Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: MSI GTX 1070 Gaming Z 8 GB Link: http://www.techpowerup.com/reviews/MSI/GTX_1070_Gaming_Z Brief: MSI's GTX 1070 Gaming Z is the bigger brother of the Gaming X, with higher GPU overclock and a memory OC, too. The backplate has also been pimped, featuring an RGB-illuminated MSI logo. Thermal performance is identical, which means the card is whisper-quiet and running low temperatures at the same time.
  2. SUSE Security Update: Security update for mysql ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2343-1 Rating: important References: #937258 #967374 #989913 #989919 #989922 #989926 #998309 Cross-References: CVE-2016-3477 CVE-2016-3521 CVE-2016-3615 CVE-2016-5440 CVE-2016-6662 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has two fixes is now available. Description: This mysql update to verson 5.5.52 fixes the following issues: Security issues fixed: - CVE-2016-3477: Fixed unspecified vulnerability in subcomponent parser (bsc#989913). - CVE-2016-3521: Fixed unspecified vulnerability in subcomponent types (bsc#989919). - CVE-2016-3615: Fixed unspecified vulnerability in subcomponent dml (bsc#989922). - CVE-2016-5440: Fixed unspecified vulnerability in subcomponent rbr (bsc#989926). - CVE-2016-6662: A malicious user with SQL and filesystem access could create a my.cnf in the datadir and , under certain circumstances, execute arbitrary code as mysql (or even root) user. (bsc#998309) More details can be found on: http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-51.html http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html Bugs fixed: - bsc#967374: properly restart mysql multi instances during upgrade - bnc#937258: multi script to restart after crash Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-mysql-12752=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-mysql-12752=1 - SUSE Manager 2.1: zypper in -t patch sleman21-mysql-12752=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-mysql-12752=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-mysql-12752=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-mysql-12752=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-mysql-12752=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-mysql-12752=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-mysql-12752=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): libmysql55client18-32bit-5.5.52-0.27.1 libmysql55client18-5.5.52-0.27.1 libmysql55client_r18-5.5.52-0.27.1 mysql-5.5.52-0.27.1 mysql-client-5.5.52-0.27.1 mysql-tools-5.5.52-0.27.1 - SUSE Manager Proxy 2.1 (x86_64): libmysql55client18-32bit-5.5.52-0.27.1 libmysql55client18-5.5.52-0.27.1 libmysql55client_r18-5.5.52-0.27.1 mysql-5.5.52-0.27.1 mysql-client-5.5.52-0.27.1 mysql-tools-5.5.52-0.27.1 - SUSE Manager 2.1 (s390x x86_64): libmysql55client18-32bit-5.5.52-0.27.1 libmysql55client18-5.5.52-0.27.1 libmysql55client_r18-5.5.52-0.27.1 mysql-5.5.52-0.27.1 mysql-client-5.5.52-0.27.1 mysql-tools-5.5.52-0.27.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libmysql55client_r18-32bit-5.5.52-0.27.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ia64): libmysql55client_r18-x86-5.5.52-0.27.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libmysql55client18-5.5.52-0.27.1 libmysql55client_r18-5.5.52-0.27.1 mysql-5.5.52-0.27.1 mysql-client-5.5.52-0.27.1 mysql-tools-5.5.52-0.27.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libmysql55client18-32bit-5.5.52-0.27.1 libmysql55client_r18-32bit-5.5.52-0.27.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): libmysql55client18-x86-5.5.52-0.27.1 libmysql55client_r18-x86-5.5.52-0.27.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): libmysql55client18-5.5.52-0.27.1 libmysql55client_r18-5.5.52-0.27.1 mysql-5.5.52-0.27.1 mysql-client-5.5.52-0.27.1 mysql-tools-5.5.52-0.27.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64): libmysql55client18-32bit-5.5.52-0.27.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): libmysql55client18-5.5.52-0.27.1 libmysql55client_r18-5.5.52-0.27.1 mysql-5.5.52-0.27.1 mysql-client-5.5.52-0.27.1 mysql-tools-5.5.52-0.27.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): mysql-debuginfo-5.5.52-0.27.1 mysql-debugsource-5.5.52-0.27.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): mysql-debuginfo-5.5.52-0.27.1 mysql-debugsource-5.5.52-0.27.1 References: https://www.suse.com/security/cve/CVE-2016-3477.html https://www.suse.com/security/cve/CVE-2016-3521.html https://www.suse.com/security/cve/CVE-2016-3615.html https://www.suse.com/security/cve/CVE-2016-5440.html https://www.suse.com/security/cve/CVE-2016-6662.html https://bugzilla.suse.com/937258 https://bugzilla.suse.com/967374 https://bugzilla.suse.com/989913 https://bugzilla.suse.com/989919 https://bugzilla.suse.com/989922 https://bugzilla.suse.com/989926 https://bugzilla.suse.com/998309 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  3. Title: TerraMaster D5-300 USB 3.0 External Hard Drive RAID Enclosure Review ( -at -) NikKTech Description: With five 3.5/2.5" drive bays which can be configured in Large and RAID 0/5 modes and data transfer speeds surpassing 260MB/s the D5-300 USB 3.0 External Hard Drive RAID Enclosure by TerraMaster is certainly worth a spot on your desk. Article Link: http://www.nikktech.com/main/articles/peripherals/hdd-enclosures/6980-terram aster-d5-300-usb-3-0-external-hard-drive-raid-enclosure-review Image Link: http://www.nikktech.com/main/images/pics/reviews/terra_master/d5_300/terra_m aster_d5_300a.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  4. =SENNHEISER PC 373D GAMING HEADSET REVIEW= ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=4b0aaaff2c&e=872093acb5 http://www.kitguru.net =SENNHEISER PC 373D 7.1 DOLBY SURROUND SOUND GAMING HEADSET REVIEW= Sennheiser is often considered more of an audiophile brand rather than one catering to movie and gaming fans, but that is not always the case. Take the new Sennheiser PC 373D 7.1 Dolby surround sound headset that we are looking at today. It has everything that other gaming headsets have: solid drivers, great padding, surround sound audio and strong microphone clarity. Read the review here: http://www.kitguru.net/peripherals/jon-martindale/sennheiser-pc-373d-7-1-dolby-surround-sound-gaming-headset-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=4b0aaaff2c&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  5. =SENNHEISER PC 373D GAMING HEADSET REVIEW= ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=4b0aaaff2c&e=872093acb5 http://www.kitguru.net =SENNHEISER PC 373D 7.1 DOLBY SURROUND SOUND GAMING HEADSET REVIEW= Sennheiser is often considered more of an audiophile brand rather than one catering to movie and gaming fans, but that is not always the case. Take the new Sennheiser PC 373D 7.1 Dolby surround sound headset that we are looking at today. It has everything that other gaming headsets have: solid drivers, great padding, surround sound audio and strong microphone clarity. Read the review here: http://www.kitguru.net/peripherals/jon-martindale/sennheiser-pc-373d-7-1-dolby-surround-sound-gaming-headset-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=4b0aaaff2c&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  6. *ZOTAC GeForce GTX 1080 ArcticStorm Review* Wanna see a GeForce GTX 1080 review based on an all custom and proper liquid cooled setup? Well, meet the ZOTAC GeForce GTX 1080 ArcticStorm Edition. We'll check out the 8 GB beast with that lovely looks. Read the full review here <http://www.guru3d.com/articles-pages/zotac-geforce-gtx-1080-arcticstorm-review,1.html>'>http://www.guru3d.com/articles-pages/zotac-geforce-gtx-1080-arcticstorm-review,1.html> . URL: http://www.guru3d.com/articles-pages/zotac-geforce-gtx-1080-arcticstorm-review,1.html <http://www.guru3d.com/articles-pages/zotac-geforce-gtx-1080-arcticstorm-review,1.html> --
  7. A news post would be great. OCC has published a review on Deus Ex: Mankind Divided Performance Analysis Here is a quote from the review: Quote: â€ÂI was able to find good, playable settings for each of the four tested GPUs, but three of them all seemed to hang around the same FPS range. This suggests my CPU is holding them back, along with my observation that performance improves significantly when inside buildings. The GTX 1070 and GTX 1080 are almost certainly being bottlenecked by my CPU, and it is possible the GTX 980 is as well, but I do not want to commit to that idea. Also, options that I would normally expect to reduce a CPU bottleneck, such as reducing Level of Detail, did not seem to make a difference. While I will not take this as proof it is not bottlenecking me, it may suggest the nature of the bottleneck is something I cannot so easily remedy. That wraps up this analysis, but I do intend to return to it in the future, when DirectX 12 support is added. This could actually go a fair distance in addressing what CPU issues I seem to be having, so I for one am looking forward to this particular patch.†Title: Deus Ex: Mankind Divided Performance Analysis Review Link: http://www.overclockersclub.com/reviews/deus_ex_mankind_divided_performance/ Img: http://www.overclockersclub.com/siteimages/articles/deus_ex_mankind_divided_performance/106_thumb.jpg
  8. Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,Can you have a great gaming computer with out a Killer Networks controller. Turns out you can.Subject: MSI X99A Tomahawk Motherboard Review ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/reviews/motherboards/msi_x99_tomahawkQuote: In this review we looked at the MSI X99A Tomahawk Arsenal Gaming motherboard and after having used the board for several weeks I have come to the conclusion that it really is a good design for gaming on the X99.A news posting would be appreciatedThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved
  9. news

    Rygel 0.32.0

    A new stable release of Rygel! (including changes of all releases I forgot to announce) 0.32.0 ======  - Translation updates All contributors to this release:  - Ask Hjorth Larsen Added/updated translations  - da, courtesy of Ask Hjorth Larsen 0.31.6 ======  - Translation updates  - Fixes for Rygel systemd service file Bugs fixed in this release:  - https://bugzilla.gnome.org/show_bug.cgi?id=766332 All contributors to this release:  - Piotr Drąg  - Jan Alexander Steffens (heftig)  - Tom Tryfonidis  - RÅ«dolfs Mazurs  - Fran Dieguez  - David King  - Changwoo Ryu  - Baurzhan Muftakhidinov  - Anders Jonsson Added/updated translations  - el, courtesy of Tom Tryfonidis  - en_GB, courtesy of David King  - gl, courtesy of Fran Dieguez  - kk, courtesy of Baurzhan Muftakhidinov  - ko, courtesy of Changwoo Ryu  - lv, courtesy of RÅ«dolfs Mazurs  - pl, courtesy of Piotr Drąg  - sv, courtesy of Anders Jonsson 0.31.5 ======  - Several translation-related fixes  - Fix .desktop file generation Core library:  - Fix configuration dir generation  - Fix criticals on unset XDG_* variables  - Make it possible to add a fixed UDN MediaExport plugin:  - Clean-up titles a bit more thoroghly Tracker:  - Fix criticals on unset XDG_* variables  - Fix URL filter  - Skip URL filter if pattern substitution failed Bugs fixed in this release:  - https://bugzilla.gnome.org/show_bug.cgi?id=730910  - https://bugzilla.gnome.org/show_bug.cgi?id=770276  - https://bugzilla.gnome.org/show_bug.cgi?id=770531 All contributors to this release:  - Jens Georg  - Matej UrbanÄÂiĠ - Piotr Drąg  - ÃœøрþÑÂûðò ÃÂøúþûøћ  - Enrico Nicoletto  - Balázs Úr  - Andika Triwidada  - Alexandre Franke Added/updated translations  - fr, courtesy of Alain Lojewski  - hu, courtesy of Balázs Úr  - id, courtesy of Andika Triwidada  - pl, courtesy of Piotr Drąg  - pt_BR, courtesy of Enrico Nicoletto  - sl, courtesy of Matej UrbanÄÂiĠ - sr, courtesy of ÃœøрþÑÂûðò ÃÂøúþûøћ  - sr ( -at -) latin, courtesy of Miroslav Nikolić Download source tarball here: http://download.gnome.org/sources/rygel/0.32/ -------- What is Rygel? Rygel is a home media solution that allows you to easily share audio, video and pictures, and control of media player on your home network. In technical terms it is both a UPnP AV MediaServer and MediaRenderer implemented through a  plug-in mechanism. Interoperability with other devices in the market is achieved  by conformance to very strict requirements of DLNA and on the fly  conversion of media to formats that client devices are capable of handling. More information at our project home page: http://www.rygel-project.org _______________________________________________
  10. At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: MSI X99A Workstation Motherboard Runs Nicely On Linux ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=23523 Summary: "The past few weeks I've been testing out the MSI X99A Workstation motherboard courtesy of MSI Computer and it's been working out very well across a spectrum of open-source Linux (as well as BSD) use-cases for those in need of a LGA-2011 v3 motherboard." Please feel free to contact us with any questions or comments you may
  11. CentOS Errata and Enhancement Advisory 2016:1902 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1902.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: eb2c140f5b95878b359ca8c65274ea3b73020ddb3b4b797ed4f8499d332d4822 kmod-i40e-1.5.10_k-2.el7_2.x86_64.rpm Source: dd03d63ea0ec326bd696d5512605e6e9976d28dd09727a00f51c02080d6af1b8 i40e-1.5.10_k-2.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  12. CentOS Errata and Enhancement Advisory 2016:1902 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1902.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: b0c104d05e884a57fd198f40c4c9bdc517e85576bbaed56f5c69d9a802158fd2 kmod-i40evf-1.5.10_k-2.el7_2.x86_64.rpm Source: f45125d39805d07bda253c88f62534a84168bcb64a88ec180f3f5655763e590e i40evf-1.5.10_k-2.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  13. openSUSE Security Update: Security update for php5 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2337-1 Rating: important References: #997206 #997207 #997208 #997210 #997211 #997220 #997225 #997230 #997248 #997257 Cross-References: CVE-2016-7124 CVE-2016-7125 CVE-2016-7126 CVE-2016-7127 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 CVE-2016-7134 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. Description: This update for php5 fixes the following security issues: * CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization * CVE-2016-7125: PHP Session Data Injection Vulnerability * CVE-2016-7126: select_colors write out-of-bounds * CVE-2016-7127: imagegammacorrect allowed arbitrary write access * CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF * CVE-2016-7129: wddx_deserialize allowed illegal memory access * CVE-2016-7130: wddx_deserialize null dereference * CVE-2016-7131: wddx_deserialize null dereference with invalid xml * CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element * CVE-2016-7134: Heap overflow in the function curl_escape Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-1095=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): apache2-mod_php5-5.6.1-75.2 apache2-mod_php5-debuginfo-5.6.1-75.2 php5-5.6.1-75.2 php5-bcmath-5.6.1-75.2 php5-bcmath-debuginfo-5.6.1-75.2 php5-bz2-5.6.1-75.2 php5-bz2-debuginfo-5.6.1-75.2 php5-calendar-5.6.1-75.2 php5-calendar-debuginfo-5.6.1-75.2 php5-ctype-5.6.1-75.2 php5-ctype-debuginfo-5.6.1-75.2 php5-curl-5.6.1-75.2 php5-curl-debuginfo-5.6.1-75.2 php5-dba-5.6.1-75.2 php5-dba-debuginfo-5.6.1-75.2 php5-debuginfo-5.6.1-75.2 php5-debugsource-5.6.1-75.2 php5-devel-5.6.1-75.2 php5-dom-5.6.1-75.2 php5-dom-debuginfo-5.6.1-75.2 php5-enchant-5.6.1-75.2 php5-enchant-debuginfo-5.6.1-75.2 php5-exif-5.6.1-75.2 php5-exif-debuginfo-5.6.1-75.2 php5-fastcgi-5.6.1-75.2 php5-fastcgi-debuginfo-5.6.1-75.2 php5-fileinfo-5.6.1-75.2 php5-fileinfo-debuginfo-5.6.1-75.2 php5-firebird-5.6.1-75.2 php5-firebird-debuginfo-5.6.1-75.2 php5-fpm-5.6.1-75.2 php5-fpm-debuginfo-5.6.1-75.2 php5-ftp-5.6.1-75.2 php5-ftp-debuginfo-5.6.1-75.2 php5-gd-5.6.1-75.2 php5-gd-debuginfo-5.6.1-75.2 php5-gettext-5.6.1-75.2 php5-gettext-debuginfo-5.6.1-75.2 php5-gmp-5.6.1-75.2 php5-gmp-debuginfo-5.6.1-75.2 php5-iconv-5.6.1-75.2 php5-iconv-debuginfo-5.6.1-75.2 php5-imap-5.6.1-75.2 php5-imap-debuginfo-5.6.1-75.2 php5-intl-5.6.1-75.2 php5-intl-debuginfo-5.6.1-75.2 php5-json-5.6.1-75.2 php5-json-debuginfo-5.6.1-75.2 php5-ldap-5.6.1-75.2 php5-ldap-debuginfo-5.6.1-75.2 php5-mbstring-5.6.1-75.2 php5-mbstring-debuginfo-5.6.1-75.2 php5-mcrypt-5.6.1-75.2 php5-mcrypt-debuginfo-5.6.1-75.2 php5-mssql-5.6.1-75.2 php5-mssql-debuginfo-5.6.1-75.2 php5-mysql-5.6.1-75.2 php5-mysql-debuginfo-5.6.1-75.2 php5-odbc-5.6.1-75.2 php5-odbc-debuginfo-5.6.1-75.2 php5-opcache-5.6.1-75.2 php5-opcache-debuginfo-5.6.1-75.2 php5-openssl-5.6.1-75.2 php5-openssl-debuginfo-5.6.1-75.2 php5-pcntl-5.6.1-75.2 php5-pcntl-debuginfo-5.6.1-75.2 php5-pdo-5.6.1-75.2 php5-pdo-debuginfo-5.6.1-75.2 php5-pgsql-5.6.1-75.2 php5-pgsql-debuginfo-5.6.1-75.2 php5-phar-5.6.1-75.2 php5-phar-debuginfo-5.6.1-75.2 php5-posix-5.6.1-75.2 php5-posix-debuginfo-5.6.1-75.2 php5-pspell-5.6.1-75.2 php5-pspell-debuginfo-5.6.1-75.2 php5-readline-5.6.1-75.2 php5-readline-debuginfo-5.6.1-75.2 php5-shmop-5.6.1-75.2 php5-shmop-debuginfo-5.6.1-75.2 php5-snmp-5.6.1-75.2 php5-snmp-debuginfo-5.6.1-75.2 php5-soap-5.6.1-75.2 php5-soap-debuginfo-5.6.1-75.2 php5-sockets-5.6.1-75.2 php5-sockets-debuginfo-5.6.1-75.2 php5-sqlite-5.6.1-75.2 php5-sqlite-debuginfo-5.6.1-75.2 php5-suhosin-5.6.1-75.2 php5-suhosin-debuginfo-5.6.1-75.2 php5-sysvmsg-5.6.1-75.2 php5-sysvmsg-debuginfo-5.6.1-75.2 php5-sysvsem-5.6.1-75.2 php5-sysvsem-debuginfo-5.6.1-75.2 php5-sysvshm-5.6.1-75.2 php5-sysvshm-debuginfo-5.6.1-75.2 php5-tidy-5.6.1-75.2 php5-tidy-debuginfo-5.6.1-75.2 php5-tokenizer-5.6.1-75.2 php5-tokenizer-debuginfo-5.6.1-75.2 php5-wddx-5.6.1-75.2 php5-wddx-debuginfo-5.6.1-75.2 php5-xmlreader-5.6.1-75.2 php5-xmlreader-debuginfo-5.6.1-75.2 php5-xmlrpc-5.6.1-75.2 php5-xmlrpc-debuginfo-5.6.1-75.2 php5-xmlwriter-5.6.1-75.2 php5-xmlwriter-debuginfo-5.6.1-75.2 php5-xsl-5.6.1-75.2 php5-xsl-debuginfo-5.6.1-75.2 php5-zip-5.6.1-75.2 php5-zip-debuginfo-5.6.1-75.2 php5-zlib-5.6.1-75.2 php5-zlib-debuginfo-5.6.1-75.2 - openSUSE 13.2 (noarch): php5-pear-5.6.1-75.2 References: https://www.suse.com/security/cve/CVE-2016-7124.html https://www.suse.com/security/cve/CVE-2016-7125.html https://www.suse.com/security/cve/CVE-2016-7126.html https://www.suse.com/security/cve/CVE-2016-7127.html https://www.suse.com/security/cve/CVE-2016-7128.html https://www.suse.com/security/cve/CVE-2016-7129.html https://www.suse.com/security/cve/CVE-2016-7130.html https://www.suse.com/security/cve/CVE-2016-7131.html https://www.suse.com/security/cve/CVE-2016-7132.html https://www.suse.com/security/cve/CVE-2016-7134.html https://bugzilla.suse.com/997206 https://bugzilla.suse.com/997207 https://bugzilla.suse.com/997208 https://bugzilla.suse.com/997210 https://bugzilla.suse.com/997211 https://bugzilla.suse.com/997220 https://bugzilla.suse.com/997225 https://bugzilla.suse.com/997230 https://bugzilla.suse.com/997248 https://bugzilla.suse.com/997257 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  14. CentOS Errata and Security Advisory 2016:1847 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1847.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 0132c81c464d7fd124c3cc05667cd1b946f02d5f290786a24b5b3f455475710a kernel-3.10.0-327.36.1.el7.x86_64.rpm 47ca54349833bf6552db64f7ebbcbc371dd75b202afc6112cd745fa5ea2e088a kernel-abi-whitelists-3.10.0-327.36.1.el7.noarch.rpm 7fb03457b08a16d9c164bc9d16430cbc2f711a43bc15e5d8d1218862fac8ad63 kernel-debug-3.10.0-327.36.1.el7.x86_64.rpm cf097685adfdda59acdbd1d31e0c71ab8e4fbec3d58276363b702ebd5d0c8da3 kernel-debug-devel-3.10.0-327.36.1.el7.x86_64.rpm 8640f0e8f41db56b9641a59e141dd26f7e406e2d04a3fe51bdfd010bf536ffb5 kernel-devel-3.10.0-327.36.1.el7.x86_64.rpm 752886f128cbcc5137b267a44b6b42ffa2f0c9834cbffb8f19377390bae22b64 kernel-doc-3.10.0-327.36.1.el7.noarch.rpm 5ec824e095fcd81cb8121ec4f847c741401a59144bff4d82ccd591cb86fd31c3 kernel-headers-3.10.0-327.36.1.el7.x86_64.rpm d6ab7934185ac95acb8ff96fdeec23c38d557d797dabe6777d0312d9d7e3981f kernel-tools-3.10.0-327.36.1.el7.x86_64.rpm 93d49a5f861ef0bde2c60ec3953049dba0e50b8602f8c06f7cc12372c4c45a8f kernel-tools-libs-3.10.0-327.36.1.el7.x86_64.rpm c12ac571e80595f53ca2a6c666cee9cb7c952f4a48c62952a0c4f312e3d54b5d kernel-tools-libs-devel-3.10.0-327.36.1.el7.x86_64.rpm e8b7e4161d9a26bd8c1433c3e0268077f927255da232d8b55a2b478e0899a7bb perf-3.10.0-327.36.1.el7.x86_64.rpm 6547fdd10604f70869da0ed0bf1aa4856e3cb9582b6801b208824864137f7d75 python-perf-3.10.0-327.36.1.el7.x86_64.rpm Source: fdaf7af158a3ced62921d8591f76638bfa77f3440900ed7e90639d275720ae68 kernel-3.10.0-327.36.1.el7.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  15. Hi News Poster HardwareOverclock.com has just posted another review. Last week we have taken a look at the ASUS Z170 Deluxe mainboard. Whether you need a system for productivity, gaming, overclocking or your home-theater, this was created to excel and look good while doing it. Title: ASUS Z170 Deluxe mainboard ( -at -) HardwareOverclock.com Link: http://hardwareoverclock.com/ASUS-Z170-Deluxe-Mainboard.htm Image: http://hardwareoverclock.com/Mainboard/Asus-Z170-Deluxe-006_small.jpg Thanks for posting kr Rene Ruf Chefredakteur HardwareOverclock.com <http://www.hardwareoverclock.com/> http://www.hardwareoverclock.com <mailto:admin ( -at -) hardwareoverclock.com> mailto:admin ( -at -) hardwareoverclock.com
  16. MSI X99A XPower Gaming Titanium Motherboard Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/msi-x99a-xpower-gaming-titanium-motherboard-review/ Image URL: http://www.thinkcomputers.org/reviews/msi_x99a_xpower_gaming_titanium/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/msi_x99a_xpower_gaming_titanium/small.jpg Quote: "Over the past couple of years MSI has really solidified themselves as a major player in the motherboard market. Their main focus with many of their motherboards has been gaming a recently they divided their gaming segment into three distinct series, Enthusiast Gaming, Performance Gaming, and Arsenal Gaming. Today we will be taking a look at a really unique motherboard which is part of the Enthusiast Gaming Series. It is not often we see motherboards with PCB’s that differ from black, but MSI has gone Titanium with their X99A XPower Gaming Titanium as the name suggests. MSI did not just make the PCB of this board a Titanium color and expect people to buy it, they have decked it out with all of the options enthusiast gamers would want! You have Intel Gaming Networking, SLI and Crossfire support with steel-plated PCIe and DDR4 slots, 32 Gb/s M.2 and U.2 ports, USB 3.1 Gen 2 (Type-A and Type-C) ports, Audio Boost 3, powered by Nahimic Sound Technology, and so much more! This motherboard has pretty much everything you could ask for! Let’s jump in and see what it is all about!"
  17. news

    ATK 2.22.0 released

    ATK 2.22.0, the last major version of the stable version of ATK has just been released. About ATK ========= GNOME provides support for accessibility devices using the ATK library. This library defines a set of interfaces to which graphical interface components adhere. This allows, for instance, screen readers to read the text of an interface and interact with its controls. ATK support is built into GTK+ and the rest of the GNOME platform, so any application using GTK+ will have reasonable accessibility support for free. Nonetheless, you should be aware of accessibility issues when when developing your applications. Although GTK+ interfaces provide reasonable accessibility by default, you can often improve how well your program behaves with accessibility tools by providing additional information to ATK. If you develop custom widgets, you should ensure that they expose their properties to ATK. News (compared with 2.20.0) =========================== * * Bug 764883: Add some missing argument (out) annotations * Gettext: * Add Language headers to po files * Add more options to XGETTEXT_OPTIONS in po/Makevars * MSVC/win32 * MSVC Builds: Add a Common Autotools Module for Introspection (Bug 764983) * MSVC Builds: Generate the Introspection Build Commands (Bug 764983) * Clean up atk-introspection-msvc.mak * Visual Studio builds: Include version info in property sheets * Visual Studio builds: Generate atk.pc * Visual Studio 2008 builds: Ensure pc file is generated before "install" * Visual Studio builds: Make .pc generation more flexible * build/win32/pc_base.py: Allow custom options * build/win32/atkpc.py: Fix dependent package string Contributors: ------------- Piotr Drąg, Chun-wei Fan, Rico Tzschichholz Translations: ------------- GNOME Translation Robot (gd), Cédric Valmary (oc), Piotr Drąg (po), David King (en_GB) Download ======== https://download.gnome.org/sources/atk/2.22/atk-2.22.0.tar.xz (728K) sha256sum: d349f5ca4974c9c76a4963e5b254720523b0c78672cbc0e1a3475dbd9b3d44b6 -- Alejandro Piñeiro Iglesias _______________________________________________
  18. The ADATA Ultimate SU800 is the first SSD series from ADATA that features 3D TLC NAND Flash memory components. Despite having 'Ultimate' in in its product name, the Ultimate SU800 is a SATA III 6Gb/s SSD that is aimed at the price-conscious consumer in the SSD value market. As you might have guessed, this means you'll get decent performance at rather affordable price points. Read on to find out how it performs and what the pricing is like! Article Title: ADATA Ultimate SU800 512GB SSD Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/adata-ultimate-su800-512gb-ssd-review_186296 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
  19. =AEROCOOL STRIKE-X AIR REVIEW= ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=cfcedaa1bf&e=872093acb5 http://www.kitguru.net =SK HYNIX CANVAS SL308 500GB REVIEW= Already well known as a manufacturer of Flash NAND, SK hynix are certainly working on ramping up their presence in the SSD market with their own drives. Hard on the heels of the Enterprise-focused SE3010 that we examined recently comes the latest addition to the Canvas consumer range – the SL308. Aimed more towards the entry level end of the consumer space, the SL308 uses low-cost TLC memory in combination with an SK hynix controller. Read the review here: http://www.kitguru.net/components/simon-crisp/sk-hynix-canvas-sl308-500gb-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=cfcedaa1bf&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  20. news

    The Best Graphics Cards

    ** TECHSPOT ------------------------------------------------------------ ** The Best Graphics Cards ------------------------------------------------------------ ** http://www.techspot.com/bestof/graphics-cards/ ------------------------------------------------------------ Looking to upgrade or buy a new GPU? Don't mind all that testing, marginal fps gains depending on the game you play, power consumption figures, or overclocking potential. You want a simple question answered. Given a certain budget, which is the graphics card you should buy? Fret no more. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  21. Title: D-Link DIR-890L AC3200 Ultra Wi-Fi Router Review ( -at -) NikKTech Description: The DIR-890L AC3200 Ultra Wi-Fi Router by D-Link is not only one of the best looking models in the market today but it also packs a large number of features and offers top of the line wired and wireless performance. Article Link: http://www.nikktech.com/main/articles/peripherals/network/modem-routers/6979 -d-link-dir-890l-ac3200-ultra-wi-fi-router-review Image Link: http://www.nikktech.com/main/images/pics/reviews/d_link/dir_890l/dlink_dir_8 90la.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  22. -------- SUMO AIR LOUNGER SELF-INFLATABLE CHAIR REVIEW ( -at -) APH NETWORKS -------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Sumo Air Lounger Self-Inflatable Chair Review ( -at -) APH Networks * Description: Ever wish you could take a large comfy chair with you to camp? The Sumo Air Lounger Self-Inflatable Chair is your chance. * Link: http://aphnetworks.com/lounge/sumo-air-lounger-self-inflatable-chair * Image: http://aphnetworks.com/funstuff/sumo-air-lounger-self-inflatable-chair/005.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  23. View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=c7f51a1611&e=0c004f9c13) Join us for the latest episode of HotHardware's Two And A Half Geeks webcast! In this show, we talk about new, relatively low-cost SSDs from Intel and OCZ, a great new Lenovo ThinkPad X1 Yoga laptop with OLED display, the mechanical Das Keyboard Prime 13, LG's G5 and V20 smartphones, new CPU architectures and we're giving away an HP 2-in1 notebook! Two And A Half Geeks 9/16/16: Intel SSD 600P, ThinkPad w/ OLED, Das Prime 13, LG G5 & V20, A Giveaway And More! (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=632ad82898&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=a385698b87&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=fdfca8df94&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=fc570d31e3&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=3b52a9ab6f&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=6b60d38e55&e=0c004f9c13 http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=2d83fa22a7&e=0c004f9c13 ============================================================
  24. PRESS ALERT: TUDIA COUS WIRELESS REMOTE CONTROL ELECTRICAL OUTLET AVAILABLE FOR PRESS REVIEW – ESSENTIAL FOR SENIORS & MOBILITY IMPAIRED Low-Cost Way to Turn On/Off Hard-to-Reach Lights, Appliances & Power Strips No Need for Expensive, Complicated IoT Smartphone Devices – Includes 5 Outlet Plugs & 2 Remotes Press Release: http://sable.madmimi.com/c/71191?id=347450.2399.1.7a171640f311fa667f4055431a4e7490 The TUDIA Cous Wireless Remote Control Electrical Outlet http://sable.madmimi.com/c/71191?id=347450.2400.1.631ad8b81d01c9350e2b89ea995e849e an inexpensive way to control all your lights, household appliances, and power strips without the need for expensive hard-to-use IoT smartphone devices is now available for press review in limited quantities. TUDIA Cous turns on and off lights and appliances, wirelessly communicating to its outlet plugs from as far as 100 feet -- even through closed doors, floors, and walls. Made for use with all hard to reach lights and appliances and essential gear for seniors and the mobility impaired, Cous comes with 5 outlet plugs and 2 remotes (additional outlet plugs and remotes are available) for only $34.75. The Cous outlet plug features a compact size that covers only one wall outlet when plugged into the top outlet, freeing up the lower outlet for other uses (unlike competitors that cover 2 outlets at once). Price: $34.74 through Amazon: http://sable.madmimi.com/c/71191?id=347450.2401.1.c33f67b69610ce13f19e7a25d6454fd6 Press Release: http://sable.madmimi.com/c/71191?id=347450.2402.1.3c46460b71c444a6b094afdb8980a28c Video: http://sable.madmimi.com/c/71191?id=347450.2403.1.b56575081094c922d4013eff75ed0957 TUDIA Cous Photos: Lifestyle: http://sable.madmimi.com/c/71191?id=347450.2404.1.ffdb44f6f038ccaefe323f863e57eaee In use: http://sable.madmimi.com/c/71191?id=347450.2405.1.d12ed42600cf433802d9d7deb1915433 TUDIA Cous: http://sable.madmimi.com/c/71191?id=347450.2406.1.dcbe78e3a31294f141e1d9398f77cbea Outlet Plug: http://sable.madmimi.com/c/71191?id=347450.2407.1.d51eafadde071cb7ed1e08a4423af94e Remote: http://sable.madmimi.com/c/71191?id=347450.2408.1.8fc673e8fb01aff103327cabceb06cc8 Remote2: http://sable.madmimi.com/c/71191?id=347450.2409.1.049f899951b3d1bf7c5957f5d8b1fa2f TUDIA Cous v. Competition: http://sable.madmimi.com/c/71191?id=347450.2410.1.68601b3b5d16e2857523d442f25b3658 Benefits: http://sable.madmimi.com/c/71191?id=347450.2411.1.fdba0f0074e8122de379b0a0e0988b04 Preferences: http://sable.madmimi.com/c/71191?id=347450.2412.1.901386986efa8e8eacad1297a6818e3a&p=eyIlN0IlN0JtaW1pLXNpZ25hdHVyZSU3RCU3RCI6IjEzNDMzNTQ2MS05MjUzNTk4NTg1LWU5ODJkMjg4MTkyOTZiOWYwMTliMzI3OGJkMGZlMTNkMzFmZDIxNzkiLCIlN0IlN0JtZW1iZXItaWQlN0QlN0QiOjkyNTM1OTg1ODUsIiU3QiU3QmVtYWlsSWQlN0QlN0QiOiIzNDc0NTAifQ== Received this from a friend?: http://sable.madmimi.com/c/71191?id=347450.2413.1.70d8ee0f0133141f4346dec94534594a&p=eyIlN0IlN0JtaW1pLXNpZ25hdHVyZSU3RCU3RCI6IjEzNDMzNTQ2MS05MjUzNTk4NTg1LWU5ODJkMjg4MTkyOTZiOWYwMTliMzI3OGJkMGZlMTNkMzFmZDIxNzkiLCIlN0IlN0JtZW1iZXItaWQlN0QlN0QiOjkyNTM1OTg1ODUsIiU3QiU3QmVtYWlsSWQlN0QlN0QiOiIzNDc0NTAifQ== Forward this email to a friend: http://sable.madmimi.com/c/71191?id=347450.2414.1.f8016b8127234d940ad2501dddf009a8&p=eyIlN0IlN0JtaW1pLXNpZ25hdHVyZSU3RCU3RCI6IjEzNDMzNTQ2MS05MjUzNTk4NTg1LWU5ODJkMjg4MTkyOTZiOWYwMTliMzI3OGJkMGZlMTNkMzFmZDIxNzkiLCIlN0IlN0JtZW1iZXItaWQlN0QlN0QiOjkyNTM1OTg1ODUsIiU3QiU3QmVtYWlsSWQlN0QlN0QiOiIzNDc0NTAifQ== To unsubscribe go here: https://go.madmimi.com/opt_out?fe=1&pact=347450-134335461-9253598585-e982d28819296b9f019b3278bd0fe13d31fd2179&amx=9253598585
  25. SUSE Security Update: Security update for php53 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2328-1 Rating: important References: #987530 #991426 #991427 #991428 #991429 #991430 #991433 #991437 #997206 #997207 #997208 #997210 #997211 #997220 #997225 #997230 #997257 Cross-References: CVE-2014-3587 CVE-2016-3587 CVE-2016-5399 CVE-2016-6288 CVE-2016-6289 CVE-2016-6290 CVE-2016-6291 CVE-2016-6296 CVE-2016-6297 CVE-2016-7124 CVE-2016-7125 CVE-2016-7126 CVE-2016-7127 CVE-2016-7128 CVE-2016-7129 CVE-2016-7130 CVE-2016-7131 CVE-2016-7132 Affected Products: SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. Description: This update for php53 fixes the following security issues: * CVE-2014-3587: Integer overflow in the cdf_read_property_info affecting SLES11 SP3 [bsc#987530] * CVE-2016-6297: Stack-based buffer overflow vulnerability in php_stream_zip_opener [bsc#991426] * CVE-2016-6291: Out-of-bounds access in exif_process_IFD_in_MAKERNOTE [bsc#991427] * CVE-2016-6289: Integer overflow leads to buffer overflow in virtual_file_ex [bsc#991428] * CVE-2016-6290: Use after free in unserialize() with Unexpected Session Deserialization [bsc#991429] * CVE-2016-5399: Improper error handling in bzread() [bsc#991430] * CVE-2016-6288: Buffer over-read in php_url_parse_ex [bsc#991433] * CVE-2016-6296: Heap buffer overflow vulnerability in simplestring_addn in simplestring.c [bsc#991437] * CVE-2016-7124: Create an Unexpected Object and Don't Invoke __wakeup() in Deserialization * CVE-2016-7125: PHP Session Data Injection Vulnerability * CVE-2016-7126: select_colors write out-of-bounds * CVE-2016-7127: imagegammacorrect allowed arbitrary write access * CVE-2016-7128: Memory Leakage In exif_process_IFD_in_TIFF * CVE-2016-7129: wddx_deserialize allows illegal memory access * CVE-2016-7130: wddx_deserialize null dereference * CVE-2016-7131: wddx_deserialize null dereference with invalid xml * CVE-2016-7132: wddx_deserialize null dereference in php_wddx_pop_element Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-php53-12750=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-php53-12750=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): apache2-mod_php53-5.3.17-55.1 php53-5.3.17-55.1 php53-bcmath-5.3.17-55.1 php53-bz2-5.3.17-55.1 php53-calendar-5.3.17-55.1 php53-ctype-5.3.17-55.1 php53-curl-5.3.17-55.1 php53-dba-5.3.17-55.1 php53-dom-5.3.17-55.1 php53-exif-5.3.17-55.1 php53-fastcgi-5.3.17-55.1 php53-fileinfo-5.3.17-55.1 php53-ftp-5.3.17-55.1 php53-gd-5.3.17-55.1 php53-gettext-5.3.17-55.1 php53-gmp-5.3.17-55.1 php53-iconv-5.3.17-55.1 php53-intl-5.3.17-55.1 php53-json-5.3.17-55.1 php53-ldap-5.3.17-55.1 php53-mbstring-5.3.17-55.1 php53-mcrypt-5.3.17-55.1 php53-mysql-5.3.17-55.1 php53-odbc-5.3.17-55.1 php53-openssl-5.3.17-55.1 php53-pcntl-5.3.17-55.1 php53-pdo-5.3.17-55.1 php53-pear-5.3.17-55.1 php53-pgsql-5.3.17-55.1 php53-pspell-5.3.17-55.1 php53-shmop-5.3.17-55.1 php53-snmp-5.3.17-55.1 php53-soap-5.3.17-55.1 php53-suhosin-5.3.17-55.1 php53-sysvmsg-5.3.17-55.1 php53-sysvsem-5.3.17-55.1 php53-sysvshm-5.3.17-55.1 php53-tokenizer-5.3.17-55.1 php53-wddx-5.3.17-55.1 php53-xmlreader-5.3.17-55.1 php53-xmlrpc-5.3.17-55.1 php53-xmlwriter-5.3.17-55.1 php53-xsl-5.3.17-55.1 php53-zip-5.3.17-55.1 php53-zlib-5.3.17-55.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): php53-debuginfo-5.3.17-55.1 php53-debugsource-5.3.17-55.1 References: https://www.suse.com/security/cve/CVE-2014-3587.html https://www.suse.com/security/cve/CVE-2016-3587.html https://www.suse.com/security/cve/CVE-2016-5399.html https://www.suse.com/security/cve/CVE-2016-6288.html https://www.suse.com/security/cve/CVE-2016-6289.html https://www.suse.com/security/cve/CVE-2016-6290.html https://www.suse.com/security/cve/CVE-2016-6291.html https://www.suse.com/security/cve/CVE-2016-6296.html https://www.suse.com/security/cve/CVE-2016-6297.html https://www.suse.com/security/cve/CVE-2016-7124.html https://www.suse.com/security/cve/CVE-2016-7125.html https://www.suse.com/security/cve/CVE-2016-7126.html https://www.suse.com/security/cve/CVE-2016-7127.html https://www.suse.com/security/cve/CVE-2016-7128.html https://www.suse.com/security/cve/CVE-2016-7129.html https://www.suse.com/security/cve/CVE-2016-7130.html https://www.suse.com/security/cve/CVE-2016-7131.html https://www.suse.com/security/cve/CVE-2016-7132.html https://bugzilla.suse.com/987530 https://bugzilla.suse.com/991426 https://bugzilla.suse.com/991427 https://bugzilla.suse.com/991428 https://bugzilla.suse.com/991429 https://bugzilla.suse.com/991430 https://bugzilla.suse.com/991433 https://bugzilla.suse.com/991437 https://bugzilla.suse.com/997206 https://bugzilla.suse.com/997207 https://bugzilla.suse.com/997208 https://bugzilla.suse.com/997210 https://bugzilla.suse.com/997211 https://bugzilla.suse.com/997220 https://bugzilla.suse.com/997225 https://bugzilla.suse.com/997230 https://bugzilla.suse.com/997257 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
×