Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. Hello editors, Today we review the Thermaltake Water 3.0 Riing RGB 240, an all-in-one liquid cooler setup that comes with a 240mm radiator, dual 120mm high static pressure LED fans, and a smart fan controller. http://www.neoseeker.com/Articles/Hardware/Reviews/thermaltake-water-3-riing-rgb-240/ "This liquid-cooling package boasts high static pressure 120mm fan > operation to provide smooth air flow across a large surface radiator and > comes with a highly reliable pump using sleeved tubing for coolant > movement, allowing it to meet many users' needs and expectations." Thanks as always for any linkage! Neoseeker Hardware http://www.neoseeker.com/ hardware ( -at -) neoseeker.com
  2. CentOS Errata and Bugfix Advisory 2016:1665 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1665.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: d3ee157cdb3844dbc90dc1f9ba763d0fc73f645386dcf7bc22d6a1b9f4e6cbde pcs-0.9.148-7.el6.centos.1.i686.rpm x86_64: 18ae6e255e0d2e59900333b568b541bd76cb5e50a3c76c749d14aafcb765f36f pcs-0.9.148-7.el6.centos.1.x86_64.rpm Source: bce3d0d0e8861c0f97f1527b1c71ef81503f23c875339355781918592ddf1b42 pcs-0.9.148-7.el6.centos.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  3. CentOS Errata and Bugfix Advisory 2016:1663 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1663.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 2da08ce1a4e3ab757f29c482bc187f630bd756c987d9c7d084b9778e7a4f7277 avahi-0.6.25-15.el6_8.1.i686.rpm ab8a4cc31915ce46c2fad566a96925cd8a174bd424db6f3d2df2afa40019c040 avahi-autoipd-0.6.25-15.el6_8.1.i686.rpm 1c86318ed404bb778352799f08b2fb1a50ef3561e58bb5100897ac8158c8f3a7 avahi-compat-howl-0.6.25-15.el6_8.1.i686.rpm ae6819eda67a34d43a8288ad63bfcf4d03ec9cf7027d3bd73433911115e6e6c1 avahi-compat-howl-devel-0.6.25-15.el6_8.1.i686.rpm 807cfb26768ecaf5a13052291228390fd36a09b02bd60281e6fbe06e3c5ffeed avahi-compat-libdns_sd-0.6.25-15.el6_8.1.i686.rpm b1dd4656a6fe62fc5c64cec1bccb42c670e10072c82d118c2d30efd11db47140 avahi-compat-libdns_sd-devel-0.6.25-15.el6_8.1.i686.rpm 45456f586f1f90142bf2d50e0da606fc0502fe9c3d32e68cd8822977e30d3f69 avahi-devel-0.6.25-15.el6_8.1.i686.rpm c2e05acac8896194405e5aedf5623a1a8e5340df7678230e9add61167cfd143a avahi-dnsconfd-0.6.25-15.el6_8.1.i686.rpm 00d291eefe76b370b0d34550735e9bc25b52419ba2b4ec0c5a5ef11c5f10a0df avahi-glib-0.6.25-15.el6_8.1.i686.rpm 19129941ada18e1e8429b33f092aaa2ff3d13e1944adfe823f5619e248e92323 avahi-glib-devel-0.6.25-15.el6_8.1.i686.rpm fecc678248c6dd23e2b92673e6a1ecd7eb7658be3c728b8fdb0aa89ee6098bb9 avahi-gobject-0.6.25-15.el6_8.1.i686.rpm b8ee777883f5c63df34f71a29c11fe08d1a71f6d1374886ff293bb34deafeda4 avahi-gobject-devel-0.6.25-15.el6_8.1.i686.rpm 926c94db33c0b9cd9bdb0a40a6afd24b88a78c69f03ddbe1cac4bca4ee4227d3 avahi-libs-0.6.25-15.el6_8.1.i686.rpm d1e76b17b6ad25d32c3e0b881f40d0970b61819cbed2428d4aae402d3a30b2fc avahi-qt3-0.6.25-15.el6_8.1.i686.rpm 86e409cac76fc3899c8a25042d32456db54cfd6f2577c658d8e7acb39e46bfef avahi-qt3-devel-0.6.25-15.el6_8.1.i686.rpm 06d9b6affaafe71a84c2a965c4e76104ad85183f905f54edf7f356cd1dc969c3 avahi-qt4-0.6.25-15.el6_8.1.i686.rpm 410bb827ac0a5504bcb818d05498058993a39793ab252350f6646478a97146e6 avahi-qt4-devel-0.6.25-15.el6_8.1.i686.rpm 9f3b0f07c426a12f6f6fa67f85afde219f2469fa4d816247cec42b8e4eb034fd avahi-tools-0.6.25-15.el6_8.1.i686.rpm 90f580cd8656864c01d480e51adce74a5faf139ad756449a77e5cf40eeda6ca1 avahi-ui-0.6.25-15.el6_8.1.i686.rpm 389e2ab4ed01c19835903eda8f27a763e02ebb0a03f2874cd6a19395ee3695d1 avahi-ui-devel-0.6.25-15.el6_8.1.i686.rpm b976b58fac5dd7ab25f2b5056a345736d85203d92cf9a7a8faa66852ecc94d9f avahi-ui-tools-0.6.25-15.el6_8.1.i686.rpm x86_64: 2da08ce1a4e3ab757f29c482bc187f630bd756c987d9c7d084b9778e7a4f7277 avahi-0.6.25-15.el6_8.1.i686.rpm 4b0801b77db3a557dc38e91b5efbc8843d13c6f66f10da4b1f4ac666c786920c avahi-0.6.25-15.el6_8.1.x86_64.rpm 0a485805a8eb11f1886625bcb161466cf42f0a62ad0e2b63111b22f1e606668b avahi-autoipd-0.6.25-15.el6_8.1.x86_64.rpm 1c86318ed404bb778352799f08b2fb1a50ef3561e58bb5100897ac8158c8f3a7 avahi-compat-howl-0.6.25-15.el6_8.1.i686.rpm 98e884c58a3752480472a56bd3602f4da4197d0e2cb4aa0cd51b20d6a1c43694 avahi-compat-howl-0.6.25-15.el6_8.1.x86_64.rpm ae6819eda67a34d43a8288ad63bfcf4d03ec9cf7027d3bd73433911115e6e6c1 avahi-compat-howl-devel-0.6.25-15.el6_8.1.i686.rpm 3f298b5c53b1e8ac637533db5a8951710095593e6178ab6ad1d1250d46c3ea55 avahi-compat-howl-devel-0.6.25-15.el6_8.1.x86_64.rpm 807cfb26768ecaf5a13052291228390fd36a09b02bd60281e6fbe06e3c5ffeed avahi-compat-libdns_sd-0.6.25-15.el6_8.1.i686.rpm 1591f9fa5a8337ebfd4ef10f95211d18835972ba2c309d781e3d2597fae111b8 avahi-compat-libdns_sd-0.6.25-15.el6_8.1.x86_64.rpm b1dd4656a6fe62fc5c64cec1bccb42c670e10072c82d118c2d30efd11db47140 avahi-compat-libdns_sd-devel-0.6.25-15.el6_8.1.i686.rpm a533b5d4d5a948761acec760e45f6c2f5d7f11385bf11fe2725ac8a1c60bf05e avahi-compat-libdns_sd-devel-0.6.25-15.el6_8.1.x86_64.rpm 45456f586f1f90142bf2d50e0da606fc0502fe9c3d32e68cd8822977e30d3f69 avahi-devel-0.6.25-15.el6_8.1.i686.rpm ad16fbf059b2fc3992bd2a5b08cae6d83db0896c86a9229d301c962b19868e52 avahi-devel-0.6.25-15.el6_8.1.x86_64.rpm 8f12a25451d122354fd1451223afd9d66e4788ba63ebf0c36a28a004d1e21be1 avahi-dnsconfd-0.6.25-15.el6_8.1.x86_64.rpm 00d291eefe76b370b0d34550735e9bc25b52419ba2b4ec0c5a5ef11c5f10a0df avahi-glib-0.6.25-15.el6_8.1.i686.rpm d73949c9b1058c0620a9f475d32c9ee4aff39fc805a71f1755160a3b4949cdde avahi-glib-0.6.25-15.el6_8.1.x86_64.rpm 19129941ada18e1e8429b33f092aaa2ff3d13e1944adfe823f5619e248e92323 avahi-glib-devel-0.6.25-15.el6_8.1.i686.rpm 7dc370beee2ed4f5a3e71d4a1a7ecd785131420773ef2cb25923530be37e21ec avahi-glib-devel-0.6.25-15.el6_8.1.x86_64.rpm fecc678248c6dd23e2b92673e6a1ecd7eb7658be3c728b8fdb0aa89ee6098bb9 avahi-gobject-0.6.25-15.el6_8.1.i686.rpm c051aa6b6271b0ae1989a5d3b9337b557d33bb29fb6f1935308189a428caec16 avahi-gobject-0.6.25-15.el6_8.1.x86_64.rpm b8ee777883f5c63df34f71a29c11fe08d1a71f6d1374886ff293bb34deafeda4 avahi-gobject-devel-0.6.25-15.el6_8.1.i686.rpm b3468c658f0a806610279320734eecb08985b5e2f553ad1e2bac4e0a52308fdd avahi-gobject-devel-0.6.25-15.el6_8.1.x86_64.rpm 926c94db33c0b9cd9bdb0a40a6afd24b88a78c69f03ddbe1cac4bca4ee4227d3 avahi-libs-0.6.25-15.el6_8.1.i686.rpm 589cf55426eefdf913e642ef143d02f35feca5833e05a4a22fb668479f511a7c avahi-libs-0.6.25-15.el6_8.1.x86_64.rpm d1e76b17b6ad25d32c3e0b881f40d0970b61819cbed2428d4aae402d3a30b2fc avahi-qt3-0.6.25-15.el6_8.1.i686.rpm fc898bb00b4400d44b60a86e46ca77a5bc52920f606c508bde151660b18e7c7c avahi-qt3-0.6.25-15.el6_8.1.x86_64.rpm 86e409cac76fc3899c8a25042d32456db54cfd6f2577c658d8e7acb39e46bfef avahi-qt3-devel-0.6.25-15.el6_8.1.i686.rpm 4a2a73611398e7e283bff835a4dcb95d9202024aaa72c8e9ec7feaf6f360a7ab avahi-qt3-devel-0.6.25-15.el6_8.1.x86_64.rpm 06d9b6affaafe71a84c2a965c4e76104ad85183f905f54edf7f356cd1dc969c3 avahi-qt4-0.6.25-15.el6_8.1.i686.rpm 179b6d176f064a9d4ccab63ba3bf8b7b8b987912ac0cbe16b36a374f3e93347c avahi-qt4-0.6.25-15.el6_8.1.x86_64.rpm 410bb827ac0a5504bcb818d05498058993a39793ab252350f6646478a97146e6 avahi-qt4-devel-0.6.25-15.el6_8.1.i686.rpm 304150a35d63157090c7ea08ca2407a52b7fe3cf54e839fe01322c33ea3bfd7e avahi-qt4-devel-0.6.25-15.el6_8.1.x86_64.rpm a3660e3a78c987334f04cd3230e3f07ac6a23f9f58704f80b025e7dffafdea3e avahi-tools-0.6.25-15.el6_8.1.x86_64.rpm 90f580cd8656864c01d480e51adce74a5faf139ad756449a77e5cf40eeda6ca1 avahi-ui-0.6.25-15.el6_8.1.i686.rpm ab3e69ae865007d22ba8f697ed1ccdaff2b5c12295d850fbe9b705b1eab43d6a avahi-ui-0.6.25-15.el6_8.1.x86_64.rpm 389e2ab4ed01c19835903eda8f27a763e02ebb0a03f2874cd6a19395ee3695d1 avahi-ui-devel-0.6.25-15.el6_8.1.i686.rpm 9c6fd42c95543adcd1a2c4c3fed3397d39463226848e9836a9c3808fa77b8301 avahi-ui-devel-0.6.25-15.el6_8.1.x86_64.rpm b4f8d55f6e1e3b7aedb85b71453e7ac29b046692362aef3b1c0e57f0e0d5ec1c avahi-ui-tools-0.6.25-15.el6_8.1.x86_64.rpm Source: 41c2b606ed52dc56b3c8ed17026c225987518cd29da0dfb5e2e49a2a5cf7f8f5 avahi-0.6.25-15.el6_8.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  4. CentOS Errata and Bugfix Advisory 2016:1659 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1659.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 2f54dd9f507ca47e2d2c835d7371a2edd3ac447134ac28fbd6ace5b8870e0cb4 libgudev1-147-2.73.el6_8.1.i686.rpm 53d805b37ec63ce390a4fbdde04160bb1bccf83323be09ce9e4f2b6e842ce440 libgudev1-devel-147-2.73.el6_8.1.i686.rpm f61e8fb204faa4e07e964b26df6867458a9cb9350019132d18149e23301fca7c libudev-147-2.73.el6_8.1.i686.rpm 7d9a0621d471856e4fecd33498ae0294408af9cfbc605059c5c68986a9755876 libudev-devel-147-2.73.el6_8.1.i686.rpm 568b6c9b6d507997db7328ce05a6fb6cd9eede306d8ab663877d70c0cb39c12c udev-147-2.73.el6_8.1.i686.rpm x86_64: 2f54dd9f507ca47e2d2c835d7371a2edd3ac447134ac28fbd6ace5b8870e0cb4 libgudev1-147-2.73.el6_8.1.i686.rpm 63dcc5be85f77f52b4897e00d42e6067346a0ee2e06fc5b413d06e79091f06c9 libgudev1-147-2.73.el6_8.1.x86_64.rpm 53d805b37ec63ce390a4fbdde04160bb1bccf83323be09ce9e4f2b6e842ce440 libgudev1-devel-147-2.73.el6_8.1.i686.rpm 79f1a919847f1ae6d5c6949787aaba20641563e911f5ee92fdf2e3f5542690ef libgudev1-devel-147-2.73.el6_8.1.x86_64.rpm f61e8fb204faa4e07e964b26df6867458a9cb9350019132d18149e23301fca7c libudev-147-2.73.el6_8.1.i686.rpm aa5d64ec6285ac23ef8a560c76151d1f6d75d40f5afb7fab70d122f89596cf51 libudev-147-2.73.el6_8.1.x86_64.rpm 7d9a0621d471856e4fecd33498ae0294408af9cfbc605059c5c68986a9755876 libudev-devel-147-2.73.el6_8.1.i686.rpm b650d142ee383c33b93f28cc1f8bec543b4135e6b1476adb61fd280adf471690 libudev-devel-147-2.73.el6_8.1.x86_64.rpm 47960c08d390f209fc7b328915bb9e2b31aa79eb4f5061eda33ce0cc3fd8542c udev-147-2.73.el6_8.1.x86_64.rpm Source: 6861aef9d2f0e7307dc259466045854ecf68c295b7300bcb992cd0a40d17f649 udev-147-2.73.el6_8.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  5. CentOS Errata and Bugfix Advisory 2016:1667 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1667.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 0711d1d646ba76fa488cf72f4a952abbb26440ddfb23df9ad6a3b6be2cb341b0 cronie-1.4.4-16.el6_8.2.i686.rpm d431438e49c24edcbea7c890218b57c64817c2bb8705584885bbed08260516bc cronie-anacron-1.4.4-16.el6_8.2.i686.rpm 9fc4e616a0f1c0253d9df1bca7cf2244bf4e06f432948086c333fe34279a824e cronie-noanacron-1.4.4-16.el6_8.2.i686.rpm x86_64: ed3509d74350050ac6b5b6a8be909e3ed3f1497393eba9319ad4b44165ed0ce8 cronie-1.4.4-16.el6_8.2.x86_64.rpm 96aa4dc6614b0c0ffb7c5156df4cb90a89b155c55dbdab41fb566834df91a9cb cronie-anacron-1.4.4-16.el6_8.2.x86_64.rpm d86bf494bc634e1c714eb0d91dae43a74ad0f718659d61e176a33c60f9ddcd9b cronie-noanacron-1.4.4-16.el6_8.2.x86_64.rpm Source: e96f13ca4ae8900d9dddc3c7dcf65d84c2c5a03d03ae77562cbd73e1183f7d8d cronie-1.4.4-16.el6_8.2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  6. CentOS Errata and Bugfix Advisory 2016:1670 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1670.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 6150d8a5c016f0fb4e8ef2717f9e36e5740b3473c52b05b3a62a8d91425ef291 cmirror-2.02.143-7.el6_8.1.i686.rpm d10a39ff9a7a0cefa39611147e3c76e90c0835a2850226be7e1bf989b51c184f device-mapper-1.02.117-7.el6_8.1.i686.rpm b9efcdd3d4416c087e1f01cfb522167961eaed59d3d6fb6358e269526add370f device-mapper-devel-1.02.117-7.el6_8.1.i686.rpm ecdf03ea08b172a04736ac92121a599093d993d619a8f820c08a01061bb85b52 device-mapper-event-1.02.117-7.el6_8.1.i686.rpm c59e4aaf4a2de0f5d80f5d581b83d1847822ced2895eff33af53b2fa9830ee09 device-mapper-event-devel-1.02.117-7.el6_8.1.i686.rpm f21ab80068e583b520bb1fcb0fdc9276a464b0b91c945a82070a869cac88f34d device-mapper-event-libs-1.02.117-7.el6_8.1.i686.rpm a17b2eb4084ed4fa96e6767c67ea48e4138a3f189607437773211d2315ae5be5 device-mapper-libs-1.02.117-7.el6_8.1.i686.rpm 02344e868bd2ce5e0cc18d3e416bb042b51263a693fe09c622a1d129bbe11afb lvm2-2.02.143-7.el6_8.1.i686.rpm 6a38597f4bb1322dcc19e09b8e93c1d743f9e73f56830aa638a87040265cf670 lvm2-cluster-2.02.143-7.el6_8.1.i686.rpm 4edf04ed800077a26a1b65724bae277a86da555199f11f0e79b71fb44aaf3857 lvm2-devel-2.02.143-7.el6_8.1.i686.rpm 834f1fac99a7912ca1d3f45d166b0caa3abb961cf3c64632420b151b8eaef011 lvm2-libs-2.02.143-7.el6_8.1.i686.rpm x86_64: 444f077702ba4efa2d8c0dacf95cf55969dbf4da66539c1b440a5bfa228b0a09 cmirror-2.02.143-7.el6_8.1.x86_64.rpm 92e94a9bfe2ba14b21a8bfce15a54824134df63634c848830909939aafb02599 device-mapper-1.02.117-7.el6_8.1.x86_64.rpm b9efcdd3d4416c087e1f01cfb522167961eaed59d3d6fb6358e269526add370f device-mapper-devel-1.02.117-7.el6_8.1.i686.rpm 6f430ccb3160c6fd696547851b1d36caf7ff3d6a24d46293f8a68a83527f2369 device-mapper-devel-1.02.117-7.el6_8.1.x86_64.rpm f3ebc0902a938d92a016008013484a6ff8a80f28dc45c0ec26c567de33cb5864 device-mapper-event-1.02.117-7.el6_8.1.x86_64.rpm c59e4aaf4a2de0f5d80f5d581b83d1847822ced2895eff33af53b2fa9830ee09 device-mapper-event-devel-1.02.117-7.el6_8.1.i686.rpm dbd095e2b22a8b0b86ca9937c44ad5f21ecedc832f5aafb10a411f88361e18ff device-mapper-event-devel-1.02.117-7.el6_8.1.x86_64.rpm f21ab80068e583b520bb1fcb0fdc9276a464b0b91c945a82070a869cac88f34d device-mapper-event-libs-1.02.117-7.el6_8.1.i686.rpm 7fa9aff8cded473418a86aa9c0a60043a0b8393111651423cd57c28cee3aa595 device-mapper-event-libs-1.02.117-7.el6_8.1.x86_64.rpm a17b2eb4084ed4fa96e6767c67ea48e4138a3f189607437773211d2315ae5be5 device-mapper-libs-1.02.117-7.el6_8.1.i686.rpm 3da97c7a9f2203d55957fb07a41fa8468fd28add0ebf40849381053a2e07bbf9 device-mapper-libs-1.02.117-7.el6_8.1.x86_64.rpm 0c8cd71d9af57edc1a838ff1a856e5dd43468b3d1ab2eb152b79eedecef151f7 lvm2-2.02.143-7.el6_8.1.x86_64.rpm 0f83b3e7920599547ca03490bd6ae2baefa0eb3d6c100b84d557e05188460a21 lvm2-cluster-2.02.143-7.el6_8.1.x86_64.rpm 4edf04ed800077a26a1b65724bae277a86da555199f11f0e79b71fb44aaf3857 lvm2-devel-2.02.143-7.el6_8.1.i686.rpm 61a8545887b866c24e9f06bc830c409795d3f1faaa04dd36c836d53337b14fed lvm2-devel-2.02.143-7.el6_8.1.x86_64.rpm 834f1fac99a7912ca1d3f45d166b0caa3abb961cf3c64632420b151b8eaef011 lvm2-libs-2.02.143-7.el6_8.1.i686.rpm 56bd8e13b2da158d071ca41e4bbf0e0a27be8502be823bed6cc48c1595cf9c72 lvm2-libs-2.02.143-7.el6_8.1.x86_64.rpm Source: b68e65ce455e8c424d4fefe4bf0cd556e3b0f507a67935056c637540177451aa lvm2-2.02.143-7.el6_8.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  7. CentOS Errata and Bugfix Advisory 2016:1661 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1661.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 05d3cf577d439c3558c77a89b029f56633b4734c8fc43612a3d14f23c232c9b3 pki-ca-9.0.3-50.el6_8.noarch.rpm 62a15c868c1d9cbcce42e8b47196a244f0e4df2919ed5d7a1711f847c552e81b pki-common-9.0.3-50.el6_8.noarch.rpm e5725a415fdcb3791ffb7b489a1d6ae187926c0f26c8ad7d2b6836328cf3e487 pki-common-javadoc-9.0.3-50.el6_8.noarch.rpm fc8731b7149b0f4982ba60be4010d4d220a56e57418633578ac3af15e979ada8 pki-java-tools-9.0.3-50.el6_8.noarch.rpm cfd7c339491cac202b2313229bcd166c8b6bc2154005cc6a4b7014c0fc817027 pki-java-tools-javadoc-9.0.3-50.el6_8.noarch.rpm ba42f5d7c73a9779d2e9f2f3135db2a2e01cc5cc9e3d3a441a6f5661445f08f7 pki-native-tools-9.0.3-50.el6_8.i686.rpm 7561ff0a658954b2600fcf980b7dbbd4213c25543e84ab82695245f944724fc4 pki-selinux-9.0.3-50.el6_8.noarch.rpm 0570298fe46d2fff7de28bbce04a4e205951a9367d0c47348542c74e1a564f67 pki-setup-9.0.3-50.el6_8.noarch.rpm db69ce03afc2e41155751a52a526a6b79c6600043d7cdaa065aff4a7ba3af8bb pki-silent-9.0.3-50.el6_8.noarch.rpm 8e90e90ee15e81bb4d691b8a008895af42dc5bee8d0b4b915c978eeaca1bea4f pki-symkey-9.0.3-50.el6_8.i686.rpm 4141ee0d9d8b8163eb6638e49a91d830becd55a265ebe29d2081d88ba8f3bb74 pki-util-9.0.3-50.el6_8.noarch.rpm 0433819d7aaa05237f18a441cec9c2ca0c43bcb2f08157f6212f938ecc99069f pki-util-javadoc-9.0.3-50.el6_8.noarch.rpm x86_64: 05d3cf577d439c3558c77a89b029f56633b4734c8fc43612a3d14f23c232c9b3 pki-ca-9.0.3-50.el6_8.noarch.rpm 62a15c868c1d9cbcce42e8b47196a244f0e4df2919ed5d7a1711f847c552e81b pki-common-9.0.3-50.el6_8.noarch.rpm e5725a415fdcb3791ffb7b489a1d6ae187926c0f26c8ad7d2b6836328cf3e487 pki-common-javadoc-9.0.3-50.el6_8.noarch.rpm fc8731b7149b0f4982ba60be4010d4d220a56e57418633578ac3af15e979ada8 pki-java-tools-9.0.3-50.el6_8.noarch.rpm cfd7c339491cac202b2313229bcd166c8b6bc2154005cc6a4b7014c0fc817027 pki-java-tools-javadoc-9.0.3-50.el6_8.noarch.rpm 10071a394ebce5a808636e9e1fe5be762993c25a5e21e3e7ba47437efe9123bb pki-native-tools-9.0.3-50.el6_8.x86_64.rpm 7561ff0a658954b2600fcf980b7dbbd4213c25543e84ab82695245f944724fc4 pki-selinux-9.0.3-50.el6_8.noarch.rpm 0570298fe46d2fff7de28bbce04a4e205951a9367d0c47348542c74e1a564f67 pki-setup-9.0.3-50.el6_8.noarch.rpm db69ce03afc2e41155751a52a526a6b79c6600043d7cdaa065aff4a7ba3af8bb pki-silent-9.0.3-50.el6_8.noarch.rpm d6f339dcae8da606a403148e56cf728e348155500543d6d7e565f37128132c92 pki-symkey-9.0.3-50.el6_8.x86_64.rpm 4141ee0d9d8b8163eb6638e49a91d830becd55a265ebe29d2081d88ba8f3bb74 pki-util-9.0.3-50.el6_8.noarch.rpm 0433819d7aaa05237f18a441cec9c2ca0c43bcb2f08157f6212f938ecc99069f pki-util-javadoc-9.0.3-50.el6_8.noarch.rpm Source: 943e5f84b784b09e1da326eb7e8c9f7194a154f2c6e5425b1672f48c73d2b704 pki-core-9.0.3-50.el6_8.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  8. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2016:1664-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1664.html Issue date: 2016-08-23 CVE Names: CVE-2016-5696 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important) Red Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue. Bug Fix(es): * When loading the Direct Rendering Manager (DRM) kernel module, the kernel panicked if DRM was previously unloaded. The kernel panic was caused by a memory leak of the ID Resolver (IDR2). With this update, IDR2 is loaded during kernel boot, and the kernel panic no longer occurs in the described scenario. (BZ#1353827) * When more than one process attempted to use the "configfs" directory entry at the same time, a kernel panic in some cases occurred. With this update, a race condition between a directory entry and a lookup operation has been fixed. As a result, the kernel no longer panics in the described scenario. (BZ#1353828) * When shutting down the system by running the halt -p command, a kernel panic occurred due to a conflict between the kernel offlining CPUs and the sched command, which used the sched group and the sched domain data without first checking the data. The underlying source code has been fixed by adding a check to avoid the conflict. As a result, the described scenario no longer results in a kernel panic. (BZ#1343894) * In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. (BZ#1355980) * Previously, multiple Very Secure FTP daemon (vsftpd) processes on a directory with a large number of files led to a high contention rate on each inode's spinlock, which caused excessive CPU usage. With this update, a spinlock to protect a single memory-to-memory copy has been removed from the ext4_getattr() function. As a result, system CPU usage has been reduced and is no longer excessive in the described situation. (BZ#1355981) * When the gfs2_grow utility is used to extend Global File System 2 (GFS2), the next block allocation causes the GFS2 kernel module to re-read its resource group index. If multiple processes in the GFS2 module raced to do the same thing, one process sometimes overwrote a valid object pointer with an invalid pointer, which caused either a kernel panic or a file system corruption. This update ensures that the resource group object pointer is not overwritten. As a result, neither kernel panic nor file system corruption occur in the described scenario. (BZ#1347539) * Previously, the SCSI Remote Protocol over InfiniBand (IB-SRP) was disabled due to a bug in the srp_queue() function. As a consequence, an attempt to enable the Remote Direct Memory Access (RDMA) at boot caused the kernel to crash. With this update, srp_queue() has been fixed, and the system now boots as expected when RDMA is enabled. (BZ#1348062) Enhancement(s): * This update optimizes the efficiency of the Transmission Control Protocol (TCP) when the peer is using a window under 537 bytes in size. As a result, devices that use maximum segment size (MSS) of 536 bytes or fewer will experience improved network performance. (BZ#1354446) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1354708 - CVE-2016-5696 kernel: challenge ACK counter information disclosure. 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-642.4.2.el6.src.rpm i386: kernel-2.6.32-642.4.2.el6.i686.rpm kernel-debug-2.6.32-642.4.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm kernel-devel-2.6.32-642.4.2.el6.i686.rpm kernel-headers-2.6.32-642.4.2.el6.i686.rpm perf-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.4.2.el6.noarch.rpm kernel-doc-2.6.32-642.4.2.el6.noarch.rpm kernel-firmware-2.6.32-642.4.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.4.2.el6.x86_64.rpm kernel-devel-2.6.32-642.4.2.el6.x86_64.rpm kernel-headers-2.6.32-642.4.2.el6.x86_64.rpm perf-2.6.32-642.4.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.4.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm python-perf-2.6.32-642.4.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-642.4.2.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-642.4.2.el6.noarch.rpm kernel-doc-2.6.32-642.4.2.el6.noarch.rpm kernel-firmware-2.6.32-642.4.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.4.2.el6.x86_64.rpm kernel-devel-2.6.32-642.4.2.el6.x86_64.rpm kernel-headers-2.6.32-642.4.2.el6.x86_64.rpm perf-2.6.32-642.4.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.4.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm python-perf-2.6.32-642.4.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-642.4.2.el6.src.rpm i386: kernel-2.6.32-642.4.2.el6.i686.rpm kernel-debug-2.6.32-642.4.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm kernel-devel-2.6.32-642.4.2.el6.i686.rpm kernel-headers-2.6.32-642.4.2.el6.i686.rpm perf-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.4.2.el6.noarch.rpm kernel-doc-2.6.32-642.4.2.el6.noarch.rpm kernel-firmware-2.6.32-642.4.2.el6.noarch.rpm ppc64: kernel-2.6.32-642.4.2.el6.ppc64.rpm kernel-bootwrapper-2.6.32-642.4.2.el6.ppc64.rpm kernel-debug-2.6.32-642.4.2.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.ppc64.rpm kernel-debug-devel-2.6.32-642.4.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.4.2.el6.ppc64.rpm kernel-devel-2.6.32-642.4.2.el6.ppc64.rpm kernel-headers-2.6.32-642.4.2.el6.ppc64.rpm perf-2.6.32-642.4.2.el6.ppc64.rpm perf-debuginfo-2.6.32-642.4.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.ppc64.rpm s390x: kernel-2.6.32-642.4.2.el6.s390x.rpm kernel-debug-2.6.32-642.4.2.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.s390x.rpm kernel-debug-devel-2.6.32-642.4.2.el6.s390x.rpm kernel-debuginfo-2.6.32-642.4.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.4.2.el6.s390x.rpm kernel-devel-2.6.32-642.4.2.el6.s390x.rpm kernel-headers-2.6.32-642.4.2.el6.s390x.rpm kernel-kdump-2.6.32-642.4.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.4.2.el6.s390x.rpm kernel-kdump-devel-2.6.32-642.4.2.el6.s390x.rpm perf-2.6.32-642.4.2.el6.s390x.rpm perf-debuginfo-2.6.32-642.4.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.s390x.rpm x86_64: kernel-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.4.2.el6.x86_64.rpm kernel-devel-2.6.32-642.4.2.el6.x86_64.rpm kernel-headers-2.6.32-642.4.2.el6.x86_64.rpm perf-2.6.32-642.4.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-642.4.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.4.2.el6.ppc64.rpm perf-debuginfo-2.6.32-642.4.2.el6.ppc64.rpm python-perf-2.6.32-642.4.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-642.4.2.el6.s390x.rpm kernel-debuginfo-2.6.32-642.4.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.4.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.4.2.el6.s390x.rpm perf-debuginfo-2.6.32-642.4.2.el6.s390x.rpm python-perf-2.6.32-642.4.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.4.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm python-perf-2.6.32-642.4.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-642.4.2.el6.src.rpm i386: kernel-2.6.32-642.4.2.el6.i686.rpm kernel-debug-2.6.32-642.4.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm kernel-devel-2.6.32-642.4.2.el6.i686.rpm kernel-headers-2.6.32-642.4.2.el6.i686.rpm perf-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.4.2.el6.noarch.rpm kernel-doc-2.6.32-642.4.2.el6.noarch.rpm kernel-firmware-2.6.32-642.4.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.4.2.el6.x86_64.rpm kernel-devel-2.6.32-642.4.2.el6.x86_64.rpm kernel-headers-2.6.32-642.4.2.el6.x86_64.rpm perf-2.6.32-642.4.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.4.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.4.2.el6.i686.rpm perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm python-perf-2.6.32-642.4.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.4.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm python-perf-2.6.32-642.4.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.4.2.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5696 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXvLHiXlSAg2UNWIIRAlbRAJ9bvBSyM+UxrWKkCIqv/0P8ZIfVzgCgrCkl ds3mXAiLu5LvtvjNvaDQlI4= =lxsp -----END PGP SIGNATURE----- --
  9. CentOS Errata and Bugfix Advisory 2016:1662 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1662.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 09ca910e5ca10c0dd44f8209dab24ed755f572bcde9fe74aea197aeda6d55013 pacemaker-1.1.14-8.el6_8.1.i686.rpm 0d8fbacd0ec152b04af9ff89b2d1977d0fdd0f27bb091493f1642f9f8e4b97fc pacemaker-cli-1.1.14-8.el6_8.1.i686.rpm 7e32a981ffd193c1b6af8d1dbc7b9e01d5555a6bcffadce5270fde59ce51d485 pacemaker-cluster-libs-1.1.14-8.el6_8.1.i686.rpm 2f45bc3706da586817ccf19b7b5ceaaaf583dba5a0cb0216ee8a50772592b791 pacemaker-cts-1.1.14-8.el6_8.1.i686.rpm e307d0b8cd9329049dc8b1e90811d7a6d74692015328a748ca19d4ac7578343d pacemaker-doc-1.1.14-8.el6_8.1.i686.rpm e109d461e62f34be1324e1a241171699f2823f9b17012bd7e942474a35c88821 pacemaker-libs-1.1.14-8.el6_8.1.i686.rpm a74dd6e9849e9990738926729dbd492342b9400f922f9188567d02206a0c3700 pacemaker-libs-devel-1.1.14-8.el6_8.1.i686.rpm 9a94ee7fdd872e33d6d6a1be032a330cba53da98d71e9a7369aa0c2d6884c060 pacemaker-remote-1.1.14-8.el6_8.1.i686.rpm x86_64: 1fbf3e6a71d9aa0cee058af53753e69b40db7e249764154aea9fdc9be5a39546 pacemaker-1.1.14-8.el6_8.1.x86_64.rpm 309c3fe253f1b5ef60702ba33786cb8d190365da4d1cdbdf7ba234462c5e98d0 pacemaker-cli-1.1.14-8.el6_8.1.x86_64.rpm 7e32a981ffd193c1b6af8d1dbc7b9e01d5555a6bcffadce5270fde59ce51d485 pacemaker-cluster-libs-1.1.14-8.el6_8.1.i686.rpm f78487389e804b79e45b13b4323bc0ef327214a2c6170fc9d6e7ee652150088b pacemaker-cluster-libs-1.1.14-8.el6_8.1.x86_64.rpm e6d27d450b01dbb59989d04676858b799ac4697579e2361b04959be2644bc5ea pacemaker-cts-1.1.14-8.el6_8.1.x86_64.rpm 4ece77b4a4d86676b9fb73f0e7c9d33f76b16bf7aded93c3bc0380a36290910e pacemaker-doc-1.1.14-8.el6_8.1.x86_64.rpm e109d461e62f34be1324e1a241171699f2823f9b17012bd7e942474a35c88821 pacemaker-libs-1.1.14-8.el6_8.1.i686.rpm a578a9536fc844a6d10a12d84588337efd9eccaabf0d61fb14dd3c8785344b70 pacemaker-libs-1.1.14-8.el6_8.1.x86_64.rpm a74dd6e9849e9990738926729dbd492342b9400f922f9188567d02206a0c3700 pacemaker-libs-devel-1.1.14-8.el6_8.1.i686.rpm afbe7a2a5bd47d5e211c4e47993a8c0ea28f5e8ef65de2ca396b5f342142d1b3 pacemaker-libs-devel-1.1.14-8.el6_8.1.x86_64.rpm 377425b9e405ef21db256448c14e9c373ff7498bbd5c2e0befab53b949bb8023 pacemaker-remote-1.1.14-8.el6_8.1.x86_64.rpm Source: 2d4a2278725a9f6e39c9885f850d8e59a827657a72822d6ea6901a4b4aa6cec6 pacemaker-1.1.14-8.el6_8.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  10. CentOS Errata and Bugfix Advisory 2016:1668 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1668.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 708db5b3290b9dc00c99a87d77d8832e23c596a24860c58ffe0e631e0fd7f671 net-snmp-5.5-57.el6_8.1.i686.rpm 5c2541c1684739843682340dc45ca29003af4403cde4affb3558a916a61da350 net-snmp-devel-5.5-57.el6_8.1.i686.rpm dbd5198e966121595952d90d9023e0a875b84de1280e9039bb9bfb7053c4be83 net-snmp-libs-5.5-57.el6_8.1.i686.rpm 99f909a52844fc7779d67246067eeb3fa31cc4f195d613c546492a9b96d46287 net-snmp-perl-5.5-57.el6_8.1.i686.rpm 213aa33f202ceed83aa0c7170a7ea5f3117bb4a92b36643bb91f95aafb5ef739 net-snmp-python-5.5-57.el6_8.1.i686.rpm fa8d7389e6334d703464a98cd74b12c90f414573ca66ad88bc397b24f5db4b21 net-snmp-utils-5.5-57.el6_8.1.i686.rpm x86_64: 414294e1ef7eeb7d4e2fdcffc7da2a4b1c6ba12c0ed852e2afe1d5c1c779050a net-snmp-5.5-57.el6_8.1.x86_64.rpm 5c2541c1684739843682340dc45ca29003af4403cde4affb3558a916a61da350 net-snmp-devel-5.5-57.el6_8.1.i686.rpm 3532ee6d3d1c25039fd1e7220c54b25699c21037e1bd1bea9b2e58463b0de298 net-snmp-devel-5.5-57.el6_8.1.x86_64.rpm dbd5198e966121595952d90d9023e0a875b84de1280e9039bb9bfb7053c4be83 net-snmp-libs-5.5-57.el6_8.1.i686.rpm 1a5a75a63c4ec891f31fed0dadfcde5a02a618a8e2cc8f9e5f17d3216ca6ddef net-snmp-libs-5.5-57.el6_8.1.x86_64.rpm d2570a9238fe6e2935ed2412effd2553f37bbcb7328f31c0ed733120758f060a net-snmp-perl-5.5-57.el6_8.1.x86_64.rpm 6c42b0c2a0ad0ce208d7a080ef3716102205d4fa52d4ecc11af00f0540e3b39c net-snmp-python-5.5-57.el6_8.1.x86_64.rpm 56e420d5e62e58bf8d30e6020d4f2a23429f4abd6db66389448a5442ff40daa6 net-snmp-utils-5.5-57.el6_8.1.x86_64.rpm Source: 965336bf8507f40ebb921cf4e715a041fcac654ee395af86902241d4d98ad8e8 net-snmp-5.5-57.el6_8.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  11. CentOS Errata and Bugfix Advisory 2016:1669 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1669.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 6631a16567d567a5f7dfadd4b04c0e405030129bfa0e57270b7eaee0538c84b8 libsmbclient-3.6.23-36.el6_8.i686.rpm 7125fea3ffcdecfe56bcbdb68d3392ff7ea84aa682064eca29233763d30e7c94 libsmbclient-devel-3.6.23-36.el6_8.i686.rpm 2f91c5e1b5fd38eb900fd59f96e1ef9ce035eace3142cc28155f8172bb8c9f9c samba-3.6.23-36.el6_8.i686.rpm ba96439258a473663e499068fd1fb714e66d7e9f868f825fb7dc602b0f11814d samba-client-3.6.23-36.el6_8.i686.rpm afd0bb78b22a1a0bf925fd3542aff81a64760dd594aeb8d81a32f62ce7f35d15 samba-common-3.6.23-36.el6_8.i686.rpm 850d4eafad645d0140f7cfe54f4479d4d747c5e90c55e4e5cc05607f3b7d130b samba-doc-3.6.23-36.el6_8.i686.rpm a975284f77d86f9828ae276aa4d00479349d412de42c8eee4118a0e08b007a2e samba-domainjoin-gui-3.6.23-36.el6_8.i686.rpm eb113138cd656f40b2ab004799d357c89a1471d6894659894574b5606963fb83 samba-swat-3.6.23-36.el6_8.i686.rpm 53bb93615d8452b8446da327be0ac8177704e7aed76f0953b9a77709750bf164 samba-winbind-3.6.23-36.el6_8.i686.rpm c84d03b32de19c5185717fc921022ae905326aa62f478a2e926d369644fa90ed samba-winbind-clients-3.6.23-36.el6_8.i686.rpm 8b995e094fcec99b668cbf6d61687550ab39d31425b80cde58095d3e7a142e8b samba-winbind-devel-3.6.23-36.el6_8.i686.rpm 5b9116ebf28e9de1b464554ba81ed9272d55bd171eb1dc2f16365354b294f532 samba-winbind-krb5-locator-3.6.23-36.el6_8.i686.rpm x86_64: 6631a16567d567a5f7dfadd4b04c0e405030129bfa0e57270b7eaee0538c84b8 libsmbclient-3.6.23-36.el6_8.i686.rpm 08a090af59252ffa38d6e3aa004bd4c983bb1b658daddcc00cbebb88d872a676 libsmbclient-3.6.23-36.el6_8.x86_64.rpm 7125fea3ffcdecfe56bcbdb68d3392ff7ea84aa682064eca29233763d30e7c94 libsmbclient-devel-3.6.23-36.el6_8.i686.rpm b21e665deefcebbf8f0d9bed51a224026befc2aa323be84ac8b79edc88a26b36 libsmbclient-devel-3.6.23-36.el6_8.x86_64.rpm 69ec12282fbfe8183c472429206fa14b58747d6dc06f03f6525a8282066f1ef6 samba-3.6.23-36.el6_8.x86_64.rpm 4690d95ff2d72c485416eef26e23f234129ebdb6e550cb00d1db40c71520a68e samba-client-3.6.23-36.el6_8.x86_64.rpm afd0bb78b22a1a0bf925fd3542aff81a64760dd594aeb8d81a32f62ce7f35d15 samba-common-3.6.23-36.el6_8.i686.rpm f94521e9972533a209a7ec7d19a1bcfc259e76aa63359365917bef1da58f5094 samba-common-3.6.23-36.el6_8.x86_64.rpm 35a9e1d4fc8355d77fbbc6d3a2bb42c4c451e8e77aef0f7f62b675d88c71fda2 samba-doc-3.6.23-36.el6_8.x86_64.rpm 8bf6db693cc5a4d8603c93454b53dca7284e658c83b8c3457aa630fa86e7a1ad samba-domainjoin-gui-3.6.23-36.el6_8.x86_64.rpm c60909b3bd51e66aa120220774c244648280391ea844b23703ee3b279e1434c9 samba-glusterfs-3.6.23-36.el6_8.x86_64.rpm 285a46465f733f5a1319d0cf89fae11df1f05a194e8315a939a7448d6190d7f1 samba-swat-3.6.23-36.el6_8.x86_64.rpm 693b25063c4add60f4fd17ce8a37ebe6cc5a4d45939e894696a3e6fe6a94001b samba-winbind-3.6.23-36.el6_8.x86_64.rpm c84d03b32de19c5185717fc921022ae905326aa62f478a2e926d369644fa90ed samba-winbind-clients-3.6.23-36.el6_8.i686.rpm 238e17824adb3fbbeeac9d0d2e2cdd5650371b2ff77c5612e1b8a2733312beb6 samba-winbind-clients-3.6.23-36.el6_8.x86_64.rpm 8b995e094fcec99b668cbf6d61687550ab39d31425b80cde58095d3e7a142e8b samba-winbind-devel-3.6.23-36.el6_8.i686.rpm 8bee8eea039b4296dcadb09666b672746268baee0b414d47d0a77bc2b1b0d5b8 samba-winbind-devel-3.6.23-36.el6_8.x86_64.rpm cad79cadce0a64a033914dfc781c997323db6f259ad536f8b2837633e94e4921 samba-winbind-krb5-locator-3.6.23-36.el6_8.x86_64.rpm Source: aa56d9e0948215d6cd356ea6eaecfe503add4b274aba46d21b25319ba2682ef3 samba-3.6.23-36.el6_8.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  12. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Deus Ex: Mankind Divided Performance Analysis Link: http://www.techpowerup.com/reviews/Performance_Analysis/Deus_Ex_Mankind_Divided Brief: Deus Ex Mankind Divided has just been released today. We bring you a performance analysis using the most popular graphics cards, at four resolutions, including 4K, at both Ultra and High settings. We also took a closer look at VRAM usage.
  13. CentOS Errata and Bugfix Advisory 2016:1658 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1658.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 7e60ccf2518f1d21f09b8dd19edb4130d43fe0442b3d0a9446aa78ec16d62763 cman-2.0.115-124.el5_11.4.i386.rpm 880b26278978f8914f99d5806222bca5330ec8be676c771fafd6006000343678 cman-devel-2.0.115-124.el5_11.4.i386.rpm x86_64: 8110f74a704c1781138723ceb87df217fddca982fea77581689b94a85dfbd514 cman-2.0.115-124.el5_11.4.x86_64.rpm 880b26278978f8914f99d5806222bca5330ec8be676c771fafd6006000343678 cman-devel-2.0.115-124.el5_11.4.i386.rpm c22ca2a878e14a8014f27b25575cf742f5e6b6ef9691b37827efd3a4f7a84765 cman-devel-2.0.115-124.el5_11.4.x86_64.rpm Source: b8dabe80d52a9088ff08f0005ddd82810efd7d3048a2eb9ede5934bae7214053 cman-2.0.115-124.el5_11.4.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________
  14. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Project build: Lunchbox 4 - Part 2 ( -at -) LanOC Reviews <http://lanoc.org/review/pc-hardware/7324-project-build-lunchbox-4-part-2> *DESCRIPTION:* So yesterday I went through and spoke about each of the components I went with for Lunchbox 4 and why I went with them. Today's the day we dive into customizing the build to make it stand out a little including adding that all important carrying handle. Then after that, I benchmark the build and figure out how the new build compares to our last Lunchbox build. Does it fit our goal of always going smaller and faster? Do I have any regrets with the new build? Well I talk about that in the last section, so don’t forget to check that out as well. *ARTICLE URL:* http://lanoc.org/review/pc-hardware/7324-project-build-lunchbox-4-part-2 *LARGE IMAGE URL:* http://lanoc.org/images/reviews/2016/lunchbox_4/title2.jpg *SMALL IMAGE URL:* http://lanoc.org/images/reviews/2016/lunchbox_4/email2.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review? format=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org <reviews ( -at -) lanoc.org>* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  15. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2016:1657-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1657.html Issue date: 2016-08-23 CVE Names: CVE-2016-4470 CVE-2016-4565 CVE-2016-5696 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.1) - ppc64, ppc64le, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important) * A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important) * A flaw was found in the implementation of the Linux kernel's handling of networking challenge ack where an attacker is able to determine the shared counter which could be used to determine sequence numbers for TCP stream injection. (CVE-2016-5696, Important) Red Hat would like to thank Jann Horn for reporting CVE-2016-4565 and Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting CVE-2016-5696. The CVE-2016-4470 issue was discovered by David Howells (Red Hat Inc.). 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1310570 - CVE-2016-4565 kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko 1341716 - CVE-2016-4470 kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path 1354708 - CVE-2016-5696 kernel: challenge ACK counter information disclosure. 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.1): Source: kernel-3.10.0-229.40.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.40.1.el7.noarch.rpm kernel-doc-3.10.0-229.40.1.el7.noarch.rpm x86_64: kernel-3.10.0-229.40.1.el7.x86_64.rpm kernel-debug-3.10.0-229.40.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.40.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.40.1.el7.x86_64.rpm kernel-devel-3.10.0-229.40.1.el7.x86_64.rpm kernel-headers-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.40.1.el7.x86_64.rpm perf-3.10.0-229.40.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1): x86_64: kernel-debug-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.40.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm python-perf-3.10.0-229.40.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: kernel-3.10.0-229.40.1.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.40.1.el7.noarch.rpm kernel-doc-3.10.0-229.40.1.el7.noarch.rpm ppc64: kernel-3.10.0-229.40.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-229.40.1.el7.ppc64.rpm kernel-debug-3.10.0-229.40.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-229.40.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.40.1.el7.ppc64.rpm kernel-devel-3.10.0-229.40.1.el7.ppc64.rpm kernel-headers-3.10.0-229.40.1.el7.ppc64.rpm kernel-tools-3.10.0-229.40.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-229.40.1.el7.ppc64.rpm perf-3.10.0-229.40.1.el7.ppc64.rpm perf-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm s390x: kernel-3.10.0-229.40.1.el7.s390x.rpm kernel-debug-3.10.0-229.40.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-229.40.1.el7.s390x.rpm kernel-debug-devel-3.10.0-229.40.1.el7.s390x.rpm kernel-debuginfo-3.10.0-229.40.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.40.1.el7.s390x.rpm kernel-devel-3.10.0-229.40.1.el7.s390x.rpm kernel-headers-3.10.0-229.40.1.el7.s390x.rpm kernel-kdump-3.10.0-229.40.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.40.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-229.40.1.el7.s390x.rpm perf-3.10.0-229.40.1.el7.s390x.rpm perf-debuginfo-3.10.0-229.40.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.40.1.el7.s390x.rpm x86_64: kernel-3.10.0-229.40.1.el7.x86_64.rpm kernel-debug-3.10.0-229.40.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-229.40.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.40.1.el7.x86_64.rpm kernel-devel-3.10.0-229.40.1.el7.x86_64.rpm kernel-headers-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-229.40.1.el7.x86_64.rpm perf-3.10.0-229.40.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.1): Source: kernel-3.10.0-229.40.1.ael7b.src.rpm noarch: kernel-abi-whitelists-3.10.0-229.40.1.ael7b.noarch.rpm kernel-doc-3.10.0-229.40.1.ael7b.noarch.rpm ppc64le: kernel-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-bootwrapper-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-debug-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-debug-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-devel-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-headers-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-tools-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-tools-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-tools-libs-3.10.0-229.40.1.ael7b.ppc64le.rpm perf-3.10.0-229.40.1.ael7b.ppc64le.rpm perf-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm python-perf-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64: kernel-debug-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-229.40.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-229.40.1.el7.ppc64.rpm perf-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm python-perf-3.10.0-229.40.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-229.40.1.el7.ppc64.rpm s390x: kernel-debug-debuginfo-3.10.0-229.40.1.el7.s390x.rpm kernel-debuginfo-3.10.0-229.40.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-229.40.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-229.40.1.el7.s390x.rpm perf-debuginfo-3.10.0-229.40.1.el7.s390x.rpm python-perf-3.10.0-229.40.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-229.40.1.el7.s390x.rpm x86_64: kernel-debug-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-229.40.1.el7.x86_64.rpm perf-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm python-perf-3.10.0-229.40.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-229.40.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.1): ppc64le: kernel-debug-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-debug-devel-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-tools-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm kernel-tools-libs-devel-3.10.0-229.40.1.ael7b.ppc64le.rpm perf-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm python-perf-3.10.0-229.40.1.ael7b.ppc64le.rpm python-perf-debuginfo-3.10.0-229.40.1.ael7b.ppc64le.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-4470 https://access.redhat.com/security/cve/CVE-2016-4565 https://access.redhat.com/security/cve/CVE-2016-5696 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXvHb0XlSAg2UNWIIRAjQCAJwL/6O1STRM5ctSuThZwU8Nb6mcDACdE5gh ENdtmy7rWAntcOoDcJJXHKc= =2mv7 -----END PGP SIGNATURE----- --
  16. We have posted a new evolving technology report!! ------------------------------------------------------------ http://us7.campaign-archive1.com/?u=3d9b6193ffd32dd60e84fc74b&id=ede9e9194b&e=1230c2ab07 http://technologyx.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=9dd6ca4549&e=1230c2ab07 TITLE: Cooler Master Masterkeys Lite L Combo Review LINK: http://technologyx.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=0ed2c4714c&e=1230c2ab07 (http://technologyx.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=471350b151&e=1230c2ab07) PHOTO: INFO: Today, Cooler Master has sent us their brand new Masterkeys Lite L Combo to take a look at. This is a mouse and keyboard combo with some seriously powerful LED technology. At the small asking price of only $60, this is one fantastic bargain. _________________________________________________________________________________________
  17. CentOS Errata and BugFix Advisory 2016:C002 Upstream details at : https://bugs.centos.org/view.php?id=9426 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 05e2ee1776051c71336590221267c2a894778919f394ffdb70395f50ccc8b266 pcs-0.9.143-15.el7.centos.x86_64.rpm Source: 8256450c3e7b8233872f0eab8b56c7d3702847d6812912a40118bcbc233df0ba pcs-0.9.143-15.el7.centos.src.rpm Note: This update was done to remove Red Hat branding and replace it with CentOS Branding. -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos at irc.freenode.net _______________________________________________
  18. Cooler Master ‘MasterMouse Pro L’ Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=bbc7d09523&e=872093acb5 http://www.kitguru.net Cooler Master ‘MasterMouse Pro L’ Review We review a lot of gaming mice at KitGuru and while many of them are impressive, we don’t get to see too many with hardware customisation options. Today, we are taking a look at the Cooler Master ‘MasterMouse Pro L’, a true ambidextrous mouse with modular covers for the body and side grips, allowing users to make physical changes to the mouse to better suit them. Pair that with RGB lighting and a 12,000 DPI sensor and we are left with a mouse that sounds very impressive on paper, but how does it perform? Read the review here: http://www.kitguru.net/peripherals/mouse/matthew-wilson/cooler-master-mastermouse-pro-l-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=bbc7d09523&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  19. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm-rhev security update Advisory ID: RHSA-2016:1653-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1653.html Issue date: 2016-08-23 CVE Names: CVE-2016-5126 CVE-2016-5403 ===================================================================== 1. Summary: An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix(es): * Quick Emulator(Qemu) built with the Block driver for iSCSI images support (virtio-blk) is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl(2) calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host. (CVE-2016-5126) * Quick emulator(Qemu) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement and therefore causes unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403) Red Hat would like to thank hongzhenhao (Marvel Team) for reporting CVE-2016-5403. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1340924 - CVE-2016-5126 Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl 1358359 - CVE-2016-5403 Qemu: virtio: unbounded memory allocation on host via guest leading to DoS 6. Package List: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7: Source: qemu-kvm-rhev-2.3.0-31.el7_2.21.src.rpm x86_64: libcacard-rhev-2.3.0-31.el7_2.21.x86_64.rpm libcacard-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm qemu-img-rhev-2.3.0-31.el7_2.21.x86_64.rpm qemu-kvm-common-rhev-2.3.0-31.el7_2.21.x86_64.rpm qemu-kvm-rhev-2.3.0-31.el7_2.21.x86_64.rpm qemu-kvm-rhev-debuginfo-2.3.0-31.el7_2.21.x86_64.rpm qemu-kvm-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5126 https://access.redhat.com/security/cve/CVE-2016-5403 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXu+r9XlSAg2UNWIIRAm7PAKCX2rCEd7UXXYiGFsm6+OUH1ZWV3ACeK660 M/h5RvKJ88Z8xHNNiQZLRHg= =tztX -----END PGP SIGNATURE----- --
  20. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: qemu-kvm-rhev security update Advisory ID: RHSA-2016:1654-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1654.html Issue date: 2016-08-23 CVE Names: CVE-2016-5126 CVE-2016-5403 ===================================================================== 1. Summary: An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 - x86_64 3. Description: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix(es): * Quick Emulator(Qemu) built with the Block driver for iSCSI images support (virtio-blk) is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl(2) calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host. (CVE-2016-5126) * Quick emulator(Qemu) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement and therefore causes unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403) Red Hat would like to thank hongzhenhao (Marvel Team) for reporting CVE-2016-5403. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1340924 - CVE-2016-5126 Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl 1358359 - CVE-2016-5403 Qemu: virtio: unbounded memory allocation on host via guest leading to DoS 6. Package List: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7: Source: qemu-kvm-rhev-2.3.0-31.el7_2.21.src.rpm x86_64: libcacard-devel-rhev-2.3.0-31.el7_2.21.x86_64.rpm libcacard-rhev-2.3.0-31.el7_2.21.x86_64.rpm libcacard-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm qemu-img-rhev-2.3.0-31.el7_2.21.x86_64.rpm qemu-kvm-common-rhev-2.3.0-31.el7_2.21.x86_64.rpm qemu-kvm-rhev-2.3.0-31.el7_2.21.x86_64.rpm qemu-kvm-rhev-debuginfo-2.3.0-31.el7_2.21.x86_64.rpm qemu-kvm-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5126 https://access.redhat.com/security/cve/CVE-2016-5403 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXu+szXlSAg2UNWIIRAifhAJwK5CK67J+uzhxfCMihor5WJj2IlQCfc9tn ruGos5qHuyCr1J81l7NjB8M= =X2xW -----END PGP SIGNATURE----- --
  21. Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,This is the epic conclusion to the Core V51 mod/build which is now complete with some TT Watercooling GearSubject: Hardline Watercooling Loop Install using Pacific Cooling Gear ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/articles/modding/pacific_cooler_installQuote: One of the pinnacles of enthusiast cooling performance is the DIY watercooling loop. Not only can it offer the best ambient level cooling performance but when done correctly looks amazing. For this build we will be using TT Premium Cooling gear and a custom painted Core V51A news posting would be appreciated.ThanksDennis To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved
  22. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Project build: Lunchbox 4 - Part 1 ( -at -) LanOC Reviews <http://lanoc.org/review/pc-hardware/7323-project-build-lunchbox-4-part-1> *DESCRIPTION:* Talk about a long time coming, not only has it been almost three years from our last Lunchbox build <http://lanoc.org/review/pc-hardware/6742-project-build-lunchbox-v3>, but I’ve been planning and working on this build for a good portion of the year. If you follow our coverage, you will see breadcrumbs of comments all the way back to January of me mentioning potentially using components in Lunchbox 4. The problem is how exactly do you follow up our last build, it fit the bill perfectly, was easy to take to events, and had more than enough power for everything we tossed at it. I mean I could do the same thing again but with a few upgraded components but we have always tried to go smaller and faster with every Lunchbox build and frankly going much smaller has a few major limitations. So today I’m going to sit down and run through our new build. A lot of the components have been covered in their own reviews but today I’m going to go over why I picked each part. Then tomorrow I will dive into a few of the customizations I did to the build, benchmark everything, and then talk about how the build turned out. *ARTICLE URL:* http://lanoc.org/review/pc-hardware/7323-project-build-lunchbox-4-part-1 *LARGE IMAGE URL:* http://lanoc.org/images/reviews/2016/lunchbox_4/title.jpg *SMALL IMAGE URL:* http://lanoc.org/images/reviews/2016/lunchbox_4/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review? format=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org <reviews ( -at -) lanoc.org>* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  23. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Project build: Lunchbox 4 - Part 1 ( -at -) LanOC Reviews <http://lanoc.org/review/pc-hardware/7323-project-build-lunchbox-4-part-1> *DESCRIPTION:* Talk about a long time coming, not only has it been almost three years from our last Lunchbox build <http://lanoc.org/review/pc-hardware/6742-project-build-lunchbox-v3>, but I’ve been planning and working on this build for a good portion of the year. If you follow our coverage, you will see breadcrumbs of comments all the way back to January of me mentioning potentially using components in Lunchbox 4. The problem is how exactly do you follow up our last build, it fit the bill perfectly, was easy to take to events, and had more than enough power for everything we tossed at it. I mean I could do the same thing again but with a few upgraded components but we have always tried to go smaller and faster with every Lunchbox build and frankly going much smaller has a few major limitations. So today I’m going to sit down and run through our new build. A lot of the components have been covered in their own reviews but today I’m going to go over why I picked each part. Then tomorrow I will dive into a few of the customizations I did to the build, benchmark everything, and then talk about how the build turned out. *ARTICLE URL:* http://lanoc.org/review/pc-hardware/7323-project-build-lunchbox-4-part-1 *LARGE IMAGE URL:* http://lanoc.org/images/reviews/2016/lunchbox_4/title.jpg *SMALL IMAGE URL:* http://lanoc.org/images/reviews/2016/lunchbox_4/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review? format=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org <reviews ( -at -) lanoc.org>* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  24. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: MSI GE72VR Apache Pro (GTX 1060) Link: http://www.techpowerup.com/reviews/MSI/GE72VR_Apache_Pro Brief: MSI looks to dominate the notebook market with the GE72VR Apache Pro. Offering an Intel i7 6700HQ and NVIDIA GeForce GTX 1060, it offers some serious gaming performance for the price. Oh, and it includes an SSD and IPS screen, which are certainly appealing.
  25. SUSE Security Update: Security update for MozillaFirefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2131-1 Rating: important References: #989196 #990628 #990856 #991809 Cross-References: CVE-2016-2830 CVE-2016-2835 CVE-2016-2836 CVE-2016-2837 CVE-2016-2838 CVE-2016-2839 CVE-2016-5252 CVE-2016-5254 CVE-2016-5258 CVE-2016-5259 CVE-2016-5262 CVE-2016-5263 CVE-2016-5264 CVE-2016-5265 CVE-2016-6354 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Server 12-LTSS SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 15 vulnerabilities is now available. Description: MozillaFirefox was updated to 45.3.0 ESR to fix the following issues (bsc#991809): * MFSA 2016-62/CVE-2016-2835/CVE-2016-2836 Miscellaneous memory safety hazards (rv:48.0 / rv:45.3) * MFSA 2016-63/CVE-2016-2830 Favicon network connection can persist when page is closed * MFSA 2016-64/CVE-2016-2838 Buffer overflow rendering SVG with bidirectional content * MFSA 2016-65/CVE-2016-2839 Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 * MFSA 2016-67/CVE-2016-5252 Stack underflow during 2D graphics rendering * MFSA 2016-70/CVE-2016-5254 Use-after-free when using alt key and toplevel menus * MFSA 2016-72/CVE-2016-5258 Use-after-free in DTLS during WebRTC session shutdown * MFSA 2016-73/CVE-2016-5259 Use-after-free in service workers with nested sync events * MFSA 2016-76/CVE-2016-5262 Scripts on marquee tag can execute in sandboxed iframes * MFSA 2016-77/CVE-2016-2837 Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback * MFSA 2016-78/CVE-2016-5263 Type confusion in display transformation * MFSA 2016-79/CVE-2016-5264 Use-after-free when applying SVG effects * MFSA 2016-80/CVE-2016-5265 Same-origin policy violation using local HTML file and saved shortcut file * CVE-2016-6354: Fix for possible buffer overrun (bsc#990856) Also a temporary workaround was added: - Temporarily bind Firefox to the first CPU as a hotfix for an apparent race condition (bsc#989196, bsc#990628) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1254=1 - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2016-1254=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1254=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2016-1254=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1254=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): MozillaFirefox-debuginfo-45.3.0esr-78.1 MozillaFirefox-debugsource-45.3.0esr-78.1 MozillaFirefox-devel-45.3.0esr-78.1 - SUSE Linux Enterprise Server for SAP 12 (x86_64): MozillaFirefox-45.3.0esr-78.1 MozillaFirefox-debuginfo-45.3.0esr-78.1 MozillaFirefox-debugsource-45.3.0esr-78.1 MozillaFirefox-translations-45.3.0esr-78.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): MozillaFirefox-45.3.0esr-78.1 MozillaFirefox-debuginfo-45.3.0esr-78.1 MozillaFirefox-debugsource-45.3.0esr-78.1 MozillaFirefox-translations-45.3.0esr-78.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): MozillaFirefox-45.3.0esr-78.1 MozillaFirefox-debuginfo-45.3.0esr-78.1 MozillaFirefox-debugsource-45.3.0esr-78.1 MozillaFirefox-translations-45.3.0esr-78.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): MozillaFirefox-45.3.0esr-78.1 MozillaFirefox-debuginfo-45.3.0esr-78.1 MozillaFirefox-debugsource-45.3.0esr-78.1 MozillaFirefox-translations-45.3.0esr-78.1 References: https://www.suse.com/security/cve/CVE-2016-2830.html https://www.suse.com/security/cve/CVE-2016-2835.html https://www.suse.com/security/cve/CVE-2016-2836.html https://www.suse.com/security/cve/CVE-2016-2837.html https://www.suse.com/security/cve/CVE-2016-2838.html https://www.suse.com/security/cve/CVE-2016-2839.html https://www.suse.com/security/cve/CVE-2016-5252.html https://www.suse.com/security/cve/CVE-2016-5254.html https://www.suse.com/security/cve/CVE-2016-5258.html https://www.suse.com/security/cve/CVE-2016-5259.html https://www.suse.com/security/cve/CVE-2016-5262.html https://www.suse.com/security/cve/CVE-2016-5263.html https://www.suse.com/security/cve/CVE-2016-5264.html https://www.suse.com/security/cve/CVE-2016-5265.html https://www.suse.com/security/cve/CVE-2016-6354.html https://bugzilla.suse.com/989196 https://bugzilla.suse.com/990628 https://bugzilla.suse.com/990856 https://bugzilla.suse.com/991809 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
×