Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. There will be an outage starting at 2016-11-30 21:00 UTC, which will last approximately 4 hours. To convert UTC to your local time, take a look at https://fedoraproject.org/wiki/UTCHowto or run: date -d '2016-11-30 21:00 UTC' Reason for outage: We have been in a freeze for the release of Fedora 25 and have multiple updates across the systems needed to occur. Part of these are to bring RHEL-7 systems to 7.3 and others are to bring some systems to Fedora 25. Affected Services: Bodhi - https://admin.fedoraproject.org/updates/ Buildsystem - http://koji.fedoraproject.org/ Package Database - https://admin.fedoraproject.org/pkgdb/ BFO - https://boot.fedoraproject.org/ GIT / Source Control DNS - ns1.fedoraproject.org, ns2.fedoraproject.org Docs - https://docs.fedoraproject.org/ Email system Fedora Account System - https://admin.fedoraproject.org/accounts/ Fedora Community - https://admin.fedoraproject.org/community/ Fedora Hosted - https://fedorahosted.org/ Fedora Insight - https://insight.fedoraproject.org/ Fedora People - https://fedorapeople.org/ Main Website - https://fedoraproject.org/ Mirror List - https://mirrors.fedoraproject.org/ Mirror Manager - https://admin.fedoraproject.org/mirrormanager/ QA Services Secondary Architectures Spins - https://spins.fedoraproject.org/ Start - https://start.fedoraproject.org/ Torrent - https://torrent.fedoraproject.org/ Translation Services - https://translate.fedoraproject.org/ Wiki - https://fedoraproject.org/wiki/ Unaffected Services: Staging - .stg.fedoraproject.org, .stg.phx2.fedoraproject.org Ticket Link: TBA Contact Information: infrastructure ( -at -) lists.fedoraproject.org Please join #fedora-admin in irc.freenode.net or add comments to the ticket for this outage above. -- Stephen J Smoogen. _______________________________________________
  2. SUSE Security Update: Security update for mariadb ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2932-1 Rating: important References: #1001367 #1003800 #1005555 #1005558 #1005562 #1005564 #1005566 #1005569 #1005581 #1005582 #1006539 #1008318 Cross-References: CVE-2016-3492 CVE-2016-5584 CVE-2016-5616 CVE-2016-5624 CVE-2016-5626 CVE-2016-5629 CVE-2016-6663 CVE-2016-7440 CVE-2016-8283 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves 9 vulnerabilities and has three fixes is now available. Description: This mariadb update to version 10.0.28 fixes the following issues (bsc#1008318): Security fixes: - CVE-2016-8283: Unspecified vulnerability in subcomponent Types (bsc#1005582) - CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581) - CVE-2016-5629: Unspecified vulnerability in subcomponent Federated (bsc#1005569) - CVE-2016-5626: Unspecified vulnerability in subcomponent GIS (bsc#1005566) - CVE-2016-5624: Unspecified vulnerability in subcomponent DML (bsc#1005564) - CVE-2016-5616: Unspecified vulnerability in subcomponent InnoDB (bsc#1005562) - CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558) - CVE-2016-3492: Unspecified vulnerability in subcomponent Optimizer (bsc#1005555) - CVE-2016-6663: Privilege Escalation / Race Condition (bsc#1001367) Bugfixes: - mysql_install_db can't find data files (bsc#1006539) - mariadb failing test sys_vars.optimizer_switch_basic (bsc#1003800) - Notable changes: * XtraDB updated to 5.6.33-79.0 * TokuDB updated to 5.6.33-79.0 * Innodb updated to 5.6.33 * Performance Schema updated to 5.6.33 - Release notes and upstream changelog: * https://kb.askmonty.org/en/mariadb-10028-release-notes * https://kb.askmonty.org/en/mariadb-10028-changelog Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1718=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1718=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): libmysqlclient-devel-10.0.28-20.16.2 libmysqlclient18-10.0.28-20.16.2 libmysqlclient18-32bit-10.0.28-20.16.2 libmysqlclient18-debuginfo-10.0.28-20.16.2 libmysqlclient18-debuginfo-32bit-10.0.28-20.16.2 libmysqlclient_r18-10.0.28-20.16.2 libmysqld-devel-10.0.28-20.16.2 libmysqld18-10.0.28-20.16.2 libmysqld18-debuginfo-10.0.28-20.16.2 mariadb-10.0.28-20.16.2 mariadb-client-10.0.28-20.16.2 mariadb-client-debuginfo-10.0.28-20.16.2 mariadb-debuginfo-10.0.28-20.16.2 mariadb-debugsource-10.0.28-20.16.2 mariadb-errormessages-10.0.28-20.16.2 mariadb-tools-10.0.28-20.16.2 mariadb-tools-debuginfo-10.0.28-20.16.2 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): libmysqlclient-devel-10.0.28-20.16.2 libmysqlclient18-10.0.28-20.16.2 libmysqlclient18-debuginfo-10.0.28-20.16.2 libmysqlclient_r18-10.0.28-20.16.2 libmysqld-devel-10.0.28-20.16.2 libmysqld18-10.0.28-20.16.2 libmysqld18-debuginfo-10.0.28-20.16.2 mariadb-10.0.28-20.16.2 mariadb-client-10.0.28-20.16.2 mariadb-client-debuginfo-10.0.28-20.16.2 mariadb-debuginfo-10.0.28-20.16.2 mariadb-debugsource-10.0.28-20.16.2 mariadb-errormessages-10.0.28-20.16.2 mariadb-tools-10.0.28-20.16.2 mariadb-tools-debuginfo-10.0.28-20.16.2 - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64): libmysqlclient18-32bit-10.0.28-20.16.2 libmysqlclient18-debuginfo-32bit-10.0.28-20.16.2 References: https://www.suse.com/security/cve/CVE-2016-3492.html https://www.suse.com/security/cve/CVE-2016-5584.html https://www.suse.com/security/cve/CVE-2016-5616.html https://www.suse.com/security/cve/CVE-2016-5624.html https://www.suse.com/security/cve/CVE-2016-5626.html https://www.suse.com/security/cve/CVE-2016-5629.html https://www.suse.com/security/cve/CVE-2016-6663.html https://www.suse.com/security/cve/CVE-2016-7440.html https://www.suse.com/security/cve/CVE-2016-8283.html https://bugzilla.suse.com/1001367 https://bugzilla.suse.com/1003800 https://bugzilla.suse.com/1005555 https://bugzilla.suse.com/1005558 https://bugzilla.suse.com/1005562 https://bugzilla.suse.com/1005564 https://bugzilla.suse.com/1005566 https://bugzilla.suse.com/1005569 https://bugzilla.suse.com/1005581 https://bugzilla.suse.com/1005582 https://bugzilla.suse.com/1006539 https://bugzilla.suse.com/1008318 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  3. SUSE Security Update: Recommended update for mariadb ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2933-1 Rating: important References: #1001367 #1003800 #1004477 #1005555 #1005558 #1005562 #1005564 #1005566 #1005569 #1005581 #1005582 #1006539 #1008318 #990890 Cross-References: CVE-2016-3492 CVE-2016-5584 CVE-2016-5616 CVE-2016-5624 CVE-2016-5626 CVE-2016-5629 CVE-2016-6663 CVE-2016-7440 CVE-2016-8283 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP2 SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP2 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 9 vulnerabilities and has 5 fixes is now available. Description: This mariadb update to version 10.0.28 fixes the following issues (bsc#1008318): Security fixes: - CVE-2016-8283: Unspecified vulnerability in subcomponent Types (bsc#1005582) - CVE-2016-7440: Unspecified vulnerability in subcomponent Encryption (bsc#1005581) - CVE-2016-5629: Unspecified vulnerability in subcomponent Federated (bsc#1005569) - CVE-2016-5626: Unspecified vulnerability in subcomponent GIS (bsc#1005566) - CVE-2016-5624: Unspecified vulnerability in subcomponent DML (bsc#1005564) - CVE-2016-5616: Unspecified vulnerability in subcomponent InnoDB (bsc#1005562) - CVE-2016-5584: Unspecified vulnerability in subcomponent Encryption (bsc#1005558) - CVE-2016-3492: Unspecified vulnerability in subcomponent Optimizer (bsc#1005555) - CVE-2016-6663: Privilege Escalation / Race Condition (bsc#1001367) Bugfixes: - mysql_install_db can't find data files (bsc#1006539) - mariadb failing test sys_vars.optimizer_switch_basic (bsc#1003800) - Remove useless mysql ( -at -) default.service (bsc#1004477) - Replace all occurrences of the string " ( -at -) sysconfdir ( -at -) " with "/etc" as it wasn't expanded properly (bsc#990890) - Notable changes: * XtraDB updated to 5.6.33-79.0 * TokuDB updated to 5.6.33-79.0 * Innodb updated to 5.6.33 * Performance Schema updated to 5.6.33 - Release notes and upstream changelog: * https://kb.askmonty.org/en/mariadb-10028-release-notes * https://kb.askmonty.org/en/mariadb-10028-changelog Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP2: zypper in -t patch SUSE-SLE-WE-12-SP2-2016-1717=1 - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1717=1 - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2016-1717=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1717=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1717=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1717=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1717=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2016-1717=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1717=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64): libmysqlclient_r18-10.0.28-17.2 libmysqlclient_r18-32bit-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): libmysqlclient_r18-10.0.28-17.2 libmysqlclient_r18-32bit-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): libmysqlclient-devel-10.0.28-17.2 libmysqlclient_r18-10.0.28-17.2 libmysqld-devel-10.0.28-17.2 libmysqld18-10.0.28-17.2 libmysqld18-debuginfo-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libmysqlclient-devel-10.0.28-17.2 libmysqlclient_r18-10.0.28-17.2 libmysqld-devel-10.0.28-17.2 libmysqld18-10.0.28-17.2 libmysqld18-debuginfo-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): libmysqlclient18-10.0.28-17.2 libmysqlclient18-debuginfo-10.0.28-17.2 mariadb-10.0.28-17.2 mariadb-client-10.0.28-17.2 mariadb-client-debuginfo-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 mariadb-errormessages-10.0.28-17.2 mariadb-tools-10.0.28-17.2 mariadb-tools-debuginfo-10.0.28-17.2 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): libmysqlclient18-10.0.28-17.2 libmysqlclient18-debuginfo-10.0.28-17.2 mariadb-10.0.28-17.2 mariadb-client-10.0.28-17.2 mariadb-client-debuginfo-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 mariadb-errormessages-10.0.28-17.2 mariadb-tools-10.0.28-17.2 mariadb-tools-debuginfo-10.0.28-17.2 - SUSE Linux Enterprise Server 12-SP2 (x86_64): libmysqlclient18-32bit-10.0.28-17.2 libmysqlclient18-debuginfo-32bit-10.0.28-17.2 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libmysqlclient18-10.0.28-17.2 libmysqlclient18-debuginfo-10.0.28-17.2 mariadb-10.0.28-17.2 mariadb-client-10.0.28-17.2 mariadb-client-debuginfo-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 mariadb-errormessages-10.0.28-17.2 mariadb-tools-10.0.28-17.2 mariadb-tools-debuginfo-10.0.28-17.2 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libmysqlclient18-32bit-10.0.28-17.2 libmysqlclient18-debuginfo-32bit-10.0.28-17.2 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): libmysqlclient18-10.0.28-17.2 libmysqlclient18-32bit-10.0.28-17.2 libmysqlclient18-debuginfo-10.0.28-17.2 libmysqlclient18-debuginfo-32bit-10.0.28-17.2 libmysqlclient_r18-10.0.28-17.2 libmysqlclient_r18-32bit-10.0.28-17.2 mariadb-10.0.28-17.2 mariadb-client-10.0.28-17.2 mariadb-client-debuginfo-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 mariadb-errormessages-10.0.28-17.2 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libmysqlclient18-10.0.28-17.2 libmysqlclient18-32bit-10.0.28-17.2 libmysqlclient18-debuginfo-10.0.28-17.2 libmysqlclient18-debuginfo-32bit-10.0.28-17.2 libmysqlclient_r18-10.0.28-17.2 libmysqlclient_r18-32bit-10.0.28-17.2 mariadb-10.0.28-17.2 mariadb-client-10.0.28-17.2 mariadb-client-debuginfo-10.0.28-17.2 mariadb-debuginfo-10.0.28-17.2 mariadb-debugsource-10.0.28-17.2 mariadb-errormessages-10.0.28-17.2 References: https://www.suse.com/security/cve/CVE-2016-3492.html https://www.suse.com/security/cve/CVE-2016-5584.html https://www.suse.com/security/cve/CVE-2016-5616.html https://www.suse.com/security/cve/CVE-2016-5624.html https://www.suse.com/security/cve/CVE-2016-5626.html https://www.suse.com/security/cve/CVE-2016-5629.html https://www.suse.com/security/cve/CVE-2016-6663.html https://www.suse.com/security/cve/CVE-2016-7440.html https://www.suse.com/security/cve/CVE-2016-8283.html https://bugzilla.suse.com/1001367 https://bugzilla.suse.com/1003800 https://bugzilla.suse.com/1004477 https://bugzilla.suse.com/1005555 https://bugzilla.suse.com/1005558 https://bugzilla.suse.com/1005562 https://bugzilla.suse.com/1005564 https://bugzilla.suse.com/1005566 https://bugzilla.suse.com/1005569 https://bugzilla.suse.com/1005581 https://bugzilla.suse.com/1005582 https://bugzilla.suse.com/1006539 https://bugzilla.suse.com/1008318 https://bugzilla.suse.com/990890 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  4. Zotac GeForce GTX 1050 Ti OC Edition Graphics Card Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/zotac-geforce-gtx-1050-ti-oc-edition-graphics-card-review/ Image URL: http://www.thinkcomputers.org/reviews/zotac_gtx1050ti/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/zotac_gtx1050ti/small.jpg Quote: "A little over a month ago NVIDIA announced both the GeForce GTX 1050 Ti and GeForce GTX 1050 graphics cards.  These are designed for MOBA gamers and gamers who will only be gaming in 1080p resolutions.  These cards effectively replace the older GeForce GTX 750 Ti graphics card.  The GeForce GTX 1050 Ti is the more powerful of the two card featuring 768 CUDA cores spread across 6 streaming multiprocessors, 48 TMUs, 32 ROPs, and 4GB of GDDR5 memory across a 128-bit wide memory interface.  Today we will be taking a look at Zotac's OC Edition of the card which features a base clock of 1392 MHz and a GPU boost of 1506 MHz.  This is compared to the GTX 1050 Ti's reference speeds of 1290 MHz core and 1392 MHz GPU boost."
  5. <http://www.eteknix.com> XFX RX 480 GTR Black Edition Graphics Card Review The RX 480 is AMD's flagship product in the Polaris series and designed to provide a stellar PC gaming experience without breaking the bank. Rather impressively, this mainstream graphics card can maintain fluid frame rates while powering some of the most demanding games available today. Not only that, the RX 480 supports FreeSync, Eyefinity and has an architecture built from the ground up for the latest APIs including Vulkan. Of course, there's fierce competition around the £200 mark in the form of the GTX 1060 and AMD's previous generation offerings. Although, the RX 480's ability to deploy asynchronous compute efficiently makes it a good investment for the future. URL - http://www.eteknix.com/xfx-rx-480-gtr-black-edition-graphics-card-review/ --
  6. AWD-IT Aura (GTX 1070) System Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=8244aef15f&e=872093acb5 http://www.kitguru.net AWD-IT Aura (GTX 1070) System Review The AWD-IT Aura system uses the GTX 1070, which we reviewed in June over HERE (https://goo.gl/po3VB4) . Alongside that we find an i7-6700K overclocked to 4.5GHz, as well as 16GB of 3000MHz Corsair DDR4 and a Samsung 750 EVO SSD. It is certainly a good spec on paper, and with a price of £1499 it looks to offer good value. Read the review here: http://www.kitguru.net/desktop-pc/gaming-rig/dominic-moass/awd-it-aura-gtx-1070-system-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=8244aef15f&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  7. ** TECHSPOT ------------------------------------------------------------ ** The Best Tablets ------------------------------------------------------------ ** Lower prices make tablets attractive entry-level computing devices ------------------------------------------------------------ ** http://www.techspot.com/bestof/tablets/ ------------------------------------------------------------ Exploding tablet sales are no more. The latest figures show us that slates and detachables' sales have fallen eight quarters in a row. This could be explained by a number of factors, among them that smartphones are now larger and faster, while laptops are thinner and lighter than they used to, so the scope of tablets has been narrowed down significantly. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  8. ** TECHSPOT ------------------------------------------------------------ ** The Best Tablets ------------------------------------------------------------ ** Lower prices make tablets attractive entry-level computing devices ------------------------------------------------------------ ** http://www.techspot.com/bestof/tablets/ ------------------------------------------------------------ Exploding tablet sales are no more. The latest figures show us that slates and detachables' sales have fallen eight quarters in a row. This could be explained by a number of factors, among them that smartphones are now larger and faster, while laptops are thinner and lighter than they used to, so the scope of tablets has been narrowed down significantly. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  9. ** TECHSPOT ------------------------------------------------------------ ** The Best Tablets ------------------------------------------------------------ ** Lower prices make tablets attractive entry-level computing devices ------------------------------------------------------------ ** http://www.techspot.com/bestof/tablets/ ------------------------------------------------------------ Exploding tablet sales are no more. The latest figures show us that slates and detachables' sales have fallen eight quarters in a row. This could be explained by a number of factors, among them that smartphones are now larger and faster, while laptops are thinner and lighter than they used to, so the scope of tablets has been narrowed down significantly. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  10. -------- COOLER MASTER MASTERPULSE PRO GAMING HEADSET REVIEW ( -at -) APH NETWORKS -- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Cooler Master MasterPulse Pro Gaming Headset Review ( -at -) APH Networks * Description: The Cooler Master MasterPulse Pro is a very well built headphone with some cool new features, but falls short against the competition in almost every way. * Link: http://aphnetworks.com/reviews/cooler-master-masterpulse-pro * Image: http://aphnetworks.com/review/cooler-master-masterpulse-pro/008.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  11. <http://www.eteknix.com> MyDigitalSSD Boost 1TB USB 3.1 Portable SSD Review The joys of traveling, may it be far or near, can be highly increased when you have all your data with you where you go. Portable storage usually has the downside and that it that it isn't as fast as internal storage. As such, it can be a pain to wait for the data transfers to finish. Not so for the portable drive that I'm testing today, the MyDigitalSSD Boost <http://mydigitalssd.com/mobile-ssd.php> . It has both the capacity, up to 1TB, and the speed to blow anything out of the way that other portable drives can offer. URL - http://www.eteknix.com/mydigitalssd-boost-1tb-usb-3-1-portable-ssd-review/ --
  12. <http://www.eteknix.com> ASUS STRIX Wireless Gaming Headset Review ASUS is one of the biggest names in the PC hardware market, with a steady stream of award-winning motherboards, graphics cards and much more being released every year. Their peripherals are still relatively new territory for them, but they've certainly been gaining in popularity, and their latest headset, the ROG STRIX Wireless, may be one of their best yet. URL - http://www.eteknix.com/asus-strix-wireless-gaming-headset-review/ --
  13. TITLE: Cooler Master MasterMouse PRO L Review ( -at -) Vortez CONTENT: Lefties rejoice, the MasterMouse PRO L is ambidextrous and not the pretend kind that features just two side buttons. It has a total of 8 programmable buttons and features the Storm Tactix Function (Labelled TX) which means you have a second layer of programmable buttons once activated to increase the total to 14 programmable buttons. It has on-board 512kb memory, and a 32bit ARM processor. The MasterMouse PRO L also features 16.7m customisable lighting with some advanced effects that is supported by the flashy new software from Cooler Master. LINK: http://www.vortez.net/review.php?id=1237 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
  14. Title: QNAP TBS-453A-8G-960GB 4-Bay M.2 SSD NASbook Review ( -at -) NikKTech Description: Although we all like the concept behind the new TBS-453A NASbook by QNAP quite honestly it feels ahead of its time mainly due to the current pricing of M.2 SSDs and lack of one or more 10GbE ports. Article Link: http://www.nikktech.com/main/articles/peripherals/network/nas-servers/7191-q nap-tbs-453a-8g-960gb-4-bay-m-2-ssd-nasbook-review Image Link: http://www.nikktech.com/main/images/pics/reviews/qnap/tbs_453a_8g_960gb/qnap _tbs_453A_8g_960gba.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  15. -------- STEELSERIES RIVAL 500 OPTICAL MOUSE REVIEW ( -at -) APH NETWORKS ----------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: SteelSeries Rival 500 Optical Mouse Review ( -at -) APH Networks * Description: The SteelSeries Rival 500 shows it is possible for hardcore MOBA/MMO players to find a good mouse with a lot of buttons on the side that does not look like it has a phone dial pad stuck to it. * Link: http://aphnetworks.com/reviews/steelseries-rival-500 * Image: http://aphnetworks.com/review/steelseries-rival-500/007.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  16. news

    Wine release 1.9.24

    The Wine development release 1.9.24 is now available. What's new in this release (see below for details): - Support for unordered access views in Direct3D. - Many fixes in the regression tests. - Some more improvements in HID support. - Various bug fixes. The source is available from the following locations: http://dl.winehq.org/wine/source/1.9/wine-1.9.24.tar.bz2 http://mirrors.ibiblio.org/wine/source/1.9/wine-1.9.24.tar.bz2 Binary packages for various distributions will be available from: http://www.winehq.org/download You will find documentation on http://www.winehq.org/documentation You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details. Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list. ---------------------------------------------------------------- Bugs fixed in 1.9.24 (total 28): 33636 wine cmd: invalid behaviour of '&' operator 35343 dialog windows are too large 35658 Anthem Room Correction 2 v1.0.1 reports 'Unknown COM error 0x80004001' (needs IAudioEndpointVolume::GetVolumeRange method implementation) 36115 cabinet/fdi tests show some valgrind warnings 38768 Stronghold 2 hangs when started. 39724 Need For Speed Underground 2 crashes after several minutes of playing 39734 ProtectDisc Driver 11: acedrv11.sys crashes 40366 Avatarika installer fails 40595 gdiplus:metafile test regression (test_frameunit) 40596 gdiplus:metafile test regression (test_nullframerect) 40695 Crash in Fallout New Vegas 40791 N-Ball editor shows only a blackscreen 40996 Deus Ex:Human Revolution fails to start when using DX11 renderer 41021 Zombie Army trilogy needs msvcr100.dll._fpieee_flt 41087 UE4 games (The Vanishing of Ethan Carter Redux, The Solus Project) crash while loading with "D3D11Query.cpp:139 # with error E_INVALIDARG" 41090 Multiple games (Starcraft 2, UE4 games) require vcruntime140.dll.__intrinsic_setjmp 41290 DirectShow applications: MP3 playback is broken if winegstreamer is disabled 41308 iconfig.exe needs msvcr120.??0_Condition_variable ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) QAE ( -at -) XZ 41451 Motocross madness: missing names of players 41602 Videos do not play in Age of Empires 41640 add rx 480 into directx.c 41671 GOG Galaxy requires unimplemented function vcruntime140.dll.__std_terminate 41683 Gauntlet start background is corrupted. 41695 LeagueClient.exe Call to unimplemented function api-ms-win-crt-math-l1-1-0.dll.nearbyint 41705 Build fails in dpnet: redefinition of typedef 'SOCKADDR' 41719 crypt32:store test regression in testRegStoreSavedCerts() 41721 hidtest.exe crashes on unimplemented function hid.dll.HidP_GetSpecificButtonCaps 41736 build error: configure detects udev only partly ---------------------------------------------------------------- Changes since 1.9.23: Akihiro Sagawa (2): strmbase: Add null pointer checks to BaseControlVideoImpls. wineqtdecoder: Always pass non-NULL preferred allocator to IAsyncReader::RequestAllocator. Alex Henrie (3): winegstreamer: Fix memory leaks in amt_from_gst_caps_video. winegstreamer: If no audio media type was allocated, don't free it. winegstreamer: Remove redundant null check before g_error_free. Alexandre Julliard (1): configure: Add fallback link command line for libudev. Alistair Leslie-Hughes (1): dpnet: Header files cleanup. Andrey Gusev (10): api-ms-win-security-lsalookup-l2-1-1: Add dll. api-ms-win-security-lsapolicy-l1-1-0: Add dll. make_specfiles: Add api-ms-win-security-lsalookup-l1-1-1 to advapi32 group. api-ms-win-core-com-private-l1-1-0: Add dll. api-ms-win-devices-config-l1-1-1: Add dll. api-ms-win-devices-query-l1-1-1: Add dll. ext-ms-win-domainjoin-netjoin-l1-1-0: Add dll. api-ms-win-power-base-l1-1-0: Add dll. api-ms-win-power-setting-l1-1-0: Add dll. api-ms-win-appmodel-identity-l1-1-0: Add dll. Aric Stewart (6): hid: Correct issues with getting packed values. hid: Fix HidP_MaxUsageListLength to handle UsagePage == 0 properly. hid: Implement HidP_GetSpecificValueCaps. hidclass.sys: Handle POP and PUSH in device descriptors. hidclass.sys: Handle descriptors with a usage count less than the report bits. hid: Implement HidP_GetSpecificButtonCaps. Bruno Jesus (4): msvfw32/tests: Add tests for ICInfo(). msvfw32: Allow ICInfo to enumerate codecs when fccType is zero. krnl386.exe16: Honour segment prefix override for outs[bwd] instruction. quartz: Take MP3 padding bit into account when calculating the block size. Carlo Bramini (5): wininet: Use return value of sprintf() instead of calling strlen() and simplify code. wldap32: Use return value of sprintf() instead of hardcoding the number of written characters. wintrust: Use return value of sprintf() instead of calling strlen(). wordpad: Use return value of LoadStringW() instead of calling lstrlenW(). winhttp: Use return value of sprintf() instead of calling strlen() and simplify code. Carlos Garnacho (1): winex11: Always use the client pointer for raw events. Daniel Lehman (6): shlwapi: Make ParseURL case-insensitive. urlmon: Fix buffer overflow in parse_canonicalize. opengl32: Set last error on invalid hdc to wglCreateContextAttribsARB. opengl32: Set last error on invalid share in wglCreateContextAttribsARB. gdi32: Initialize rgbReserved to zero in SetDIBColorTable. oleaut32/tests: Fix type descriptions leak (valgrind). Detlef Riekenberg (1): cabinet: Properly initialize internal fci structure (Valgrind). Donat Enikeev (2): crypt32/tests: Fix regression on Win7 with unprivileged run. crypt32/tests: Fix chain tests failure with cs.standford.edu certificates. Erich Hoover (1): user32/tests: Fix an inconsistent test case in clearing the clipboard. Fabian Maurer (1): dmloader: Better error reporting in IDirectMusicLoaderImpl_SetObject. Flávio J. Saraiva (2): cmd/tests: 'no echo' character with chains and brackets. cmd/tests: Add test for chaining rules. François Gouget (1): crypt32/tests: Add a trailing '\n' to ok() calls. Grant Paul (1): xmllite: Parse URLs in `DOCTYPE PUBLIC` DTDs. Grazvydas Ignotas (1): wined3d: Add Polaris GPUs and their driver. Hadrien Boizard (1): comctl32: Use wine_dbgstr_point in TRACES. Hans Leidekker (12): wbemprox: Implement Win32_OperatingSystem.TotalVirtualMemorySize. wbemprox: Implement Win32_PhysicalMemory.MemoryType. winhttp/tests: Fix test failures on Windows XP. webservices/tests: Mark some test results as broken. webservices/tests: Fix argument order in WsCreateMessage calls (Clang). webservices: Fix calculation of the end of a UTF-8 sequence. webservices: Add support for repeating element field mappings in WsWriteType. webservices: Add support for serializing array parameters in WsCall. wbemprox: Return a non-null UUID for Win32_ComputerSystemProduct.UUID if nothing better is available. wbemprox: Return the machine ID for Win32_ComputerSystemProduct.UUID on Linux. rpcrt4: Handle NULL binding in RpcBindingInqAuthClient{,Ex}. shell32: Implement IKnownFolderManager::GetFolderByName. Henri Verbeet (7): gdi32: Add support for D3DDDIFMT_A4R4G4B4 and D3DDDIFMT_X4R4G4B4 to D3DKMTCreateDCFromMemory(). wined3d: Support wined3d_texture_get_dc() on WINED3DFMT_B4G4R4A4_UNORM and WINED3DFMT_B4G4R4X4_UNORM textures. wined3d: Disable GL_TEXTURE_2D again in check_filter(). wined3d: The drawable is a valid location for offscreen textures when "AlwaysOffscreen" is disabled. wined3d: Properly check for the required extensions before selecting the GLSL FFP implementations. wined3d: Don't require the ARB program shader backend for the ARB fragment program FFP implementation. wined3d: Prefer shader backends that support both vertex and fragment shaders over ones that support only either. Hugh McMaster (2): reg/tests: Add more tests for 'reg import'. regedit/tests: Test if the final line is imported if it doesn't end in a newline. Huw D. M. Davies (7): user32/tests: Don't perform character lookup ToUnicode() tests on non-US keyboards. kernel32/tests: Add some GetLastError() values for Windows 8 and 10. kernel32/tests: On failure don't test the returned count - it contains random data on Windows 8 and 10. kernel32/tests: VerifyConsoleIoHandle() always returns FALSE on Windows 8 and 10. ntdll/tests: Listen on the pipe to allow the client to connect on Windows 8 and 10. user32/tests: Mark built-in wndproc auto-detection behaviour as broken on Windows 8 and 10. ntdll/tests: The fpu exception offset is broken on 32-bit Windows 8 too. Jacek Caban (3): advapi32/tests: Added TokenIsAppContainer tests. ntdll: Added TokenIsAppContainer semi-stub implementation. mshtml: Added IHTMLDocument3::dir property implementation. Julian Rüger (1): po: Update German translation. Józef Kucia (26): wined3d: Extend wined3d_texture_upload_data() to support partial uploads. wined3d: Use wined3d_texture_upload_data() in wined3d_device_update_sub_resource(). wined3d: Implement wined3d_update_sub_resource() for 3D textures. d3d11: Lie about threading support. wined3d: Add support for WINED3DFMT_R16_SNORM format. wined3d: Add support for WINED3DFMT_R8_SNORM format. wined3d: Add support for WINED3DFMT_R16G16B16A16_SNORM format. d3d11/tests: Add test for occlusion query. wined3d: Increase data size for occlusion queries to 8 bytes. d3d11: Return E_INVALIDARG from GetData() when "data" is NULL and "data_size" is non-zero. wined3d: Use glGetQueryObjectui64v() for occlusion queries when available. d3d11/tests: Add test for occlusion query with result bigger than UINT32_MAX. wined3d: Do not record sampler usage for UAVs. wined3d: Add ARB_shader_image_load_store extension. wined3d: Generate GLSL declarations for UAVs. wined3d: Introduce wined3d_device_set_unordered_access_view(). d3d11: Implement UAV binding. wined3d: Invalidate texture locations while binding UAVs. wined3d: Implement SM5 atomic_iadd instruction. wined3d: Add support for UAV reads. wined3d: Synchronize shader memory accesses after each draw call. d3d11/tests: Add test for 2D texture UAV in pixel shader. wined3d: Extract resource type info to shared table. d3d10core/tests: Port test_occlusion_query() from d3d11. d3d9/tests: Add test for occlusion query with result bigger than UINT32_MAX. wined3d: Increase shader resource limit to MAX_SHADER_RESOURCE_VIEWS. Lauri Kenttä (1): po: Update Finnish translation. Matteo Bruni (2): include: Fix FACILITY_AUDCLNT defines. include: Add d3d11 error codes. Michael Müller (1): msvfw32: Use case insensitive compare in ICInfo for fourcc codes. Michael Stefaniuc (2): winepulse: Avoid casting a COM object to an interface. mshtml: Avoid a cast from a COM object to an interface. Mingcong Bai (1): po: Update Simplified Chinese translation. Nikolay Sivov (26): include: Add d3dx11 error codes. d3dx11: Implement async data loader interfaces. mshtml: Fix BSTR leak in SetReferrerWithPolicy() (Valgrind). mshtml: Fix some IUri leaks (Valgrind). mshtml: Fix outer window url leak (Valgrind). mshtml: Fix uri builder leak on nsIFileURL release (Valgrind). mshtml/tests: Fix some BSTR leaks in various tests (Valgrind). ieframe/tests: Fix BSTR leak (Valgrind). ieframe: Fix moniker leak on error path. oledb32: Use growing array to store error records. oledb32: IErrorRecords uses 0-based index to access record info. oledb32: Implement GetCustomErrorObject(). oledb32: Implement GetBasicErrorInfo(). oledb32: Use better naming for IErrorRecords implementation structure. oledb32: Implement GetErrorParameters(). dwrite: Make it clear that wine_dbgstr_longlong() output is in hex. d2d1: Implement DrawLine() over DrawGeometry() for a linear path. d2d1: Store stroke style properties, implement methods returning them. shell32: Use interface pointers instead of a pointer to implementation structure. d2d1: Implement retrieving dash pattern data for stroke styles. d2d1: Fix GetGradientStops() when asked for more stops than collection has. strmbase: Remove a couple of redundant statements in Release() methods. strmbase: Allocate sample list as a part of queue structure. strmbase: Use wine_dbgstr_longlong() to trace REFERENCE_TIME arguments. strmbase: Remove some of casts to interface pointers. quartz: Use wine_dbgstr_longlong() to trace REFERENCE_TIME. Piotr Caban (6): msvcrt: Improve multibyte characters support in printf. vcruntime140: Add __std_terminate implementation. ucrtbase: Add __intrinsic_setjmp implementation. msvcr110: Add Concurrency::details::_Condition_variable class stub. msvcr120: Add _Condition_variable implementation. msvcr120: Add _Condition_variable tests. Stefan Dösinger (4): ddraw: Use wined3d_device_process_vertices for execute buffers. ddraw: Avoid redundant index buffer discards. ddraw: Avoid redundant src vertex buffer discards. ddraw: Implement executebuffer point and line draws. Stefan Silviu (1): msvcrt: Implement nearbyint and nearbyintf. -- Alexandre Julliard julliard ( -at -) winehq.org
  17. View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=24bf4b456a&e=0c004f9c13) Lenovo recently released one of the most interesting tablet hybrids in recent memory, just in time for the holidays. The Yoga Book has a digital keyboard that doubles as a sketch pad that even accommodates plain old paper, giving users several ways to draw images or jot notes. In fact, the tablet aspect of the machine is one of the most creative (and fun) concepts we’ve seen this year. The Yoga Book differs from traditional tablet first hybrid devices in several ways, but the most noticeable of these is the permanently attached keyboard, which is a departure from traditional 10-inch tablet form factors. Some tablet-first devices, like the 2016 version of the Dell XPS 12 and the Lenovo ThinkPad X1 Tablet, ship with a detachable keyboard. The 2-in-1 format is arguably more functional than a lone slate... Lenovo Yoga Book Review: A 2-In-1 With A Trick (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=0c73e62df5&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=6e70b7f990&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e07edc0c24&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e928e22c42&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=6ccfd53b9b&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=9bf1dda809&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f6fd957d06&e=0c004f9c13 ============================================================
  18. SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2912-1 Rating: important References: #1000189 #1000287 #1000304 #1000776 #1001419 #1001486 #1002165 #1003079 #1003153 #1003400 #1003568 #1003866 #1003925 #1003964 #1004252 #1004462 #1004517 #1004520 #1005666 #1006691 #1007615 #1007886 #744692 #772786 #789311 #857397 #860441 #865545 #866130 #868923 #874131 #876463 #898675 #904489 #909994 #911687 #915183 #921338 #921784 #922064 #922634 #924381 #924384 #930399 #931454 #934067 #937086 #937888 #940545 #941420 #946309 #955446 #956514 #959463 #961257 #962846 #966864 #967640 #970943 #971975 #971989 #974406 #974620 #975596 #975772 #976195 #977687 #978094 #979451 #979928 #982783 #983619 #984194 #984419 #984779 #984992 #985562 #986445 #987192 #987333 #987542 #987565 #987621 #987805 #988440 #988617 #988715 #989152 #989953 #990245 #991247 #991608 #991665 #992244 #992555 #992591 #992593 #992712 #993392 #993841 #993890 #993891 #994296 #994438 #994520 #994748 #995153 #995968 #996664 #997059 #997299 #997708 #997896 #998689 #998795 #998825 #999577 #999584 #999600 #999779 #999907 #999932 Cross-References: CVE-2015-8956 CVE-2016-5696 CVE-2016-6130 CVE-2016-6327 CVE-2016-6480 CVE-2016-6828 CVE-2016-7042 CVE-2016-7097 CVE-2016-7425 CVE-2016-8658 CVE-2016-8666 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 11 vulnerabilities and has 111 fixes is now available. Description: The SUSE Linux Enterprise 12 kernel was updated to 3.12.67 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517). - CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968). - CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925). - CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152). - CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability (bnc#987542). - CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748). - CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability (bnc#991608). - CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296). - CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932). - CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462). - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486). The following non-security bugs were fixed: - aacraid: Fix RRQ overload (bsc#1003079). - acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up (FATE#315621). - AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520). - apparmor: add missing id bounds check on dfa verification (bsc#1000304). - apparmor: check that xindex is in trans_table bounds (bsc#1000304). - apparmor: do not expose kernel stack (bsc#1000304). - apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304). - apparmor: ensure the target profile name is always audited (bsc#1000304). - apparmor: exec should not be returning ENOENT when it denies (bsc#1000304). - apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304). - apparmor: fix audit full profile hname on successful load (bsc#1000304). - apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287). - apparmor: fix disconnected bind mnts reconnection (bsc#1000304). - apparmor: fix log failures for all profiles in a set (bsc#1000304). - apparmor: fix module parameters can be changed after policy is locked (bsc#1000304). - apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304). - apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304). - apparmor: fix put() parent ref after up[censored] the active ref (bsc#1000304). - apparmor: fix refcount bug in profile replacement (bsc#1000304). - apparmor: fix refcount race when finding a child profile (bsc#1000304). - apparmor: fix replacement bug that adds new child to old parent (bsc#1000304). - apparmor: fix uninitialized lsm_audit member (bsc#1000304). - apparmor: fix update the mtime of the profile file on replacement (bsc#1000304). - apparmor: internal paths should be treated as disconnected (bsc#1000304). - apparmor: use list_next_entry instead of list_entry_next (bsc#1000304). - arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing (fate#315482)). - arm64: mm: remove broken &= operator from pmd_mknotpresent (Automatic NUMA Balancing (fate#315482)). - avoid dentry crash triggered by NFS (bsc#984194). - be2net: Don't leak iomapped memory on removal (bsc#921784). - be2net: fix BE3-R FW download compatibility check (bsc#921784). - be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784). - be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784). - blkfront: fix an error path memory leak (luckily none so far). - blk-mq: fix undefined behaviour in order_to_size() (fate#315209). - blktap2: eliminate deadlock potential from shutdown path (bsc#909994). - blktap2: eliminate race from deferred work queue handling (bsc#911687). - bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes (fate#316924). - bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687). - bonding: fix curr_active_slave/carrier with loadbalance arp monitoring (fate#316924). - bonding: Prevent IPv6 link local address on enslaved devices (fate#316924). - bonding: prevent out of bound accesses (fate#316924). - bonding: set carrier off for devices created through netlink (bsc#999577). - btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619). - btrfs: add missing discards when unpinning extents with -o discard (bsc#904489). - btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489). - btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489). - btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600). - btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489). - btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779) - btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489). - btrfs: handle quota reserve failure properly (bsc#1005666). - btrfs: iterate over unused chunk space in FITRIM (bsc#904489). - btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489). - btrfs: properly track when rescan worker is running (bsc#989953). - btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489). - btrfs: reorder patches to place local patches back at the end of the series - btrfs: skip superblocks during discard (bsc#904489). - btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192). - btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712). - cdc-acm: added sanity checking for probe() (bsc#993891). - ceph: After a write, we must free the 'request', not the 'response'. This error crept in during the backport. bsc#995153 - cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153). - cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153). - clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888). - conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864). - cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866). - cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338). - dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943) - Document the process to blacklist upstream commit-ids - drivers/hv: share Hyper-V SynIC constants with userspace (bnc#937888). - drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#937888). - drivers: hv: vmbus: avoid unneeded compiler optimizations in vmbus_wait_for_unload() (bnc#937888). - drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#937888). - drivers: hv: vmbus: Cleanup vmbus_set_event() (bnc#937888). - drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#937888). - drivers: hv: vmbus: do not manipulate with clocksources on crash (bnc#937888). - drivers: hv: vmbus: Force all channel messages to be delivered on CPU 0 (bnc#937888). - drivers: hv: vmbus: Get rid of the unused irq variable (bnc#937888). - drivers: hv: vmbus: handle various crash scenarios (bnc#937888). - drivers: hv: vmbus: remove code duplication in message handling (bnc#937888). - drivers: hv: vmbus: Support handling messages on multiple CPUs (bnc#937888). - drivers: hv: vmbus: Support kexec on ws2012 r2 and above (bnc#937888). - efi: Small leak on error in runtime map code (fate#315019). - ext2: Enable ext2 driver in config files (bsc#976195, fate#320805) - ext4: Add parameter for tuning handling of ext2 (bsc#976195). - ext4: Fixup handling for custom configs. - fs/select: add vmalloc fallback for select(2) (bsc#1000189). - ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419). - hyperv: enable call to clockevents_unbind_device in kexec/kdump path - hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel - i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659). - ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338). - ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891). - input: Revert "can: dev: fix deadlock reported after bus-off". - input: Revert "Input: i8042 - break load dependency between atkbd/psmouse and i8042". - input: Revert "Input: i8042 - set up shared ps2_cmd_mutex for AUX ports". - introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486). - iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772). - ipv6: Fix improper use or RCU (bsc#961257) - ipv6: fix multipath route replace error recovery (bsc#930399). - ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt. - ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067). - ipv6: send only one NEWLINK when RA causes changes (bsc#934067). - iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805). - iwlwifi: dvm: fix flush support for old firmware (bsc#940545). - kabi: clockevents: export clockevents_unbind again. - kabi: Fix kabi change cause by adding flock_owner to open_context (bsc#998689). - kabi: hide harmless change in struct inet_connection_sock (fate#318553). - kABI: protect backing-dev include in mm/migrate. - kABI: protect enum usb_device_speed. - kABI: protect struct mlx5_modify_qp_mbox_in. - kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617). - kaweth: fix firmware download (bsc#993890). - kaweth: fix oops upon failed memory allocation (bsc#993890). - kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420). - kernel/printk/printk.c: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311). - kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463). - Kvm: vmx: defer load of APIC access page address during reset (bsc#959463). - libceph: enable large, variable-sized OSD requests (bsc#988715). - libceph: make r_request msg_size calculation clearer (bsc#988715). - libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715). - libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715). - libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715). - libfc: do not send ABTS when resetting exchanges (bsc#962846). - libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846). - libfc: Fixup disc_mutex handling (bsc#962846). - libfc: fixup locking of ptp_setup() (bsc#962846). - libfc: Issue PRLI after a PRLO has been received (bsc#962846). - libfc: reset exchange manager during LOGO handling (bsc#962846). - libfc: Revisit kref handling (bnc#990245). - libfc: sanity check cpu number extracted from xid (bsc#988440). - libfc: send LOGO for PLOGI failure (bsc#962846). - lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866). - md: check command validity early in md_ioctl() (bsc#1004520). - md: Drop sending a change uevent when stopping (bsc#1003568). - md: lockless I/O submission for RAID1 (bsc#982783). - md/raid5: fix a recently broken BUG_ON() (bsc#1006691). - memcg: convert threshold to bytes (bnc#931454). - memcg: fix thresholds for 32b architectures (bnc#931454). - mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975 VM performance -- git fixes). - mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445). - module: Issue warnings when tainting kernel (bsc#974406). - mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708). - MSI-X: fix an error path (luckily none so far). - netback: fix flipping mode (bsc#996664). - netback: fix refounting (bsc#978094). - netfront: don't truncate grant references. - netfront: use correct linear area after linearizing an skb (bsc#1007886). - nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400). - nfs: Add a stub for GETDEVICELIST (bnc#898675). - nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584). - nfsd: Use free_conn to free connection (bsc#979451). - nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514). - nfs: Fix a regression in the read() syscall (bsc#999584). - nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463). - nfs: fix pg_test page count calculation (bnc#898675). - nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776). - nfsv4: add flock_owner to open context (bnc#998689). - nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689). - nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689). - nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689). - nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130). - oom: print nodemask in the oom report (bnc#1003866). - packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131). - perf/x86/intel: Fix bug for "cycles:p" and "cycles:pp" on SLM (bsc#997896). - pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252). - pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441). - powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825). - printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928). - qgroup: Prevent qgroup->reserved from going subzero (bsc#993841). - qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609) - radeon: avoid boot hang in Xen Dom0 (luckily none so far). - ratelimit: extend to print suppressed messages on release (bsc#979928). - ratelimit: fix bug in time interval by resetting right begin time (bsc#979928). - rbd: truncate objects on cmpext short reads (bsc#988715). - rpm/config.sh: Set the SP1 release string to 60. (bsc#997059) - rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059) - rtnetlink: avoid 0 sized arrays (fate#316924). - s390: add SMT support (bnc#994438, LTC#144756). - sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419). - sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419). - scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992). - scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989) - scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992). - sd: Fix memory leak caused by RESET_WP patch (bsc#999779). - squashfs3: properly handle dir_emit() failures (bsc#998795). - sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923). - sunrpc: Fix a regression when reconnecting (bsc#946309). - supported.conf: Add ext2 - supported.conf: Add iscsi modules to -base (bsc#997299) - supported.conf: Add tun to -base (bsc#992593) - supported.conf: Add veth to -base (bsc#992591) - target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621). - target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621). - tcp: add proper TS val into RST packets (bsc#937086). - tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086). - tcp: fix child sockets to use system default congestion control if not set (fate#318553). - tcp: fix cwnd limited checking to improve congestion control (bsc#988617). - tcp: refresh skb timestamp at retransmit time (bsc#937086). - timers: Use proper base migration in add_timer_on() (bnc#993392). - tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486). - tunnels: Remove encapsulation offloads on decap (bsc#1001486). - Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244). - Update patches.kabi/kabi.clockevents_unbind.patch (bnc#937888). - uprobes: Fix the memcg accounting (bnc#931454). - usb: fix typo in wMaxPacketSize validation (bsc#991665). - usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615). - usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634). - usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665). - vmxnet3: Wake queue from reset work (bsc#999907). - x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes). - xenbus: don't invoke ->is_ready() for most device states (bsc#987333). - xenbus: inspect the correct type in xenbus_dev_request_and_reply(). - xen: Linux 3.12.63. - xen/pciback: Fix conf_space read/write overlap check. - xen-pciback: return proper values during BAR sizing. - xen: Refresh patches.xen/xen3-patch-3.9 (bsc#991247). - xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620). - xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153). - xfs: fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153). - xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446). - xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565). - xhci: silence warnings in switch (bnc#991665). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1700=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1700=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1700=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1700=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1700=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1700=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): kernel-default-debuginfo-3.12.67-60.64.18.1 kernel-default-debugsource-3.12.67-60.64.18.1 kernel-default-extra-3.12.67-60.64.18.1 kernel-default-extra-debuginfo-3.12.67-60.64.18.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): kernel-obs-build-3.12.67-60.64.18.1 kernel-obs-build-debugsource-3.12.67-60.64.18.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): kernel-docs-3.12.67-60.64.18.3 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kernel-default-3.12.67-60.64.18.1 kernel-default-base-3.12.67-60.64.18.1 kernel-default-base-debuginfo-3.12.67-60.64.18.1 kernel-default-debuginfo-3.12.67-60.64.18.1 kernel-default-debugsource-3.12.67-60.64.18.1 kernel-default-devel-3.12.67-60.64.18.1 kernel-syms-3.12.67-60.64.18.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): kernel-devel-3.12.67-60.64.18.1 kernel-macros-3.12.67-60.64.18.1 kernel-source-3.12.67-60.64.18.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): kernel-xen-3.12.67-60.64.18.1 kernel-xen-base-3.12.67-60.64.18.1 kernel-xen-base-debuginfo-3.12.67-60.64.18.1 kernel-xen-debuginfo-3.12.67-60.64.18.1 kernel-xen-debugsource-3.12.67-60.64.18.1 kernel-xen-devel-3.12.67-60.64.18.1 - SUSE Linux Enterprise Server 12-SP1 (s390x): kernel-default-man-3.12.67-60.64.18.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.67-60.64.18.1 kernel-ec2-debuginfo-3.12.67-60.64.18.1 kernel-ec2-debugsource-3.12.67-60.64.18.1 kernel-ec2-devel-3.12.67-60.64.18.1 kernel-ec2-extra-3.12.67-60.64.18.1 kernel-ec2-extra-debuginfo-3.12.67-60.64.18.1 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_67-60_64_18-default-1-6.3 kgraft-patch-3_12_67-60_64_18-xen-1-6.3 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): kernel-devel-3.12.67-60.64.18.1 kernel-macros-3.12.67-60.64.18.1 kernel-source-3.12.67-60.64.18.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kernel-default-3.12.67-60.64.18.1 kernel-default-debuginfo-3.12.67-60.64.18.1 kernel-default-debugsource-3.12.67-60.64.18.1 kernel-default-devel-3.12.67-60.64.18.1 kernel-default-extra-3.12.67-60.64.18.1 kernel-default-extra-debuginfo-3.12.67-60.64.18.1 kernel-syms-3.12.67-60.64.18.1 kernel-xen-3.12.67-60.64.18.1 kernel-xen-debuginfo-3.12.67-60.64.18.1 kernel-xen-debugsource-3.12.67-60.64.18.1 kernel-xen-devel-3.12.67-60.64.18.1 References: https://www.suse.com/security/cve/CVE-2015-8956.html https://www.suse.com/security/cve/CVE-2016-5696.html https://www.suse.com/security/cve/CVE-2016-6130.html https://www.suse.com/security/cve/CVE-2016-6327.html https://www.suse.com/security/cve/CVE-2016-6480.html https://www.suse.com/security/cve/CVE-2016-6828.html https://www.suse.com/security/cve/CVE-2016-7042.html https://www.suse.com/security/cve/CVE-2016-7097.html https://www.suse.com/security/cve/CVE-2016-7425.html https://www.suse.com/security/cve/CVE-2016-8658.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1000189 https://bugzilla.suse.com/1000287 https://bugzilla.suse.com/1000304 https://bugzilla.suse.com/1000776 https://bugzilla.suse.com/1001419 https://bugzilla.suse.com/1001486 https://bugzilla.suse.com/1002165 https://bugzilla.suse.com/1003079 https://bugzilla.suse.com/1003153 https://bugzilla.suse.com/1003400 https://bugzilla.suse.com/1003568 https://bugzilla.suse.com/1003866 https://bugzilla.suse.com/1003925 https://bugzilla.suse.com/1003964 https://bugzilla.suse.com/1004252 https://bugzilla.suse.com/1004462 https://bugzilla.suse.com/1004517 https://bugzilla.suse.com/1004520 https://bugzilla.suse.com/1005666 https://bugzilla.suse.com/1006691 https://bugzilla.suse.com/1007615 https://bugzilla.suse.com/1007886 https://bugzilla.suse.com/744692 https://bugzilla.suse.com/772786 https://bugzilla.suse.com/789311 https://bugzilla.suse.com/857397 https://bugzilla.suse.com/860441 https://bugzilla.suse.com/865545 https://bugzilla.suse.com/866130 https://bugzilla.suse.com/868923 https://bugzilla.suse.com/874131 https://bugzilla.suse.com/876463 https://bugzilla.suse.com/898675 https://bugzilla.suse.com/904489 https://bugzilla.suse.com/909994 https://bugzilla.suse.com/911687 https://bugzilla.suse.com/915183 https://bugzilla.suse.com/921338 https://bugzilla.suse.com/921784 https://bugzilla.suse.com/922064 https://bugzilla.suse.com/922634 https://bugzilla.suse.com/924381 https://bugzilla.suse.com/924384 https://bugzilla.suse.com/930399 https://bugzilla.suse.com/931454 https://bugzilla.suse.com/934067 https://bugzilla.suse.com/937086 https://bugzilla.suse.com/937888 https://bugzilla.suse.com/940545 https://bugzilla.suse.com/941420 https://bugzilla.suse.com/946309 https://bugzilla.suse.com/955446 https://bugzilla.suse.com/956514 https://bugzilla.suse.com/959463 https://bugzilla.suse.com/961257 https://bugzilla.suse.com/962846 https://bugzilla.suse.com/966864 https://bugzilla.suse.com/967640 https://bugzilla.suse.com/970943 https://bugzilla.suse.com/971975 https://bugzilla.suse.com/971989 https://bugzilla.suse.com/974406 https://bugzilla.suse.com/974620 https://bugzilla.suse.com/975596 https://bugzilla.suse.com/975772 https://bugzilla.suse.com/976195 https://bugzilla.suse.com/977687 https://bugzilla.suse.com/978094 https://bugzilla.suse.com/979451 https://bugzilla.suse.com/979928 https://bugzilla.suse.com/982783 https://bugzilla.suse.com/983619 https://bugzilla.suse.com/984194 https://bugzilla.suse.com/984419 https://bugzilla.suse.com/984779 https://bugzilla.suse.com/984992 https://bugzilla.suse.com/985562 https://bugzilla.suse.com/986445 https://bugzilla.suse.com/987192 https://bugzilla.suse.com/987333 https://bugzilla.suse.com/987542 https://bugzilla.suse.com/987565 https://bugzilla.suse.com/987621 https://bugzilla.suse.com/987805 https://bugzilla.suse.com/988440 https://bugzilla.suse.com/988617 https://bugzilla.suse.com/988715 https://bugzilla.suse.com/989152 https://bugzilla.suse.com/989953 https://bugzilla.suse.com/990245 https://bugzilla.suse.com/991247 https://bugzilla.suse.com/991608 https://bugzilla.suse.com/991665 https://bugzilla.suse.com/992244 https://bugzilla.suse.com/992555 https://bugzilla.suse.com/992591 https://bugzilla.suse.com/992593 https://bugzilla.suse.com/992712 https://bugzilla.suse.com/993392 https://bugzilla.suse.com/993841 https://bugzilla.suse.com/993890 https://bugzilla.suse.com/993891 https://bugzilla.suse.com/994296 https://bugzilla.suse.com/994438 https://bugzilla.suse.com/994520 https://bugzilla.suse.com/994748 https://bugzilla.suse.com/995153 https://bugzilla.suse.com/995968 https://bugzilla.suse.com/996664 https://bugzilla.suse.com/997059 https://bugzilla.suse.com/997299 https://bugzilla.suse.com/997708 https://bugzilla.suse.com/997896 https://bugzilla.suse.com/998689 https://bugzilla.suse.com/998795 https://bugzilla.suse.com/998825 https://bugzilla.suse.com/999577 https://bugzilla.suse.com/999584 https://bugzilla.suse.com/999600 https://bugzilla.suse.com/999779 https://bugzilla.suse.com/999907 https://bugzilla.suse.com/999932 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  19. Hi folks, There will be a BSP on the weekend of the 27th-29th of January at my house in Cambridge. More information in the wiki at http://wiki.debian.org/BSP/2017/01/gb/Cambridge and please register there as well if you're going to join us so we can co-ordinate accommodation, food etc. Let's do Stretch! -- Steve McIntyre, Cambridge, UK. steve ( -at -) einval.com Welcome my son, welcome to the machine.
  20. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: MSI GeForce GTX 1070 Quick Silver OC 8 GB Link: http://www.techpowerup.com/reviews/MSI/GTX_1070_Quick_Silver_OC Brief: MSI's GTX 1070 Quick Silver does away with the red-and-black color theme and uses stylish silver instead. Thanks to the powerful cooler from the GTX 1070 Gaming Z, the card is the coolest and quietest GTX 1070 we ever tested. It also comes at a rather affordable $425.
  21. AOC AGON AG271QG 165hz G-Sync Gaming Monitor Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=9166fceb3b&e=872093acb5 http://www.kitguru.net AOC AGON AG271QG 165hz G-Sync Gaming Monitor Review We were impressed with our first look at AOC’s new AGON gaming screen brand, which arrived in the shape of the AG271QX (http://www.kitguru.net/peripherals/james-morris/aoc-agon-ag271qx-adaptive-sync-gaming-monitor-review/) . Whilst the AOC AGON AG271QG’s almost identical model name and indistinguishable external appearance makes it look like it’s the same screen with G-Sync instead of FreeSync, it actually has a markedly different specification. Read the review here: http://www.kitguru.net/peripherals/james-morris/aoc-agon-ag271qg-165hz-g-sync-gaming-monitor-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=9166fceb3b&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  22. Hello Hardware Community! After a very long development process, the CableMod Team is happy to announce to the world our new premium cable kits. Developed with input from some of the world's top modders, these power supply cable replacements are made to be the best internal PC cables on the market. This email requires a modern e-mail reader but you can view the email online here: https://cablemod.com/?na=v&id=16&nk=383-b16d417f68. Thank you, CableMod
  23. Hi News Poster HardwareOverclock.com has just posted another review. Last week we have tested the brand new Plextor S2G 256GB M.2 SSD. "Plextor has combined advanced SSD technology with proprietary firmware and software to create the S2 series of SSDs that offer users the best cost vs. performance ratio. The S2 series uses high quality components such as the Hynix 16nm TLC NAND Flash memory and the latest SMI controller chip to deliver continuous blazing read/write speeds of up to 520/450 MB/s and random read/write speeds of 98K/78K IOPS(S2C), 96K/77K IOPS(S2G). The exceptional performance offers first time users and enthusiasts the most affordable SSD upgrade." Title: Plextor S2G 256GB SSD M.2 ( -at -) HardwareOverclock.com Link: http://hardwareoverclock.com/Plextor-S2G-256GB-im-Formfaktor-M2.htm Image: http://hardwareoverclock.com/speicher/Plextor-S2G-SSD-256GB-07.jpg Thanks for posting our news. Pls feel free and send us your News too. Rene Ruf Chefredakteur HardwareOverclock.com <mailto:admin ( -at -) hardwareoverclock.com> mailto:admin ( -at -) hardwareoverclock.com hardwareoverclock.com
×