news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
** TECHSPOT ------------------------------------------------------------ ** Alienware 15 R3 Review ------------------------------------------------------------ ** http://www.techspot.com/review/1289-alienware-15-r3/ ------------------------------------------------------------ Up for review today is the latest Alienware 15. Fully configurable with a wide range of hardware, with prices ranging from $1,350 for the base model to $2,700 for the top-spec system, expect GeForce 10 graphics and Alienware level of design and polish. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ---- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mozilla-firefox (SSA:2016-348-01) New mozilla-firefox packages are available for Slackware 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/mozilla-firefox-45.6.0esr-i586-1_slack14.2.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/mozilla-firefox-45.6.0esr-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/mozilla-firefox-45.6.0esr-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mozilla-firefox-45.6.0esr-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mozilla-firefox-45.6.0esr-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-50.1.0-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-50.1.0-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.1 package: 880b7278bed2ab1af3d9f9cf6ee7d6bd mozilla-firefox-45.6.0esr-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 583f320c256d17608cebcc6c9cb7a93e mozilla-firefox-45.6.0esr-x86_64-1_slack14.1.txz Slackware 14.2 package: 223e07e18ca74c0b533e42ba6b9ca549 mozilla-firefox-45.6.0esr-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 2f7c9af1aa63ff8fdb2c9fa952f0c872 mozilla-firefox-45.6.0esr-x86_64-1_slack14.2.txz Slackware -current package: 49b372a1d19008c2287e657ace60fe22 xap/mozilla-firefox-50.1.0-i586-1.txz Slackware x86_64 -current package: 3e78b5b3427118a72448a2b5a0d78d69 xap/mozilla-firefox-50.1.0-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg mozilla-firefox-45.6.0esr-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
[security-announce] openSUSE-SU-2016:3129-1: important: Security update for tomcat
news posted a topic in Upcoming News
openSUSE Security Update: Security update for tomcat ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:3129-1 Rating: important References: #1002639 #1004728 #1007853 #1007854 #1007855 #1007857 #1007858 #1010893 #1011805 #1011812 #974407 Cross-References: CVE-2016-0762 CVE-2016-5018 CVE-2016-6794 CVE-2016-6796 CVE-2016-6797 CVE-2016-6816 CVE-2016-8735 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves 7 vulnerabilities and has four fixes is now available. Description: This update for Tomcat provides the following fixes: Feature changes: The embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029) Security fixes: - CVE-2016-0762: Realm Timing Attack (bsc#1007854) - CVE-2016-5018: Security Manager Bypass (bsc#1007855) - CVE-2016-6794: System Property Disclosure (bsc#1007857) - CVE-2016-6796: Manager Bypass (bsc#1007858) - CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853) - CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805) - CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812) Bugs fixed: - Fixed StringIndexOutOfBound[censored]ception in WebAppClassLoaderBase.filter(). (bsc#974407) - Fixed a deployment error in the examples webapp by changing the context.xml format to the new one introduced by Tomcat 8. (bsc#1004728) - Enabled optional setenv.sh script. See section '(3.4) Using the "setenv" script' in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639) - Fixed regression caused by CVE-2016-6816. This update supplies the new packages apache-commons-pool2 and apache-commons-dbcp in version 2 to allow tomcat to use the DBCP 2.0 interface. This update was imported from the SUSE:SLE-12-SP1:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1455=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (noarch): apache-commons-dbcp-2.1.1-2.1 apache-commons-dbcp-javadoc-2.1.1-2.1 apache-commons-pool2-2.4.2-2.1 apache-commons-pool2-javadoc-2.4.2-2.1 tomcat-8.0.32-11.1 tomcat-admin-webapps-8.0.32-11.1 tomcat-docs-webapp-8.0.32-11.1 tomcat-el-3_0-api-8.0.32-11.1 tomcat-embed-8.0.32-11.1 tomcat-javadoc-8.0.32-11.1 tomcat-jsp-2_3-api-8.0.32-11.1 tomcat-jsvc-8.0.32-11.1 tomcat-lib-8.0.32-11.1 tomcat-servlet-3_1-api-8.0.32-11.1 tomcat-webapps-8.0.32-11.1 References: https://www.suse.com/security/cve/CVE-2016-0762.html https://www.suse.com/security/cve/CVE-2016-5018.html https://www.suse.com/security/cve/CVE-2016-6794.html https://www.suse.com/security/cve/CVE-2016-6796.html https://www.suse.com/security/cve/CVE-2016-6797.html https://www.suse.com/security/cve/CVE-2016-6816.html https://www.suse.com/security/cve/CVE-2016-8735.html https://bugzilla.suse.com/1002639 https://bugzilla.suse.com/1004728 https://bugzilla.suse.com/1007853 https://bugzilla.suse.com/1007854 https://bugzilla.suse.com/1007855 https://bugzilla.suse.com/1007857 https://bugzilla.suse.com/1007858 https://bugzilla.suse.com/1010893 https://bugzilla.suse.com/1011805 https://bugzilla.suse.com/1011812 https://bugzilla.suse.com/974407 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
[security-announce] openSUSE-SU-2016:3134-1: important: Security update for xen
news posted a topic in Upcoming News
openSUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:3134-1 Rating: important References: #1000106 #1003030 #1003032 #1004981 #1005004 #1005005 #1007157 #1007941 #1009100 #1009103 #1009104 #1009105 #1009107 #1009108 #1009109 #1009111 #1011652 Cross-References: CVE-2016-7777 CVE-2016-7908 CVE-2016-7909 CVE-2016-8667 CVE-2016-8669 CVE-2016-8910 CVE-2016-9377 CVE-2016-9378 CVE-2016-9379 CVE-2016-9380 CVE-2016-9381 CVE-2016-9382 CVE-2016-9383 CVE-2016-9384 CVE-2016-9385 CVE-2016-9386 CVE-2016-9637 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes 17 vulnerabilities is now available. Description: xen was updated to version 4.7.1 to fix 17 security issues. These security issues were fixed: - CVE-2016-9637: ioport array overflow allowing a malicious guest administrator can escalate their privilege to that of the host (bsc#1011652). - CVE-2016-9386: x86 null segments were not always treated as unusable allowing an unprivileged guest user program to elevate its privilege to that of the guest operating system. Exploit of this vulnerability is easy on Intel and more complicated on AMD (bsc#1009100). - CVE-2016-9382: x86 task switch to VM86 mode was mis-handled, allowing a unprivileged guest process to escalate its privilege to that of the guest operating system on AMD hardware. On Intel hardware a malicious unprivileged guest process can crash the guest (bsc#1009103). - CVE-2016-9385: x86 segment base write emulation lacked canonical address checks, allowing a malicious guest administrator to crash the host (bsc#1009104). - CVE-2016-9384: Guest 32-bit ELF symbol table load leaking host data to unprivileged guest users (bsc#1009105). - CVE-2016-9383: The x86 64-bit bit test instruction emulation was broken, allowing a guest to modify arbitrary memory leading to arbitray code execution (bsc#1009107). - CVE-2016-9377: x86 software interrupt injection was mis-handled, allowing an unprivileged guest user to crash the guest (bsc#1009108). - CVE-2016-9378: x86 software interrupt injection was mis-handled, allowing an unprivileged guest user to crash the guest (bsc#1009108) - CVE-2016-9381: Improper processing of shared rings allowing guest administrators take over the qemu process, elevating their privilege to that of the qemu process (bsc#1009109). - CVE-2016-9379: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111). - CVE-2016-9380: Delimiter injection vulnerabilities in pygrub allowed guest administrators to obtain the contents of sensitive host files or delete the files (bsc#1009111). - CVE-2016-7777: Xen did not properly honor CR0.TS and CR0.EM, which allowed local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it (bsc#1000106). - CVE-2016-8910: The rtl8139_cplus_transmit function in hw/net/rtl8139.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count (bsc#1007157). - CVE-2016-8667: The rc4030_write function in hw/dma/rc4030.c in allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value (bsc#1005004). - CVE-2016-8669: The serial_update_parameters function in hw/char/serial.c allowed local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base (bsc#1005005). - CVE-2016-7908: The mcf_fec_do_tx function in hw/net/mcf_fec.c did not properly limit the buffer descriptor count when transmitting packets, which allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags (bsc#1003030). - CVE-2016-7909: The pcnet_rdra_addr function in hw/net/pcnet.c allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0 (bsc#1003032). These non-security issues were fixed: - bsc#1004981: Xen RPM didn't contain debug hypervisor for EFI systems - bsc#1007941: Xen tools limited the number of vcpus to 256 This update was imported from the SUSE:SLE-12-SP2:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2016-1477=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): xen-debugsource-4.7.1_02-3.1 xen-devel-4.7.1_02-3.1 xen-libs-4.7.1_02-3.1 xen-libs-debuginfo-4.7.1_02-3.1 xen-tools-domU-4.7.1_02-3.1 xen-tools-domU-debuginfo-4.7.1_02-3.1 - openSUSE Leap 42.2 (x86_64): xen-4.7.1_02-3.1 xen-doc-html-4.7.1_02-3.1 xen-libs-32bit-4.7.1_02-3.1 xen-libs-debuginfo-32bit-4.7.1_02-3.1 xen-tools-4.7.1_02-3.1 xen-tools-debuginfo-4.7.1_02-3.1 References: https://www.suse.com/security/cve/CVE-2016-7777.html https://www.suse.com/security/cve/CVE-2016-7908.html https://www.suse.com/security/cve/CVE-2016-7909.html https://www.suse.com/security/cve/CVE-2016-8667.html https://www.suse.com/security/cve/CVE-2016-8669.html https://www.suse.com/security/cve/CVE-2016-8910.html https://www.suse.com/security/cve/CVE-2016-9377.html https://www.suse.com/security/cve/CVE-2016-9378.html https://www.suse.com/security/cve/CVE-2016-9379.html https://www.suse.com/security/cve/CVE-2016-9380.html https://www.suse.com/security/cve/CVE-2016-9381.html https://www.suse.com/security/cve/CVE-2016-9382.html https://www.suse.com/security/cve/CVE-2016-9383.html https://www.suse.com/security/cve/CVE-2016-9384.html https://www.suse.com/security/cve/CVE-2016-9385.html https://www.suse.com/security/cve/CVE-2016-9386.html https://www.suse.com/security/cve/CVE-2016-9637.html https://bugzilla.suse.com/1000106 https://bugzilla.suse.com/1003030 https://bugzilla.suse.com/1003032 https://bugzilla.suse.com/1004981 https://bugzilla.suse.com/1005004 https://bugzilla.suse.com/1005005 https://bugzilla.suse.com/1007157 https://bugzilla.suse.com/1007941 https://bugzilla.suse.com/1009100 https://bugzilla.suse.com/1009103 https://bugzilla.suse.com/1009104 https://bugzilla.suse.com/1009105 https://bugzilla.suse.com/1009107 https://bugzilla.suse.com/1009108 https://bugzilla.suse.com/1009109 https://bugzilla.suse.com/1009111 https://bugzilla.suse.com/1011652 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
[security-announce] openSUSE-SU-2016:3144-1: important: Security update for tomcat
news posted a topic in Upcoming News
openSUSE Security Update: Security update for tomcat ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:3144-1 Rating: important References: #1002639 #1007853 #1007854 #1007855 #1007857 #1007858 #1010893 #1011805 #1011812 Cross-References: CVE-2016-0762 CVE-2016-5018 CVE-2016-6794 CVE-2016-6796 CVE-2016-6797 CVE-2016-6816 CVE-2016-8735 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that solves 7 vulnerabilities and has two fixes is now available. Description: This update for tomcat fixes the following issues: Feature changes: The embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029) Security fixes: - CVE-2016-0762: Realm Timing Attack (bsc#1007854) - CVE-2016-5018: Security Manager Bypass (bsc#1007855) - CVE-2016-6794: System Property Disclosure (bsc#1007857) - CVE-2016-6796: Security Manager Bypass (bsc#1007858) - CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853) - CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805) - CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812) Bug fixes: - Enabled optional setenv.sh script. See section '(3.4) Using the "setenv" script' in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639) This update supplies the new packages apache-commons-pool2 and apache-commons-dbcp in version 2 to allow tomcat to use the DBCP 2.0 interface. This update was imported from the SUSE:SLE-12-SP2:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2016-1456=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (noarch): apache-commons-dbcp-2.1.1-2.1 apache-commons-dbcp-javadoc-2.1.1-2.1 apache-commons-pool2-2.4.2-2.1 apache-commons-pool2-javadoc-2.4.2-2.1 tomcat-8.0.36-4.1 tomcat-admin-webapps-8.0.36-4.1 tomcat-docs-webapp-8.0.36-4.1 tomcat-el-3_0-api-8.0.36-4.1 tomcat-embed-8.0.36-4.1 tomcat-javadoc-8.0.36-4.1 tomcat-jsp-2_3-api-8.0.36-4.1 tomcat-jsvc-8.0.36-4.1 tomcat-lib-8.0.36-4.1 tomcat-servlet-3_1-api-8.0.36-4.1 tomcat-webapps-8.0.36-4.1 References: https://www.suse.com/security/cve/CVE-2016-0762.html https://www.suse.com/security/cve/CVE-2016-5018.html https://www.suse.com/security/cve/CVE-2016-6794.html https://www.suse.com/security/cve/CVE-2016-6796.html https://www.suse.com/security/cve/CVE-2016-6797.html https://www.suse.com/security/cve/CVE-2016-6816.html https://www.suse.com/security/cve/CVE-2016-8735.html https://bugzilla.suse.com/1002639 https://bugzilla.suse.com/1007853 https://bugzilla.suse.com/1007854 https://bugzilla.suse.com/1007855 https://bugzilla.suse.com/1007857 https://bugzilla.suse.com/1007858 https://bugzilla.suse.com/1010893 https://bugzilla.suse.com/1011805 https://bugzilla.suse.com/1011812 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:3146-1 Rating: important References: #1013533 #1013604 Cross-References: CVE-2016-9576 CVE-2016-9794 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise High Availability 12-SP2 SUSE Linux Enterprise Desktop 12-SP2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The SUSE Linux Enterprise 12 SP 2 kernel was updated to fix two security issues. The following security bugs were fixed: - CVE-2016-9576: A use-after-free vulnerability in the SCSI generic driver allows users with write access to /dev/sg* or /dev/bsg* to elevate their privileges (bsc#1013604). - CVE-2016-9794: A use-after-free vulnerability in the ALSA pcm layer allowed local users to cause a denial of service, memory corruption or possibly even to elevate their privileges (bsc#1013533). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP2: zypper in -t patch SUSE-SLE-WE-12-SP2-2016-1815=1 - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1815=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1815=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1815=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1815=1 - SUSE Linux Enterprise High Availability 12-SP2: zypper in -t patch SUSE-SLE-HA-12-SP2-2016-1815=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1815=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64): kernel-default-debuginfo-4.4.21-90.1 kernel-default-debugsource-4.4.21-90.1 kernel-default-extra-4.4.21-90.1 kernel-default-extra-debuginfo-4.4.21-90.1 - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): kernel-obs-build-4.4.21-90.1 kernel-obs-build-debugsource-4.4.21-90.1 - SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch): kernel-docs-4.4.21-90.3 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): kernel-default-4.4.21-90.1 kernel-default-base-4.4.21-90.1 kernel-default-base-debuginfo-4.4.21-90.1 kernel-default-debuginfo-4.4.21-90.1 kernel-default-debugsource-4.4.21-90.1 kernel-default-devel-4.4.21-90.1 kernel-syms-4.4.21-90.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch): kernel-devel-4.4.21-90.1 kernel-macros-4.4.21-90.1 kernel-source-4.4.21-90.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): kernel-default-4.4.21-90.1 kernel-default-base-4.4.21-90.1 kernel-default-base-debuginfo-4.4.21-90.1 kernel-default-debuginfo-4.4.21-90.1 kernel-default-debugsource-4.4.21-90.1 kernel-default-devel-4.4.21-90.1 kernel-syms-4.4.21-90.1 - SUSE Linux Enterprise Server 12-SP2 (noarch): kernel-devel-4.4.21-90.1 kernel-macros-4.4.21-90.1 kernel-source-4.4.21-90.1 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-90-default-1-2.3 - SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64): cluster-md-kmp-default-4.4.21-90.1 cluster-md-kmp-default-debuginfo-4.4.21-90.1 cluster-network-kmp-default-4.4.21-90.1 cluster-network-kmp-default-debuginfo-4.4.21-90.1 dlm-kmp-default-4.4.21-90.1 dlm-kmp-default-debuginfo-4.4.21-90.1 gfs2-kmp-default-4.4.21-90.1 gfs2-kmp-default-debuginfo-4.4.21-90.1 kernel-default-debuginfo-4.4.21-90.1 kernel-default-debugsource-4.4.21-90.1 ocfs2-kmp-default-4.4.21-90.1 ocfs2-kmp-default-debuginfo-4.4.21-90.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): kernel-default-4.4.21-90.1 kernel-default-debuginfo-4.4.21-90.1 kernel-default-debugsource-4.4.21-90.1 kernel-default-devel-4.4.21-90.1 kernel-default-extra-4.4.21-90.1 kernel-default-extra-debuginfo-4.4.21-90.1 kernel-syms-4.4.21-90.1 - SUSE Linux Enterprise Desktop 12-SP2 (noarch): kernel-devel-4.4.21-90.1 kernel-macros-4.4.21-90.1 kernel-source-4.4.21-90.1 References: https://www.suse.com/security/cve/CVE-2016-9576.html https://www.suse.com/security/cve/CVE-2016-9794.html https://bugzilla.suse.com/1013533 https://bugzilla.suse.com/1013604 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=1bc1b7ea11&e=8138df6da5 ** Benchmark Reviews Presents: ------------------------------------------------------------ TITLE: Bloody B840 LK Optic Mechanical Keyboard Review (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=195658c0c9&e=8138df6da5) QUOTE: A4Tech is a Taiwanese company whose “Bloody†gaming division was launched in 2012. Bloody produces gaming keyboards and mice using a unique switch technology: rather than metal contact points closing an electrical circuit when a key is pressed, Bloody’s mechanical switches use infrared LEDs and photosensors, which Bloody claims provides faster key response and a more reliable and durable switch. Benchmark Reviews checks out the Bloody B840 LK Optic Mechanical Gaming Keyboard, equipped with next-generation “clicky†optical key switches. LINK: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=daf0073ac6&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=b9e9378941&e=8138df6da5 ============================================================
-
*AMD announces RYZEN 8-core processor* It is time to share a thing or two about the new AMD ZEN based processors. Meet RYZEN and more precise information and specifications in this editorial. Last week in Sonoma we got briefed on a number of things, time to share our take on it in a quick 2 page overview. Read the editorial here <http://www.guru3d.com/articles-pages/editorial-amd-zen-is-now-ryzen-processor,1.html>'>http://www.guru3d.com/articles-pages/editorial-amd-zen-is-now-ryzen-processor,1.html> . URL: http://www.guru3d.com/articles-pages/editorial-amd-zen-is-now-ryzen-processor,1.html <http://www.guru3d.com/articles-pages/editorial-amd-zen-is-now-ryzen-processor,1.html> --
-
View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=3aa42005c0&e=0c004f9c13) We’ve been hearing about AMD’s next-generation Zen-based processors for quite a while now, though the company has just officially unveiled that desktop variants will now be branded RYZEN. Over the past few months, we’ve seen Zen in action in both high-performance desktop and server applications and have been able to disclose a handful of features, specifications, and performance details. Today however, with AMD poised to host its “New Horizon†webcast, we have some more information to share related to the RYZEN branding, along with the ZEN architecture and AM4 platform as a whole. First and foremost is the actual branding for its Zen-based processors for desktops, formerly codenamed “Summit Ridgeâ€Â. AMD will be branding its Zen-architecture based desktop processors RYZEN -- pronounced Rye-Zen (like horizon, without the “hoâ€Â). We’ve also got some new details regarding RYZEN’s speeds and feeds, and some additional performance-related data to share... AMD To Attack Performance Desktop Market With RYZEN, More Zen Architecture Details Revealed (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=41671e144f&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=d9c24c62d0&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=2e451fa164&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=88a75fc04f&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=117c6b77af&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=9f60b659b7&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f36892a33f&e=0c004f9c13 ============================================================
-
In this edition of The Tech Report's mobile staff picks, we dig ourselves out of the snow to bring you the latest and best in tablets, Chromebooks, laptops, and phones. Read more: http://techreport.com/review/31042/the-tech-report-winter-2016-mobile-staff-picks --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
-
Hardware Canucks is pleased to present our article entitled "The AMD Ryzen CPU Preview; Zen Architecture Matures. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/73981-amd-ryzen-cpu-preview-zen-matures.html *Quote:* *AMD's upcoming Zen-based processors now have an official name. Called Ryzen, one of these CPUs will have 16 threads and 20MB of cache. Let's take a closer look at it!* We would appreciate it if you would post this in your News section. Regards, -- Hardware Canucks News Team
-
AMD's Zen CPUs for the desktop, formerly code-named Summit Ridge, now have an official name: Ryzen. Along with the new name, AMD demonstrated the performance of some fresh Ryzen silicon and shared some new details of these chips last week at a summit in Sonoma, California. Here's what we learned. Read more: http://techreport.com/review/31105/amd-crests-summit-ridge-with-ryzen-cpus --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
-
AMD's Zen CPUs for the desktop, formerly code-named Summit Ridge, now have an official name: Ryzen. Along with the new name, AMD demonstrated the performance of some fresh Ryzen silicon and shared some new details of these chips last week at a summit in Sonoma, California. Here's what we learned. Read more: http://techreport.com/review/31105/amd-crests-summit-ridge-with-ryzen-cpus --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
-
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title: *Rosewill RMS-16003 Dual Arm Monitor Desk Mount *Link: *http://bigbruin.com/content/rms-16003_1 *Image (250x250): *http://bigbruin.com/images/articles/936/promo_3.jpg *Quote:* The Rosewill RMS-16003 is very well designed dual arm monitor mount, that will get your two flat panel displays up off your desk and let you place them exactly at the position you want them. There is plenty of adjustment for height, depth, tilt, swivel, and rotation, and I am personally very pleased with how my matched set of 22" monitors look now. On top of that, you will regain a good deal of desktop real estate, which I may be just as excited about. Best regards, Jason www.bigbruin.com -- If you have tech news of your own, please send it to:
-
View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=9ba4951382&e=0c004f9c13) Intel's first generation Compute Stick turned quite a few heads, including ours, as it was a remarkable thing to consider that a fully functioning PC could be crammed onto a device roughly the size of a bloated USB flash drive. It wasn't especially powerful—Intel pairing an Atom processor based on its Bay Trail-T platform with just 2GB of single-channel RAM and 32GB of onboard storage—but for $149 with Windows pre-installed it was an intriguing device... The latest version Intel Compute Stick (STK2m3W64CC) ups the ante in the pocket-sized PC product line significantly by swinging a Skylake-based Core m3-6Y30 processor and 4GB of RAM in a dual-channel configuration at general purpose computing tasks... Intel Compute Stick Core m3 Review: Skylake On A Thumbstick (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=bea62919e9&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=8ebf688cb5&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=b5f369cc8c&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f11943678f&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=c7a18acb02&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=483fdca085&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=54f09bf497&e=0c004f9c13 ============================================================
-
[CentOS-announce] CEBA-2016:2931 CentOS 7 haproxy BugFix Update
news posted a topic in Upcoming News
CentOS Errata and Bugfix Advisory 2016:2931 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-2931.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 74be52cf22cf3a911880d8411874ecf2c94955e33110befd6bfbdc1c5a5dfe81 haproxy-1.5.18-3.el7_3.1.x86_64.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
CentOS Errata and Bugfix Advisory 2016:2944 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-2944.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 6f4d532fc7a8ab23f587710326aece921b51145ed01fd3c9e865969d86291d32 chrony-2.1.1-2.el6_8.i686.rpm x86_64: 62e49cb71efcfd7e0a542208fb217514ee1bb31dcc6d2b1332b4dccdfffca1d0 chrony-2.1.1-2.el6_8.x86_64.rpm Source: 5c43a53158f77ad26650688c9fbf1f569d4a220edbff6a56101ef2c98c875d8e chrony-2.1.1-2.el6_8.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
-
Title: Crucial MX300 525GB SSD Review ( -at -) NikKTech Description: With a price/capacity ratio far better compared to its direct competitor the MX300 525GB SSD by our friends over at Crucial represents an even better investment than its brother the 750GB Limited Edition SSD. Article Link: http://www.nikktech.com/main/articles/pc-hardware/storage/solid-state-drives /7261-crucial-mx300-525gb-ssd-review Image Link: http://www.nikktech.com/main/images/pics/reviews/crucial/mx300_525gb/crucial _mx300_525gb_ssda.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
[CentOS-announce] CEBA-2016:2930 CentOS 7 fence-agents BugFix Update
news posted a topic in Upcoming News
CentOS Errata and Bugfix Advisory 2016:2930 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-2930.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 6cd757278013ee4a4727be81533a94cdc9bdbb4b426896353c643bf503135b8a fence-agents-all-4.0.11-47.el7_3.2.x86_64.rpm 07decfab5c58f519814878a2bbe0d1fae2b4beb913fc785775ae123574fb864d fence-agents-apc-4.0.11-47.el7_3.2.x86_64.rpm e1e70e7f5dc67dafd7f86bd50842a5a13facb6e0bf06ea1651e36f5ad09cc7b7 fence-agents-apc-snmp-4.0.11-47.el7_3.2.x86_64.rpm 52cdf41a2c9e9f27b3972ea7347b2dd3b9076215ef7f6e4418ae6e932c542b1a fence-agents-bladecenter-4.0.11-47.el7_3.2.x86_64.rpm 30aeabcbb84b4de310664c5b9624dc12da326109435e47c83d5f2dfa207cae02 fence-agents-brocade-4.0.11-47.el7_3.2.x86_64.rpm e2495a379c5d69e80f1c48f40243d482baba464438e32c1755aba6b55ee773b0 fence-agents-cisco-mds-4.0.11-47.el7_3.2.x86_64.rpm ac2230747fafc587f6131c26c14235916faea13124c1074cec14a9ea607679b8 fence-agents-cisco-ucs-4.0.11-47.el7_3.2.x86_64.rpm d67df7ef3cfc1cadd2f796d593ed9114221c42ae227806deb4e41b66c8925ed1 fence-agents-common-4.0.11-47.el7_3.2.x86_64.rpm 5536079c8975e0d032ffa408e055720e884372c2f7875ae6cd1d18802d73eaed fence-agents-compute-4.0.11-47.el7_3.2.x86_64.rpm 29ebd0e0e76e99eb5b5e04ba05562c30cb72bc49308a269260c15c17da06b35c fence-agents-drac5-4.0.11-47.el7_3.2.x86_64.rpm ba0987513ed143c267f6627620f635f6cce5b15e6f4e7d97b78a15fc613d0b7c fence-agents-eaton-snmp-4.0.11-47.el7_3.2.x86_64.rpm 4342cd2d93b835b66a98721a6ac177fd19959c494f0ffed15276b05bfa0f95e7 fence-agents-emerson-4.0.11-47.el7_3.2.x86_64.rpm b18398cf3655f79df0a8ff0ce22003bd31fa99ad99f92b7711e1f5fce79d0c4b fence-agents-eps-4.0.11-47.el7_3.2.x86_64.rpm c954731caad2b3635caea48404d0c49c6bf6ea7e883ee4e348198d14142295b2 fence-agents-hpblade-4.0.11-47.el7_3.2.x86_64.rpm 6a953e0ba0e1693a649e0e90bf707cc9def496ad8cf33cc1fc2e36d3701a487c fence-agents-ibmblade-4.0.11-47.el7_3.2.x86_64.rpm ec6b2d7259a33a1c0b07869ecf290559cb4ef164af82efda99ffdd465713cc3c fence-agents-ifmib-4.0.11-47.el7_3.2.x86_64.rpm dbb07b8690ad182d08545b4ffc377ee63f33bcd5f62105894d3841126cd83243 fence-agents-ilo2-4.0.11-47.el7_3.2.x86_64.rpm 46ef3ca55f4e0362ee5b1acba0a58e851124bba683bbb1bbc740e6b1589b3f21 fence-agents-ilo-moonshot-4.0.11-47.el7_3.2.x86_64.rpm 833aaf098d2785fb0931f1bd8a24231c788d77fed53296bf94cb67381cbdbfb3 fence-agents-ilo-mp-4.0.11-47.el7_3.2.x86_64.rpm 340de23651940ee26bbd73c4238734edd3cc652e64cce9590ff23282d7779d29 fence-agents-ilo-ssh-4.0.11-47.el7_3.2.x86_64.rpm f66ddafdabb279f729e7fb93d07feadbcf488a123bb980ac8a45f22b44a99615 fence-agents-intelmodular-4.0.11-47.el7_3.2.x86_64.rpm ecdc91a83e9f64061ffe66ef4163d638685d86ac253dd419243301dd63cae254 fence-agents-ipdu-4.0.11-47.el7_3.2.x86_64.rpm 79f2604ff6e61b55d9569259fb87220ec05d49624995b076fa087db0cab573a2 fence-agents-ipmilan-4.0.11-47.el7_3.2.x86_64.rpm 2a365bcf0309c7d703325d5cad06b91549e407dff18159fc56ff602060721cfc fence-agents-kdump-4.0.11-47.el7_3.2.x86_64.rpm 54bde3daf5a9f94fb73c2779e8545eb31b3a9eaf652e3234da0486b0275a1a57 fence-agents-mpath-4.0.11-47.el7_3.2.x86_64.rpm f377095a1653bec746717aac73800d595b6ad92275989bf86020aeb98e99c1b8 fence-agents-rhevm-4.0.11-47.el7_3.2.x86_64.rpm 9f63f2e4561638c58d8d6d93fcdac48637d86824b6bbd24426d4422c0f5a10c5 fence-agents-rsa-4.0.11-47.el7_3.2.x86_64.rpm 5d3976d715102a7486758240eed747e561a7101757ce76f5f4d682a9ff6cef04 fence-agents-rsb-4.0.11-47.el7_3.2.x86_64.rpm 3f299f88cf209abec7f7ccc93aa3f537653348d0ab9b764b4de5d6f15d42548c fence-agents-scsi-4.0.11-47.el7_3.2.x86_64.rpm 0bd93f4c83e5e683c75959c3105896a4f28780620ab6ad30af22ac9d4b72197d fence-agents-virsh-4.0.11-47.el7_3.2.x86_64.rpm 8e0e2358904fd842c913742e2db671dba7ad305946dcc45e1b7bcabd389a98e0 fence-agents-vmware-soap-4.0.11-47.el7_3.2.x86_64.rpm 8b41dbc7e1d57e3008f2ef67ca12fffe0b67d74c3ade626875b1a67301a53c10 fence-agents-wti-4.0.11-47.el7_3.2.x86_64.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
[CentOS-announce] CEBA-2016:2929 CentOS 7 resource-agents BugFix Update
news posted a topic in Upcoming News
CentOS Errata and Bugfix Advisory 2016:2929 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-2929.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: b62de7ea7fce3c77d95f138d093130a7dba978b11eca69ea807857f6c8027a96 resource-agents-3.9.5-82.el7_3.3.x86_64.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
SUSE Security Update: Security update for Linux Kernel Live Patch 11 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:3119-1 Rating: important References: #1003253 #1012183 #1012759 Cross-References: CVE-2016-7117 CVE-2016-8655 CVE-2016-9555 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.51-52_39 fixes several issues. The following security bugs were fixed: - CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759). - CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183). - CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003253). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1814=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1814=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_51-52_39-default-6-2.1 kgraft-patch-3_12_51-52_39-xen-6-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_51-52_39-default-6-2.1 kgraft-patch-3_12_51-52_39-xen-6-2.1 References: https://www.suse.com/security/cve/CVE-2016-7117.html https://www.suse.com/security/cve/CVE-2016-8655.html https://www.suse.com/security/cve/CVE-2016-9555.html https://bugzilla.suse.com/1003253 https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012759 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 14 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:3113-1 Rating: important References: #1012183 #1012759 Cross-References: CVE-2016-8655 CVE-2016-9555 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.60-52_49 fixes several issues. The following security bugs were fixed: - CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759). - CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1808=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1808=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_49-default-4-2.1 kgraft-patch-3_12_60-52_49-xen-4-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_49-default-4-2.1 kgraft-patch-3_12_60-52_49-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2016-8655.html https://www.suse.com/security/cve/CVE-2016-9555.html https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012759 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
EpicGear DeFiant EG MMS Mechanical Keyboard Kit @ Legit Reviews
news posted a topic in Upcoming News
EpicGear is a subsidiary of Golden Emperor InternationaL (GeIL) that was established in 2011 to manufacture peripherals aimed and tailored towards the needs of PC gamers. EpicGear isn’t a very well-known name here in the United States, but they have produced some solid, well-reviewed products thus far, such as their dual-sensor MeduZa mouse and around-ear SonorouZ SE V2.0 headset. EpicGear products are aimed at PC enthusiasts who want a high quality product for a reasonable price. Today, we will be reviewing the EpicGear DeFiant EG MMS keyboard kit, a keyboard kit with unique mechanical switches and a couple of tricks up its sleeve that you won’t find in other gaming keyboards... Article Title: EpicGear DeFiant EG MMS Mechanical Keyboard Kit ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/epicgear-defiant-eg-mms-keyboard-kit-review_188736 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// = -
SUSE Security Update: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:3116-1 Rating: important References: #1012183 #1012759 Cross-References: CVE-2016-8655 CVE-2016-9555 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues. The following security bugs were fixed: - CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759). - CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1813=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_62-60_64_8-default-3-2.1 kgraft-patch-3_12_62-60_64_8-xen-3-2.1 References: https://www.suse.com/security/cve/CVE-2016-8655.html https://www.suse.com/security/cve/CVE-2016-9555.html https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012759 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 5 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:3117-1 Rating: important References: #1012183 #1012759 Cross-References: CVE-2016-8655 CVE-2016-9555 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.59-60_41 fixes several issues. The following security bugs were fixed: - CVE-2016-8655: A race condition in the af_packet packet_set_ring function could be used by local attackers to crash the kernel or gain privileges (bsc#1012759). - CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bsc#1012183). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1812=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_41-default-5-2.1 kgraft-patch-3_12_59-60_41-xen-5-2.1 References: https://www.suse.com/security/cve/CVE-2016-8655.html https://www.suse.com/security/cve/CVE-2016-9555.html https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012759 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org