVE-2017-5023.html https://www.suse.com/security/cve/CVE-2017-5024.html https://www.suse.com/security/cve/CVE-2017-5025.html https://www.suse.com/security/cve/CVE-2017-5026.html https://bugzilla.suse.com/1022049 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  4. news

    Wine release 2.2

    The Wine development release 2.2 is now available. What's new in this release (see below for details): - Windows version set to Windows 7 for new prefixes. - More steps towards the Direct3D command stream. - Still more Shader Model 5 instructions. - Initial support for double-buffered theme painting. - Various bug fixes. The source is available from the following locations: http://dl.winehq.org/wine/source/2.x/wine-2.2.tar.xz http://mirrors.ibiblio.org/wine/source/2.x/wine-2.2.tar.xz Binary packages for various distributions will be available from: http://www.winehq.org/download You will find documentation on http://www.winehq.org/documentation You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details. Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list. ---------------------------------------------------------------- Bugs fixed in 2.2 (total 35): 13365 Missing text in IFC Markets Terminal Graphics 14939 Black & White: DXTC to ARGB converter not implemented 17495 Open dialog crashes if the desktop folder is at a Unicode path that cannot be represented in the current locale 18477 Need For Speed Most Wanted crashes after accepting video settings changes 19888 Venom Codename: Outbreak - initial menu screen is black (no menu items) 25625 Implement PROPSHEET_InsertPage 26603 iMesh 10 crashes at startup (needs wmvcore.dll.WMCreateReaderPriv) 32414 Samsung TV SDK 3.5.2 Emulator crashes on startup (needs 'Shell Image Data Factory', CLSID '{66e4e4fb-f385-4dd0-8d74-a2efd1bc6178}') 33318 3DMark2001 SE: upgrading to Wine 1.5.27 reduces performance score by 20% 36213 valgrind shows some possible leaks under crypt32/tests/sip.c 36247 VHD Attach v3.90 (.NET app) needs virtdisk.dll 36341 valgrind shows some possible leaks under crypt32/tests/base64.c 36365 valgrind shows a TON of leaks in ieframe/tests/webbrowser.c 36395 valgrind shows a possible leak in inetcomm/tests/mimeole.c 36557 valgrind shows some invalid writes in ieframe/tests/webbrowser.c 36662 valgrind shows a few memory leaks in ws2_32/tests/sock.c 37398 Urban Assault black screen when using software renderer and DDSCAPS_SYSTEMMEMORY 37399 Urban Assault black screen when using software renderer (palette problem) 38485 New Marvel Heroes 2015 Launcher crashes on unimplemented function dhcpcsvc.dll.DhcpRequestParams 39048 MIDI Clock Messages are Corrupted Between Wine and ALSA 39655 Enemy Front crashes almost immediately after launch 39910 PDF XChange Editor annotations formatting not displayed after saving 40952 improper escaping of quotes in command line 41206 Artemis 2.4.0 crashed upon start 41448 Civilization II Unhandled page fault on read access 41648 AmiBroker 6.00 fails, when run, with raise_exception Unhandled exception 41753 Steep (Ubisoft) needs iphlpapi.dll.GetUnicastIpAddressEntry 41830 Up[censored] group box text causes garbage 41926 Zafehouse demo crashes with Call from 0x7b43c14c to unimplemented function ddraw.dll.GetSurfaceFromDC, aborting 41971 Hitman Absolution crashes at startup at WineD3D on Windows 42094 winamp needs unimplemented function ntoskrnl.exe.IoStopTimer 42355 Artifacts in GTAIV appear and disappear when driving 42361 DX Library: PlaySoundFile() doesn't play MP3 files with specific extra headers 42365 Unimplemented function msvcr120.dll.fesetenv 42367 KiriKiri Z based games: main screen doesn't update. ---------------------------------------------------------------- Changes since 2.1: Akihiro Sagawa (5): d3d9/tests: Add LockRect tests with dynamic textures. d3d8/tests: Add LockRect tests with dynamic textures. wined3d: Upload textures if NO_DIRTY_UPDATE flag is set when locking dynamic textures. version: Ignore flag values in Ex functions. version/tests: Add tests for GetFileVersionInfoEx. Alex Henrie (4): comdlg32: Use localized "Path does not exist" string. comdlg32: Don't crash if an IShellFolder could not be created. ddraw/tests: Validate the "surface" pointer is unmodified after CreateSurface() without cooperative level. ddraw: Validate the "surface" pointer before creating the surface in CreateSurface(). Alistair Leslie-Hughes (21): include: Add comsvcs.idl. uuid: Add comsvcs.h. comsvcs: Register typelib. dpnet/test: Share code between tests. dpnet/tests: Don't hardcode paths. dxgi: Silence a noisy fixme. include: Correct value passed to __WINE_ALLOC_SIZE. dpnet: Use registry lookup in EnumServiceProviders. dpnet: Implement IDirectPlay8Client EnumServiceProviders. dpnet: Add __WINE_ALLOC_SIZE attributes to heap_xxx() functions. dpnet/tests: Add IDirectPlay8Client EnumHost tests. dpnet/tests: Initial IDirectPlay8ThreadPool tests. dpnet/tests: Add IDirectPlay8Peer EnumHost Tests. winnt.h: Implement RtlSecureZeroMemory. dpnet: Add basic validation in IDirectPlay8Client EnumHosts. dpnet: Add basic validation in IDirectPlay8Peer EnumHosts. dpnet: Implement IDirectPlay8Thread Initialize. dplayx/tests: Skip tests if dplayx is a stub dll or firewall is enabled. dpnet/tests: Add tests to show IDirectPlay8ThreadPool is a singleton object. dplayx/tests: DirectPlay IPX support was removed in Vista. dplayx: Don't print an error when no Lobby Providers are found. Andrew Eikum (1): jsproxy: Use debugstr_a on URL. Andrew Wesie (2): ntdll: Read entry point in LdrInitializeThunk. wined3d: Add cube array sampler support. Andrey Gusev (1): xinput1_3: Avoid spamming FIXME for XInputGetKeystroke. Andrey Semakin (2): winemine: Mine random placing fix. winemine: Added Shift+LClick hotkey to uncover multiple cells. André Hentschel (2): iphlpapi: Add GetUnicastIpAddressEntry implementation. iphlpapi/tests: Add tests for GetUnicastIpAddressEntry. Aurimas Fišeras (2): po: Update Lithuanian translation. po: Update Lithuanian translation. Austin English (2): wine.inf: Set default Windows version to win7. advapi32: Add missing function header to TreeResetNamedSecurityInfoW(). Bruno Jesus (8): winealsa.drv: Fix handling of system real time MIDI messages. wlanapi: Semi-stub WlanEnumInterfaces. winemp3.acm: Ignore XING headers when parsing MP3 files. configure: Make FreeBSD recognize struct __res_state for iphlpapi. wlanapi: Add a stub for WlanScan. wlanapi: Add a stub for WlanRegisterNotification. wlanapi: Add a stub for WlanGetAvailableNetworkList. wlanapi: Add some usage information. Can Taşan (1): po: Update Turkish translation. Carlo Bramini (2): winmm: RegQueryValueExW wants the size in bytes, not the size in characters. winmm: Fix wrong return type for midiInOpen and midiOutOpen. Carlos Garnacho (1): winex11: Use XIAllDevices to select for XI_RawMotion. Charles Davis (1): iphlpapi: Add missing header to configure test. Christian Inci (1): kernel32/tests: Add test for SetFileTime. Daniel Lehman (3): kernel32/tests: Don't call function in assert(). kernel32/tests: Don't call DeleteFile from assert(). opengl32/tests: Fix leak in opengl test (valgrind). Detlef Riekenberg (2): localspl: Clear LastError on success in AddMonitor. winspool/tests: Test LastError on success of AddMonitor. Dmitry Timoshkov (3): user32: BUTTON_CalcLabelRect should use the button font. user32: Fix groupbox rectangle calculation in the button's WM_SETTEXT handler. kernel32: Replace Peb->BeingDebugged check by CheckRemoteDebuggerPresent(). Erich Hoover (1): dsound: Clear the temporary mixing buffer after allocation. Fabian Maurer (6): msvcr120: Add fesetenv stub. user32/tests: Add tests for windows when first shown with WS_VISIBLE or RedrawWindow. user32/tests: Add tests for windows when first shown with SetWindowPos. user32/tests: Add tests for windows when first shown if they have children. user32/tests: Add WM_NCPAINT tests for windows crossing screen or maximized. user32/tests: Add tests for disabled buttons receiving WM_LBUTTONUP. François Gouget (31): winetest: Flush the report file to disk between each test. include: Add prototypes for IStream_{Reset,Size}(). include: Add a couple of INTERNET_SCHEME_XXX constants. inetcomm/tests: A spelling fix in an ok() message. appwiz.cpl: Add __WINE_ALLOC_SIZE attributes to heap_xxx() functions. ole32: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). scrrun: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). wmp: Add __WINE_ALLOC_SIZE attributes to heap_xxx() functions. schedsvc: Simplify and standardize the heap_xxx() declarations. oleaut32: Standardize the heap_xxx() functions. mshtml/tests: A couple of spelling fixes in ok() messages. shdocvw: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). winetest: There is no special directory anymore. winetest: Explain why the source filename is printed. wininet/tests: A spelling fix in an ok() message. advpack: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). browseui: Add __WINE_ALLOC_SIZE attributes to heap_xxx() functions. advapi32: Simplify and standardize the heap_xxx() declarations. wldap32: Keep the error constants ordered. wldap32: Add an error message and an explanation for the lack of error constants. dpnet/tests: A spelling fix in a variable name. wmvcore: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). atl: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). jsproxy: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). inseng: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). iccvid: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). explorerframe: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). gdi32/tests: Add inline, __WINE_ALLOC_SIZE attributes to heap_xxx() functions. winetest: Allow sending the report to another server. winhttp: Add __WINE_ALLOC_SIZE attributes to heap_xxx() functions. dwrite/tests: Add a __WINE_ALLOC_SIZE attribute to heap_alloc(). Gerald Pfeifer (1): services/tests: Add #include to service.c. Guillaume Charifi (1): wined3d: Add dual-source blend factors. Hans Leidekker (4): webservices: Fix use of month as array index. webservices/tests: Add helpers to set various description structures. webservices/tests: Add more tests for WsReadEnvelopeStart. webservices/tests: Add an empty response message test. Henri Verbeet (35): wined3d: Trace the blit parameters in wined3d_select_blitter(). wined3d: Allow decompression blits on system memory resources in arbfp_blit_supported(). wined3d: Allow decompression blits on system memory resources in ffp_blit_supported(). wined3d: Disallow upload conversion from compressed formats in surface_convert_format(). d3d8/tests: Add a test for resource creation with D3DFMT_UNKNOWN. d3d9/tests: Add a test for resource creation with D3DFMT_UNKNOWN. d3d9: Clear the "surface" pointer on error in d3d9_device_CreateDepthStencilSurfaceEx(). d3d8: Do not modify the "texture" pointer for D3DFMT_UNKNOWN in d3d8_device_CreateTexture(). d3d8: Do not modify the "texture" pointer for D3DFMT_UNKNOWN in d3d8_device_CreateCubeTexture(). d3d8: Do not modify the "texture" pointer for D3DFMT_UNKNOWN in d3d8_device_CreateVolumeTexture(). d3d8: Do not modify the "surface" pointer for D3DFMT_UNKNOWN in d3d8_device_CreateRenderTarget(). d3d8: Do not modify the "surface" pointer for D3DFMT_UNKNOWN in d3d8_device_CreateDepthStencilSurface(). ddraw/tests: Rewrite GetDCTest(). ddraw: Implement GetSurfaceFromDC(). wined3d: Disable sRGB decode in swapchain_blit(). wined3d: Use wined3d_texture_load_location() in device_clear_render_targets(). wined3d: Merge common code between texture3d_load_location() and surface_load_location(). d2d1: Properly invert join directions when needed. wined3d: Get rid of the unused "depth_blt_texture" field from struct wined3d_device. wined3d: Free the swapchain context array in swapchain_destroy_contexts(). wined3d: Use wined3d_device_delete_opengl_contexts() in wined3d_device_uninit_3d(). wined3d: Pass a texture and sub-resource index to context_acquire(). wined3d: Use context_acquire() in create_primary_opengl_context(). usp10: Explicitly check for zero-width control characters in ScriptShapeOpenType(). usp10: Itemise ZWSP like ZWNJ and ZWJ. wined3d: Use create_primary_opengl_context() in wined3d_device_init_3d(). wined3d: Send sampler GL initialisation through the command stream. wined3d: Send shader resource view GL initialisation through the command stream. wined3d: Send unordered access view GL initialisation through the command stream. wined3d: Send GL context destruction through the command stream. wined3d: Send primary GL context initialisation through the command stream. wined3d: Handle CS op emission from CS op handlers. wined3d: Handle system memory copies in wined3d_texture_load_location(). wined3d: Introduce a helper function to lookup a wined3d_light_info structure. wined3d: Introduce a helper function to enable lights. Hugh McMaster (3): regedit: Display a dialog message after successful/unsuccessful file import. regedit: Refresh listview after import. regedit: Sort treeview children on refresh. Huw D. M. Davies (10): user32/tests: Restore the mouse cursor to its original position. wbemdisp: Implement ISWbemObjectSet::ItemIndex. gdi32: Don't copy biSizeImage in copy_color_info(). gdi32: Use the image size returned by GetImage. gdi32: Update biSizeImage when uncompressing the RLE bitmap. gdi32: Initialize biSizeImage in the DDB's bitmapinfo. gdi32: Reset the image size when cropping the source bitmap. gdi32: Calculate the stride from the image size. gdi32: Calculate the stride from the image size. gdi32/tests: Test blitting from a D3DKMT bitmap to a regular bitmap. Jacek Caban (34): inetcomm: Return S_FALSE if no data is returned in IInternetProtocol::Read. mshtml: Added MHTMLDocument object implementation. mshtml/tests: Added MHTML document tests. winerror.h: Moved DXGI HRESULT defines to winerror.h and add a few missing ones. user32: Allow creating windows using null driver for invisible winstations. services/tests: Test creating windows inside non-interactive service. maintainers: Update myself. server: Choose newer async object when searching from client pointer. ntdll: Don't set io->Information in server_read_file and server_write_file. mshtml/tests: Added body event setters tests. mshtml: Use inner window's event target for body element. mshtml: Return event target as EventTarget in NodeImplVtbl.get_event_target. mshtml: Return event target as EventTarget from DispatchEx vtbl. mshtml: Don't reallocate handler_vector_t when handlers are added. mshtml: Added new get_handler_vector helper for creating handle_vector_t. mshtml: Use get_handler_vector in remove_event_handler. mshtml: Use get_handler_vector in call_event_handlers. mshtml: Use get_handler_vector in get_event_handler. mshtml: Use get_handler_vector in detach_event. mshtml: Pass event target as EventTarget to release_event_target. mshtml: Release event target in XMLHttpRequest destructor. rbtree.h: Added WINE_RB_FOR_EACH_DESTRUCTOR and WINE_RB_FOR_EACH_ENTRY_DESTRUCTOR helpers for implementing tree destructors. mshtml: Store event handlers in rb tree. mshtml: Added IHTMLDocument5::onfocusin and onfocusout properties implementation. mshtml: Added IHTMLElement4::onbeforeactivate property implementation. mshtml: Added IHTMLCurrentStyle::get_direction implementation. mshtml: Added IHTMLDocument7::onscroll property implementation. mshtml: Added IHTMLDocument4::onselectionchange property implementation. mshtml: Added IHTMLDocument7::onchange property implementation. mshtml: Added IHTMLDocument5::onmousewheel property implementation. mshtml: Reimplemented check_event_attr to iterate though declared attributes instead of all known events. mshtml: Added get_event_dispex_ref helper that avoids using attr_name. mshtml: Don't use attr_name in attr_to_eid. mshtml: Removed no longer used attr_name from event_info_t. Jacob Lifshay (1): kernel32: Fix improper escaping of quotes in command line. Jactry Zeng (1): qcap: Avoid call LeaveCriticalSection() repeatedly. Jarkko Korpi (1): ntoskrnl: Add IoStopTimer stub. Jetro Jormalainen (1): dinput: Give correct count of devices still to be enumerated. Jonathan Doron (3): ntdll: Define more file information classes. include: Add definition for FILE_ID_INFORMATION. kernel32: Added implementation of FileIdInfo for GetFileInformationByHandleEx. Józef Kucia (55): ddraw: Implement D3DOP_TEXTURELOAD. ddraw/tests: Add basic test for D3DOP_TEXTURELOAD. wined3d: Recognize SM5 imm_atomic_iadd opcode. wined3d: Implement applying state for compute pipeline. wined3d: Group compute states together. wined3d: Allow passing compute states to device_invalidate_state(). wined3d: Use more suitable bind target for SRV/UAV buffers. d3d11/tests: Add test for interleaved Draw() and Dispatch() calls. wined3d: Implement SM5 store_uav_typed instruction. wined3d: Fix order of command stream functions. wined3d: Implement compute pipeline UAV binding. wined3d: Acquire unordered access resources for compute dispatches. d3d11: Implement d3d11_immediate_context_CSSetUnorderedAccessViews(). wined3d: Track current vertex color clamp mode in glsl_context_data. wined3d: Generate code for compute shaders. wined3d: Implement dcl_thread_group instruction. d3d11: Implement d3d11_immediate_context_Dispatch(). wined3d: Merge WINED3D_CS_OP_SET_UNORDERED_ACCESS_VIEW and WINED3D_CS_OP_SET_COMPUTE_UAV. d3d11: Fix default shader resource views for cube textures. d3d11: Validate array size for cube textures. wined3d: Implement texture cube array views. d3d11/tests: Add test for resinfo instruction. d3d11: Do not keep mutex locked when D3D11_BUFFER_DESC validation fails. wined3d: Get rid of initPixelFormatsNoGL(). wined3d: Simplify pixel format selection. d3d10core/tests: Port test_resinfo_instruction() from d3d11. wined3d: Fix bind count for shader resource views. d3d9: Do not decrease swapchain surface refcount when it is already 0. d3d9: Do not decrease swapchain refcount when it is already 0. d3d8: Do not decrease swapchain surface refcount when it is already 0. d3d10core/tests: Mark sRGB RTV clear test as broken on Nvidia drivers. d3d11/tests: Mark some tests as broken on Nvidia drivers. wined3d: Honor buffer ranges for shader resource views. d3d11/tests: Add tests for buffer ranges. wined3d: Handle declarations for raw UAVs. wined3d: Add support for buffer UAVs. wined3d: Implement raw buffer views. wined3d: Implement SM5 atomic_* instructions. d3d11/tests: Add test for atomic instructions. wined3d: Fix condition to determine if FIXME message should be printed. d3d10core/tests: Add tests for buffer ranges. d3d10core/tests: Fix SM4 not instruction test. d3d11/tests: Fix SM4 not instruction test. d3d11/tests: Add more tests for format reinterpreting SRVs. wined3d: Handle declarations for raw buffer shader resources. wined3d: Record sampler usage for WINED3DSIH_LD_RAW. wined3d: Implement SM5 store_raw instruction. wined3d: Implement SM5 imm_atomic_* instructions. d3d11/tests: Add test for SM5 imm_atomic_* instructions. wined3d: Recognize SM5 imm_atomic_imax opcode. wined3d: Recognize SM5 imm_atomic_imin opcode. d3d10core/tests: Add more tests for format reinterpreting SRVs. d3d10core/tests: Add optional "rect" parameter to check_texture_sub_resource_* functions. wined3d: Implement SM5 ld_raw instruction. d3d11/tests: Add test for unaligned raw buffer access. Ken Thomases (1): winemac: Pass correct buffer length to RegQueryValueExW(). Kim Malmo (1): po: Update Norwegian translation. Lauri Kenttä (12): cabinet: Make Extract overwrite existing files. cabinet: Make Extract fail on read-only files. msvcrt: Check pmode in _wsopen_dispatch. msvcrt: Fix _creat and _wcreat. msvcrt/tests: Add tests for _creat. po: Update Finnish translation. crypt32: Test CryptStringToBinary with weird Base64. crypt32: Base64 header requires a space. crypt32: Fix Base64 issues in CryptStringToBinary. crypt32: CryptStringToBinary accepts any header. crypt32: Fix wrong Base64 trailer WCHAR constants. crypt32: Remove unused parameter and dead code. Louis Lenders (1): virtdisk: Add stub dll. Matteo Bruni (4): wined3d: Don't query aux buffers count on core profile. ddraw/tests: Fix IDirect3DDevice typo. d3dx10: Make use of data_size when tracing data string. d3dx11: Make use of data_size when tracing data string. Michael Müller (4): server: Give all access rights when opening an object with MAXIMUM_ALLOWED. ntdll: Implement RtlAddMandatoryAce. advapi32: Implement AddMandatoryAce. advapi32/tests: Add tests for AddMandatoryAce. Michael Stefaniuc (7): ddraw/tests: Fix double assigment to the same lvalue (coccinellery). dplayx: Fix multiple assigments to the same lvalue (coccinellery). kernel32: Remove always true if conditions (coccinellery). strmbase: Remove an always true if condition (coccinellery). shell32/tests: Use the correct field for SW_SHOWNORMAL (coccinellery). hid/tests: Remove duplicated for condition (coccinellery). crypt32/tests: Use IsEqualGUID() to compare GUIDs. Nikolay Sivov (48): urlmon: Remove 'stub' from implemented functions trace message. msctf: Return proper pointer to interface. oleaut32/tests: Correctly return interface pointer. shell32: Added a stub for IShellImageDataFactory. xmllite: Handle char references within text nodes. oleview: Use Treeview notifications to release created instances. oleview: Remove application specific version string. mmdevapi: Fix pointer type cast. user32/tests: Test to show that original font is not selected back after painting buttons. shell32: Added IShellImageData stub. shell32: Implement IShellImageData::Decode() when created from file path. shell32: Implement IShellImageData::GetSize(). shell32: Implement IShellImageData::Draw(). winex11: Pass correct buffer length to RegQueryValueExW(). shell32: Pass correct buffer length to RegQueryValueExW(). setupapi: Use sizeof() instead of numerical constants for buffer sizes. secur32: Pass correct buffer length to RegQueryValueExW(). oleaut32: Return proper interface pointers. dxgi/tests: Switch to D3D10.1. dxgi/tests: Basic test for DXGI_SWAP_CHAIN_FLAG_GDI_COMPATIBLE. uxtheme: Partial implementation of BeginBufferedPaint(). uxtheme: Implement EndBufferedPaint(). uxtheme: Implement GetBufferedPaintDC(). uxtheme: Implement GetBufferedPaintTargetDC(). uxtheme: Implement GetBufferedPaintTargetRect(). uxtheme: Implement GetBufferedPaintBits(). uxtheme/tests: A bit more tests for buffered painting API. dxgi: Added support for DXGI_SWAP_CHAIN_FLAG_GDI_COMPATIBLE. riched20: Return proper interface pointers. kernel32/nls: Added Bangla (India) locale data. d2d1: Always create HWND target as gdi-compatible. po: Update Russian translation. advapi32: Fix trace format of InitiateSystemShutdownEx(). hlink: Properly return interface pointers. itss: Properly return interface pointers. mapi32: Properly return interface pointer. infosoft: Properly return interface pointers. wordpad: Clean up IRichEditOleCallback implementation. d2d1: Create gdi-compatible texture for WIC target when asked for it. pstorec: Fix QueryInterface() of IPStore. comctl32/tests: Basic test for PGN_CALCSIZE. comctl32/pager: Don't block window size changes. d2d1: Added support for ID2D1GdiInteropRenderTarget interface. comctl32/propsheet: Add helpers to do string duplication. comctl32/propsheet: Implement PSM_SETHEADERTITLE. comctl32/propsheet: Implement PSM_SETHEADERSUBTITLE. regedit: Make it clear whether it is a key or a value that is about to be removed. d2d1/tests: Test to show that WIC bitmap is locked within BeginDraw()/EndDraw(). Peter Hater (1): comctl32/propsheet: Added PSM_INSERTPAGE implementation. Piotr Caban (8): msvcrt: Add fesetenv implementation. ntdll: Add stub implementation of NtQueryInformationThread(ThreadIsIoPending). wine.inf: Add Dynamic DST/{First,Last}Entry registry keys. gdiplus: Make GpBitmap->bitmapbits access thread safe. gdiplus: GpBitmap can be only locked once, get rid of numlocks field. gdiplus: Reimplement GdipCreateHBITMAPFromBitmap so it can work on locked bitmaps. gdiplus: Add GdipCreateHBITMAPFromBitmap tests when bitmap bits are locked. msvcr120: Add _except1 implementation. Rodrigo Rivas Costa (1): user32: Fix error handling in EndDeferWindowPos. Sebastian Lackner (9): dinput: Allocate correct amount of memory in IDirectInput8AImpl_EnumDevicesBySemantics. wined3d: Add a missing call to context_release. ntdll/tests: Add tests for FileIdInformation class. ntdll: Implement FileIdInformation class in NtQueryInformationFile. user32/tests: Add test for EndDeferWindowPos with destroyed window. ntdll/tests: Add tests for FileIoCompletionNotificationInformation info class. mmdevapi: Use InitOnce to initialize audio drivers. wined3d: Remove duplicate assignment of NULL to map_ptr in wined3d_buffer_map. wined3d: Avoid unnecessary memory allocations in nested command stream calls. Thierry Vermeylen (1): wnaspi32: Do not crash on SC_GETSET_TIMEOUTS. Wei Xie (1): qcap: Add O_CLOEXEC flag to prevent child process from inheriting handles. Zebediah Figura (2): storage.dll16: Simplify operations in IStream16::Seek. storage.dll16: Set OpenStorage/OpenStream output to NULL on failure. -- Alexandre Julliard julliard ( -at -) winehq.org
  5. -------- WESTERN DIGITAL RED WD80EFZX 8TB HARD DRIVE REVIEW ( -at -) APH NETWORKS --- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Western Digital Red WD80EFZX 8TB Hard Drive Review ( -at -) APH Networks * Description: The helium-filled Western Digital Red WD80EFZX 8TB is a large capacity drive that plays the game by attempting to balance the parameters: Power efficiency, price, and performance. * Link: http://aphnetworks.com/reviews/western-digital-red-wd80efzx-8tb * Image: http://aphnetworks.com/review/western-digital-red-wd80efzx-8tb/006.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  6. SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0494-1 Rating: important References: #1001419 #1002165 #1003077 #1003253 #1003925 #1004517 #1007944 #1008374 #1008645 #1008831 #1008833 #1008850 #1009875 #1010150 #1010467 #1010501 #1010507 #1010711 #1010713 #1010716 #1011685 #1011820 #1012183 #1012422 #1012832 #1012851 #1012852 #1012895 #1013038 #1013042 #1013531 #1013542 #1014454 #1014746 #1015878 #1017710 #1018446 #1019079 #1019783 #1021258 #821612 #824171 #914939 #929141 #935436 #956514 #961923 #966826 #967716 #969340 #973691 #979595 #987576 #989152 #989261 #991665 #992566 #992569 #992906 #992991 #993890 #993891 #994296 #994618 #994759 #995968 #996329 #996541 #996557 #997059 #997401 #997708 #998689 #999932 #999943 Cross-References: CVE-2004-0230 CVE-2012-6704 CVE-2015-1350 CVE-2015-8956 CVE-2015-8962 CVE-2015-8964 CVE-2015-8970 CVE-2016-0823 CVE-2016-10088 CVE-2016-3841 CVE-2016-6828 CVE-2016-7042 CVE-2016-7097 CVE-2016-7117 CVE-2016-7425 CVE-2016-7910 CVE-2016-7911 CVE-2016-7916 CVE-2016-8399 CVE-2016-8632 CVE-2016-8633 CVE-2016-8646 CVE-2016-9555 CVE-2016-9685 CVE-2016-9756 CVE-2016-9793 CVE-2017-5551 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Server 11-EXTRA SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that solves 27 vulnerabilities and has 48 fixes is now available. Description: The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374). - CVE-2017-5551: Clear S_ISGID on tmpfs when setting posix ACLs (bsc#1021258). - CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968). - CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710). - CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340). - CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831). - CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local malicious application to execute arbitrary code within the context of the kernel bnc#1014746). - CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531). - CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542). - CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038). - CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566). - CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832). - CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939). - CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501). - CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685). - CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716). - CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711). - CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507). - CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467). - CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150). - CVE-2016-8633: drivers/firewire/net.c in the Linux kernel in certain unusual hardware configurations allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833). - CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux, when the GNU Compiler Collection (gcc) stack protector is enabled, used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517). - CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925). - CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077). - CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file (bnc#994759). - CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932). - CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296). The following non-security bugs were fixed: - Always include the git commit in KOTD builds. This allows us not to set it explicitly in builds submitted to the official distribution (bnc#821612, bnc#824171). - KVM: x86: SYSENTER emulation is broken (bsc#994618). - NFS: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261). - NFS: Refresh open-owner id when server says SEQID is bad (bsc#989261). - NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595). - NFSv4: add flock_owner to open context (bnc#998689). - NFSv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689). - NFSv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689). - NFSv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689). - NFSv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595). - SELinux: Fix possible NULL pointer dereference in selinux_inode_permission() (bsc#1012895). - USB: fix typo in wMaxPacketSize validation (bsc#991665). - USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665). - Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, among others). - __ptrace_may_access() should not deny sub-threads (bsc#1012851). - apparmor: fix IRQ stack overflow during free_profile (bsc#1009875). - arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716). - cdc-acm: added sanity checking for probe() (bsc#993891). - include/linux/math64.h: add div64_ul() (bsc#996329). - kabi-fix for flock_owner addition (bsc#998689). - kabi: get back scsi_device.current_cmnd (bsc#935436). - kaweth: fix firmware download (bsc#993890). - kaweth: fix oops upon failed memory allocation (bsc#993890). - kexec: add a kexec_crash_loaded() function (bsc#973691). - md linear: fix a race between linear_add() and linear_congested() (bsc#1018446). - mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820). - mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943). - mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645). - nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944). - ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783). - posix-timers: Remove remaining uses of tasklist_lock (bnc#997401). - posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401). - posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401). - powerpc: Add ability to build little endian kernels (bsc#967716). - powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716). - powerpc: Do not build assembly files with ABIv2 (bsc#967716). - powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716). - powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716). - powerpc: Fix error when cross building TAGS and cscope (bsc#967716). - powerpc: Make the vdso32 also build big-endian (bsc#967716). - powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716). - powerpc: Remove buggy 9-year-old test for binutils lower than 2.12.1 (bsc#967716). - powerpc: Require gcc 4.0 on 64-bit (bsc#967716). - powerpc: dtc is required to build dtb files (bsc#967716). - printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878). - qlcnic: Schedule napi directly in netpoll (bsc#966826). - reiserfs: fix race in prealloc discard (bsc#987576). - rpm/config.sh: Set a fitting release string (bsc#997059) - rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422) - rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059) - s390/dasd: fix failfast for disconnected devices (bnc#961923, LTC#135138). - sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165). - sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419). - sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329). - scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557). - scsi: remove current_cmnd field from struct scsi_device (bsc#935436). - x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141). - xfs: remove the deprecated nodelaylog option (bsc#992906). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-linux-kernel-12992=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-linux-kernel-12992=1 - SUSE Manager 2.1: zypper in -t patch sleman21-linux-kernel-12992=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-linux-kernel-12992=1 - SUSE Linux Enterprise Server 11-EXTRA: zypper in -t patch slexsp3-linux-kernel-12992=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-linux-kernel-12992=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-linux-kernel-12992=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): kernel-bigsmp-3.0.101-0.47.96.1 kernel-bigsmp-base-3.0.101-0.47.96.1 kernel-bigsmp-devel-3.0.101-0.47.96.1 kernel-default-3.0.101-0.47.96.1 kernel-default-base-3.0.101-0.47.96.1 kernel-default-devel-3.0.101-0.47.96.1 kernel-ec2-3.0.101-0.47.96.1 kernel-ec2-base-3.0.101-0.47.96.1 kernel-ec2-devel-3.0.101-0.47.96.1 kernel-source-3.0.101-0.47.96.1 kernel-syms-3.0.101-0.47.96.1 kernel-trace-3.0.101-0.47.96.1 kernel-trace-base-3.0.101-0.47.96.1 kernel-trace-devel-3.0.101-0.47.96.1 kernel-xen-3.0.101-0.47.96.1 kernel-xen-base-3.0.101-0.47.96.1 kernel-xen-devel-3.0.101-0.47.96.1 - SUSE Manager Proxy 2.1 (x86_64): kernel-bigsmp-3.0.101-0.47.96.1 kernel-bigsmp-base-3.0.101-0.47.96.1 kernel-bigsmp-devel-3.0.101-0.47.96.1 kernel-default-3.0.101-0.47.96.1 kernel-default-base-3.0.101-0.47.96.1 kernel-default-devel-3.0.101-0.47.96.1 kernel-ec2-3.0.101-0.47.96.1 kernel-ec2-base-3.0.101-0.47.96.1 kernel-ec2-devel-3.0.101-0.47.96.1 kernel-source-3.0.101-0.47.96.1 kernel-syms-3.0.101-0.47.96.1 kernel-trace-3.0.101-0.47.96.1 kernel-trace-base-3.0.101-0.47.96.1 kernel-trace-devel-3.0.101-0.47.96.1 kernel-xen-3.0.101-0.47.96.1 kernel-xen-base-3.0.101-0.47.96.1 kernel-xen-devel-3.0.101-0.47.96.1 - SUSE Manager 2.1 (s390x x86_64): kernel-default-3.0.101-0.47.96.1 kernel-default-base-3.0.101-0.47.96.1 kernel-default-devel-3.0.101-0.47.96.1 kernel-source-3.0.101-0.47.96.1 kernel-syms-3.0.101-0.47.96.1 kernel-trace-3.0.101-0.47.96.1 kernel-trace-base-3.0.101-0.47.96.1 kernel-trace-devel-3.0.101-0.47.96.1 - SUSE Manager 2.1 (x86_64): kernel-bigsmp-3.0.101-0.47.96.1 kernel-bigsmp-base-3.0.101-0.47.96.1 kernel-bigsmp-devel-3.0.101-0.47.96.1 kernel-ec2-3.0.101-0.47.96.1 kernel-ec2-base-3.0.101-0.47.96.1 kernel-ec2-devel-3.0.101-0.47.96.1 kernel-xen-3.0.101-0.47.96.1 kernel-xen-base-3.0.101-0.47.96.1 kernel-xen-devel-3.0.101-0.47.96.1 - SUSE Manager 2.1 (s390x): kernel-default-man-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): kernel-default-3.0.101-0.47.96.1 kernel-default-base-3.0.101-0.47.96.1 kernel-default-devel-3.0.101-0.47.96.1 kernel-source-3.0.101-0.47.96.1 kernel-syms-3.0.101-0.47.96.1 kernel-trace-3.0.101-0.47.96.1 kernel-trace-base-3.0.101-0.47.96.1 kernel-trace-devel-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 x86_64): kernel-ec2-3.0.101-0.47.96.1 kernel-ec2-base-3.0.101-0.47.96.1 kernel-ec2-devel-3.0.101-0.47.96.1 kernel-xen-3.0.101-0.47.96.1 kernel-xen-base-3.0.101-0.47.96.1 kernel-xen-devel-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (x86_64): kernel-bigsmp-3.0.101-0.47.96.1 kernel-bigsmp-base-3.0.101-0.47.96.1 kernel-bigsmp-devel-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x): kernel-default-man-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586): kernel-pae-3.0.101-0.47.96.1 kernel-pae-base-3.0.101-0.47.96.1 kernel-pae-devel-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64): kernel-xen-extra-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-EXTRA (x86_64): kernel-bigsmp-extra-3.0.101-0.47.96.1 kernel-trace-extra-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-EXTRA (ppc64): kernel-ppc64-extra-3.0.101-0.47.96.1 - SUSE Linux Enterprise Server 11-EXTRA (i586): kernel-pae-extra-3.0.101-0.47.96.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): kernel-default-3.0.101-0.47.96.1 kernel-default-base-3.0.101-0.47.96.1 kernel-default-devel-3.0.101-0.47.96.1 kernel-ec2-3.0.101-0.47.96.1 kernel-ec2-base-3.0.101-0.47.96.1 kernel-ec2-devel-3.0.101-0.47.96.1 kernel-pae-3.0.101-0.47.96.1 kernel-pae-base-3.0.101-0.47.96.1 kernel-pae-devel-3.0.101-0.47.96.1 kernel-source-3.0.101-0.47.96.1 kernel-syms-3.0.101-0.47.96.1 kernel-trace-3.0.101-0.47.96.1 kernel-trace-base-3.0.101-0.47.96.1 kernel-trace-devel-3.0.101-0.47.96.1 kernel-xen-3.0.101-0.47.96.1 kernel-xen-base-3.0.101-0.47.96.1 kernel-xen-devel-3.0.101-0.47.96.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): kernel-default-debuginfo-3.0.101-0.47.96.1 kernel-default-debugsource-3.0.101-0.47.96.1 kernel-trace-debuginfo-3.0.101-0.47.96.1 kernel-trace-debugsource-3.0.101-0.47.96.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64): kernel-ec2-debuginfo-3.0.101-0.47.96.1 kernel-ec2-debugsource-3.0.101-0.47.96.1 kernel-xen-debuginfo-3.0.101-0.47.96.1 kernel-xen-debugsource-3.0.101-0.47.96.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (x86_64): kernel-bigsmp-debuginfo-3.0.101-0.47.96.1 kernel-bigsmp-debugsource-3.0.101-0.47.96.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586): kernel-pae-debuginfo-3.0.101-0.47.96.1 kernel-pae-debugsource-3.0.101-0.47.96.1 References: https://www.suse.com/security/cve/CVE-2004-0230.html https://www.suse.com/security/cve/CVE-2012-6704.html https://www.suse.com/security/cve/CVE-2015-1350.html https://www.suse.com/security/cve/CVE-2015-8956.html https://www.suse.com/security/cve/CVE-2015-8962.html https://www.suse.com/security/cve/CVE-2015-8964.html https://www.suse.com/security/cve/CVE-2015-8970.html https://www.suse.com/security/cve/CVE-2016-0823.html https://www.suse.com/security/cve/CVE-2016-10088.html https://www.suse.com/security/cve/CVE-2016-3841.html https://www.suse.com/security/cve/CVE-2016-6828.html https://www.suse.com/security/cve/CVE-2016-7042.html https://www.suse.com/security/cve/CVE-2016-7097.html https://www.suse.com/security/cve/CVE-2016-7117.html https://www.suse.com/security/cve/CVE-2016-7425.html https://www.suse.com/security/cve/CVE-2016-7910.html https://www.suse.com/security/cve/CVE-2016-7911.html https://www.suse.com/security/cve/CVE-2016-7916.html https://www.suse.com/security/cve/CVE-2016-8399.html https://www.suse.com/security/cve/CVE-2016-8632.html https://www.suse.com/security/cve/CVE-2016-8633.html https://www.suse.com/security/cve/CVE-2016-8646.html https://www.suse.com/security/cve/CVE-2016-9555.html https://www.suse.com/security/cve/CVE-2016-9685.html https://www.suse.com/security/cve/CVE-2016-9756.html https://www.suse.com/security/cve/CVE-2016-9793.html https://www.suse.com/security/cve/CVE-2017-5551.html https://bugzilla.suse.com/1001419 https://bugzilla.suse.com/1002165 https://bugzilla.suse.com/1003077 https://bugzilla.suse.com/1003253 https://bugzilla.suse.com/1003925 https://bugzilla.suse.com/1004517 https://bugzilla.suse.com/1007944 https://bugzilla.suse.com/1008374 https://bugzilla.suse.com/1008645 https://bugzilla.suse.com/1008831 https://bugzilla.suse.com/1008833 https://bugzilla.suse.com/1008850 https://bugzilla.suse.com/1009875 https://bugzilla.suse.com/1010150 https://bugzilla.suse.com/1010467 https://bugzilla.suse.com/1010501 https://bugzilla.suse.com/1010507 https://bugzilla.suse.com/1010711 https://bugzilla.suse.com/1010713 https://bugzilla.suse.com/1010716 https://bugzilla.suse.com/1011685 https://bugzilla.suse.com/1011820 https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012422 https://bugzilla.suse.com/1012832 https://bugzilla.suse.com/1012851 https://bugzilla.suse.com/1012852 https://bugzilla.suse.com/1012895 https://bugzilla.suse.com/1013038 https://bugzilla.suse.com/1013042 https://bugzilla.suse.com/1013531 https://bugzilla.suse.com/1013542 https://bugzilla.suse.com/1014454 https://bugzilla.suse.com/1014746 https://bugzilla.suse.com/1015878 https://bugzilla.suse.com/1017710 https://bugzilla.suse.com/1018446 https://bugzilla.suse.com/1019079 https://bugzilla.suse.com/1019783 https://bugzilla.suse.com/1021258 https://bugzilla.suse.com/821612 https://bugzilla.suse.com/824171 https://bugzilla.suse.com/914939 https://bugzilla.suse.com/929141 https://bugzilla.suse.com/935436 https://bugzilla.suse.com/956514 https://bugzilla.suse.com/961923 https://bugzilla.suse.com/966826 https://bugzilla.suse.com/967716 https://bugzilla.suse.com/969340 https://bugzilla.suse.com/973691 https://bugzilla.suse.com/979595 https://bugzilla.suse.com/987576 https://bugzilla.suse.com/989152 https://bugzilla.suse.com/989261 https://bugzilla.suse.com/991665 https://bugzilla.suse.com/992566 https://bugzilla.suse.com/992569 https://bugzilla.suse.com/992906 https://bugzilla.suse.com/992991 https://bugzilla.suse.com/993890 https://bugzilla.suse.com/993891 https://bugzilla.suse.com/994296 https://bugzilla.suse.com/994618 https://bugzilla.suse.com/994759 https://bugzilla.suse.com/995968 https://bugzilla.suse.com/996329 https://bugzilla.suse.com/996541 https://bugzilla.suse.com/996557 https://bugzilla.suse.com/997059 https://bugzilla.suse.com/997401 https://bugzilla.suse.com/997708 https://bugzilla.suse.com/998689 https://bugzilla.suse.com/999932 https://bugzilla.suse.com/999943 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  7. MSI GE72 7RE Apache Pro Gaming Laptop Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=12f5e8d0de&e=872093acb5 http://www.kitguru.net =MSI GE72 7RE APACHE PRO LAPTOP REVIEW= You may find the model name of the MSI GE72 7RE Apache Pro looks familiar however the devil lies in the detail. It’s the 7RE suffix you need to focus on as the previous MSI GE72VR 6RF has been updated from Intel Skylake CPU and GTX 1060 graphics to Kaby Lake and GTX 1050Ti graphics. Read the review here: http://www.kitguru.net/lifestyle/mobile/laptops/leo-waldock/msi-ge72-7re-apache-pro-gaming-laptop-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=12f5e8d0de&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  8. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Aerocool P7-C1 Link: https://www.techpowerup.com/reviews/Aerocool/P7-C1 Brief: The Aerocool "Project 7" P7-C1 offers a futuristic take on what a gaming professional should use as their chassis. It offers large, clean design elements, a long list of functionality, an interesting material mix, and RGB lighting.
  9. SUSE Security Update: Security update for java-1_7_0-openjdk ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0490-1 Rating: important References: #1020905 Cross-References: CVE-2016-2183 CVE-2016-5546 CVE-2016-5547 CVE-2016-5548 CVE-2016-5549 CVE-2016-5552 CVE-2017-3231 CVE-2017-3241 CVE-2017-3252 CVE-2017-3253 CVE-2017-3259 CVE-2017-3260 CVE-2017-3261 CVE-2017-3272 CVE-2017-3289 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Desktop 12-SP2 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 15 vulnerabilities is now available. Description: This update for java-1_7_0-openjdk fixes the following issues: - Oracle Critical Patch Update of January 2017 to OpenJDK 7u131 (bsc#1020905): * Security Fixes - S8138725: Add options for Javadoc generation - S8140353: Improve signature checking - S8151934, CVE-2017-3231: Resolve class resolution - S8156804, CVE-2017-3241: Better constraint checking - S8158406: Limited Parameter Processing - S8158997: JNDI Protocols Switch - S8159507: RuntimeVisibleAnnotation validation - S8161218: Better bytecode loading - S8161743, CVE-2017-3252: Provide proper login context - S8162577: Standardize logging levels - S8162973: Better component components - S8164143, CVE-2017-3260: Improve components for menu items - S8164147, CVE-2017-3261: Improve streaming socket output - S8165071, CVE-2016-2183: Expand TLS support - S8165344, CVE-2017-3272: Update concurrency support - S8166988, CVE-2017-3253: Improve image processing performance - S8167104, CVE-2017-3289: Additional class construction refinements - S8167223, CVE-2016-5552: URL handling improvements - S8168705, CVE-2016-5547: Better ObjectIdentifier validation - S8168714, CVE-2016-5546: Tighten ECDSA validation - S8168728, CVE-2016-5548: DSA signing improvments - S8168724, CVE-2016-5549: ECDSA signing improvments - S6253144: Long narrowing conversion should describe the algorithm used and implied "risks" - S6328537: Improve javadocs for Socket class by adding references to SocketOptions - S6978886: javadoc shows stacktrace after print error resulting from disk full - S6995421: Eliminate the static dependency to sun.security.ec.ECKeyFactory - S6996372: synchronizing handshaking hash - S7027045: (doc) java/awt/Window.java has several typos in javadoc - S7054969: Null-check-in-finally pattern in java/security documentation - S7072353: JNDI libraries do not build with javac -Xlint:all -Werror - S7075563: Broken link in "javax.swing.SwingWorker" - S7077672: jdk8_tl nightly fail in step-2 build on 8/10/11 - S7088502: Security libraries don't build with javac -Werror - S7092447: Clarify the default locale used in each locale sensitive operation - S7093640: Enable client-side TLS 1.2 by default - S7103570: AtomicIntegerFieldUpdater does not work when SecurityManager is installed - S7117360: Warnings in java.util.concurrent.atomic package - S7117465: Warning cleanup for IMF classes - S7187144: JavaDoc for ScriptEngineFactory.getProgram() contains an error - S8000418: javadoc should used a standard "generated by javadoc" string - S8000666: javadoc should write directly to Writer instead of composing strings - S8000673: remove dead code from HtmlWriter and subtypes - S8000970: break out auxiliary classes that will prevent multi-core compilation of the JDK - S8001669: javadoc internal DocletAbortException should set cause when appropriate - S8008949: javadoc stopped copying doc-files - S8011402: Move blacklisting certificate logic from hard code to data - S8011547: Update XML Signature implementation to Apache Santuario 1.5.4 - S8012288: XML DSig API allows wrong tag names and extra elements in SignedInfo - S8016217: More javadoc warnings - S8017325: Cleanup of the javadoc tag in java.security.cert - S8017326: Cleanup of the javadoc tag in java.security.spec - S8019772: Fix doclint issues in javax.crypto and javax.security subpackages - S8020557: javadoc cleanup in javax.security - S8020688: Broken links in documentation at http://docs.oracle.com/javase/6/docs/api/index. - S8021108: Clean up doclint warnings and errors in java.text package - S8021417: Fix doclint issues in java.util.concurrent - S8021833: javadoc cleanup in java.net - S8022120: JCK test api/javax_xml/crypto/dsig/TransformService/index_ParamMethods fails - S8022175: Fix doclint warnings in javax.print - S8022406: Fix doclint issues in java.beans - S8022746: List of spelling errors in API doc - S8024779: [macosx] SwingNode crashes on exit - S8025085: [javadoc] some errors in javax/swing - S8025218: [javadoc] some errors in java/awt classes - S8025249: [javadoc] fix some javadoc errors in javax/swing/ - S8025409: Fix javadoc comments errors and warning reported by doclint report - S8026021: more fix of javadoc errors and warnings reported by doclint, see the description - S8037099: [macosx] Remove all references to GC from native OBJ-C code - S8038184: XMLSignature throws StringIndexOutOfBound[censored]ception if ID attribute value is empty String - S8038349: Signing XML with DSA throws Exception when key is larger than 1024 bits - S8049244: XML Signature performance issue caused by unbuffered signature data - S8049432: New tests for TLS property jdk.tls.client.protocols - S8050893: (smartcardio) Invert reset argument in tests in sun/security/smartcardio - S8059212: Modify regression tests so that they do not just fail if no cardreader found - S8068279: (typo in the spec) javax.script.ScriptEngineFactory.getLanguageName - S8068491: Update the protocol for references of docs.oracle.com to HTTPS. - S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java needs to be updated for JDK-8061210 - S8076369: Introduce the jdk.tls.client.protocols system property for JDK 7u - S8139565: Restrict certificates with DSA keys less than 1024 bits - S8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions - S8140587: Atomic*FieldUpdaters should use Class.isInstance instead of direct class check - S8143959: Certificates requiring blacklisting - S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks - S8148516: Improve the default strength of EC in JDK - S8149029: Secure validation of XML based digital signature always enabled when checking wrapping attacks - S8151893: Add security property to configure XML Signature secure validation mode - S8155760: Implement Serialization Filtering - S8156802: Better constraint checking - S8161228: URL objects with custom protocol handlers have port changed after deserializing - S8161571: Verifying ECDSA signatures permits trailing bytes - S8163304: jarsigner -verbose -verify should print the algorithms used to sign the jar - S8164908: ReflectionFactory support for IIOP and custom serialization - S8165230: RMIConnection addNotificationListeners failing with specific inputs - S8166393: disabledAlgorithms property should not be strictly parsed - S8166591: [macos 10.12] Trackpad scrolling of text on OS X 10.12 Sierra is very fast (Trackpad, Retina only) - S8166739: Improve extensibility of ObjectInputFilter information passed to the filter - S8166875: (tz) Support tzdata2016g - S8166878: Connection reset during TLS handshake - S8167356: Follow up fix for jdk8 backport of 8164143. Changes for CMenuComponent.m were missed - S8167459: Add debug output for indicating if a chosen ciphersuite was legacy - S8167472: Chrome interop regression with JDK-8148516 - S8167591: Add MD5 to signed JAR restrictions - S8168861: AnchorCertificates uses hardcoded password for cacerts keystore - S8168993: JDK8u121 L10n resource file update - S8169191: (tz) Support tzdata2016i - S8169688: Backout (remove) MD5 from jdk.jar.disabledAlgorithms for January CPU - S8169911: Enhanced tests for jarsigner -verbose -verify after JDK-8163304 - S8170131: Certificates not being blocked by jdk.tls.disabledAlgorithms property - S8170268: 8u121 L10n resource file update - msgdrop 20 - S8173622: Backport of 7180907 is incomplete - S8173849: Fix use of java.util.Base64 in test cases - S8173854: [TEST] Update DHEKeySizing test case following 8076328 & 8081760 - CVE-2017-3259 Vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. * Backports - S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef on __APPLE__and _LLP64 systems. - S8000351, PR3316, RH1390708: Tenuring threshold should be unsigned - S8153711, PR3315, RH1284948: [REDO] GlobalRefs never deleted when processing invokeMethod command - S8170888, PR3316, RH1390708: [linux] support for cgroup memory limits in container (ie Docker) environments * Bug fixes - PR3318: Replace 'infinality' with 'improved font rendering' (--enable-improved-font-rendering) - PR3318: Fix compatibility with vanilla Fontconfig - PR3318: Fix glyph y advance - PR3318: Always round glyph advance in 26.6 space - PR3318: Simplify glyph advance handling - PR3324: Fix NSS_LIBDIR substitution in make_generic_profile.sh broken by PR1989 * AArch64 port - S8165673, PR3320: AArch64: Fix JNI floating point argument handling Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-255=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-255=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-255=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-255=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-255=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-255=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-255=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): java-1_7_0-openjdk-1.7.0.131-39.1 java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-debugsource-1.7.0.131-39.1 java-1_7_0-openjdk-demo-1.7.0.131-39.1 java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-devel-1.7.0.131-39.1 java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-headless-1.7.0.131-39.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): java-1_7_0-openjdk-1.7.0.131-39.1 java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-debugsource-1.7.0.131-39.1 java-1_7_0-openjdk-demo-1.7.0.131-39.1 java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-devel-1.7.0.131-39.1 java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-headless-1.7.0.131-39.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): java-1_7_0-openjdk-1.7.0.131-39.1 java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-debugsource-1.7.0.131-39.1 java-1_7_0-openjdk-demo-1.7.0.131-39.1 java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-devel-1.7.0.131-39.1 java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-headless-1.7.0.131-39.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): java-1_7_0-openjdk-1.7.0.131-39.1 java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-debugsource-1.7.0.131-39.1 java-1_7_0-openjdk-demo-1.7.0.131-39.1 java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-devel-1.7.0.131-39.1 java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-headless-1.7.0.131-39.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): java-1_7_0-openjdk-1.7.0.131-39.1 java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-debugsource-1.7.0.131-39.1 java-1_7_0-openjdk-demo-1.7.0.131-39.1 java-1_7_0-openjdk-demo-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-devel-1.7.0.131-39.1 java-1_7_0-openjdk-devel-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-headless-1.7.0.131-39.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): java-1_7_0-openjdk-1.7.0.131-39.1 java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-debugsource-1.7.0.131-39.1 java-1_7_0-openjdk-headless-1.7.0.131-39.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): java-1_7_0-openjdk-1.7.0.131-39.1 java-1_7_0-openjdk-debuginfo-1.7.0.131-39.1 java-1_7_0-openjdk-debugsource-1.7.0.131-39.1 java-1_7_0-openjdk-headless-1.7.0.131-39.1 java-1_7_0-openjdk-headless-debuginfo-1.7.0.131-39.1 References: https://www.suse.com/security/cve/CVE-2016-2183.html https://www.suse.com/security/cve/CVE-2016-5546.html https://www.suse.com/security/cve/CVE-2016-5547.html https://www.suse.com/security/cve/CVE-2016-5548.html https://www.suse.com/security/cve/CVE-2016-5549.html https://www.suse.com/security/cve/CVE-2016-5552.html https://www.suse.com/security/cve/CVE-2017-3231.html https://www.suse.com/security/cve/CVE-2017-3241.html https://www.suse.com/security/cve/CVE-2017-3252.html https://www.suse.com/security/cve/CVE-2017-3253.html https://www.suse.com/security/cve/CVE-2017-3259.html https://www.suse.com/security/cve/CVE-2017-3260.html https://www.suse.com/security/cve/CVE-2017-3261.html https://www.suse.com/security/cve/CVE-2017-3272.html https://www.suse.com/security/cve/CVE-2017-3289.html https://bugzilla.suse.com/1020905 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  10. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Logitech G533 Wireless Headset ( -at -) LanOC Reviews <https://lanoc.org/review/audio/7447-logitech-g533-wireless-headset> *DESCRIPTION:* As someone who prefers good audio quality but also can’t stand being attached to my desk with a wire, I have been on the hunt for the perfect wireless headset for a long time now. I’ve run into a few that I liked and even used for a while but they all seem to have their flaws that become obvious over time. The Logitech G930 for example. I tested it back in 2013 <https://lanoc.org/review/audio/6774-logitech-g930-wireless-headset> and it performed really well, but I ran into issues trying to use it at LAN events and later it even gave me issues in my office when running other wireless devices. Well, I’m back at it again, this time with Logitech’s G533. In a lot of ways, it is similar to the old G930 and Logitech was happy to tell me about the improvements in wireless performance and even improvements in gaming audio performance, but let’s take a closer look and see what it has going on. *ARTICLE URL:* https://lanoc.org/review/audio/7447-logitech-g533-wireless-headset *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/logitech_g533_wireless_headset/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/logitech_g533_wireless_headset/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  11. TITLE: AORUS GTX 1080 XTREME Edition Review ( -at -) Vortez CONTENT: In the spotlight today is the AORUS GTX 1080 XTREME. The eagle eyed among you will see a key resemblance to the GIGABYTE's mighty GTX 1080 Xtreme Gaming - both cards are indeed very similar, though there are subtle differences which are mainly seen with the cooling configuration and of course the minor adjustments to the styling. LINK: https://www.vortez.net/review.php?id=1266 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
  12. <http://www.eteknix.com> Creative Sound BlasterX Pro-Gaming Katana Desktop Soundbar Review Desktop audio is something worth caring about, from being able to hear the footsteps of your enemies in multiplayer shooters, to simply rocking out to your favourite songs while working, pretty much everyone has a need for good quality sound at their desktop. Creative have long been one of the biggest names in desktop audio, with many years of experience of creating fantastic speaker setups for everything from day-to-day office use, to movie fans, to gaming. Now they're back again with one of their proudest creations, the Sound BlasterX Katana, a multi-channel gaming soundbar and subwoofer that's set to give you the enthusiast grade audio processing, drivers and bone-shaking power you desire. URL - http://www.eteknix.com/creative-sound-blasterx-pro-gaming-katana-desktop-soundbar-review/ --
  13. ------------------------------------------------------------ http://us7.campaign-archive2.com/?u=406e963590798a4aa1eab5f99&id=11310aad3e&e=168437af67 Dear News Affiliates, Custom PC Review recently published article(s) your readers may enjoy. We’d appreciate it if you could share it with them. Title: Review: Ubiquiti UniFi AP AC PRO Wi-Fi Access Point (UAP‑AC‑PRO) (http://custompcreview.us7.list-manage1.com/track/click?u=406e963590798a4aa1eab5f99&id=447d8c41a3&e=168437af67) Excerpt: "One of the rising stars in the enterprise networking world is Ubiquiti Networks, a company which has become very well known for producing competitive enterprise grade networking equipment for less than half the cost when compared to similar products from more well known brands..." Thank you for your support, -- Sam Chen -- Editor-in-Chief -- Custom PC Review -- http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=5f9b20264a&e=168437af67 (http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=ac2b0cc21f&e=168437af67)
  14. Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,By now we all know about delidding in this review we test a tool that makes the process easy. Not as easy as the Pentium II but pretty darn close.Subject: Rockit Cool Rockit 88 Processor Delidding Tool ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/articles/modding/rockitcool_delid-88Quote: In this review I’ll be looking at a tool designed to safely delid your LGA 115x processors (excluding 2000 seires Sandy Bridge) called the Rockit 88 from Rockit Cool. This was a project that got kickstarted last year and has since become one of the premier products used for delidding processors.A news posting would be appreciated.ThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved
  15. A news post would be great. OCC has published a review on the Anonabox FAWKES Tor Router Here is a quote from the review: Quote: â€ÂAs we saw with the Pro, the TOR performance is meager, but this is the design of TOR. TOR hops around the world to "wrap" your data in, hence the name The Onion Router. Because your hops and exit nodes are spread all over the world, your traffic is bouncing around all over the place and this will cause latency. TOR is not designed to stream media over or torrent your favorite files; in fact TOR recommends not using it for torrent downloading, which can be illegal anyway and we do not condone that. What TOR is good for is sending your private emails, downloading confidential documents, etc., that you do not want public eyes viewing. Take, for instance, if you want to check your bank account and send some emails at Starbucks while sipping a latte, then the Anonabox FAWKES with TOR will allow you to do so without having to worry about me in the corner with a packet sniffer and decrypting your logins.†Title: Anonabox FAWKES Tor Router Review Link: http://www.overclockersclub.com/reviews/anonabox_fawkes_tor/ Img: http://www.overclockersclub.com/siteimages/articles/anonabox_fawkes_tor/8_thumb.jpg
  16. openSUSE Security Update: Security update for mariadb ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0486-1 Rating: important References: #1008253 #1020868 #1020873 #1020875 #1020877 #1020878 #1020882 #1020884 #1020885 #1020891 #1020894 #1020896 #1022428 Cross-References: CVE-2016-6664 CVE-2017-3238 CVE-2017-3243 CVE-2017-3244 CVE-2017-3257 CVE-2017-3258 CVE-2017-3265 CVE-2017-3291 CVE-2017-3312 CVE-2017-3317 CVE-2017-3318 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves 11 vulnerabilities and has two fixes is now available. Description: This mariadb version update to 10.0.29 fixes the following issues: - CVE-2017-3318: unspecified vulnerability affecting Error Handling (bsc#1020896) - CVE-2017-3317: unspecified vulnerability affecting Logging (bsc#1020894) - CVE-2017-3312: insecure error log file handling in mysqld_safe, incomplete CVE-2016-6664 (bsc#1020873) - CVE-2017-3291: unrestricted mysqld_safe's ledir (bsc#1020884) - CVE-2017-3265: unsafe chmod/chown use in init script (bsc#1020885) - CVE-2017-3258: unspecified vulnerability in the DDL component (bsc#1020875) - CVE-2017-3257: unspecified vulnerability affecting InnoDB (bsc#1020878) - CVE-2017-3244: unspecified vulnerability affecing the DML component (bsc#1020877) - CVE-2017-3243: unspecified vulnerability affecting the Charsets component (bsc#1020891) - CVE-2017-3238: unspecified vulnerability affecting the Optimizer component (bsc#1020882) - CVE-2016-6664: Root Privilege Escalation (bsc#1008253) - Applications using the client library for MySQL (libmysqlclient.so) had a use-after-free issue that could cause the applications to crash (bsc#1022428) - notable changes: * XtraDB updated to 5.6.34-79.1 * TokuDB updated to 5.6.34-79.1 * Innodb updated to 5.6.35 * Performance Schema updated to 5.6.35 Release notes and changelog: * https://kb.askmonty.org/en/mariadb-10029-release-notes * https://kb.askmonty.org/en/mariadb-10029-changelog This update was imported from the SUSE:SLE-12-SP1:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-257=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-257=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): libmysqlclient-devel-10.0.29-18.1 libmysqlclient18-10.0.29-18.1 libmysqlclient18-debuginfo-10.0.29-18.1 libmysqlclient_r18-10.0.29-18.1 libmysqld-devel-10.0.29-18.1 libmysqld18-10.0.29-18.1 libmysqld18-debuginfo-10.0.29-18.1 mariadb-10.0.29-18.1 mariadb-bench-10.0.29-18.1 mariadb-bench-debuginfo-10.0.29-18.1 mariadb-client-10.0.29-18.1 mariadb-client-debuginfo-10.0.29-18.1 mariadb-debuginfo-10.0.29-18.1 mariadb-debugsource-10.0.29-18.1 mariadb-errormessages-10.0.29-18.1 mariadb-test-10.0.29-18.1 mariadb-test-debuginfo-10.0.29-18.1 mariadb-tools-10.0.29-18.1 mariadb-tools-debuginfo-10.0.29-18.1 - openSUSE Leap 42.2 (x86_64): libmysqlclient18-32bit-10.0.29-18.1 libmysqlclient18-debuginfo-32bit-10.0.29-18.1 libmysqlclient_r18-32bit-10.0.29-18.1 - openSUSE Leap 42.1 (i586 x86_64): libmysqlclient-devel-10.0.29-18.1 libmysqlclient18-10.0.29-18.1 libmysqlclient18-debuginfo-10.0.29-18.1 libmysqlclient_r18-10.0.29-18.1 libmysqld-devel-10.0.29-18.1 libmysqld18-10.0.29-18.1 libmysqld18-debuginfo-10.0.29-18.1 mariadb-10.0.29-18.1 mariadb-bench-10.0.29-18.1 mariadb-bench-debuginfo-10.0.29-18.1 mariadb-client-10.0.29-18.1 mariadb-client-debuginfo-10.0.29-18.1 mariadb-debuginfo-10.0.29-18.1 mariadb-debugsource-10.0.29-18.1 mariadb-errormessages-10.0.29-18.1 mariadb-test-10.0.29-18.1 mariadb-test-debuginfo-10.0.29-18.1 mariadb-tools-10.0.29-18.1 mariadb-tools-debuginfo-10.0.29-18.1 - openSUSE Leap 42.1 (x86_64): libmysqlclient18-32bit-10.0.29-18.1 libmysqlclient18-debuginfo-32bit-10.0.29-18.1 libmysqlclient_r18-32bit-10.0.29-18.1 References: https://www.suse.com/security/cve/CVE-2016-6664.html https://www.suse.com/security/cve/CVE-2017-3238.html https://www.suse.com/security/cve/CVE-2017-3243.html https://www.suse.com/security/cve/CVE-2017-3244.html https://www.suse.com/security/cve/CVE-2017-3257.html https://www.suse.com/security/cve/CVE-2017-3258.html https://www.suse.com/security/cve/CVE-2017-3265.html https://www.suse.com/security/cve/CVE-2017-3291.html https://www.suse.com/security/cve/CVE-2017-3312.html https://www.suse.com/security/cve/CVE-2017-3317.html https://www.suse.com/security/cve/CVE-2017-3318.html https://bugzilla.suse.com/1008253 https://bugzilla.suse.com/1020868 https://bugzilla.suse.com/1020873 https://bugzilla.suse.com/1020875 https://bugzilla.suse.com/1020877 https://bugzilla.suse.com/1020878 https://bugzilla.suse.com/1020882 https://bugzilla.suse.com/1020884 https://bugzilla.suse.com/1020885 https://bugzilla.suse.com/1020891 https://bugzilla.suse.com/1020894 https://bugzilla.suse.com/1020896 https://bugzilla.suse.com/1022428 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  17. At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Windows 10 vs. Ubuntu Linux OpenGL Benchmarks With A Core i7 7700K ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=24154 Summary: "This week I've published Windows 10 vs. Linux NVIDIA gaming benchmarks and a Radeon Software Windows 10 vs. RadeonSI/RADV Linux comparison with a variety of interesting games. For this third article on the topic of Windows 10 vs. Linux performance are a few Intel HD Graphics 630 benchmark results." Please feel free to contact us with any questions or comments you may
  18. The Ubuntu team is pleased to announce the release of Ubuntu 16.04.2 LTS (Long-Term Support) for its Desktop, Server, and Cloud products, as well as other flavours of Ubuntu with long-term support. Like previous LTS series', 16.04.2 includes hardware enablement stacks for use on newer hardware. This support is offered on all architectures except for 32-bit powerpc, and is installed by default when using one of the desktop images. Ubuntu Server defaults to installing the GA kernel, however you may select the HWE kernel from the installer bootloader. As usual, this point release includes many updates, and updated installation media has been provided so that fewer updates will need to be downloaded after installation. These include security updates and corrections for other high-impact bugs, with a focus on maintaining stability and compatibility with Ubuntu 16.04 LTS. Kubuntu 16.04.2 LTS, Xubuntu 16.04.2 LTS, Mythbuntu 16.04.2 LTS, Ubuntu GNOME 16.04.2 LTS, Lubuntu 16.04.2 LTS, Ubuntu Kylin 16.04.2 LTS, Ubuntu MATE 16.04.2 LTS and Ubuntu Studio 16.04.2 LTS are also now available. More details can be found in their individual release notes: https://wiki.ubuntu.com/XenialXerus/ReleaseNotes#Official_flavours Maintenance updates will be provided for 5 years for Ubuntu Desktop, Ubuntu Server, Ubuntu Cloud, Ubuntu Base, and Ubuntu Kylin. All the remaining flavours will be supported for 3 years. To get Ubuntu 16.04.2 --------------------- In order to download Ubuntu 16.04.2, visit: http://www.ubuntu.com/download Users of Ubuntu 14.04 will be offered an automatic upgrade to 16.04.2 via Update Manager. For further information about upgrading, see: https://help.ubuntu.com/community/XenialUpgrades As always, upgrades to the latest version of Ubuntu are entirely free of charge. We recommend that all users read the 16.04.1 release notes, which document caveats and workarounds for known issues, as well as more in-depth notes on the release itself. They are available at: https://wiki.ubuntu.com/XenialXerus/ReleaseNotes If you have a question, or if you think you may have found a bug but aren't sure, you can try asking in any of the following places: #ubuntu on irc.freenode.net http://lists.ubuntu.com/mailman/listinfo/ubuntu-users http://www.ubuntuorg http://askubuntu.com Help Shape Ubuntu ----------------- If you would like to help shape Ubuntu, take a look at the list of ways you can participate at: http://www.ubuntu.com/community/get-involved About Ubuntu ------------ Ubuntu is a full-featured Linux distribution for desktops, laptops, clouds and servers, with a fast and easy installation and regular releases. A tightly-integrated selection of excellent applications is included, and an incredible variety of add-on software is just a few clicks away. Professional services including support are available from Canonical and hundreds of other companies around the world. For more information about support, visit: http://www.ubuntu.com/support More Information ---------------- You can learn more about Ubuntu and about this release on our website listed below: http://www.ubuntu.com/ To sign up for future Ubuntu announcements, please subscribe to Ubuntu's very low volume announcement list at: http://lists.ubuntu.com/mailman/listinfo/ubuntu-announce On behalf of the Ubuntu Release Team, ... Adam Conrad --
  19. openSUSE Security Update: Security update for mysql-community-server ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0479-1 Rating: important References: #1020872 #1020873 #1020875 #1020876 #1020877 #1020878 #1020882 #1020884 #1020885 #1020890 #1020893 #1020894 #1020896 Cross-References: CVE-2016-8318 CVE-2016-8327 CVE-2017-3238 CVE-2017-3244 CVE-2017-3257 CVE-2017-3258 CVE-2017-3265 CVE-2017-3273 CVE-2017-3291 CVE-2017-3312 CVE-2017-3313 CVE-2017-3317 CVE-2017-3318 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: mysql-community-server was updated to version 5.6.35 to fix bugs and security issues: * Changes http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-35.html * Fixed CVEs: CVE-2016-8318 [boo#1020872], CVE-2017-3312 [boo#1020873], CVE-2017-3258 [boo#1020875], CVE-2017-3273 [boo#1020876], CVE-2017-3244 [boo#1020877], CVE-2017-3257 [boo#1020878], CVE-2017-3238 [boo#1020882], CVE-2017-3291 [boo#1020884], CVE-2017-3265 [boo#1020885], CVE-2017-3313 [boo#1020890], CVE-2016-8327 [boo#1020893], CVE-2017-3317 [boo#1020894], CVE-2017-3318 [boo#1020896] Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-258=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): libmysql56client18-5.6.35-22.1 libmysql56client18-debuginfo-5.6.35-22.1 libmysql56client_r18-5.6.35-22.1 mysql-community-server-5.6.35-22.1 mysql-community-server-bench-5.6.35-22.1 mysql-community-server-bench-debuginfo-5.6.35-22.1 mysql-community-server-client-5.6.35-22.1 mysql-community-server-client-debuginfo-5.6.35-22.1 mysql-community-server-debuginfo-5.6.35-22.1 mysql-community-server-debugsource-5.6.35-22.1 mysql-community-server-errormessages-5.6.35-22.1 mysql-community-server-test-5.6.35-22.1 mysql-community-server-test-debuginfo-5.6.35-22.1 mysql-community-server-tools-5.6.35-22.1 mysql-community-server-tools-debuginfo-5.6.35-22.1 - openSUSE Leap 42.1 (x86_64): libmysql56client18-32bit-5.6.35-22.1 libmysql56client18-debuginfo-32bit-5.6.35-22.1 libmysql56client_r18-32bit-5.6.35-22.1 References: https://www.suse.com/security/cve/CVE-2016-8318.html https://www.suse.com/security/cve/CVE-2016-8327.html https://www.suse.com/security/cve/CVE-2017-3238.html https://www.suse.com/security/cve/CVE-2017-3244.html https://www.suse.com/security/cve/CVE-2017-3257.html https://www.suse.com/security/cve/CVE-2017-3258.html https://www.suse.com/security/cve/CVE-2017-3265.html https://www.suse.com/security/cve/CVE-2017-3273.html https://www.suse.com/security/cve/CVE-2017-3291.html https://www.suse.com/security/cve/CVE-2017-3312.html https://www.suse.com/security/cve/CVE-2017-3313.html https://www.suse.com/security/cve/CVE-2017-3317.html https://www.suse.com/security/cve/CVE-2017-3318.html https://bugzilla.suse.com/1020872 https://bugzilla.suse.com/1020873 https://bugzilla.suse.com/1020875 https://bugzilla.suse.com/1020876 https://bugzilla.suse.com/1020877 https://bugzilla.suse.com/1020878 https://bugzilla.suse.com/1020882 https://bugzilla.suse.com/1020884 https://bugzilla.suse.com/1020885 https://bugzilla.suse.com/1020890 https://bugzilla.suse.com/1020893 https://bugzilla.suse.com/1020894 https://bugzilla.suse.com/1020896 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  20. Hello all, On behalf of the Fedora Atomic WG[0] and Fedora Release Engineering[1], I am pleased to announce the first ever Fedora Layered Image Release. Each Container Image is released with the following streams which aim to provide lifecycle management choices to our users: Name Name-Version Name-Version-Release Each of the Name and Name-Version tags will be updated in place with their respective updates for as long as the maintainer supports them and the Name-Version-Release will always be a frozen in time reference to that particular release of the Container Image. At this time the following Container Images are available in the Fedora Registry. registry.fedoraproject.org/f25/cockpit:130-1.f25docker registry.fedoraproject.org/f25/cockpit:130 registry.fedoraproject.org/f25/cockpit registry.fedoraproject.org/f25/kubernetes-node:0.1-2.f25docker registry.fedoraproject.org/f25/kubernetes-node:0.1 registry.fedoraproject.org/f25/kubernetes-node registry.fedoraproject.org/f25/toolchain:1-1.f25docker registry.fedoraproject.org/f25/toolchain:1 registry.fedoraproject.org/f25/toolchain registry.fedoraproject.org/f25/kubernetes-master:0.1-3.f25docker registry.fedoraproject.org/f25/kubernetes-master:0.1 registry.fedoraproject.org/f25/kubernetes-master From now on we will be doing regularly scheduled releases of Fedora Layered Image content that will match the Fedora Atomic Two Week Release schedule. We are currently working on a way to provide browse and search functionality for Fedora Container Images so please stay tuned for that. For those interested, the source of this content is provided in DistGit which can easily be searched via the container-specific pkgdb namespace[2]. As always, we welcome feedback and would encourage anyone interested to come join the Fedora Atomic WG[0] as we continue to iterate on integrating the Project Atomic[3] family of technologies into Fedora. Anyone interested in contributing Container Images, please feel free to join in and submit one for Review[4][5]. Thank you, -AdamM [0] - https://pagure.io/atomic-wg [1] - https://docs.pagure.org/releng/ [2] - https://admin.fedoraproject.org/pkgdb/packages/docker/%2A/ [3] - http://www.projectatomic.io/ [4] - https://fedoraproject.org/wiki/Container:Review_Process [5] - https://fedoraproject.org/wiki/Container:Guidelines _______________________________________________
  21. Hi News Poster HardwareOverclock.com has just posted another review. Last week we have tested the Cryorig A80 AIO water cooler. Built on the bases of Asetek's Gen. 5 Pump and Cold Plate design, CRYORIG's A Series HCL units have a completely redesigned and improved pump system. Actually they have 3 kind of AIO solutions, we have tested the biggest one, the A80. Title: Cryorig A80 AIO water cooler ( -at -) HardwareOverclock.com Link: http://hardwareoverclock.com/Cryorig-A80-AIO-Wasserkuehlung.htm Image: http://hardwareoverclock.com/Wasserkuehlung/Cryorig-A80-AIO-280mm-038.jpg Thanks for posting our news. Pls feel free and send us your News too. Rene Ruf Chefredakteur HardwareOverclock.com <mailto:admin ( -at -) hardwareoverclock.com> mailto:admin ( -at -) hardwareoverclock.com hardwareoverclock.com
  22. View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=f0b05d9a9e&e=0c004f9c13) A couple of weeks back, NVIDIA unveiled a family of new professional Quadro cards, based on the company’s Pascal GPU architecture. The latest additions to the Quadro line-up run the gamut in terms of features and capabilities, from the low-power, small form factor Quadro P400 to the gargantuan, ultra-powerful Quadro GP100. Smack dab in the middle of the line-up are a pair of mid-range offerings, the Quadro P4000 and Quadro P2000, which we’ll be featuring here... NVIDIA Quadro P4000 And P2000 Workstation GPU Reviews: Midrange Professional Pascal (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=67fe6f8bec&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=1b8e1b382b&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=b144bd6d94&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=2212f716b4&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=cc005aefcd&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=43ea71fc29&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=4241e2b86d&e=0c004f9c13 ============================================================
  23. A simple application to access, organize and share your photos on GNOME. It is meant to be a simple and elegant replacement for using a file manager to deal with photos. Seamless cloud integration is offered through GNOME Online Accounts. Overview of changes in 3.23.90 ============================== * Bugs fixed: 690255 Try to avoid low resolution thumbnails 763712 Use G_DECLARE_FINAL_TYPE 777053 tests: Wait for the UI to be drawn completely 777492 Notify when an online account needs attention 778620 Appdata uses screenshots of older version * Updated translations: Catalan Czech Danish Finnish Friulian German Indonesian Kazakh Polish Slovak Swedish Ukrainian Bugs: https://bugzilla.gnome.org/enter_bug.cgi?product=gnome-photos Design: https://wiki.gnome.org/Design/Apps/Photos Download: http://download.gnome.org/sources/gnome-photos/3.23/ Git: http://git.gnome.org/browse/gnome-photos Website: https://wiki.gnome.org/Apps/Photos Happy hacking, Debarshi _______________________________________________
  24. A simple application to access, organize and share your photos on GNOME. It is meant to be a simple and elegant replacement for using a file manager to deal with photos. Seamless cloud integration is offered through GNOME Online Accounts. Overview of changes in 3.22.4 ============================== * Bugs fixed: 776565 Crashed right after creating a new album 776670 application: Add F1 accelerator to show help 777053 tests: Wait for the UI to be drawn completely * Updated translations: Icelandic Bugs: https://bugzilla.gnome.org/enter_bug.cgi?product=gnome-photos Design: https://wiki.gnome.org/Design/Apps/Photos Download: http://download.gnome.org/sources/gnome-photos/3.22/ Git: http://git.gnome.org/browse/gnome-photos Website: https://wiki.gnome.org/Apps/Photos Happy hacking, Debarshi _______________________________________________
  25. Intel Core i3-7350K Kaby Lake Processor Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/intel-core-i3-7350k-kaby-lake-processor-review/ Image URL: http://www.thinkcomputers.org/reviews/intel_i3_7350k/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/intel_i3_7350k/small.jpg Quote: "When Intel released their 7th Generation Core “Kaby Lake†processors there was a rather interesting processor in the bunch, it was the Core i3-7350K. This was the first time Intel released a Core i3 series processor that featured HyperThreading technology as well as being a fully unlocked K-SKU. If you remember back in 2014 Intel released the Pentium G3258 Anniversary Edition, which was fully unlocked, but did not feature HyperThreading. With the Core i3-7350K you get a dual-core, 4-thread processor running at 4.20 GHz, with a TDP of only 60W. You get all of this for a modest $168. Could this be the entry level enthusiast part people have been looking for? Read on as we find out!"
×