news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
TITLE: ASUS TUF SABERTOOTH 990FX R3.0 Review ( -at -) Vortez CONTENT: The ASUS TUF SABERTOOTH range was arguably an instant hit with its military themed camo colours of golden, greeny browns and the TUF promise of an extra rugged, extra strong design backed by a 5 year warranty. Today, the TUF lineup of products have matured aesthetically, delivering an unexpected degree of control over your system to ensure an absolute level of robustness. Of course, the 990FX chipset has something in common with the TUF lineup, it's nearly the same age (within a year?). Despite that, competitive pricing of the FX chips present favourable value and it makes sense to refresh the tired old SABERTOOTH 990FX. Though there was a second revision of the SABERTOOTH 990FX, it mostly brought about minor changes, and underworks that the end consumer may not really notice, other than the heatsink colour change. This time, the R3.0 delivers a whole lot more. LINK: http://www.vortez.net/review.php?id=1221 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
** TECHSPOT ------------------------------------------------------------ ** Battlefield 1 Benchmarked: Graphics & CPU Performance ------------------------------------------------------------ ** http://www.techspot.com/review/1267-battlefield-1-benchmarks/ ------------------------------------------------------------ Battlefield 1 marks the fifteenth installment to EA's multiplayer military shooter franchise. The BF1 beta made a strong first impression with great graphics that weren't overly demanding. After testing 41 graphics cards and 20 processors in our Gears of War 4 benchmark feature, we wanted to do the same for Battlefield 1 and for the most part we succeeded. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
A news post would be great. OCC has published a review on the MSI RX 470 Gaming X 8G Here is a quote from the review: Quote: â€ÂWhere you can add FPS performance without compromising the settings you use in-game is by overclocking. MSI builds some headroom into its Gaming series cards and this one is no different. I was able to run the boost clock speed all the way up to 1410MHz using 1120mv and keep it there throughout my testing. No small feat when you look at how easily this architecture from AMD will throttle clock speeds. By building a robust power delivery system on a custom PCB using Military Class IV Super Ferrite chokes, Tantalum-filled Hi-C caps, and solid capacitors, you can set the voltage right where you need it to keep from overloading the circuitry. Delivering clean reliable power is but one part of the equation. Keeping the silicon cool is another.†Title: MSI RX 470 Gaming X 8G Review Link: http://www.overclockersclub.com/reviews/msi_rx_470_gaming_x_8g/ Img: http://www.overclockersclub.com/siteimages/articles/msi_rx_470_gaming_x_8g/5_thumb.jpg
-
openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2597-1 Rating: important References: #1000019 #1004465 Cross-References: CVE-2016-5181 CVE-2016-5182 CVE-2016-5183 CVE-2016-5184 CVE-2016-5185 CVE-2016-5186 CVE-2016-5187 CVE-2016-5188 CVE-2016-5189 CVE-2016-5190 CVE-2016-5191 CVE-2016-5192 CVE-2016-5193 Affected Products: openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: Chromium was updated to 54.0.2840.59 to fix security issues and bugs. The following security issues are fixed (bnc#1004465): - CVE-2016-5181: Universal XSS in Blink - CVE-2016-5182: Heap overflow in Blink - CVE-2016-5183: Use after free in PDFium - CVE-2016-5184: Use after free in PDFium - CVE-2016-5185: Use after free in Blink - CVE-2016-5187: URL spoofing - CVE-2016-5188: UI spoofing - CVE-2016-5192: Cross-origin bypass in Blink - CVE-2016-5189: URL spoofing - CVE-2016-5186: Out of bounds read in DevTools - CVE-2016-5191: Universal XSS in Bookmarks - CVE-2016-5190: Use after free in Internals - CVE-2016-5193: Scheme bypass The following bugs were fixed: - bnc#1000019: display issues in full screen mode, add --ui-disable-partial-swap to the launcher The following packaging changes are included: - The desktop sub-packages are no obsolete - The package now uses the system variants of some bundled libraries - The hangouts extension is now built Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch 5717=1 - openSUSE 13.2: zypper in -t patch 5717=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (x86_64): chromedriver-54.0.2840.59-82.1 chromedriver-debuginfo-54.0.2840.59-82.1 chromium-54.0.2840.59-82.1 chromium-debuginfo-54.0.2840.59-82.1 chromium-debugsource-54.0.2840.59-82.1 chromium-ffmpegsumo-54.0.2840.59-82.1 chromium-ffmpegsumo-debuginfo-54.0.2840.59-82.1 - openSUSE 13.2 (i586 x86_64): chromedriver-54.0.2840.59-131.2 chromedriver-debuginfo-54.0.2840.59-131.2 chromium-54.0.2840.59-131.2 chromium-debuginfo-54.0.2840.59-131.2 chromium-debugsource-54.0.2840.59-131.2 chromium-ffmpegsumo-54.0.2840.59-131.2 chromium-ffmpegsumo-debuginfo-54.0.2840.59-131.2 References: https://www.suse.com/security/cve/CVE-2016-5181.html https://www.suse.com/security/cve/CVE-2016-5182.html https://www.suse.com/security/cve/CVE-2016-5183.html https://www.suse.com/security/cve/CVE-2016-5184.html https://www.suse.com/security/cve/CVE-2016-5185.html https://www.suse.com/security/cve/CVE-2016-5186.html https://www.suse.com/security/cve/CVE-2016-5187.html https://www.suse.com/security/cve/CVE-2016-5188.html https://www.suse.com/security/cve/CVE-2016-5189.html https://www.suse.com/security/cve/CVE-2016-5190.html https://www.suse.com/security/cve/CVE-2016-5191.html https://www.suse.com/security/cve/CVE-2016-5192.html https://www.suse.com/security/cve/CVE-2016-5193.html https://bugzilla.suse.com/1000019 https://bugzilla.suse.com/1004465 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2597-1 Rating: important References: #1000019 #1004465 Cross-References: CVE-2016-5181 CVE-2016-5182 CVE-2016-5183 CVE-2016-5184 CVE-2016-5185 CVE-2016-5186 CVE-2016-5187 CVE-2016-5188 CVE-2016-5189 CVE-2016-5190 CVE-2016-5191 CVE-2016-5192 CVE-2016-5193 Affected Products: openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: Chromium was updated to 54.0.2840.59 to fix security issues and bugs. The following security issues are fixed (bnc#1004465): - CVE-2016-5181: Universal XSS in Blink - CVE-2016-5182: Heap overflow in Blink - CVE-2016-5183: Use after free in PDFium - CVE-2016-5184: Use after free in PDFium - CVE-2016-5185: Use after free in Blink - CVE-2016-5187: URL spoofing - CVE-2016-5188: UI spoofing - CVE-2016-5192: Cross-origin bypass in Blink - CVE-2016-5189: URL spoofing - CVE-2016-5186: Out of bounds read in DevTools - CVE-2016-5191: Universal XSS in Bookmarks - CVE-2016-5190: Use after free in Internals - CVE-2016-5193: Scheme bypass The following bugs were fixed: - bnc#1000019: display issues in full screen mode, add --ui-disable-partial-swap to the launcher The following packaging changes are included: - The desktop sub-packages are no obsolete - The package now uses the system variants of some bundled libraries - The hangouts extension is now built Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch 5717=1 - openSUSE 13.2: zypper in -t patch 5717=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (x86_64): chromedriver-54.0.2840.59-82.1 chromedriver-debuginfo-54.0.2840.59-82.1 chromium-54.0.2840.59-82.1 chromium-debuginfo-54.0.2840.59-82.1 chromium-debugsource-54.0.2840.59-82.1 chromium-ffmpegsumo-54.0.2840.59-82.1 chromium-ffmpegsumo-debuginfo-54.0.2840.59-82.1 - openSUSE 13.2 (i586 x86_64): chromedriver-54.0.2840.59-131.2 chromedriver-debuginfo-54.0.2840.59-131.2 chromium-54.0.2840.59-131.2 chromium-debuginfo-54.0.2840.59-131.2 chromium-debugsource-54.0.2840.59-131.2 chromium-ffmpegsumo-54.0.2840.59-131.2 chromium-ffmpegsumo-debuginfo-54.0.2840.59-131.2 References: https://www.suse.com/security/cve/CVE-2016-5181.html https://www.suse.com/security/cve/CVE-2016-5182.html https://www.suse.com/security/cve/CVE-2016-5183.html https://www.suse.com/security/cve/CVE-2016-5184.html https://www.suse.com/security/cve/CVE-2016-5185.html https://www.suse.com/security/cve/CVE-2016-5186.html https://www.suse.com/security/cve/CVE-2016-5187.html https://www.suse.com/security/cve/CVE-2016-5188.html https://www.suse.com/security/cve/CVE-2016-5189.html https://www.suse.com/security/cve/CVE-2016-5190.html https://www.suse.com/security/cve/CVE-2016-5191.html https://www.suse.com/security/cve/CVE-2016-5192.html https://www.suse.com/security/cve/CVE-2016-5193.html https://bugzilla.suse.com/1000019 https://bugzilla.suse.com/1004465 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
[security-announce] SUSE-SU-2016:2598-1: important: Security update for Chromium
news posted a topic in Upcoming News
SUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2598-1 Rating: important References: #1000019 #1004465 Cross-References: CVE-2016-5181 CVE-2016-5182 CVE-2016-5183 CVE-2016-5184 CVE-2016-5185 CVE-2016-5186 CVE-2016-5187 CVE-2016-5188 CVE-2016-5189 CVE-2016-5190 CVE-2016-5191 CVE-2016-5192 CVE-2016-5193 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: Chromium was updated to 54.0.2840.59 to fix security issues and bugs. The following security issues are fixed (bnc#1004465): - CVE-2016-5181: Universal XSS in Blink - CVE-2016-5182: Heap overflow in Blink - CVE-2016-5183: Use after free in PDFium - CVE-2016-5184: Use after free in PDFium - CVE-2016-5185: Use after free in Blink - CVE-2016-5187: URL spoofing - CVE-2016-5188: UI spoofing - CVE-2016-5192: Cross-origin bypass in Blink - CVE-2016-5189: URL spoofing - CVE-2016-5186: Out of bounds read in DevTools - CVE-2016-5191: Universal XSS in Bookmarks - CVE-2016-5190: Use after free in Internals - CVE-2016-5193: Scheme bypass The following bugs were fixed: - bnc#1000019: display issues in full screen mode, add --ui-disable-partial-swap to the launcher The following packaging changes are included: - The desktop sub-packages are no obsolete - The package now uses the system variants of some bundled libraries - The hangouts extension is now built Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch 5717=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): chromedriver-54.0.2840.59-109.1 chromedriver-debuginfo-54.0.2840.59-109.1 chromium-54.0.2840.59-109.1 chromium-debuginfo-54.0.2840.59-109.1 chromium-debugsource-54.0.2840.59-109.1 chromium-ffmpegsumo-54.0.2840.59-109.1 chromium-ffmpegsumo-debuginfo-54.0.2840.59-109.1 References: https://www.suse.com/security/cve/CVE-2016-5181.html https://www.suse.com/security/cve/CVE-2016-5182.html https://www.suse.com/security/cve/CVE-2016-5183.html https://www.suse.com/security/cve/CVE-2016-5184.html https://www.suse.com/security/cve/CVE-2016-5185.html https://www.suse.com/security/cve/CVE-2016-5186.html https://www.suse.com/security/cve/CVE-2016-5187.html https://www.suse.com/security/cve/CVE-2016-5188.html https://www.suse.com/security/cve/CVE-2016-5189.html https://www.suse.com/security/cve/CVE-2016-5190.html https://www.suse.com/security/cve/CVE-2016-5191.html https://www.suse.com/security/cve/CVE-2016-5192.html https://www.suse.com/security/cve/CVE-2016-5193.html https://bugzilla.suse.com/1000019 https://bugzilla.suse.com/1004465 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
TITLE: GIGABYTE Force H5 Review ( -at -) Vortez CONTENT: As the Force H5 fills the role of the virtual surround, USB gaming headset, GIGABYTE have come up with an interesting solution for the built in audio processing and interactive controls. Rather than a traditional mechanical remote featuring buttons, we are presented with a touch controlled panel that lights up. LINK: http://www.vortez.net/review.php?id=1220 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2596-1 Rating: important References: #1004418 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one security issue. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-kernel-source-12807=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-kernel-source-12807=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): kernel-default-3.0.101-0.7.44.1 kernel-default-base-3.0.101-0.7.44.1 kernel-default-devel-3.0.101-0.7.44.1 kernel-source-3.0.101-0.7.44.1 kernel-syms-3.0.101-0.7.44.1 kernel-trace-3.0.101-0.7.44.1 kernel-trace-base-3.0.101-0.7.44.1 kernel-trace-devel-3.0.101-0.7.44.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 x86_64): kernel-ec2-3.0.101-0.7.44.1 kernel-ec2-base-3.0.101-0.7.44.1 kernel-ec2-devel-3.0.101-0.7.44.1 kernel-xen-3.0.101-0.7.44.1 kernel-xen-base-3.0.101-0.7.44.1 kernel-xen-devel-3.0.101-0.7.44.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (s390x): kernel-default-man-3.0.101-0.7.44.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586): kernel-pae-3.0.101-0.7.44.1 kernel-pae-base-3.0.101-0.7.44.1 kernel-pae-devel-3.0.101-0.7.44.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): kernel-default-debuginfo-3.0.101-0.7.44.1 kernel-default-debugsource-3.0.101-0.7.44.1 kernel-default-devel-debuginfo-3.0.101-0.7.44.1 kernel-trace-debuginfo-3.0.101-0.7.44.1 kernel-trace-debugsource-3.0.101-0.7.44.1 kernel-trace-devel-debuginfo-3.0.101-0.7.44.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 x86_64): kernel-ec2-debuginfo-3.0.101-0.7.44.1 kernel-ec2-debugsource-3.0.101-0.7.44.1 kernel-xen-debuginfo-3.0.101-0.7.44.1 kernel-xen-debugsource-3.0.101-0.7.44.1 kernel-xen-devel-debuginfo-3.0.101-0.7.44.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586): kernel-pae-debuginfo-3.0.101-0.7.44.1 kernel-pae-debugsource-3.0.101-0.7.44.1 kernel-pae-devel-debuginfo-3.0.101-0.7.44.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004418 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
[CentOS-announce] CESA-2016:2093 Important CentOS 6 bind Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2016:2093 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-2093.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 26593a0bc69f60721bfbe602702fed0b1b6a9052689c8a38c205d7990bcef96f bind-9.8.2-0.47.rc1.el6_8.2.i686.rpm 9fdf51a04607a7ae65ee4c1c6fd66baa8731dd46568cac59142dd058a2de36c3 bind-chroot-9.8.2-0.47.rc1.el6_8.2.i686.rpm 06815b94fb05c3aba8a7b46ceaf5d90cd9d7f218069e0692e657616976bf34e0 bind-devel-9.8.2-0.47.rc1.el6_8.2.i686.rpm ffd6cac5b2e46c019c85a7d542d0697bf1f879fb98220fccb63df83a287bee18 bind-libs-9.8.2-0.47.rc1.el6_8.2.i686.rpm 12ee83e91fc71dd47fee86b28919b3be06cbdd0c9b788aafd1616d4d64e60653 bind-sdb-9.8.2-0.47.rc1.el6_8.2.i686.rpm 32208e49b5afc026bb1c370aee1f19c76be6290b54ddfa530d9d1619f64b12d8 bind-utils-9.8.2-0.47.rc1.el6_8.2.i686.rpm x86_64: 80e27194242661a3531d16838ff345e8614418ead4367d74e8386f0a47eec445 bind-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm 415c2f5ca5d5699973739f86bd7fc06dc3c05631c75fd3890acba9f3c48b7132 bind-chroot-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm 06815b94fb05c3aba8a7b46ceaf5d90cd9d7f218069e0692e657616976bf34e0 bind-devel-9.8.2-0.47.rc1.el6_8.2.i686.rpm 647c07e08b0d72a9e272dbb2193c47e9f2a0402b9b4191bbeeef4b196f744919 bind-devel-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm ffd6cac5b2e46c019c85a7d542d0697bf1f879fb98220fccb63df83a287bee18 bind-libs-9.8.2-0.47.rc1.el6_8.2.i686.rpm 9253860386f45cdb54a64f06b8622a0773923732993ccc0a75d23e1eb48d30e0 bind-libs-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm 2d7c635a0b0d89d7802d6658397513fc949a739713be929ed8e7110869ddacb0 bind-sdb-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm 312bbcea824c1bfe24d85dc0ba93cab754e516c726844a6fecbc83b44cff54e6 bind-utils-9.8.2-0.47.rc1.el6_8.2.x86_64.rpm Source: 2b06618b10b7afb41bd17f9c270f45254cfe447ba815187915caed02dc07399c bind-9.8.2-0.47.rc1.el6_8.2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
CentOS Errata and Bugfix Advisory 2016:2096 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-2096.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 81adad4d2e47225ac0063c0cb9cd0466fc625cb76098c9427ade10b6ad2b4ada tzdata-2016h-1.el7.noarch.rpm 6502b4d41d55440d0f706c6bb31b56e2bf480cfc9a0a207c190d7f1b22c5771c tzdata-java-2016h-1.el7.noarch.rpm Source: 9dc0352fae7e07c4c56cc878ee3abef747ec79f67c837089ea6dfba607dbca9d tzdata-2016h-1.el7.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
-
CentOS Errata and Bugfix Advisory 2016:2096 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-2096.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 0052e3c0edefe1f8915fc34e779b24606c127af41012674831c14f87d51f7e16 tzdata-2016h-1.el6.noarch.rpm ddbc1f33f59568dd99138f53deb8eb029383ec68d015461eeb63903afd05267e tzdata-java-2016h-1.el6.noarch.rpm x86_64: 0052e3c0edefe1f8915fc34e779b24606c127af41012674831c14f87d51f7e16 tzdata-2016h-1.el6.noarch.rpm ddbc1f33f59568dd99138f53deb8eb029383ec68d015461eeb63903afd05267e tzdata-java-2016h-1.el6.noarch.rpm Source: b0fb605d1e065f012f89b608e61a6ef121c5a73552f6dbce2be2c448b3370944 tzdata-2016h-1.el6.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
-
[CentOS-announce] CESA-2016:2093 Important CentOS 5 bind Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2016:2093 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-2093.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 1c7927fec6b2966dd9e0b8c9c28bc8e384638db4dabea4f216f5fe649b65424e bind-9.3.6-25.P1.el5_11.10.i386.rpm f05787e1d6d3824b875923a91f9b71c73342190fcacdf34ed7e426f88eda16d1 bind-chroot-9.3.6-25.P1.el5_11.10.i386.rpm 8328c709e2ac7203f2a33f5bc591262900fa4c3a4715f5224ed3fbe1848bc2d3 bind-devel-9.3.6-25.P1.el5_11.10.i386.rpm ac09b6c1a8368ed464a8bae61f4a2025b2e617c8f77bdd90b14ce5a3cd5010c3 bind-libbind-devel-9.3.6-25.P1.el5_11.10.i386.rpm 73318c5eb63ea15dc6e31cf23fbb23e0012d860e9e3726c18a9bbec99df7a485 bind-libs-9.3.6-25.P1.el5_11.10.i386.rpm 1b06ccd1b79c863c7459cb4cfa1a6d5cf18b06b20d141dbceac8be23275c3606 bind-sdb-9.3.6-25.P1.el5_11.10.i386.rpm e5f0a486cb2b6808f3f1d5b81f42ebab2927d5e2d12abcf21a22d44106cac52e bind-utils-9.3.6-25.P1.el5_11.10.i386.rpm 592201761602a121208cefad75f7d955df9a89d58be06c0b9db978322f47fb94 caching-nameserver-9.3.6-25.P1.el5_11.10.i386.rpm x86_64: 3cff5f207d927f99e5d342397badeb1513485699ae0aefda9a5562f99a51f560 bind-9.3.6-25.P1.el5_11.10.x86_64.rpm 5d41ef95a0fc3a3635421def7792c4971aef60fa968e31f050805998bdf530f6 bind-chroot-9.3.6-25.P1.el5_11.10.x86_64.rpm 8328c709e2ac7203f2a33f5bc591262900fa4c3a4715f5224ed3fbe1848bc2d3 bind-devel-9.3.6-25.P1.el5_11.10.i386.rpm 73ea232936f464e5eb90aff556e7b72d5fc43809596b7ba3edf006fa0c8ffd37 bind-devel-9.3.6-25.P1.el5_11.10.x86_64.rpm ac09b6c1a8368ed464a8bae61f4a2025b2e617c8f77bdd90b14ce5a3cd5010c3 bind-libbind-devel-9.3.6-25.P1.el5_11.10.i386.rpm 6f7dfba454de9f05434380cfc30dc19558d7b5ea1b2e68688cd642140858b793 bind-libbind-devel-9.3.6-25.P1.el5_11.10.x86_64.rpm 73318c5eb63ea15dc6e31cf23fbb23e0012d860e9e3726c18a9bbec99df7a485 bind-libs-9.3.6-25.P1.el5_11.10.i386.rpm a8233281551c9185260b88df6c0b5c0279986edfbf68042b46d2e023595f41ed bind-libs-9.3.6-25.P1.el5_11.10.x86_64.rpm c503f14920c2853330733ab283c2e9099fc77a0815f6264f554fb61f77825f90 bind-sdb-9.3.6-25.P1.el5_11.10.x86_64.rpm a4e2bc74b6044ce313b9897c2d9f2fbd1ebe372426e54db186125ac08669d2ef bind-utils-9.3.6-25.P1.el5_11.10.x86_64.rpm 47ca6185600538c59be505ecdbf0dd837344ca19ff68bef651a988b20f71cde4 caching-nameserver-9.3.6-25.P1.el5_11.10.x86_64.rpm Source: a87cf41ad9e8b99cd2f3fa1641d82d570b4b9ff81a35ca92c64549a08b7ef16a bind-9.3.6-25.P1.el5_11.10.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________ -
[CentOS-announce] CESA-2016:2094 Important CentOS 5 bind97 Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2016:2094 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-2094.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: bbb7a04f44606083f62ae69cea90bb29360a7e75716b3cc05f681d34b8e907a7 bind97-9.7.0-21.P2.el5_11.8.i386.rpm 01a297bc02856208edd495ef3eb03a754b8d63a4944547150a75a3293ec2cdb7 bind97-chroot-9.7.0-21.P2.el5_11.8.i386.rpm 339429fe3711f3a9f3f8cb00b5486286fc76c519eae1fa8c8f1bf52b62591aba bind97-devel-9.7.0-21.P2.el5_11.8.i386.rpm 908f02de2180a6c483046992fafd710f7361c3785d3606a479ba74e4b27f1ee8 bind97-libs-9.7.0-21.P2.el5_11.8.i386.rpm 9787163334d94a88b3cea8f1fb434ea0395787edb61307510a1aa0d249bcdb45 bind97-utils-9.7.0-21.P2.el5_11.8.i386.rpm x86_64: 1b2296acb71cb6ee456daeb7a957aaa9bc3c573ba7151778f8132b466c80752e bind97-9.7.0-21.P2.el5_11.8.x86_64.rpm aa9f002b79ce397438391b00c945cca4124bb70f034fd774572d771f14ee182f bind97-chroot-9.7.0-21.P2.el5_11.8.x86_64.rpm 339429fe3711f3a9f3f8cb00b5486286fc76c519eae1fa8c8f1bf52b62591aba bind97-devel-9.7.0-21.P2.el5_11.8.i386.rpm 61ce23c7b9f3765239a389a1543c3f85ac862084325e6f6c10297de933294630 bind97-devel-9.7.0-21.P2.el5_11.8.x86_64.rpm 908f02de2180a6c483046992fafd710f7361c3785d3606a479ba74e4b27f1ee8 bind97-libs-9.7.0-21.P2.el5_11.8.i386.rpm 18771645ae922c3bebe44aaf1e9376105509432713eaa37d6fcc07fd87dbeb1a bind97-libs-9.7.0-21.P2.el5_11.8.x86_64.rpm f9526dbaa32e4d74e071d72255363b4fa53a92fabd5d8af00765c5f435fae840 bind97-utils-9.7.0-21.P2.el5_11.8.x86_64.rpm Source: 4ddc9ccf10398546bfd8ed635e531368e4d02030de807b355f0b53f28bff1784 bind97-9.7.0-21.P2.el5_11.8.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________ -
CentOS Errata and Bugfix Advisory 2016:2096 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-2096.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 5f017688459d59931f6c59681406b5a2b064a12fa713668a487f62e039b32d3e tzdata-2016h-1.el5.i386.rpm 5dfb4fb30451fe97d0b897615d3cafd3d6e0893dd8d5ec88bcd6253778b9d90f tzdata-java-2016h-1.el5.i386.rpm x86_64: 3d8b6021853f1f6b10da37209f7a27405118bd479aeb6e1f6a2f5b73da023dcf tzdata-2016h-1.el5.x86_64.rpm 94f250609aa3c4ef1a0f24e4dba952bb116664392878e9f9833ae2a0880de426 tzdata-java-2016h-1.el5.x86_64.rpm Source: 5a7f8a9b948ad2fba327aebeec1bb4e6d894c104f83ae540e4f1a65802fcce30 tzdata-2016h-1.el5.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________
-
Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,Some of the best things are inspired, or maybe it is inspiration is the best. I forget but ya, good case.Subject: Silverstone Primera PM01 Case Review ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/reviews/cases/sst_pm01Quote: In this review I’ll be looking at the Silverstone Primera Series PM01. This is a new series for Silverstone that is designed for exceptional style and functionality. Primera is a Spanish word for first and is an interesting choice considering that the overall design and styleA news posting would be appreciated.ThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved
-
Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,Some of the best things are inspired, or maybe it is inspiration is the best. I forget but ya, good case.Subject: Silverstone Primera PM01 Case Review ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/reviews/cases/sst_pm01Quote: In this review I’ll be looking at the Silverstone Primera Series PM01. This is a new series for Silverstone that is designed for exceptional style and functionality. Primera is a Spanish word for first and is an interesting choice considering that the overall design and styleA news posting would be appreciated.ThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2593-1 Rating: important References: #1001419 #1002165 #1004418 #904970 #907150 #920615 #920633 #930408 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Module for Public Cloud 12 ______________________________________________________________________________ An update that solves one vulnerability and has 7 fixes is now available. Description: The SUSE Linux Enterprise 12 GA LTSS kernel was updated to fix two issues. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). This non-security bug was fixed: - sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1524=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1524=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1524=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (noarch): kernel-devel-3.12.60-52.57.1 kernel-macros-3.12.60-52.57.1 kernel-source-3.12.60-52.57.1 - SUSE Linux Enterprise Server for SAP 12 (x86_64): kernel-default-3.12.60-52.57.1 kernel-default-base-3.12.60-52.57.1 kernel-default-base-debuginfo-3.12.60-52.57.1 kernel-default-debuginfo-3.12.60-52.57.1 kernel-default-debugsource-3.12.60-52.57.1 kernel-default-devel-3.12.60-52.57.1 kernel-syms-3.12.60-52.57.1 kernel-xen-3.12.60-52.57.1 kernel-xen-base-3.12.60-52.57.1 kernel-xen-base-debuginfo-3.12.60-52.57.1 kernel-xen-debuginfo-3.12.60-52.57.1 kernel-xen-debugsource-3.12.60-52.57.1 kernel-xen-devel-3.12.60-52.57.1 kgraft-patch-3_12_60-52_57-default-1-2.1 kgraft-patch-3_12_60-52_57-xen-1-2.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): kernel-default-3.12.60-52.57.1 kernel-default-base-3.12.60-52.57.1 kernel-default-base-debuginfo-3.12.60-52.57.1 kernel-default-debuginfo-3.12.60-52.57.1 kernel-default-debugsource-3.12.60-52.57.1 kernel-default-devel-3.12.60-52.57.1 kernel-syms-3.12.60-52.57.1 - SUSE Linux Enterprise Server 12-LTSS (noarch): kernel-devel-3.12.60-52.57.1 kernel-macros-3.12.60-52.57.1 kernel-source-3.12.60-52.57.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kernel-xen-3.12.60-52.57.1 kernel-xen-base-3.12.60-52.57.1 kernel-xen-base-debuginfo-3.12.60-52.57.1 kernel-xen-debuginfo-3.12.60-52.57.1 kernel-xen-debugsource-3.12.60-52.57.1 kernel-xen-devel-3.12.60-52.57.1 kgraft-patch-3_12_60-52_57-default-1-2.1 kgraft-patch-3_12_60-52_57-xen-1-2.1 - SUSE Linux Enterprise Server 12-LTSS (s390x): kernel-default-man-3.12.60-52.57.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.60-52.57.1 kernel-ec2-debuginfo-3.12.60-52.57.1 kernel-ec2-debugsource-3.12.60-52.57.1 kernel-ec2-devel-3.12.60-52.57.1 kernel-ec2-extra-3.12.60-52.57.1 kernel-ec2-extra-debuginfo-3.12.60-52.57.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1001419 https://bugzilla.suse.com/1002165 https://bugzilla.suse.com/1004418 https://bugzilla.suse.com/904970 https://bugzilla.suse.com/907150 https://bugzilla.suse.com/920615 https://bugzilla.suse.com/920633 https://bugzilla.suse.com/930408 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2592-1 Rating: important References: #1001419 #1002165 #1004418 #904970 #907150 #920615 #920633 #930408 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has 7 fixes is now available. Description: The SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). This non-security bug was fixed: - sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1522=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1522=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1522=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1522=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1522=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1522=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-extra-3.12.62-60.64.8.2 kernel-default-extra-debuginfo-3.12.62-60.64.8.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): kernel-obs-build-3.12.62-60.64.8.3 kernel-obs-build-debugsource-3.12.62-60.64.8.3 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): kernel-docs-3.12.62-60.64.8.5 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kernel-default-3.12.62-60.64.8.2 kernel-default-base-3.12.62-60.64.8.2 kernel-default-base-debuginfo-3.12.62-60.64.8.2 kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-devel-3.12.62-60.64.8.2 kernel-syms-3.12.62-60.64.8.2 - SUSE Linux Enterprise Server 12-SP1 (noarch): kernel-devel-3.12.62-60.64.8.2 kernel-macros-3.12.62-60.64.8.2 kernel-source-3.12.62-60.64.8.2 - SUSE Linux Enterprise Server 12-SP1 (x86_64): kernel-xen-3.12.62-60.64.8.2 kernel-xen-base-3.12.62-60.64.8.2 kernel-xen-base-debuginfo-3.12.62-60.64.8.2 kernel-xen-debuginfo-3.12.62-60.64.8.2 kernel-xen-debugsource-3.12.62-60.64.8.2 kernel-xen-devel-3.12.62-60.64.8.2 - SUSE Linux Enterprise Server 12-SP1 (s390x): kernel-default-man-3.12.62-60.64.8.2 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.62-60.64.8.2 kernel-ec2-debuginfo-3.12.62-60.64.8.2 kernel-ec2-debugsource-3.12.62-60.64.8.2 kernel-ec2-devel-3.12.62-60.64.8.2 kernel-ec2-extra-3.12.62-60.64.8.2 kernel-ec2-extra-debuginfo-3.12.62-60.64.8.2 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_62-60_64_8-default-1-2.2 kgraft-patch-3_12_62-60_64_8-xen-1-2.2 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kernel-default-3.12.62-60.64.8.2 kernel-default-debuginfo-3.12.62-60.64.8.2 kernel-default-debugsource-3.12.62-60.64.8.2 kernel-default-devel-3.12.62-60.64.8.2 kernel-default-extra-3.12.62-60.64.8.2 kernel-default-extra-debuginfo-3.12.62-60.64.8.2 kernel-syms-3.12.62-60.64.8.2 kernel-xen-3.12.62-60.64.8.2 kernel-xen-debuginfo-3.12.62-60.64.8.2 kernel-xen-debugsource-3.12.62-60.64.8.2 kernel-xen-devel-3.12.62-60.64.8.2 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): kernel-devel-3.12.62-60.64.8.2 kernel-macros-3.12.62-60.64.8.2 kernel-source-3.12.62-60.64.8.2 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1001419 https://bugzilla.suse.com/1002165 https://bugzilla.suse.com/1004418 https://bugzilla.suse.com/904970 https://bugzilla.suse.com/907150 https://bugzilla.suse.com/920615 https://bugzilla.suse.com/920633 https://bugzilla.suse.com/930408 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Title: Antec KUHLER H2O H600 Pro AIO Liquid CPU Cooler Review ( -at -) NikKTech Description: Very good cooling efficiency, almost silent running and a good price tag are the three main reasons as to why you should give a chance to the new KUHLER H2O H600 Pro AIO liquid CPU cooler by Antec. Article Link: http://www.nikktech.com/main/articles/pc-hardware/cpu-cooling/liquid-cpu-coo lers/7076-antec-kuhler-h2o-h600-pro-aio-liquid-cpu-cooler-review Image Link: http://www.nikktech.com/main/images/pics/reviews/antec/kuhler_h2o_h600_pro/a ntec_h2o_h600_proa.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=4f236c7068&e=0c004f9c13) Moto introduced the Moto Z family back in July with the launch of the Moto Z and Moto Z Force. Packed with flagship worthy hardware like the Qualcomm Snapdragon 820, both phones made a serious statement (click for full review) thanks to their modular capabilities, by way of Moto Mods. Moto Mods tune the already premium smartphones to a whole new level when attached. We were impressed by the Moto Mods we played with, including JBL's SoundBoost and the Moto Insta-Share Projector. Unfortunately, these phones were tied to Verizon at the time of our review, but unlocked variants are now trickling onto store shelves. Today, however, we take a close look at the newest sibling in the Moto Z family - the Moto Z Play. The Moto Z Play is pitched as a more affordable alternative to the Moto Z and Moto Z Force... Moto Z Play Review: 8-Cores And Insane Battery Life (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e036ce5d34&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=237b3d1d88&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=90aff2a6e8&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=0228756e40&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=8b30b197c3&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=9bad9333ac&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=144cc7494c&e=0c004f9c13 ============================================================
-
[security-announce] SUSE-SU-2016:2589-1: important: Security update for qemu
news posted a topic in Upcoming News
SUSE Security Update: Security update for qemu ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2589-1 Rating: important References: #1000048 #967012 #967013 #982017 #982018 #982019 #982222 #982223 #982285 #982959 #983961 #983982 #991080 #991466 #994760 #994771 #994774 #996441 #997858 #997859 Cross-References: CVE-2016-2391 CVE-2016-2392 CVE-2016-4453 CVE-2016-4454 CVE-2016-5105 CVE-2016-5106 CVE-2016-5107 CVE-2016-5126 CVE-2016-5238 CVE-2016-5337 CVE-2016-5338 CVE-2016-5403 CVE-2016-6490 CVE-2016-6833 CVE-2016-6836 CVE-2016-6888 CVE-2016-7116 CVE-2016-7155 CVE-2016-7156 Affected Products: SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 19 vulnerabilities and has one errata is now available. Description: qemu was updated to fix 19 security issues. These security issues were fixed: - CVE-2016-2392: The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU did not properly validate USB configuration descriptor objects, which allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet (bsc#967012) - CVE-2016-2391: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allowed local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers (bsc#967013) - CVE-2016-5106: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982018) - CVE-2016-5105: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, used an uninitialized variable, which allowed local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command (bsc#982017) - CVE-2016-5107: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors (bsc#982019) - CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982285) - CVE-2016-4454: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read (bsc#982222) - CVE-2016-4453: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982223) - CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer (bsc#983982) - CVE-2016-5337: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983961) - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c in QEMU allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982959) - CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion (bsc#991080) - CVE-2016-6490: Infinite loop in the virtio framework. A privileged user inside the guest could have used this flaw to crash the Qemu instance on the host resulting in DoS (bsc#991466) - CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. A privileged user inside guest could have used this flaw to crash the Qemu instance resulting in DoS (bsc#994771) - CVE-2016-6833: Use-after-free issue in the VMWARE VMXNET3 NIC device support. A privileged user inside guest could have used this issue to crash the Qemu instance resulting in DoS (bsc#994774) - CVE-2016-7116: Host directory sharing via Plan 9 File System(9pfs) was vulnerable to a directory/path traversal issue. A privileged user inside guest could have used this flaw to access undue files on the host (bsc#996441) - CVE-2016-6836: VMWARE VMXNET3 NIC device support was leaging information leakage. A privileged user inside guest could have used this to leak host memory bytes to a guest (bsc#994760) - CVE-2016-7155: In the VMWARE PVSCSI paravirtual SCSI bus a OOB access and/or infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997858) - CVE-2016-7156: In the VMWARE PVSCSI paravirtual SCSI bus a infinite loop issue could have allowed a privileged user inside guest to crash the Qemu process resulting in DoS (bsc#997859) This non-security issue was fixed: - bsc#1000048: Fix migration failure where target host is a soon to be released SLES 12 SP2. Qemu's spice code gets an assertion. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1523=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1523=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): qemu-2.3.1-21.1 qemu-block-curl-2.3.1-21.1 qemu-block-curl-debuginfo-2.3.1-21.1 qemu-debugsource-2.3.1-21.1 qemu-guest-agent-2.3.1-21.1 qemu-guest-agent-debuginfo-2.3.1-21.1 qemu-lang-2.3.1-21.1 qemu-tools-2.3.1-21.1 qemu-tools-debuginfo-2.3.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): qemu-kvm-2.3.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le): qemu-ppc-2.3.1-21.1 qemu-ppc-debuginfo-2.3.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): qemu-ipxe-1.0.0-21.1 qemu-seabios-1.8.1-21.1 qemu-sgabios-8-21.1 qemu-vgabios-1.8.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): qemu-block-rbd-2.3.1-21.1 qemu-block-rbd-debuginfo-2.3.1-21.1 qemu-x86-2.3.1-21.1 - SUSE Linux Enterprise Server 12-SP1 (s390x): qemu-s390-2.3.1-21.1 qemu-s390-debuginfo-2.3.1-21.1 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): qemu-ipxe-1.0.0-21.1 qemu-seabios-1.8.1-21.1 qemu-sgabios-8-21.1 qemu-vgabios-1.8.1-21.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): qemu-2.3.1-21.1 qemu-block-curl-2.3.1-21.1 qemu-block-curl-debuginfo-2.3.1-21.1 qemu-debugsource-2.3.1-21.1 qemu-kvm-2.3.1-21.1 qemu-tools-2.3.1-21.1 qemu-tools-debuginfo-2.3.1-21.1 qemu-x86-2.3.1-21.1 References: https://www.suse.com/security/cve/CVE-2016-2391.html https://www.suse.com/security/cve/CVE-2016-2392.html https://www.suse.com/security/cve/CVE-2016-4453.html https://www.suse.com/security/cve/CVE-2016-4454.html https://www.suse.com/security/cve/CVE-2016-5105.html https://www.suse.com/security/cve/CVE-2016-5106.html https://www.suse.com/security/cve/CVE-2016-5107.html https://www.suse.com/security/cve/CVE-2016-5126.html https://www.suse.com/security/cve/CVE-2016-5238.html https://www.suse.com/security/cve/CVE-2016-5337.html https://www.suse.com/security/cve/CVE-2016-5338.html https://www.suse.com/security/cve/CVE-2016-5403.html https://www.suse.com/security/cve/CVE-2016-6490.html https://www.suse.com/security/cve/CVE-2016-6833.html https://www.suse.com/security/cve/CVE-2016-6836.html https://www.suse.com/security/cve/CVE-2016-6888.html https://www.suse.com/security/cve/CVE-2016-7116.html https://www.suse.com/security/cve/CVE-2016-7155.html https://www.suse.com/security/cve/CVE-2016-7156.html https://bugzilla.suse.com/1000048 https://bugzilla.suse.com/967012 https://bugzilla.suse.com/967013 https://bugzilla.suse.com/982017 https://bugzilla.suse.com/982018 https://bugzilla.suse.com/982019 https://bugzilla.suse.com/982222 https://bugzilla.suse.com/982223 https://bugzilla.suse.com/982285 https://bugzilla.suse.com/982959 https://bugzilla.suse.com/983961 https://bugzilla.suse.com/983982 https://bugzilla.suse.com/991080 https://bugzilla.suse.com/991466 https://bugzilla.suse.com/994760 https://bugzilla.suse.com/994771 https://bugzilla.suse.com/994774 https://bugzilla.suse.com/996441 https://bugzilla.suse.com/997858 https://bugzilla.suse.com/997859 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
openSUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2584-1 Rating: important References: #1001419 #1001486 #1002165 #1004418 Cross-References: CVE-2016-5195 CVE-2016-8666 Affected Products: openSUSE 13.1 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: The openSUSE 13.1 kernel was updated to fix bugs and security issues. The following security bugs were fixed: - CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bnc#1001486). - CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418). The following non-security bugs were fixed: - sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419). - sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419). - tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2016-1211=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): cloop-2.639-11.34.1 cloop-debuginfo-2.639-11.34.1 cloop-debugsource-2.639-11.34.1 cloop-kmp-default-2.639_k3.12.62_55-11.34.1 cloop-kmp-default-debuginfo-2.639_k3.12.62_55-11.34.1 cloop-kmp-desktop-2.639_k3.12.62_55-11.34.1 cloop-kmp-desktop-debuginfo-2.639_k3.12.62_55-11.34.1 cloop-kmp-xen-2.639_k3.12.62_55-11.34.1 cloop-kmp-xen-debuginfo-2.639_k3.12.62_55-11.34.1 crash-7.0.2-2.34.1 crash-debuginfo-7.0.2-2.34.1 crash-debugsource-7.0.2-2.34.1 crash-devel-7.0.2-2.34.1 crash-doc-7.0.2-2.34.1 crash-eppic-7.0.2-2.34.1 crash-eppic-debuginfo-7.0.2-2.34.1 crash-gcore-7.0.2-2.34.1 crash-gcore-debuginfo-7.0.2-2.34.1 crash-kmp-default-7.0.2_k3.12.62_55-2.34.1 crash-kmp-default-debuginfo-7.0.2_k3.12.62_55-2.34.1 crash-kmp-desktop-7.0.2_k3.12.62_55-2.34.1 crash-kmp-desktop-debuginfo-7.0.2_k3.12.62_55-2.34.1 crash-kmp-xen-7.0.2_k3.12.62_55-2.34.1 crash-kmp-xen-debuginfo-7.0.2_k3.12.62_55-2.34.1 hdjmod-debugsource-1.28-16.34.1 hdjmod-kmp-default-1.28_k3.12.62_55-16.34.1 hdjmod-kmp-default-debuginfo-1.28_k3.12.62_55-16.34.1 hdjmod-kmp-desktop-1.28_k3.12.62_55-16.34.1 hdjmod-kmp-desktop-debuginfo-1.28_k3.12.62_55-16.34.1 hdjmod-kmp-xen-1.28_k3.12.62_55-16.34.1 hdjmod-kmp-xen-debuginfo-1.28_k3.12.62_55-16.34.1 ipset-6.21.1-2.38.1 ipset-debuginfo-6.21.1-2.38.1 ipset-debugsource-6.21.1-2.38.1 ipset-devel-6.21.1-2.38.1 ipset-kmp-default-6.21.1_k3.12.62_55-2.38.1 ipset-kmp-default-debuginfo-6.21.1_k3.12.62_55-2.38.1 ipset-kmp-desktop-6.21.1_k3.12.62_55-2.38.1 ipset-kmp-desktop-debuginfo-6.21.1_k3.12.62_55-2.38.1 ipset-kmp-xen-6.21.1_k3.12.62_55-2.38.1 ipset-kmp-xen-debuginfo-6.21.1_k3.12.62_55-2.38.1 iscsitarget-1.4.20.3-13.34.1 iscsitarget-debuginfo-1.4.20.3-13.34.1 iscsitarget-debugsource-1.4.20.3-13.34.1 iscsitarget-kmp-default-1.4.20.3_k3.12.62_55-13.34.1 iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.12.62_55-13.34.1 iscsitarget-kmp-desktop-1.4.20.3_k3.12.62_55-13.34.1 iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.12.62_55-13.34.1 iscsitarget-kmp-xen-1.4.20.3_k3.12.62_55-13.34.1 iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.12.62_55-13.34.1 kernel-default-3.12.62-55.1 kernel-default-base-3.12.62-55.1 kernel-default-base-debuginfo-3.12.62-55.1 kernel-default-debuginfo-3.12.62-55.1 kernel-default-debugsource-3.12.62-55.1 kernel-default-devel-3.12.62-55.1 kernel-syms-3.12.62-55.1 libipset3-6.21.1-2.38.1 libipset3-debuginfo-6.21.1-2.38.1 ndiswrapper-1.58-35.1 ndiswrapper-debuginfo-1.58-35.1 ndiswrapper-debugsource-1.58-35.1 ndiswrapper-kmp-default-1.58_k3.12.62_55-35.1 ndiswrapper-kmp-default-debuginfo-1.58_k3.12.62_55-35.1 ndiswrapper-kmp-desktop-1.58_k3.12.62_55-35.1 ndiswrapper-kmp-desktop-debuginfo-1.58_k3.12.62_55-35.1 openvswitch-1.11.0-0.41.1 openvswitch-controller-1.11.0-0.41.1 openvswitch-controller-debuginfo-1.11.0-0.41.1 openvswitch-debuginfo-1.11.0-0.41.1 openvswitch-debugsource-1.11.0-0.41.1 openvswitch-kmp-default-1.11.0_k3.12.62_55-0.41.1 openvswitch-kmp-default-debuginfo-1.11.0_k3.12.62_55-0.41.1 openvswitch-kmp-desktop-1.11.0_k3.12.62_55-0.41.1 openvswitch-kmp-desktop-debuginfo-1.11.0_k3.12.62_55-0.41.1 openvswitch-kmp-xen-1.11.0_k3.12.62_55-0.41.1 openvswitch-kmp-xen-debuginfo-1.11.0_k3.12.62_55-0.41.1 openvswitch-pki-1.11.0-0.41.1 openvswitch-switch-1.11.0-0.41.1 openvswitch-switch-debuginfo-1.11.0-0.41.1 openvswitch-test-1.11.0-0.41.1 pcfclock-0.44-258.35.1 pcfclock-debuginfo-0.44-258.35.1 pcfclock-debugsource-0.44-258.35.1 pcfclock-kmp-default-0.44_k3.12.62_55-258.35.1 pcfclock-kmp-default-debuginfo-0.44_k3.12.62_55-258.35.1 pcfclock-kmp-desktop-0.44_k3.12.62_55-258.35.1 pcfclock-kmp-desktop-debuginfo-0.44_k3.12.62_55-258.35.1 python-openvswitch-1.11.0-0.41.1 python-openvswitch-test-1.11.0-0.41.1 python-virtualbox-4.2.36-2.66.1 python-virtualbox-debuginfo-4.2.36-2.66.1 vhba-kmp-debugsource-20130607-2.34.1 vhba-kmp-default-20130607_k3.12.62_55-2.34.1 vhba-kmp-default-debuginfo-20130607_k3.12.62_55-2.34.1 vhba-kmp-desktop-20130607_k3.12.62_55-2.34.1 vhba-kmp-desktop-debuginfo-20130607_k3.12.62_55-2.34.1 vhba-kmp-xen-20130607_k3.12.62_55-2.34.1 vhba-kmp-xen-debuginfo-20130607_k3.12.62_55-2.34.1 virtualbox-4.2.36-2.66.1 virtualbox-debuginfo-4.2.36-2.66.1 virtualbox-debugsource-4.2.36-2.66.1 virtualbox-devel-4.2.36-2.66.1 virtualbox-guest-kmp-default-4.2.36_k3.12.62_55-2.66.1 virtualbox-guest-kmp-default-debuginfo-4.2.36_k3.12.62_55-2.66.1 virtualbox-guest-kmp-desktop-4.2.36_k3.12.62_55-2.66.1 virtualbox-guest-kmp-desktop-debuginfo-4.2.36_k3.12.62_55-2.66.1 virtualbox-guest-tools-4.2.36-2.66.1 virtualbox-guest-tools-debuginfo-4.2.36-2.66.1 virtualbox-guest-x11-4.2.36-2.66.1 virtualbox-guest-x11-debuginfo-4.2.36-2.66.1 virtualbox-host-kmp-default-4.2.36_k3.12.62_55-2.66.1 virtualbox-host-kmp-default-debuginfo-4.2.36_k3.12.62_55-2.66.1 virtualbox-host-kmp-desktop-4.2.36_k3.12.62_55-2.66.1 virtualbox-host-kmp-desktop-debuginfo-4.2.36_k3.12.62_55-2.66.1 virtualbox-qt-4.2.36-2.66.1 virtualbox-qt-debuginfo-4.2.36-2.66.1 virtualbox-websrv-4.2.36-2.66.1 virtualbox-websrv-debuginfo-4.2.36-2.66.1 xen-debugsource-4.3.4_10-67.1 xen-devel-4.3.4_10-67.1 xen-kmp-default-4.3.4_10_k3.12.62_55-67.1 xen-kmp-default-debuginfo-4.3.4_10_k3.12.62_55-67.1 xen-kmp-desktop-4.3.4_10_k3.12.62_55-67.1 xen-kmp-desktop-debuginfo-4.3.4_10_k3.12.62_55-67.1 xen-libs-4.3.4_10-67.1 xen-libs-debuginfo-4.3.4_10-67.1 xen-tools-domU-4.3.4_10-67.1 xen-tools-domU-debuginfo-4.3.4_10-67.1 xtables-addons-2.3-2.33.1 xtables-addons-debuginfo-2.3-2.33.1 xtables-addons-debugsource-2.3-2.33.1 xtables-addons-kmp-default-2.3_k3.12.62_55-2.33.1 xtables-addons-kmp-default-debuginfo-2.3_k3.12.62_55-2.33.1 xtables-addons-kmp-desktop-2.3_k3.12.62_55-2.33.1 xtables-addons-kmp-desktop-debuginfo-2.3_k3.12.62_55-2.33.1 xtables-addons-kmp-xen-2.3_k3.12.62_55-2.33.1 xtables-addons-kmp-xen-debuginfo-2.3_k3.12.62_55-2.33.1 - openSUSE 13.1 (i686 x86_64): kernel-debug-3.12.62-55.1 kernel-debug-base-3.12.62-55.1 kernel-debug-base-debuginfo-3.12.62-55.1 kernel-debug-debuginfo-3.12.62-55.1 kernel-debug-debugsource-3.12.62-55.1 kernel-debug-devel-3.12.62-55.1 kernel-debug-devel-debuginfo-3.12.62-55.1 kernel-desktop-3.12.62-55.1 kernel-desktop-base-3.12.62-55.1 kernel-desktop-base-debuginfo-3.12.62-55.1 kernel-desktop-debuginfo-3.12.62-55.1 kernel-desktop-debugsource-3.12.62-55.1 kernel-desktop-devel-3.12.62-55.1 kernel-ec2-3.12.62-55.1 kernel-ec2-base-3.12.62-55.1 kernel-ec2-base-debuginfo-3.12.62-55.1 kernel-ec2-debuginfo-3.12.62-55.1 kernel-ec2-debugsource-3.12.62-55.1 kernel-ec2-devel-3.12.62-55.1 kernel-trace-3.12.62-55.1 kernel-trace-base-3.12.62-55.1 kernel-trace-base-debuginfo-3.12.62-55.1 kernel-trace-debuginfo-3.12.62-55.1 kernel-trace-debugsource-3.12.62-55.1 kernel-trace-devel-3.12.62-55.1 kernel-vanilla-3.12.62-55.1 kernel-vanilla-debuginfo-3.12.62-55.1 kernel-vanilla-debugsource-3.12.62-55.1 kernel-vanilla-devel-3.12.62-55.1 kernel-xen-3.12.62-55.1 kernel-xen-base-3.12.62-55.1 kernel-xen-base-debuginfo-3.12.62-55.1 kernel-xen-debuginfo-3.12.62-55.1 kernel-xen-debugsource-3.12.62-55.1 kernel-xen-devel-3.12.62-55.1 - openSUSE 13.1 (noarch): kernel-devel-3.12.62-55.1 kernel-docs-3.12.62-55.2 kernel-macros-3.12.62-55.1 kernel-source-3.12.62-55.1 kernel-source-vanilla-3.12.62-55.1 virtualbox-host-source-4.2.36-2.66.1 - openSUSE 13.1 (x86_64): xen-4.3.4_10-67.1 xen-doc-html-4.3.4_10-67.1 xen-libs-32bit-4.3.4_10-67.1 xen-libs-debuginfo-32bit-4.3.4_10-67.1 xen-tools-4.3.4_10-67.1 xen-tools-debuginfo-4.3.4_10-67.1 xen-xend-tools-4.3.4_10-67.1 xen-xend-tools-debuginfo-4.3.4_10-67.1 - openSUSE 13.1 (i686): kernel-pae-3.12.62-55.1 kernel-pae-base-3.12.62-55.1 kernel-pae-base-debuginfo-3.12.62-55.1 kernel-pae-debuginfo-3.12.62-55.1 kernel-pae-debugsource-3.12.62-55.1 kernel-pae-devel-3.12.62-55.1 - openSUSE 13.1 (i586): cloop-kmp-pae-2.639_k3.12.62_55-11.34.1 cloop-kmp-pae-debuginfo-2.639_k3.12.62_55-11.34.1 crash-kmp-pae-7.0.2_k3.12.62_55-2.34.1 crash-kmp-pae-debuginfo-7.0.2_k3.12.62_55-2.34.1 hdjmod-kmp-pae-1.28_k3.12.62_55-16.34.1 hdjmod-kmp-pae-debuginfo-1.28_k3.12.62_55-16.34.1 ipset-kmp-pae-6.21.1_k3.12.62_55-2.38.1 ipset-kmp-pae-debuginfo-6.21.1_k3.12.62_55-2.38.1 iscsitarget-kmp-pae-1.4.20.3_k3.12.62_55-13.34.1 iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.12.62_55-13.34.1 ndiswrapper-kmp-pae-1.58_k3.12.62_55-35.1 ndiswrapper-kmp-pae-debuginfo-1.58_k3.12.62_55-35.1 openvswitch-kmp-pae-1.11.0_k3.12.62_55-0.41.1 openvswitch-kmp-pae-debuginfo-1.11.0_k3.12.62_55-0.41.1 pcfclock-kmp-pae-0.44_k3.12.62_55-258.35.1 pcfclock-kmp-pae-debuginfo-0.44_k3.12.62_55-258.35.1 vhba-kmp-pae-20130607_k3.12.62_55-2.34.1 vhba-kmp-pae-debuginfo-20130607_k3.12.62_55-2.34.1 virtualbox-guest-kmp-pae-4.2.36_k3.12.62_55-2.66.1 virtualbox-guest-kmp-pae-debuginfo-4.2.36_k3.12.62_55-2.66.1 virtualbox-host-kmp-pae-4.2.36_k3.12.62_55-2.66.1 virtualbox-host-kmp-pae-debuginfo-4.2.36_k3.12.62_55-2.66.1 xen-kmp-pae-4.3.4_10_k3.12.62_55-67.1 xen-kmp-pae-debuginfo-4.3.4_10_k3.12.62_55-67.1 xtables-addons-kmp-pae-2.3_k3.12.62_55-2.33.1 xtables-addons-kmp-pae-debuginfo-2.3_k3.12.62_55-2.33.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://www.suse.com/security/cve/CVE-2016-8666.html https://bugzilla.suse.com/1001419 https://bugzilla.suse.com/1001486 https://bugzilla.suse.com/1002165 https://bugzilla.suse.com/1004418 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2585-1 Rating: important References: #1004418 Cross-References: CVE-2016-5195 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-EXTRA SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue. This security bug was fixed: - CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-kernel-source-12804=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-kernel-source-12804=1 - SUSE Linux Enterprise Server 11-EXTRA: zypper in -t patch slexsp3-kernel-source-12804=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-kernel-source-12804=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (noarch): kernel-docs-3.0.101-84.2 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): kernel-default-3.0.101-84.1 kernel-default-base-3.0.101-84.1 kernel-default-devel-3.0.101-84.1 kernel-source-3.0.101-84.1 kernel-syms-3.0.101-84.1 kernel-trace-3.0.101-84.1 kernel-trace-base-3.0.101-84.1 kernel-trace-devel-3.0.101-84.1 - SUSE Linux Enterprise Server 11-SP4 (i586 x86_64): kernel-ec2-3.0.101-84.1 kernel-ec2-base-3.0.101-84.1 kernel-ec2-devel-3.0.101-84.1 kernel-xen-3.0.101-84.1 kernel-xen-base-3.0.101-84.1 kernel-xen-devel-3.0.101-84.1 - SUSE Linux Enterprise Server 11-SP4 (s390x): kernel-default-man-3.0.101-84.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64): kernel-ppc64-3.0.101-84.1 kernel-ppc64-base-3.0.101-84.1 kernel-ppc64-devel-3.0.101-84.1 - SUSE Linux Enterprise Server 11-SP4 (i586): kernel-pae-3.0.101-84.1 kernel-pae-base-3.0.101-84.1 kernel-pae-devel-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (i586 x86_64): kernel-xen-extra-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (x86_64): kernel-trace-extra-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (ppc64): kernel-ppc64-extra-3.0.101-84.1 - SUSE Linux Enterprise Server 11-EXTRA (i586): kernel-pae-extra-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): kernel-default-debuginfo-3.0.101-84.1 kernel-default-debugsource-3.0.101-84.1 kernel-trace-debuginfo-3.0.101-84.1 kernel-trace-debugsource-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 s390x x86_64): kernel-default-devel-debuginfo-3.0.101-84.1 kernel-trace-devel-debuginfo-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64): kernel-ec2-debuginfo-3.0.101-84.1 kernel-ec2-debugsource-3.0.101-84.1 kernel-xen-debuginfo-3.0.101-84.1 kernel-xen-debugsource-3.0.101-84.1 kernel-xen-devel-debuginfo-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (ppc64): kernel-ppc64-debuginfo-3.0.101-84.1 kernel-ppc64-debugsource-3.0.101-84.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586): kernel-pae-debuginfo-3.0.101-84.1 kernel-pae-debugsource-3.0.101-84.1 kernel-pae-devel-debuginfo-3.0.101-84.1 References: https://www.suse.com/security/cve/CVE-2016-5195.html https://bugzilla.suse.com/1004418 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title:*Seek Thermal CompactPro Android Thermal Imager *Link:* http://bigbruin.com/content/seek-compactpro_1 *Image (250x250):* http://bigbruin.com/images/articles/929/promo_8.jpg *Quote:* Seek Thermal has developed a series of devices that allow you to harness the power of thermal imaging at a much more palatable price range. We will be checking out one of their CompactPro thermal imagers designed to work with your Android mobile phone. This little device connects to your phone via the USB port; and with a free mobile app it uses the screen, processing power, and flash memory of your phone in conjunction with the CompactPro's 320x240 thermal sensor. Best regards, Jason www.bigbruin.com --
-
-------- PHANTEKS ENTHOO EVOLV ATX TEMPERED GLASS EDITION COMPUTER CASE REVIEW ( -at -) APH NETWORKS ----------------------------------------------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Phanteks Enthoo EVOLV ATX Tempered Glass Edition Computer Case Review ( -at -) APH Networks * Description: Phanteks' Enthoo EVOLV ATX Tempered Glass Edition is an all-round excellent mid-tower chassis now equipped with tinted tempered glass side panels for a stunning view of your PC's interior. * Link: http://aphnetworks.com/reviews/phanteks-enthoo-evolv-atx-tempered-glass-edition * Image: http://aphnetworks.com/review/phanteks-enthoo-evolv-atx-tempered-glass-edition/004.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5