Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=9975a9ff8d&e=0c004f9c13) Although most of us would prefer to own all of the latest and greatest smartphones, there are plenty of us who don’t need all of the power and features today’s top phones have to offer. In addition, the high price tags on today's flagship phones presents a barrier for many. For casual smartphone users, there isn’t enough to gain by spending many hundreds of dollars more on a high end phone versus a more modest (and budget-friendly) model. It is for these reasons that Moto created the Moto G4 Play. As the third member of the new Moto G family, the Moto G4 Play is designed for fundamental smartphone functionality -- staying in touch with family and friends, catching up on the news, playing games, and taking pictures, etc. In addition to delivering reliable performance for these key functions, Moto focused on keeping the phone affordable and is offering it unlocked... Moto G4 Play Review: Budget Android, Full-Featured And Unlocked (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=2abd853e51&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=69a3a5c005&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=d2bcedcac7&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=0f0c698392&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f8c74c9a03&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=ca3e3f2532&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=f0a654f735&e=0c004f9c13 ============================================================
  2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Updated Vagrant box's are now available for CentOS Linux 7 and CentOS Linux 6 for x86_64. These are available, as in the past, for the Libvirt and the VirtualBox providers in Vagrant. We have also enabled the vmware providers, for anyone using Vmware's products for backing Vagrant on Linux, MacOS or Windows. ref: https://atlas.hashicorp.com/centos/boxes/6 https://atlas.hashicorp.com/centos/boxes/7 Release Notes for these images are published at : https://seven.centos.org/2016/10/updated-centos-vagrant-images-available - -v1609-01/ We are doing all of our work, including build scripts and build content for these Vagrant Box's as a part of the CentOS Cloud Instance SIG. And host the content for contribution and participation at https://github.com/CentOS/sig-cloud-instance-build/tree/master/vagrant - - I would like to invite everyone to come join us and help extend the scope of this work, as well as improve the current results. regards, - -- Karanbir Singh, Project Lead, The CentOS Project +44-207-0999389 | http://www.centos.org/ | twitter.com/CentOS GnuPG Key : http://www.karan.org/publickey.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJYAPekAAoJEI3Oi2Mx7xbtNK8H+gK051yYnUuNnU8kJgT0+nim /iOQHfJeg24w/pObUOl58v1/aAEUuLP2z/KvqEVCAfjWKRsO6I8+GjnFs5CdEj1v p+QpE7tyriu0Al2v[censored]lBjIuSLG8ELH16gFDZnLvzWnWItD5tm1T2eHtnoGimRBR 3XK/8BM50mqie7GBQeCMTbg0YygFWxTpTE2UipwtYjHoH0nBwXCUNWWkOV+z7qWM vg7kRBizt6NC++A4uROewk4Ez+jRvrmqqRrjc9V5peMBG2NALpS10hTqI3MUDuhI uvOFUycv1ZlBtWmou+vbkF0g2yPsFhrFa2WuLkG/olR45EmFfJ9/wKJC5zsl7RE= =xAPy -----END PGP SIGNATURE----- _______________________________________________
  3. -------- WESTERN DIGITAL MY PASSPORT WIRELESS PRO 2TB WIRELESS HARD DRIVE REVIEW ( -at -) APH NETWORKS ----------------------------------------------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Western Digital My Passport Wireless Pro 2TB Wireless Hard Drive Review ( -at -) APH Networks * Description: The Western Digital My Passport Wireless Pro 2TB is a wireless external hard drive loaded with features that makes it a great travel companion for enthusiast and professional photographers alike. * Link: http://aphnetworks.com/reviews/western-digital-my-passport-wireless-pro-2tb * Image: http://aphnetworks.com/review/western-digital-my-passport-wireless-pro-2tb/004.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  4. openSUSE Security Update: Security update for php5 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2540-1 Rating: important References: #999679 #999680 #999682 #999684 #999685 #999819 #999820 Cross-References: CVE-2016-7411 CVE-2016-7412 CVE-2016-7413 CVE-2016-7414 CVE-2016-7416 CVE-2016-7417 CVE-2016-7418 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for php5 fixes the following security issues: * CVE-2016-7411: php5: Memory corruption when destructing deserialized object * CVE-2016-7412: Heap overflow in mysqlnd when not receiving UNSIGNED_FLAG in BIT field * CVE-2016-7413: Use after free in wddx_deserialize * CVE-2016-7414: Out of bounds heap read when verifying signature of zip phar in phar_parse_zipfile * CVE-2016-7416: Stack based buffer overflow in msgfmt_format_message * CVE-2016-7417: Missing type check when unserializing SplArray * CVE-2016-7418: Null pointer dereference in php_wddx_push_element This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1193=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): apache2-mod_php5-5.5.14-62.1 apache2-mod_php5-debuginfo-5.5.14-62.1 php5-5.5.14-62.1 php5-bcmath-5.5.14-62.1 php5-bcmath-debuginfo-5.5.14-62.1 php5-bz2-5.5.14-62.1 php5-bz2-debuginfo-5.5.14-62.1 php5-calendar-5.5.14-62.1 php5-calendar-debuginfo-5.5.14-62.1 php5-ctype-5.5.14-62.1 php5-ctype-debuginfo-5.5.14-62.1 php5-curl-5.5.14-62.1 php5-curl-debuginfo-5.5.14-62.1 php5-dba-5.5.14-62.1 php5-dba-debuginfo-5.5.14-62.1 php5-debuginfo-5.5.14-62.1 php5-debugsource-5.5.14-62.1 php5-devel-5.5.14-62.1 php5-dom-5.5.14-62.1 php5-dom-debuginfo-5.5.14-62.1 php5-enchant-5.5.14-62.1 php5-enchant-debuginfo-5.5.14-62.1 php5-exif-5.5.14-62.1 php5-exif-debuginfo-5.5.14-62.1 php5-fastcgi-5.5.14-62.1 php5-fastcgi-debuginfo-5.5.14-62.1 php5-fileinfo-5.5.14-62.1 php5-fileinfo-debuginfo-5.5.14-62.1 php5-firebird-5.5.14-62.1 php5-firebird-debuginfo-5.5.14-62.1 php5-fpm-5.5.14-62.1 php5-fpm-debuginfo-5.5.14-62.1 php5-ftp-5.5.14-62.1 php5-ftp-debuginfo-5.5.14-62.1 php5-gd-5.5.14-62.1 php5-gd-debuginfo-5.5.14-62.1 php5-gettext-5.5.14-62.1 php5-gettext-debuginfo-5.5.14-62.1 php5-gmp-5.5.14-62.1 php5-gmp-debuginfo-5.5.14-62.1 php5-iconv-5.5.14-62.1 php5-iconv-debuginfo-5.5.14-62.1 php5-imap-5.5.14-62.1 php5-imap-debuginfo-5.5.14-62.1 php5-intl-5.5.14-62.1 php5-intl-debuginfo-5.5.14-62.1 php5-json-5.5.14-62.1 php5-json-debuginfo-5.5.14-62.1 php5-ldap-5.5.14-62.1 php5-ldap-debuginfo-5.5.14-62.1 php5-mbstring-5.5.14-62.1 php5-mbstring-debuginfo-5.5.14-62.1 php5-mcrypt-5.5.14-62.1 php5-mcrypt-debuginfo-5.5.14-62.1 php5-mssql-5.5.14-62.1 php5-mssql-debuginfo-5.5.14-62.1 php5-mysql-5.5.14-62.1 php5-mysql-debuginfo-5.5.14-62.1 php5-odbc-5.5.14-62.1 php5-odbc-debuginfo-5.5.14-62.1 php5-opcache-5.5.14-62.1 php5-opcache-debuginfo-5.5.14-62.1 php5-openssl-5.5.14-62.1 php5-openssl-debuginfo-5.5.14-62.1 php5-pcntl-5.5.14-62.1 php5-pcntl-debuginfo-5.5.14-62.1 php5-pdo-5.5.14-62.1 php5-pdo-debuginfo-5.5.14-62.1 php5-pgsql-5.5.14-62.1 php5-pgsql-debuginfo-5.5.14-62.1 php5-phar-5.5.14-62.1 php5-phar-debuginfo-5.5.14-62.1 php5-posix-5.5.14-62.1 php5-posix-debuginfo-5.5.14-62.1 php5-pspell-5.5.14-62.1 php5-pspell-debuginfo-5.5.14-62.1 php5-readline-5.5.14-62.1 php5-readline-debuginfo-5.5.14-62.1 php5-shmop-5.5.14-62.1 php5-shmop-debuginfo-5.5.14-62.1 php5-snmp-5.5.14-62.1 php5-snmp-debuginfo-5.5.14-62.1 php5-soap-5.5.14-62.1 php5-soap-debuginfo-5.5.14-62.1 php5-sockets-5.5.14-62.1 php5-sockets-debuginfo-5.5.14-62.1 php5-sqlite-5.5.14-62.1 php5-sqlite-debuginfo-5.5.14-62.1 php5-suhosin-5.5.14-62.1 php5-suhosin-debuginfo-5.5.14-62.1 php5-sysvmsg-5.5.14-62.1 php5-sysvmsg-debuginfo-5.5.14-62.1 php5-sysvsem-5.5.14-62.1 php5-sysvsem-debuginfo-5.5.14-62.1 php5-sysvshm-5.5.14-62.1 php5-sysvshm-debuginfo-5.5.14-62.1 php5-tidy-5.5.14-62.1 php5-tidy-debuginfo-5.5.14-62.1 php5-tokenizer-5.5.14-62.1 php5-tokenizer-debuginfo-5.5.14-62.1 php5-wddx-5.5.14-62.1 php5-wddx-debuginfo-5.5.14-62.1 php5-xmlreader-5.5.14-62.1 php5-xmlreader-debuginfo-5.5.14-62.1 php5-xmlrpc-5.5.14-62.1 php5-xmlrpc-debuginfo-5.5.14-62.1 php5-xmlwriter-5.5.14-62.1 php5-xmlwriter-debuginfo-5.5.14-62.1 php5-xsl-5.5.14-62.1 php5-xsl-debuginfo-5.5.14-62.1 php5-zip-5.5.14-62.1 php5-zip-debuginfo-5.5.14-62.1 php5-zlib-5.5.14-62.1 php5-zlib-debuginfo-5.5.14-62.1 - openSUSE Leap 42.1 (noarch): php5-pear-5.5.14-62.1 References: https://www.suse.com/security/cve/CVE-2016-7411.html https://www.suse.com/security/cve/CVE-2016-7412.html https://www.suse.com/security/cve/CVE-2016-7413.html https://www.suse.com/security/cve/CVE-2016-7414.html https://www.suse.com/security/cve/CVE-2016-7416.html https://www.suse.com/security/cve/CVE-2016-7417.html https://www.suse.com/security/cve/CVE-2016-7418.html https://bugzilla.suse.com/999679 https://bugzilla.suse.com/999680 https://bugzilla.suse.com/999682 https://bugzilla.suse.com/999684 https://bugzilla.suse.com/999685 https://bugzilla.suse.com/999819 https://bugzilla.suse.com/999820 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  5. openSUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2539-1 Rating: important References: #1000435 #1001765 #954374 #970293 #982210 #982211 #982251 #987173 #987857 #990074 #996269 Cross-References: CVE-2016-7796 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves one vulnerability and has 10 fixes is now available. Description: This update for systemd fixes the following security issue: - CVE-2016-7796: A zero-length message received over systemd's notification socket could make manager_dispatch_notify_fd() return an error and, as a side effect, disable the notification handler completely. As the notification socket is world-writable, this could have allowed a local user to perform a denial-of-service attack against systemd. (bsc#1001765) Additionally, the following non-security fixes are included: - Fix HMAC calculation when appending a data object to journal. (bsc#1000435) - Never accept file descriptors from file systems with mandatory locking enabled. (bsc#954374) - Do not warn about missing install info with "preset". (bsc#970293) - Save /run/systemd/users/UID before starting user ( -at -) .service. (bsc#996269) - Make sure that /var/lib/systemd/sysv-convert/database is always initialized. (bsc#982211) - Remove daylight saving time handling and tzfile parser. (bsc#990074) - Make sure directory watch is started before cryptsetup. (bsc#987173) - Introduce sd_pid_notify() and sd_pid_notifyf() APIs. (bsc#987857) - Set KillMode=mixed for our daemons that fork worker processes. - Add nosuid and nodev options to tmp.mount. - Don't start console-getty.service when /dev/console is missing. (bsc#982251) - Correct segmentation fault in udev/path_id due to missing NULL check. (bsc#982210) This update was imported from the SUSE:SLE-12-SP1:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1194=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): libgudev-1_0-0-210-98.1 libgudev-1_0-0-debuginfo-210-98.1 libgudev-1_0-devel-210-98.1 libudev-devel-210-98.1 libudev-mini-devel-210-98.1 libudev-mini1-210-98.1 libudev-mini1-debuginfo-210-98.1 libudev1-210-98.1 libudev1-debuginfo-210-98.1 nss-myhostname-210-98.1 nss-myhostname-debuginfo-210-98.1 systemd-210-98.1 systemd-debuginfo-210-98.1 systemd-debugsource-210-98.1 systemd-devel-210-98.1 systemd-journal-gateway-210-98.1 systemd-journal-gateway-debuginfo-210-98.1 systemd-logger-210-98.1 systemd-mini-210-98.1 systemd-mini-debuginfo-210-98.1 systemd-mini-debugsource-210-98.1 systemd-mini-devel-210-98.1 systemd-mini-sysvinit-210-98.1 systemd-sysvinit-210-98.1 typelib-1_0-GUdev-1_0-210-98.1 udev-210-98.1 udev-debuginfo-210-98.1 udev-mini-210-98.1 udev-mini-debuginfo-210-98.1 - openSUSE Leap 42.1 (noarch): systemd-bash-completion-210-98.1 - openSUSE Leap 42.1 (x86_64): libgudev-1_0-0-32bit-210-98.1 libgudev-1_0-0-debuginfo-32bit-210-98.1 libudev1-32bit-210-98.1 libudev1-debuginfo-32bit-210-98.1 nss-myhostname-32bit-210-98.1 nss-myhostname-debuginfo-32bit-210-98.1 systemd-32bit-210-98.1 systemd-debuginfo-32bit-210-98.1 References: https://www.suse.com/security/cve/CVE-2016-7796.html https://bugzilla.suse.com/1000435 https://bugzilla.suse.com/1001765 https://bugzilla.suse.com/954374 https://bugzilla.suse.com/970293 https://bugzilla.suse.com/982210 https://bugzilla.suse.com/982211 https://bugzilla.suse.com/982251 https://bugzilla.suse.com/987173 https://bugzilla.suse.com/987857 https://bugzilla.suse.com/990074 https://bugzilla.suse.com/996269 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  6. Case Mod Friday: Phanteks Primo SE ( -at -) ThinkComputers.org Feature Link: http://www.thinkcomputers.org/case-mod-friday-phanteks-primo-se/ Image URL: http://www.thinkcomputers.org/articles/casemodfriday/primo-se-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/casemodfriday/primo-se-small.jpg Quote: "This weeks mod comes from BIRD Customs.  This will be the first time we are featuring them on the site.  They have done a great custom build inside the Phanteks Primo SE case.  Inside we see an AMD FX 8370, AMD Radeon RX 480, Klevv memory, and water cooling powered by Alphacool.  This build is just so solid and clean!  Be sure you take a look!"
  7. openSUSE Security Update: Security update for compat-openssl098 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2537-1 Rating: important References: #979475 #982575 #983249 #993819 #994749 #994844 #995075 #995324 #995359 #995377 #998190 #999665 #999666 #999668 Cross-References: CVE-2016-2177 CVE-2016-2178 CVE-2016-2179 CVE-2016-2181 CVE-2016-2182 CVE-2016-2183 CVE-2016-6302 CVE-2016-6303 CVE-2016-6304 CVE-2016-6306 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has four fixes is now available. Description: This update for compat-openssl098 fixes the following issues: OpenSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: High * OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666) Severity: Low * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575) * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249) * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844) * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749) * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819) * Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359) * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324) * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377) * Certificate message OOB reads (CVE-2016-6306) (bsc#999668) More information can be found on: https://www.openssl.org/news/secadv/20160922.txt Bugs fixed: * update expired S/MIME certs (bsc#979475) * fix crash in print_notice (bsc#998190) * resume reading from /dev/urandom when interrupted by a signal (bsc#995075) This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-1189=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): compat-openssl098-debugsource-0.9.8j-15.1 libopenssl0_9_8-0.9.8j-15.1 libopenssl0_9_8-debuginfo-0.9.8j-15.1 - openSUSE Leap 42.1 (x86_64): libopenssl0_9_8-32bit-0.9.8j-15.1 libopenssl0_9_8-debuginfo-32bit-0.9.8j-15.1 References: https://www.suse.com/security/cve/CVE-2016-2177.html https://www.suse.com/security/cve/CVE-2016-2178.html https://www.suse.com/security/cve/CVE-2016-2179.html https://www.suse.com/security/cve/CVE-2016-2181.html https://www.suse.com/security/cve/CVE-2016-2182.html https://www.suse.com/security/cve/CVE-2016-2183.html https://www.suse.com/security/cve/CVE-2016-6302.html https://www.suse.com/security/cve/CVE-2016-6303.html https://www.suse.com/security/cve/CVE-2016-6304.html https://www.suse.com/security/cve/CVE-2016-6306.html https://bugzilla.suse.com/979475 https://bugzilla.suse.com/982575 https://bugzilla.suse.com/983249 https://bugzilla.suse.com/993819 https://bugzilla.suse.com/994749 https://bugzilla.suse.com/994844 https://bugzilla.suse.com/995075 https://bugzilla.suse.com/995324 https://bugzilla.suse.com/995359 https://bugzilla.suse.com/995377 https://bugzilla.suse.com/998190 https://bugzilla.suse.com/999665 https://bugzilla.suse.com/999666 https://bugzilla.suse.com/999668 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  8. Roccat Skeltr Smart RGB Gaming Keyboard Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=bd3e858448&e=872093acb5 http://www.kitguru.net =ROCCAT SKELTR SMART RGB GAMING KEYBOARD REVIEW= Although you may balk at spending £150 on a membrane keyboard, Roccat hopes that with the inclusion of segregated switches, advanced Bluetooth functionality, smartphone connectivity, a smartphone/tablet stand and of course RGB lighting, that there will be enough to tempt you to pony up the cash. Read the review here: http://www.kitguru.net/peripherals/keyboards/jon-martindale/roccat-skeltr-smart-rgb-gaming-keyboard-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=bd3e858448&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  9. <http://www.eteknix.com> noblechairs EPIC Series Chair Review Picking the right chair to go with your desk, so you can kick back and enjoy your games, or even just feel comfortable for those long work hours, can be a demanding task. The market is packed with options, ranging from the budget offerings, to hundreds, even thousands of pounds. Gaming chairs are big business these days, and while the market is flooded with affordable products ranging from £100-200, there's not a growing market for premium products, and that's where noblechairs come in. URL - http://www.eteknix.com/noblechairs-epic-series-chair-review/ --
  10. <http://www.eteknix.com> Gigabyte P57X v6 GTX 1070 Gaming Laptop Review Gigabyte has established themselves as one of the pioneers in the gaming laptop sector and released a fantastic repertoire of successful products. Of course, there's fierce competition from the likes of MSI, ASUS and other key players which make it essential to try and hone the best possible package. So far, I've been impressed with Gigabyte's offerings and believe they've taken the feedback on board to formulate a plethora of premium designs. In particular, the Aero 14 <http://www.eteknix.com/gigabyte-aero-14-gtx-970m-gaming-laptop-review/>  was a huge step forward in the right direction and the best ultrabook I've encountered which can run modern games relatively efficiently. URL - http://www.eteknix.com/gigabyte-p57x-v6-gtx-1070-gaming-laptop-review/ --
  11. Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,Xtreme is the name of the game, can it be extreme using old school HDMI?Subject: Gigabyte GTX 1060 Xtreme Gaming 6GB Video Card Review ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/reviews/video/gv_n1060xtreme-6gdQuote: The Gigabyte Xtreme Gaming GTX 1060 is the right card for those wanting best in class performance with dedicated VR support built in. The triple slot cooler ensures quiet operation and RGB LEDs just for fun.A news posting would be appreciated, and/or Xtreme..... ThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved
  12. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mariadb-galera security and bug fix update Advisory ID: RHSA-2016:2060-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2060.html Issue date: 2016-10-13 CVE Names: CVE-2016-6662 ===================================================================== 1. Summary: An update for mariadb-galera is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 - x86_64 3. Description: MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Galera is a synchronous multi-master cluster for MariaDB. Security Fix(es): * It was discovered that the MySQL logging functionality allowed writing to MySQL configuration files. An administrative database user, or a database user with FILE privileges, could possibly use this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662) Bug Fix(es): * Because Red Hat Enterprise Linux 7.3 changed the return format of the "systemctl is-enabled" command as consumed by shell scripts, the mariadb-galera RPM package, upon installation, erroneously detected that the MariaDB service was enabled when it was not. As a result, the Red Hat OpenStack Platform installer, which then tried to run mariadb-galera using Pacemaker and not systemd, failed to start Galera. With this update, mariadb-galera's RPM installation scripts now use a different systemctl command, correctly detecting the default MariaDB as disabled, and the installer can succeed. (BZ#1376909) * Previously, both the mariadb-server and mariadb-galera-server packages shipped the client-facing libraries, dialog.so and mysql_clear_password.so. As a result, the mariadb-galera-server package would fail to install because of package conflicts. With this update, these libraries have been moved from mariadb-galera-server to mariadb-libs, and the mariadb-galera-server package installs successfully. (BZ#1376903) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1375198 - CVE-2016-6662 mysql: general_log can write to configuration files, leading to privilege escalation 1376903 - RHEL 7.3 upgrades fails on upgrade because of mariadb-libs package conflict. 1376909 - mysqld service prevents haproxy to get started and deployment fails 6. Package List: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7: Source: mariadb-galera-5.5.42-1.2.el7ost.src.rpm x86_64: mariadb-galera-common-5.5.42-1.2.el7ost.x86_64.rpm mariadb-galera-debuginfo-5.5.42-1.2.el7ost.x86_64.rpm mariadb-galera-server-5.5.42-1.2.el7ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6662 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/cve/CVE-2016-6662 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX/+n4XlSAg2UNWIIRAqiYAKCmra9Lgje5oDlMbH8GxPJJMpsMogCfSb30 92s2svQXFq4UxaT7xg3sE78= =QfH5 -----END PGP SIGNATURE----- --
  13. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mariadb-galera security update Advisory ID: RHSA-2016:2062-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2062.html Issue date: 2016-10-13 CVE Names: CVE-2016-6662 ===================================================================== 1. Summary: An update for mariadb-galera is now available for Red Hat OpenStack Platform 9.0 (Mitaka). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 9.0 - x86_64 3. Description: MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Galera is a synchronous multi-master cluster for MariaDB. Security Fix(es): * A permissions flaw was discovered in the MySQL logging functionality, which allowed writing to MySQL configuration files. An administrative database user, or a database user with FILE privileges, could possibly exploit this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1375198 - CVE-2016-6662 mysql: general_log can write to configuration files, leading to privilege escalation 6. Package List: Red Hat OpenStack Platform 9.0: Source: mariadb-galera-5.5.42-5.el7ost.src.rpm x86_64: mariadb-galera-common-5.5.42-5.el7ost.x86_64.rpm mariadb-galera-debuginfo-5.5.42-5.el7ost.x86_64.rpm mariadb-galera-server-5.5.42-5.el7ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6662 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX/+szXlSAg2UNWIIRAgnbAJ97dJVNpyC/mQE3rrezfRjOcTRdAQCfdB4h aZGHT/AlOntAvQPPhongG8Y= =bAsD -----END PGP SIGNATURE----- --
  14. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mariadb-galera security and bug fix update Advisory ID: RHSA-2016:2059-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2059.html Issue date: 2016-10-13 CVE Names: CVE-2016-6662 ===================================================================== 1. Summary: An update for mariadb-galera is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 - x86_64 3. Description: MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Galera is a synchronous multi-master cluster for MariaDB. Security Fix(es): * It was discovered that the MySQL logging functionality allowed writing to MySQL configuration files. An administrative database user, or a database user with FILE privileges, could possibly use this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662) Bug Fix(es): * Because Red Hat Enterprise Linux 7.3 changed the return format of the "systemctl is-enabled" command as consumed by shell scripts, the mariadb-galera RPM package, upon installation, erroneously detected that the MariaDB service was enabled when it was not. As a result, the Red Hat OpenStack Platform installer, which then tried to run mariadb-galera using Pacemaker and not systemd, failed to start Galera. With this update, mariadb-galera's RPM installation scripts now use a different systemctl command, correctly detecting the default MariaDB as disabled, and the installer can succeed. (BZ#1376908) * Previously, both the mariadb-server and mariadb-galera-server packages shipped the client-facing libraries, dialog.so and mysql_clear_password.so. As a result, the mariadb-galera-server package would fail to install because of package conflicts. With this update, these libraries have been moved from mariadb-galera-server to mariadb-libs, and the mariadb-galera-server package installs successfully. (BZ#1376902) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1375198 - CVE-2016-6662 mysql: general_log can write to configuration files, leading to privilege escalation 1376902 - RHEL 7.3 upgrades fails on upgrade because of mariadb-libs package conflict. 1376908 - mysqld service prevents haproxy to get started and deployment fails 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7: Source: mariadb-galera-5.5.42-1.2.el7ost.src.rpm x86_64: mariadb-galera-common-5.5.42-1.2.el7ost.x86_64.rpm mariadb-galera-debuginfo-5.5.42-1.2.el7ost.x86_64.rpm mariadb-galera-server-5.5.42-1.2.el7ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6662 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/cve/CVE-2016-6662 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX/+ncXlSAg2UNWIIRAjDHAJ9pQ8o9rq4RJ1X10ucF9ZV7ZNAtNQCfY+ue VoMtEE5l2Wp00bPtZcTFdJ0= =ReLe -----END PGP SIGNATURE----- --
  15. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mariadb-galera security and bug fix update Advisory ID: RHSA-2016:2061-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2061.html Issue date: 2016-10-13 CVE Names: CVE-2016-6662 ===================================================================== 1. Summary: An update for mariadb-galera is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 - x86_64 3. Description: MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Galera is a synchronous multi-master cluster for MariaDB. Security Fix(es): * It was discovered that the MySQL logging functionality allowed writing to MySQL configuration files. An administrative database user, or a database user with FILE privileges, could possibly use this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662) Bug Fix(es): * Previously, both the mariadb-server and mariadb-galera-server packages shipped the client-facing libraries, dialog.so and mysql_clear_password.so. As a result, the mariadb-galera-server package would fail to install because of package conflicts. With this update, these libraries have been moved from mariadb-galera-server to mariadb-libs, and the mariadb-galera-server package installs successfully. (BZ#1376904) * Because Red Hat Enterprise Linux 7.3 changed the return format of the "systemctl is-enabled" command as consumed by shell scripts, the mariadb-galera RPM package, upon installation, erroneously detected that the MariaDB service was enabled when it was not. As a result, the Red Hat OpenStack Platform installer, which then tried to run mariadb-galera using Pacemaker and not systemd, failed to start Galera. With this update, mariadb-galera's RPM installation scripts now use a different systemctl command, correctly detecting the default MariaDB as disabled, and the installer can succeed. (BZ#1376910) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1375198 - CVE-2016-6662 mysql: general_log can write to configuration files, leading to privilege escalation 1376904 - RHEL 7.3 upgrades fails on upgrade because of mariadb-libs package conflict. 1376910 - mysqld service prevents haproxy to get started and deployment fails 6. Package List: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7: Source: mariadb-galera-5.5.42-5.el7ost.src.rpm x86_64: mariadb-galera-common-5.5.42-5.el7ost.x86_64.rpm mariadb-galera-debuginfo-5.5.42-5.el7ost.x86_64.rpm mariadb-galera-server-5.5.42-5.el7ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6662 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX/+oQXlSAg2UNWIIRAsxqAJ9gO3qcyZavGXgY7hJRYvEFf972BwCguHnK TJlkJuPFQjW/7SaD81/XPWQ= =Rmjx -----END PGP SIGNATURE----- --
  16. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mariadb-galera security update Advisory ID: RHSA-2016:2058-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2058.html Issue date: 2016-10-13 CVE Names: CVE-2016-6662 ===================================================================== 1. Summary: An update for mariadb-galera is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6 - x86_64 3. Description: MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Galera is a synchronous multi-master cluster for MariaDB. Security Fix(es): * It was discovered that the MySQL logging functionality allowed writing to MySQL configuration files. An administrative database user, or a database user with FILE privileges, could possibly use this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1375198 - CVE-2016-6662 mysql: general_log can write to configuration files, leading to privilege escalation 6. Package List: Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6: Source: mariadb-galera-5.5.42-1.1.el6ost.src.rpm x86_64: mariadb-galera-common-5.5.42-1.1.el6ost.x86_64.rpm mariadb-galera-debuginfo-5.5.42-1.1.el6ost.x86_64.rpm mariadb-galera-server-5.5.42-1.1.el6ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6662 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/cve/CVE-2016-6662 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX/+m+XlSAg2UNWIIRAhyMAJ9DsXCln7YBsiC07myChizET4FqVACdHjRK qwCGSv6ibpsND+rJuAOK+FQ= =6CBH -----END PGP SIGNATURE----- --
  17. Hi News Poster HardwareOverclock.com has just posted another review. This week we have tested the Alphacool Eisbaer 240 AIO water cooler. This AIO was a closed water cooling system that's easy to install and can be easily and safely expanded with its quick-lock closure. Title: Alphacool Eisbaer 240 AIO water cooler ( -at -) HardwareOverclock.com Link: http://hardwareoverclock.com/Alphacool-Eisbaer-240-AIO-Wasserkuehlung.htm Image: http://hardwareoverclock.com/Wasserkuehlung/Alphacool-Eisbaer-240-05.jpg Thanks for posting kr Rene Ruf Chefredakteur HardwareOverclock.com <mailto:admin ( -at -) hardwareoverclock.com> mailto:admin ( -at -) hardwareoverclock.com hardwareoverclock.com
  18. SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2533-1 Rating: important References: #953339 #953362 #953518 #954872 #955399 #957986 #958848 #961600 #963161 #964427 #970135 #971949 #973188 #973631 #974038 #975130 #975138 #975907 #976058 #976111 #978164 #978295 #978413 #979035 #979620 #979670 #980716 #980724 #981264 #981276 #982024 #982025 #982026 #982224 #982225 #982286 #982695 #982960 #983973 #983984 #984981 #985503 #986586 #988675 #990843 #990923 #990970 #991934 #992224 #994421 #994625 #994761 #994772 #994775 #995785 #995789 #995792 #997731 Cross-References: CVE-2014-3615 CVE-2014-3672 CVE-2016-3158 CVE-2016-3159 CVE-2016-3710 CVE-2016-3712 CVE-2016-3960 CVE-2016-4001 CVE-2016-4002 CVE-2016-4020 CVE-2016-4037 CVE-2016-4439 CVE-2016-4441 CVE-2016-4453 CVE-2016-4454 CVE-2016-4480 CVE-2016-4952 CVE-2016-4962 CVE-2016-4963 CVE-2016-5105 CVE-2016-5106 CVE-2016-5107 CVE-2016-5126 CVE-2016-5238 CVE-2016-5337 CVE-2016-5338 CVE-2016-5403 CVE-2016-6258 CVE-2016-6351 CVE-2016-6833 CVE-2016-6834 CVE-2016-6835 CVE-2016-6836 CVE-2016-6888 CVE-2016-7092 CVE-2016-7093 CVE-2016-7094 CVE-2016-7154 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves 38 vulnerabilities and has 20 fixes is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264). - CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188). - CVE-2016-3159: The fpu_fxrstor function in arch/x86/i387.c did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188). - CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue (bsc#978164) - CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038). - CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130). - CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138). - CVE-2016-4020: The patch_instruction function did not initialize the imm32 variable, which allowed local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR) (bsc#975907) - CVE-2016-4037: The ehci_advance_state function in hw/usb/hcd-ehci.c allowed local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list (bsc#976111) - CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716) - CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724) - CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command (bsc#982225) - CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggered an out-of-bounds read (bsc#982224) - CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295). - CVE-2016-4952: Out-of-bounds access issue in pvsci_ring_init_msg/data routines (bsc#981276) - CVE-2016-4962: The libxl device-handling allowed local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore (bsc#979620) - CVE-2016-4963: The libxl device-handling allowed local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore (bsc#979670) - CVE-2016-5105: Stack information leakage while reading configuration (bsc#982024) - CVE-2016-5106: Out-of-bounds write while setting controller properties (bsc#982025) - CVE-2016-5107: Out-of-bounds read in megasas_lookup_frame() function (bsc#982026) - CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function allowed local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call (bsc#982286) - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960) - CVE-2016-5337: The megasas_ctrl_get_info function allowed local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information (bsc#983973) - CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984) - CVE-2016-5403: virtio: unbounded memory allocation on host via guest leading to DoS (XSA-184) (bsc#990923) - CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for up[censored] pagetable entries (bsc#988675) - CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with ESP/NCR53C9x controller emulation support, allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the host via vectors involving DMA read into ESP command buffer (bsc#990843). - CVE-2016-6833: A use-after-free issue in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994775). - CVE-2016-6834: A infinite loop during packet fragmentation in the VMWARE VMXNET3 NIC device support allowed privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994421). - CVE-2016-6835: Buffer overflow in the VMWARE VMXNET3 NIC device support, causing an OOB read access (bsc#994625). - CVE-2016-6836: VMWARE VMXNET3 NIC device allowed privileged user inside the guest to leak information. It occured while processing transmit(tx) queue, when it reaches the end of packet (bsc#994761). - CVE-2016-6888: A integer overflow int the VMWARE VMXNET3 NIC device support, during the initialisation of new packets in the device, could have allowed a privileged user inside guest to crash the Qemu instance resulting in DoS (bsc#994772). - CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785) - CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789) - CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792) - CVE-2016-7154: Use-after-free vulnerability in the FIFO event channel code in Xen allowed local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number (bsc#997731). These non-security issues were fixed: - bsc#991934: Hypervisor crash in csched_acct - bsc#992224: During boot of Xen Hypervisor, failed to get contiguous memory for DMA - bsc#970135: New virtualization project clock test randomly fails on Xen - bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live - bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79) - bsc#985503: vif-route broken - bsc#978413: PV guest upgrade from sles11sp4 to sles12sp2 alpha3 failed on sles11sp4 xen host. - bsc#986586: Out of memory (oom) during boot on "modprobe xenblk" (non xen kernel) - bsc#953339, bsc#953362, bsc#953518, bsc#984981: Implement SUSE specific unplug protocol for emulated PCI devices in PVonHVM guests to qemu-xen-upstream - bsc#958848: HVM guest crash at /usr/src/packages/BUILD/ xen-4.4.2-testing/obj/default/balloon/balloon.c:407 - bsc#982695: xen-4.5.2 qemu fails to boot HVM guest from xvda - bsc#954872: script block-dmmd not working as expected - bsc#961600: : poor performance when Xen HVM domU configured with max memory > current memory - bsc#979035: Restore xm migrate fixes for bsc#955399/ bsc#955399 - bsc#963161: Windows VM getting stuck during load while a VF is assigned to it - bsc#976058: Xen error running simple HVM guest (Post Alpha 2 xen+qemu) - bsc#957986: Indirect descriptors are not compatible with Amazon block backend - bsc#973631: AWS EC2 kdump issue - bsc#964427: Discarding device blocks failed with input/output error Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1476=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1476=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): xen-4.4.4_04-22.22.2 xen-debugsource-4.4.4_04-22.22.2 xen-doc-html-4.4.4_04-22.22.2 xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2 xen-kmp-default-debuginfo-4.4.4_04_k3.12.60_52.54-22.22.2 xen-libs-32bit-4.4.4_04-22.22.2 xen-libs-4.4.4_04-22.22.2 xen-libs-debuginfo-32bit-4.4.4_04-22.22.2 xen-libs-debuginfo-4.4.4_04-22.22.2 xen-tools-4.4.4_04-22.22.2 xen-tools-debuginfo-4.4.4_04-22.22.2 xen-tools-domU-4.4.4_04-22.22.2 xen-tools-domU-debuginfo-4.4.4_04-22.22.2 - SUSE Linux Enterprise Server 12-LTSS (x86_64): xen-4.4.4_04-22.22.2 xen-debugsource-4.4.4_04-22.22.2 xen-doc-html-4.4.4_04-22.22.2 xen-kmp-default-4.4.4_04_k3.12.60_52.54-22.22.2 xen-kmp-default-debuginfo-4.4.4_04_k3.12.60_52.54-22.22.2 xen-libs-32bit-4.4.4_04-22.22.2 xen-libs-4.4.4_04-22.22.2 xen-libs-debuginfo-32bit-4.4.4_04-22.22.2 xen-libs-debuginfo-4.4.4_04-22.22.2 xen-tools-4.4.4_04-22.22.2 xen-tools-debuginfo-4.4.4_04-22.22.2 xen-tools-domU-4.4.4_04-22.22.2 xen-tools-domU-debuginfo-4.4.4_04-22.22.2 References: https://www.suse.com/security/cve/CVE-2014-3615.html https://www.suse.com/security/cve/CVE-2014-3672.html https://www.suse.com/security/cve/CVE-2016-3158.html https://www.suse.com/security/cve/CVE-2016-3159.html https://www.suse.com/security/cve/CVE-2016-3710.html https://www.suse.com/security/cve/CVE-2016-3712.html https://www.suse.com/security/cve/CVE-2016-3960.html https://www.suse.com/security/cve/CVE-2016-4001.html https://www.suse.com/security/cve/CVE-2016-4002.html https://www.suse.com/security/cve/CVE-2016-4020.html https://www.suse.com/security/cve/CVE-2016-4037.html https://www.suse.com/security/cve/CVE-2016-4439.html https://www.suse.com/security/cve/CVE-2016-4441.html https://www.suse.com/security/cve/CVE-2016-4453.html https://www.suse.com/security/cve/CVE-2016-4454.html https://www.suse.com/security/cve/CVE-2016-4480.html https://www.suse.com/security/cve/CVE-2016-4952.html https://www.suse.com/security/cve/CVE-2016-4962.html https://www.suse.com/security/cve/CVE-2016-4963.html https://www.suse.com/security/cve/CVE-2016-5105.html https://www.suse.com/security/cve/CVE-2016-5106.html https://www.suse.com/security/cve/CVE-2016-5107.html https://www.suse.com/security/cve/CVE-2016-5126.html https://www.suse.com/security/cve/CVE-2016-5238.html https://www.suse.com/security/cve/CVE-2016-5337.html https://www.suse.com/security/cve/CVE-2016-5338.html https://www.suse.com/security/cve/CVE-2016-5403.html https://www.suse.com/security/cve/CVE-2016-6258.html https://www.suse.com/security/cve/CVE-2016-6351.html https://www.suse.com/security/cve/CVE-2016-6833.html https://www.suse.com/security/cve/CVE-2016-6834.html https://www.suse.com/security/cve/CVE-2016-6835.html https://www.suse.com/security/cve/CVE-2016-6836.html https://www.suse.com/security/cve/CVE-2016-6888.html https://www.suse.com/security/cve/CVE-2016-7092.html https://www.suse.com/security/cve/CVE-2016-7093.html https://www.suse.com/security/cve/CVE-2016-7094.html https://www.suse.com/security/cve/CVE-2016-7154.html https://bugzilla.suse.com/953339 https://bugzilla.suse.com/953362 https://bugzilla.suse.com/953518 https://bugzilla.suse.com/954872 https://bugzilla.suse.com/955399 https://bugzilla.suse.com/957986 https://bugzilla.suse.com/958848 https://bugzilla.suse.com/961600 https://bugzilla.suse.com/963161 https://bugzilla.suse.com/964427 https://bugzilla.suse.com/970135 https://bugzilla.suse.com/971949 https://bugzilla.suse.com/973188 https://bugzilla.suse.com/973631 https://bugzilla.suse.com/974038 https://bugzilla.suse.com/975130 https://bugzilla.suse.com/975138 https://bugzilla.suse.com/975907 https://bugzilla.suse.com/976058 https://bugzilla.suse.com/976111 https://bugzilla.suse.com/978164 https://bugzilla.suse.com/978295 https://bugzilla.suse.com/978413 https://bugzilla.suse.com/979035 https://bugzilla.suse.com/979620 https://bugzilla.suse.com/979670 https://bugzilla.suse.com/980716 https://bugzilla.suse.com/980724 https://bugzilla.suse.com/981264 https://bugzilla.suse.com/981276 https://bugzilla.suse.com/982024 https://bugzilla.suse.com/982025 https://bugzilla.suse.com/982026 https://bugzilla.suse.com/982224 https://bugzilla.suse.com/982225 https://bugzilla.suse.com/982286 https://bugzilla.suse.com/982695 https://bugzilla.suse.com/982960 https://bugzilla.suse.com/983973 https://bugzilla.suse.com/983984 https://bugzilla.suse.com/984981 https://bugzilla.suse.com/985503 https://bugzilla.suse.com/986586 https://bugzilla.suse.com/988675 https://bugzilla.suse.com/990843 https://bugzilla.suse.com/990923 https://bugzilla.suse.com/990970 https://bugzilla.suse.com/991934 https://bugzilla.suse.com/992224 https://bugzilla.suse.com/994421 https://bugzilla.suse.com/994625 https://bugzilla.suse.com/994761 https://bugzilla.suse.com/994772 https://bugzilla.suse.com/994775 https://bugzilla.suse.com/995785 https://bugzilla.suse.com/995789 https://bugzilla.suse.com/995792 https://bugzilla.suse.com/997731 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  19. SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2528-1 Rating: important References: #973188 #974038 #975130 #975138 #978164 #978295 #980716 #980724 #981264 #982960 #983984 #988675 #995785 #995792 Cross-References: CVE-2014-3615 CVE-2014-3672 CVE-2016-3158 CVE-2016-3159 CVE-2016-3710 CVE-2016-3960 CVE-2016-4001 CVE-2016-4002 CVE-2016-4439 CVE-2016-4441 CVE-2016-4480 CVE-2016-5238 CVE-2016-5338 CVE-2016-6258 CVE-2016-7092 CVE-2016-7094 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS ______________________________________________________________________________ An update that fixes 16 vulnerabilities is now available. Description: This update for xen fixes several issues. These security issues were fixed: - CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792) - CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785) - CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for up[censored] pagetable entries (bsc#988675) - CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions allowed local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the host via vectors related to the information transfer buffer (bsc#983984) - CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode (bsc#982960) - CVE-2014-3672: The qemu implementation in libvirt Xen allowed local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr (bsc#981264) - CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller (FSC) support did not properly check DMA length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command (bsc#980724) - CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI Controller (FSC) support did not properly check command buffer length, which allowed local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the host via unspecified vectors (bsc#980716) - CVE-2016-3710: The VGA module improperly performed bounds checking on banked access to video memory, which allowed local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue (bsc#978164) - CVE-2016-4480: The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen did not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might have allowed local guest OS users to gain privileges via a crafted mapping of memory (bsc#978295) - CVE-2016-3960: Integer overflow in the x86 shadow pagetable code allowed local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping (bsc#974038) - CVE-2016-3158: The xrstor function did not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allowed local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits (bsc#973188) - CVE-2016-4001: Buffer overflow in the stellaris_enet_receive function, when the Stellaris ethernet controller is configured to accept large packets, allowed remote attackers to cause a denial of service (QEMU crash) via a large packet (bsc#975130) - CVE-2016-4002: Buffer overflow in the mipsnet_receive function, when the guest NIC is configured to accept large packets, allowed remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes (bsc#975138) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-xen-12786=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 x86_64): xen-devel-4.1.6_08-29.1 xen-kmp-default-4.1.6_08_3.0.101_0.7.40-29.1 xen-kmp-trace-4.1.6_08_3.0.101_0.7.40-29.1 xen-libs-4.1.6_08-29.1 xen-tools-domU-4.1.6_08-29.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (x86_64): xen-4.1.6_08-29.1 xen-doc-html-4.1.6_08-29.1 xen-doc-pdf-4.1.6_08-29.1 xen-libs-32bit-4.1.6_08-29.1 xen-tools-4.1.6_08-29.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586): xen-kmp-pae-4.1.6_08_3.0.101_0.7.40-29.1 References: https://www.suse.com/security/cve/CVE-2014-3615.html https://www.suse.com/security/cve/CVE-2014-3672.html https://www.suse.com/security/cve/CVE-2016-3158.html https://www.suse.com/security/cve/CVE-2016-3159.html https://www.suse.com/security/cve/CVE-2016-3710.html https://www.suse.com/security/cve/CVE-2016-3960.html https://www.suse.com/security/cve/CVE-2016-4001.html https://www.suse.com/security/cve/CVE-2016-4002.html https://www.suse.com/security/cve/CVE-2016-4439.html https://www.suse.com/security/cve/CVE-2016-4441.html https://www.suse.com/security/cve/CVE-2016-4480.html https://www.suse.com/security/cve/CVE-2016-5238.html https://www.suse.com/security/cve/CVE-2016-5338.html https://www.suse.com/security/cve/CVE-2016-6258.html https://www.suse.com/security/cve/CVE-2016-7092.html https://www.suse.com/security/cve/CVE-2016-7094.html https://bugzilla.suse.com/973188 https://bugzilla.suse.com/974038 https://bugzilla.suse.com/975130 https://bugzilla.suse.com/975138 https://bugzilla.suse.com/978164 https://bugzilla.suse.com/978295 https://bugzilla.suse.com/980716 https://bugzilla.suse.com/980724 https://bugzilla.suse.com/981264 https://bugzilla.suse.com/982960 https://bugzilla.suse.com/983984 https://bugzilla.suse.com/988675 https://bugzilla.suse.com/995785 https://bugzilla.suse.com/995792 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  20. Energen 5-Port USB Charging Station Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/energen-5-port-usb-charging-station-review/ Image URL: http://www.thinkcomputers.org/reviews/energen_usb/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/energen_usb/small.jpg Quote: "Besides our computers almost all of our other electronic devices get charged via USB, our phones, cameras, tablets, headphones, and much more. It seems that there are not enough USB ports in our laptops and desktops to charge all of these devices! That is where Energen’s 5-port USB Charging Station comes in! It gives you four 2.4A USB power ports and a fifth Qualcomm Quick Charge 3.0 port for even faster charging. The Qualcomm Quick Charge 3.0 port charges device 4x faster than than typical 1A powered USB ports. This is a perfect device for the office, travel, or even your bedroom! Let’s see what it is all about!"
  21. Aerocool DS 230 Case Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=1640c9d8ab&e=872093acb5 http://www.kitguru.net =AEROCOOL DS 230 CASE REVIEW= Aerocool DS 230 has a familiar look about it, somewhat akin to a Fractal Design Define R5 or Thermaltake F51 standing on a small plinth. The emphasis is on low noise, which makes perfect sense in a Dead Silence model, and both side panels and the top cover are heavily lined with sound deadening material. You don’t get a window in the main panel, however some attention has been paid to cosmetic appeal with a lighting system in the front of the case and also in the plinth or base. Read the review here: http://www.kitguru.net/components/cases/leo-waldock/aerocool-ds-230-case-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend2.com/forward?u=bfb2b902b5fb045ad6f841f98&id=1640c9d8ab&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  22. <http://www.eteknix.com> Aerocool P7C1 Project 7 Tempered Glass Mid-Tower Chassis Review There's a huge demand for unique and premium looking chassis in the system building market these days, but more often than not, these chassis often come with a hefty price tag that leaves many consumers out of the running to purchase them. Aerocool realised this and have created their new Project 7 product range, which features all the unique design we've come to expect from an Aerocool chassis, fitted out with funky multicolour LED lighting effects and a huge tempered glass side panel window to show off your new hardware, and it does it for a very reasonable price. URL - http://www.eteknix.com/aerocool-p7c1-project-7-tempered-glass-mid-tower-chassis-review/ --
  23. openSUSE Security Update: Security update for systemd ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2522-1 Rating: important References: #1000435 #1001765 #954374 #970293 #982211 #996269 Cross-References: CVE-2016-7796 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that solves one vulnerability and has 5 fixes is now available. Description: This update for systemd fixes the following issues: - CVE-2016-7796: A zero-length message received over systemd's notification socket could make manager_dispatch_notify_fd() return an error and, as a side effect, disable the notification handler completely. As the notification socket is world-writable, this could have allowed a local user to perform a denial-of-service attack against systemd. (bsc#1001765) Additionally, the following non-security fixes are included: - Fix HMAC calculation when appending a data object to journal. (bsc#1000435) - Never accept file descriptors from file systems with mandatory locking enabled. (bsc#954374) - Do not warn about missing install info with "preset". (bsc#970293) - Save /run/systemd/users/UID before starting user ( -at -) .service. (bsc#996269) - Make sure that /var/lib/systemd/sysv-convert/database is always initialized. (bsc#982211) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-1184=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): libgudev-1_0-0-210.1475218254.1e76ce0-25.48.1 libgudev-1_0-0-debuginfo-210.1475218254.1e76ce0-25.48.1 libgudev-1_0-devel-210.1475218254.1e76ce0-25.48.1 libudev-devel-210.1475218254.1e76ce0-25.48.1 libudev-mini-devel-210.1475218254.1e76ce0-25.48.1 libudev-mini1-210.1475218254.1e76ce0-25.48.1 libudev-mini1-debuginfo-210.1475218254.1e76ce0-25.48.1 libudev1-210.1475218254.1e76ce0-25.48.1 libudev1-debuginfo-210.1475218254.1e76ce0-25.48.1 nss-myhostname-210.1475218254.1e76ce0-25.48.1 nss-myhostname-debuginfo-210.1475218254.1e76ce0-25.48.1 systemd-210.1475218254.1e76ce0-25.48.1 systemd-debuginfo-210.1475218254.1e76ce0-25.48.1 systemd-debugsource-210.1475218254.1e76ce0-25.48.1 systemd-devel-210.1475218254.1e76ce0-25.48.1 systemd-journal-gateway-210.1475218254.1e76ce0-25.48.1 systemd-journal-gateway-debuginfo-210.1475218254.1e76ce0-25.48.1 systemd-logger-210.1475218254.1e76ce0-25.48.1 systemd-mini-210.1475218254.1e76ce0-25.48.1 systemd-mini-debuginfo-210.1475218254.1e76ce0-25.48.1 systemd-mini-debugsource-210.1475218254.1e76ce0-25.48.1 systemd-mini-devel-210.1475218254.1e76ce0-25.48.1 systemd-mini-sysvinit-210.1475218254.1e76ce0-25.48.1 systemd-sysvinit-210.1475218254.1e76ce0-25.48.1 typelib-1_0-GUdev-1_0-210.1475218254.1e76ce0-25.48.1 udev-210.1475218254.1e76ce0-25.48.1 udev-debuginfo-210.1475218254.1e76ce0-25.48.1 udev-mini-210.1475218254.1e76ce0-25.48.1 udev-mini-debuginfo-210.1475218254.1e76ce0-25.48.1 - openSUSE 13.2 (noarch): systemd-bash-completion-210.1475218254.1e76ce0-25.48.1 - openSUSE 13.2 (x86_64): libgudev-1_0-0-32bit-210.1475218254.1e76ce0-25.48.1 libgudev-1_0-0-debuginfo-32bit-210.1475218254.1e76ce0-25.48.1 libudev1-32bit-210.1475218254.1e76ce0-25.48.1 libudev1-debuginfo-32bit-210.1475218254.1e76ce0-25.48.1 nss-myhostname-32bit-210.1475218254.1e76ce0-25.48.1 nss-myhostname-debuginfo-32bit-210.1475218254.1e76ce0-25.48.1 systemd-32bit-210.1475218254.1e76ce0-25.48.1 systemd-debuginfo-32bit-210.1475218254.1e76ce0-25.48.1 References: https://www.suse.com/security/cve/CVE-2016-7796.html https://bugzilla.suse.com/1000435 https://bugzilla.suse.com/1001765 https://bugzilla.suse.com/954374 https://bugzilla.suse.com/970293 https://bugzilla.suse.com/982211 https://bugzilla.suse.com/996269 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  24. http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=1da2a76deb&e=8138df6da5 ** Benchmark Reviews Presents: ------------------------------------------------------------ kworld-s25-elite-mobile-gaming-earphones-front TITLE: Kworld S25 Earphones Review (http://benchmarkreviews.us10.list-manage2.com/track/click?u=9a2f239b17114c9008e3dfda9&id=6b85bc98a8&e=8138df6da5) QUOTE: The S25 Elite Mobile Gaming Earphones are gold in color, have 9mm drivers, and look very similar to a bullet casing. A very stylish look that had some people turning their heads when I was wearing them out in public, as it appeared I had a couple of 9mm rounds stuffed into my ears. In this article for Benchmark Reviews, I’ll be putting the Kworld S25 Elite Mobile Gaming Earphones to the test. Do these golden bullets live up to Kworld’s claims? Let’s find out… LINK: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=488b916c5f&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=f075e20cd3&e=8138df6da5 ============================================================
  25. A news post would be great. OCC has published a review on G.SKILL Trident Z 3200MHz DDR4 32GB Here is a quote from the review: Quote: â€ÂLooking at the performance delivered by this set of G.SKILL Trident Z modules, it's clear that the modules do stand up well with the tighter timings. However, the secondary timings were loose enough that comparative performance took a hit when you look at the performance delivered by a similar kit from the competition. The looser secondary and tertiary timings let the modules overclock much further than the comparison modules, but you have to work a bit to tune these modules and the board for better performance. That being said, these modules will overclock to at least 3400MHz using the XMP 2.0 applied timings. To get there I needed to crank up the voltage to the modules to 1.5v to get the modules stable at 3400MHz 14-14-14-34. I cannot advocate pushing 1.5v through your modules, but G.SKILL has a limited lifetime warranty on the modules should anything happen.†Title: G.SKILL Trident Z 3200MHz DDR4 32GB Review Link: http://www.overclockersclub.com/reviews/gskill_trident_z_3200mhz_ddr4_32gb/ Img: http://www.overclockersclub.com/siteimages/articles/gskill_trident_z_3200mhz_ddr4_32gb/4_thumb.jpg
×