Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. TITLE: PowerColor RED DEVIL RX 480 Review ( -at -) Vortez CONTENT: The DEVIL series has been a permanent and successful fixture for PowerColor, representing the very finest in what a graphics card can offer. For those with a decidedly dark side, the RED DEVIL RX 480 seeks to appease the inner demon - boasting a custom design with triple fan configuration and two-mode factory overclock; providing gamers with a silent choice or outright performance. LINK: http://www.vortez.net/review.php?id=1193 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
  2. CentOS Errata and Bugfix Advisory 2016:1530 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1530.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 684e67a738b7dce51fd91736f404ec13e2816f48d8474478ac10336b93c03a0e iscsi-initiator-utils-6.2.0.873-33.el7_2.2.i686.rpm 834a8c18c7ee02963aa8c4c4f3d1b5aad2762715bb3fdc6a7efcdbe78bd752f2 iscsi-initiator-utils-6.2.0.873-33.el7_2.2.x86_64.rpm 93ac02ec70706226a2849dee8c6c39b2440b2d13444beeb066ead8e2e6cc6662 iscsi-initiator-utils-devel-6.2.0.873-33.el7_2.2.i686.rpm ba3d1771cdf04b6ab717d48fbc1f946560eb70e60be5608ce396aef23a44f969 iscsi-initiator-utils-devel-6.2.0.873-33.el7_2.2.x86_64.rpm 2dc7269aa0aa992b78685ef37dba6a27be4919453616c07d957d8594f2277971 iscsi-initiator-utils-iscsiuio-6.2.0.873-33.el7_2.2.x86_64.rpm Source: 08a81a1c93c3aa5da7f7b4666b8c660d48f51efea45472f08cd9467ffde3e6df iscsi-initiator-utils-6.2.0.873-33.el7_2.2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2016:1532-02 Product: Red Hat Enterprise MRG for RHEL-6 Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1532.html Issue date: 2016-08-02 CVE Names: CVE-2015-8660 CVE-2016-4470 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important) * The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application. (CVE-2015-8660, Moderate) Red Hat would like to thank Nathan Williams for reporting CVE-2015-8660. The CVE-2016-4470 issue was discovered by David Howells (Red Hat Inc.). The kernel-rt packages have been upgraded to upstream version 3.10.0-327.rt56.194.el6rt, which provides a number of bug fixes over the previous version. (BZ#1343658) This update also fixes the following bugs: * Previously, use of the get/put_cpu_var() function in function refill_stock() from the memcontrol cgroup code lead to a "scheduling while atomic" warning. With this update, refill_stock() uses the get/put_cpu_light() function instead, and the warnings no longer appear. (BZ#1348710) * Prior to this update, if a real time task pinned to a given CPU was taking 100% of the CPU time, then calls to the lru_add_drain_all() function on other CPUs blocked for an undetermined amount of time. This caused latencies and undesired side effects. With this update, lru_add_drain_all() has been changed to drain the LRU pagevecs of remote CPUs. (BZ#1348711) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1291329 - CVE-2015-8660 kernel: Permission bypass on overlayfs during copy_up 1341716 - CVE-2016-4470 kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path 1343658 - update the MRG 2.5.z 3.10 kernel-rt sources 6. Package List: MRG Realtime for RHEL 6 Server v.2: Source: kernel-rt-3.10.0-327.rt56.194.el6rt.src.rpm noarch: kernel-rt-doc-3.10.0-327.rt56.194.el6rt.noarch.rpm kernel-rt-firmware-3.10.0-327.rt56.194.el6rt.noarch.rpm x86_64: kernel-rt-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-debug-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-devel-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-trace-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-vanilla-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-vanilla-debuginfo-3.10.0-327.rt56.194.el6rt.x86_64.rpm kernel-rt-vanilla-devel-3.10.0-327.rt56.194.el6rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8660 https://access.redhat.com/security/cve/CVE-2016-4470 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXoRx6XlSAg2UNWIIRAtcZAKCRDzqcIQ0jzuW15qMqskr2lSRILACguGCA Bhidqzg0j1hkf1NZjhlERSY= =hfmH -----END PGP SIGNATURE----- --
  4. CentOS Errata and Bugfix Advisory 2016:1536 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1536.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 87b4a73012cb08b9068dac809832905ce7832c70dbcec218750c03a7026daad4 libgovirt-0.3.3-1.el7_2.4.i686.rpm 18537c31367589754f2cd7ad0c830da636f55e5e1c740a0a09d9e5c7b83e9f35 libgovirt-0.3.3-1.el7_2.4.x86_64.rpm 021f69336390708324d22a5cc16d9a04195252fef99d4517cc8900cdf66b89af libgovirt-devel-0.3.3-1.el7_2.4.i686.rpm 40db11a6717c06ffa91c742e26429996e44c084e29bbe87a827542341a3fd981 libgovirt-devel-0.3.3-1.el7_2.4.x86_64.rpm Source: fa0c488124649422b1fe1b41ee4505798aa1b95507d9105684e94857dba30818 libgovirt-0.3.3-1.el7_2.4.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: golang security, bug fix, and enhancement update Advisory ID: RHSA-2016:1538-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1538.html Issue date: 2016-08-02 CVE Names: CVE-2016-5386 ===================================================================== 1. Summary: An update for golang is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server Optional (v. 7) - noarch, x86_64 3. Description: The golang packages provide the Go programming language compiler. The following packages have been upgraded to a newer upstream version: golang (1.6.3). (BZ#1346331) Security Fix(es): * An input-validation flaw was discovered in the Go programming language built in CGI implementation, which set the environment variable "HTTP_PROXY" using the incoming "Proxy" HTTP-request header. The environment variable "HTTP_PROXY" is used by numerous web clients, including Go's net/http package, to specify a proxy server to use for HTTP and, in some cases, HTTPS requests. This meant that when a CGI-based web application ran, an attacker could specify a proxy server which the application then used for subsequent outgoing requests, allowing a man-in-the-middle attack. (CVE-2016-5386) Red Hat would like to thank Scott Geary (VendHQ) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1346331 - REBASE to golang 1.6 1353798 - CVE-2016-5386 Go: sets environmental variable based on user supplied Proxy request header 6. Package List: Red Hat Enterprise Linux Server Optional (v. 7): Source: golang-1.6.3-1.el7_2.1.src.rpm noarch: golang-docs-1.6.3-1.el7_2.1.noarch.rpm golang-misc-1.6.3-1.el7_2.1.noarch.rpm golang-src-1.6.3-1.el7_2.1.noarch.rpm golang-tests-1.6.3-1.el7_2.1.noarch.rpm x86_64: golang-1.6.3-1.el7_2.1.x86_64.rpm golang-bin-1.6.3-1.el7_2.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5386 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXoRzhXlSAg2UNWIIRApixAKCMAuZK86IigGI6xma0zpDy/0sQRwCgkeda Hk4/rr0WJ77ZzBLkEBO5tQI= =Ksfa -----END PGP SIGNATURE----- --
  6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2016:1539-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1539.html Issue date: 2016-08-02 CVE Names: CVE-2015-8660 CVE-2016-2143 CVE-2016-4470 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated kernel packages include several security issues and numerous bug fixes, some of which you can see below. Space precludes documenting all of these bug fixes in this advisory. To see the complete list of bug fixes, users are directed to the related Knowledge Article: https://access.redhat.com/articles/2460971. Security Fix(es): * A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important) * The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application. (CVE-2015-8660, Moderate) * It was reported that on s390x, the fork of a process with four page table levels will cause memory corruption with a variety of symptoms. All processes are created with three level page table and a limit of 4TB for the address space. If the parent process has four page table levels with a limit of 8PB, the function that duplicates the address space will try to copy memory areas outside of the address space limit for the child process. (CVE-2016-2143, Moderate) Red Hat would like to thank Nathan Williams for reporting CVE-2015-8660. The CVE-2016-4470 issue was discovered by David Howells (Red Hat Inc.). Bug Fix(es): * The glibc headers and the Linux headers share certain definitions of key structures that are required to be defined in kernel and in userspace. In some instances both userspace and sanitized kernel headers have to be included in order to get the structure definitions required by the user program. Unfortunately because the glibc and Linux headers don't coordinate this can result in compilation errors. The glibc headers have therefore been fixed to coordinate with Linux UAPI-based headers. With the header coordination compilation errors no longer occur. (BZ#1331285) * When running the TCP/IPv6 traffic over the mlx4_en networking interface on the big endian architectures, call traces reporting about a "hw csum failure" could occur. With this update, the mlx4_en driver has been fixed by correction of the checksum calculation for the big endian architectures. As a result, the call trace error no longer appears in the log messages. (BZ#1337431) * Under significant load, some applications such as logshifter could generate bursts of log messages too large for the system logger to spool. Due to a race condition, log messages from that application could then be lost even after the log volume dropped to manageable levels. This update fixes the kernel mechanism used to notify the transmitter end of the socket used by the system logger that more space is available on the receiver side, removing a race condition which previously caused the sender to stop transmitting new messages and allowing all log messages to be processed correctly. (BZ#1337513) * Previously, after heavy open or close of the Accelerator Function Unit (AFU) contexts, the interrupt packet went out and the AFU context did not see any interrupts. Consequently, a kernel panic could occur. The provided patch set fixes handling of the interrupt requests, and kernel panic no longer occurs in the described situation. (BZ#1338886) * net: recvfrom would fail on short buffer. (BZ#1339115) * Backport rhashtable changes from upstream. (BZ#1343639) * Server Crashing after starting Glusterd & creating volumes. (BZ#1344234) * RAID5 reshape deadlock fix. (BZ#1344313) * BDX perf uncore support fix. (BZ#1347374) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1291329 - CVE-2015-8660 kernel: Permission bypass on overlayfs during copy_up 1308908 - CVE-2016-2143 kernel: Fork of large process causes memory corruption 1341716 - CVE-2016-4470 kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-327.28.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.28.2.el7.noarch.rpm kernel-doc-3.10.0-327.28.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7.x86_64.rpm kernel-devel-3.10.0-327.28.2.el7.x86_64.rpm kernel-headers-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.28.2.el7.x86_64.rpm perf-3.10.0-327.28.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm python-perf-3.10.0-327.28.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.28.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-327.28.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.28.2.el7.noarch.rpm kernel-doc-3.10.0-327.28.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7.x86_64.rpm kernel-devel-3.10.0-327.28.2.el7.x86_64.rpm kernel-headers-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.28.2.el7.x86_64.rpm perf-3.10.0-327.28.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm python-perf-3.10.0-327.28.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.28.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-327.28.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.28.2.el7.noarch.rpm kernel-doc-3.10.0-327.28.2.el7.noarch.rpm ppc64: kernel-3.10.0-327.28.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-327.28.2.el7.ppc64.rpm kernel-debug-3.10.0-327.28.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-327.28.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.28.2.el7.ppc64.rpm kernel-devel-3.10.0-327.28.2.el7.ppc64.rpm kernel-headers-3.10.0-327.28.2.el7.ppc64.rpm kernel-tools-3.10.0-327.28.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-327.28.2.el7.ppc64.rpm perf-3.10.0-327.28.2.el7.ppc64.rpm perf-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm python-perf-3.10.0-327.28.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-327.28.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-327.28.2.el7.ppc64le.rpm kernel-debug-3.10.0-327.28.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.28.2.el7.ppc64le.rpm kernel-devel-3.10.0-327.28.2.el7.ppc64le.rpm kernel-headers-3.10.0-327.28.2.el7.ppc64le.rpm kernel-tools-3.10.0-327.28.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-327.28.2.el7.ppc64le.rpm perf-3.10.0-327.28.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm python-perf-3.10.0-327.28.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm s390x: kernel-3.10.0-327.28.2.el7.s390x.rpm kernel-debug-3.10.0-327.28.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-327.28.2.el7.s390x.rpm kernel-debug-devel-3.10.0-327.28.2.el7.s390x.rpm kernel-debuginfo-3.10.0-327.28.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-327.28.2.el7.s390x.rpm kernel-devel-3.10.0-327.28.2.el7.s390x.rpm kernel-headers-3.10.0-327.28.2.el7.s390x.rpm kernel-kdump-3.10.0-327.28.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-327.28.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-327.28.2.el7.s390x.rpm perf-3.10.0-327.28.2.el7.s390x.rpm perf-debuginfo-3.10.0-327.28.2.el7.s390x.rpm python-perf-3.10.0-327.28.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.s390x.rpm x86_64: kernel-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7.x86_64.rpm kernel-devel-3.10.0-327.28.2.el7.x86_64.rpm kernel-headers-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.28.2.el7.x86_64.rpm perf-3.10.0-327.28.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm python-perf-3.10.0-327.28.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-327.28.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-327.28.2.el7.ppc64.rpm perf-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-327.28.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-327.28.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-327.28.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.28.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-327.28.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.28.2.el7.noarch.rpm kernel-doc-3.10.0-327.28.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7.x86_64.rpm kernel-devel-3.10.0-327.28.2.el7.x86_64.rpm kernel-headers-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.28.2.el7.x86_64.rpm perf-3.10.0-327.28.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm python-perf-3.10.0-327.28.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.28.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8660 https://access.redhat.com/security/cve/CVE-2016-2143 https://access.redhat.com/security/cve/CVE-2016-4470 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/2460971 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXoR0TXlSAg2UNWIIRAvjnAJsHgdzb+uIGBU2qFbo1WViyZ3Q+mgCeMSct rYt7kZ6fTSk+GeFuP7S+jrM= =A2Lp -----END PGP SIGNATURE----- --
  7. CentOS Errata and Security Advisory 2016:1546 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1546.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 38ea752f8fbb0d2c79a7a647e5adf536ea9805993e947a875d67ef8e2731ef7c libtiff-4.0.3-25.el7_2.i686.rpm dc891cf3d0afc0483753fef0ae1298722378a90611db62ae658055679ceeed78 libtiff-4.0.3-25.el7_2.x86_64.rpm 29e13443a6b24a75ae2f0e6a5b58006129f9f9c9289bea011c88a94c33b3802b libtiff-devel-4.0.3-25.el7_2.i686.rpm b5f9e615a3ebcc987597fd3b2400f5c08657ff32e5e3b5ba5415c7a6d02bf258 libtiff-devel-4.0.3-25.el7_2.x86_64.rpm 09a01d05f2bac16b9963424a18303e5efbbb5f1557cdc9105b4d6382eb8e9851 libtiff-static-4.0.3-25.el7_2.i686.rpm 432aed62716177440832629ddadbe1eb4fc74cd1241c91595debe145f462f0ae libtiff-static-4.0.3-25.el7_2.x86_64.rpm 484104cedb9abcbc12e94c87cdfeb0ba366a433478f906bfa9032a89c6490d1c libtiff-tools-4.0.3-25.el7_2.x86_64.rpm Source: 37c6504438b41b65a1816c52bb0ccff535964c567914d3d68d5c1ca13fc4685f libtiff-4.0.3-25.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  8. CentOS Errata and Bugfix Advisory 2016:1531 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1531.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 096795fd722b8cd569c3960b3edd41e110f841e38d8904099247e814bb94032b mdadm-3.3.2-7.el7_2.1.x86_64.rpm Source: 319ae85ef91331eadfe38fb903a42bbd5b5e5070eced2bd48fec005017e2279d mdadm-3.3.2-7.el7_2.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  9. CentOS Errata and Bugfix Advisory 2016:1534 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1534.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 37691339e37f8f1fb97cc78ace142e11751e3f16ff4eeed6cc1e4d99426ddaee microcode_ctl-2.1-12.el7_2.1.x86_64.rpm Source: d24b5b7fe90a54140353586fe28c3487fcfdcda9735891ab657c6aa90eb08033 microcode_ctl-2.1-12.el7_2.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  10. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2016:1541-03 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1541.html Issue date: 2016-08-02 CVE Names: CVE-2015-8660 CVE-2016-4470 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important) * The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application. (CVE-2015-8660, Moderate) Red Hat would like to thank Nathan Williams for reporting CVE-2015-8660. The CVE-2016-4470 issue was discovered by David Howells (Red Hat Inc.). The kernel-rt packages have been upgraded to the kernel-3.10.0-327.28.2.el7 source tree, which provides a number of bug fixes over the previous version. (BZ#1350307) This update also fixes the following bugs: * Previously, use of the get/put_cpu_var() function in function refill_stock() from the memcontrol cgroup code lead to a "scheduling while atomic" warning. With this update, refill_stock() uses the get/put_cpu_light() function instead, and the warnings no longer appear. (BZ#1347171) * Prior to this update, if a real time task pinned to a given CPU was taking 100% of the CPU time, then calls to the lru_add_drain_all() function on other CPUs blocked for an undetermined amount of time. This caused latencies and undesired side effects. With this update, lru_add_drain_all() has been changed to drain the LRU pagevecs of remote CPUs. (BZ#1348523) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1291329 - CVE-2015-8660 kernel: Permission bypass on overlayfs during copy_up 1341716 - CVE-2016-4470 kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path 1350307 - kernel-rt: update to the RHEL7.2.z batch#6 source tree 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-327.28.2.rt56.234.el7_2.src.rpm noarch: kernel-rt-doc-3.10.0-327.28.2.rt56.234.el7_2.noarch.rpm x86_64: kernel-rt-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debug-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debug-kvm-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-devel-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-kvm-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-trace-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-trace-kvm-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-327.28.2.rt56.234.el7_2.src.rpm noarch: kernel-rt-doc-3.10.0-327.28.2.rt56.234.el7_2.noarch.rpm x86_64: kernel-rt-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debug-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debug-devel-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-devel-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-trace-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm kernel-rt-trace-devel-3.10.0-327.28.2.rt56.234.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8660 https://access.redhat.com/security/cve/CVE-2016-4470 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXoR1NXlSAg2UNWIIRAv2rAJ99Z36Rv+mlJM1WHCh3JqGj+CVlGQCfdSWu +/cXUfSAuXQH5IYYM68A7K8= =L9Ma -----END PGP SIGNATURE----- --
  11. CentOS Errata and Bugfix Advisory 2016:1526 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1526.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 64870fdb6bd36e425f36d3bbe10385bca6fd174d14e4c4cd73e608a1b2859a1a mod_auth_gssapi-1.3.1-3.el7_2.x86_64.rpm Source: e0f126c18027a6840e3a7ccd231c56be98b535565370be89ef1e4893fabc59be mod_auth_gssapi-1.3.1-3.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  12. View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=8950461588&e=0c004f9c13) Earlier this morning, Samsung held its latest Unpacked event in New York City where it unveiled the highly anticipated Galaxy Note7 smartphone. At the event, Samsung also announced U.S. availability for the Gear 360 camera (it arrives August 19th with a price tag of $349) and a revised Gear VR headset that features USB-C connectivity to support the new Galaxy Note7. We go hands-on at the crowded Hammerstein ballroom at Samsung Unpacked - NYC. Hands-On Samsung's Galaxy Note7 With Revamped Gear VR Headset (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=2dcfeaec69&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=c0f65d8fc2&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=5059a99b1b&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=57705961ba&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=6104d4bcfe&e=0c004f9c13 ============================================================
  13. CentOS Errata and Bugfix Advisory 2016:1544 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1544.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 7a3ca6fd532637d25bcbdbef7927cd50d89c687d97d29fedb38af84d41606c79 389-ds-base-1.3.4.0-33.el7_2.x86_64.rpm 313bcd815c80151e916ef5127631b38f060dcc0630afa01206895cfc78518198 389-ds-base-devel-1.3.4.0-33.el7_2.x86_64.rpm a9ba90388166cfa0c056ba005fad3e593e68c351f5696c5b187093ed043a6971 389-ds-base-libs-1.3.4.0-33.el7_2.x86_64.rpm Source: 02dfe683ace42216ebfd976242b4ff7eb88a4e98211c687dc41a857041ed644a 389-ds-base-1.3.4.0-33.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  14. CentOS Errata and Bugfix Advisory 2016:1522 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1522.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 80903bbf766045b3ad4a278371796e331c6a92f3df8afb62c579025705877fb9 bash-4.2.46-20.el7_2.x86_64.rpm 53858be63719604229d08a5a70a6b19cc145159dab5a96daaaa0fb161c83124a bash-doc-4.2.46-20.el7_2.x86_64.rpm Source: cb6acfa45d2ddcf60f870b950ef130829d4389b576b019bb1468b71ce1056f1f bash-4.2.46-20.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  15. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: ASRock DeskMini 110 Link: http://www.techpowerup.com/reviews/ASRock/DeskMini_110 Brief: ASRock has upped the ante with mini-PCs by introducing their latest innovation, the ASRock DeskMini 110. The DeskMini 110 features the new Mini-STX form factor that brings full 65W CPU support into a tiny 5"x5" package. That means you can stuff a 65W Core i7 6700 Skylake-S CPU into the ASRock DeskMini 110. It also features a PCIe Gen3 x4 link for one of its M.2 ports, so you can have ultra-fast storage, too!
  16. Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,RGB mouse anyone? Thermaltake has them at 10 levels, or something like that.Subject Thermaltake Level 10M Advanced Gaming Mouse Review ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/reviews/input_device/tt_level10_maQuote: The original Thermaltake Level 10M is one of the best mice I have ever used so expectations were high for the Level 10M Advanced Gaming MouseA news posting would be appreciated.ThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved
  17. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libtiff security update Advisory ID: RHSA-2016:1546-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1546.html Issue date: 2016-08-02 CVE Names: CVE-2014-8127 CVE-2014-8129 CVE-2014-8130 CVE-2014-9330 CVE-2014-9655 CVE-2015-1547 CVE-2015-7554 CVE-2015-8665 CVE-2015-8668 CVE-2015-8683 CVE-2015-8781 CVE-2015-8782 CVE-2015-8783 CVE-2015-8784 CVE-2016-3632 CVE-2016-3945 CVE-2016-3990 CVE-2016-3991 CVE-2016-5320 ===================================================================== 1. Summary: An update for libtiff is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2014-9655, CVE-2015-1547, CVE-2015-8784, CVE-2015-8683, CVE-2015-8665, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2016-3990, CVE-2016-5320) * Multiple flaws have been discovered in various libtiff tools (bmp2tiff, pal2rgb, thumbnail, tiff2bw, tiff2pdf, tiffcrop, tiffdither, tiffsplit, tiff2rgba). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. (CVE-2014-8127, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330, CVE-2015-7554, CVE-2015-8668, CVE-2016-3632, CVE-2016-3945, CVE-2016-3991) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications linked against libtiff must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1177893 - CVE-2014-9330 libtiff: Out-of-bounds reads followed by a crash in bmp2tiff 1185805 - CVE-2014-8127 libtiff: out-of-bounds read with malformed TIFF image in multiple tools 1185815 - CVE-2014-8129 libtiff: out-of-bounds read/write with malformed TIFF image in tiff2pdf 1185817 - CVE-2014-8130 libtiff: divide by zero in the tiffdither tool 1190703 - CVE-2014-9655 libtiff: use of uninitialized memory in putcontig8bitYCbCr21tile and NeXTDecode 1190709 - CVE-2015-1547 libtiff: use of uninitialized memory in NeXTDecode 1294417 - CVE-2015-7554 libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags 1294425 - CVE-2015-8668 libtiff: OOB read in bmp2tiff 1294427 - CVE-2015-8683 libtiff: Out-of-bounds when reading CIE Lab image format files 1294444 - CVE-2015-8665 libtiff: Out-of-bounds read in tif_getimage.c 1301649 - CVE-2015-8781 CVE-2015-8782 CVE-2015-8783 libtiff: invalid assertion 1301652 - CVE-2015-8784 libtiff: out-of-bound write in NeXTDecode() 1325093 - CVE-2016-3945 libtiff: out-of-bounds write in the tiff2rgba tool 1325095 - CVE-2016-3632 libtiff: out-of-bounds write in _TIFFVGetField function 1326246 - CVE-2016-3990 libtiff: out-of-bounds write in horizontalDifference8() 1326249 - CVE-2016-3991 libtiff: out-of-bounds write in loadImage() function 1346687 - CVE-2016-5320 libtiff: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libtiff-4.0.3-25.el7_2.src.rpm x86_64: libtiff-4.0.3-25.el7_2.i686.rpm libtiff-4.0.3-25.el7_2.x86_64.rpm libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm libtiff-devel-4.0.3-25.el7_2.i686.rpm libtiff-devel-4.0.3-25.el7_2.x86_64.rpm libtiff-static-4.0.3-25.el7_2.i686.rpm libtiff-static-4.0.3-25.el7_2.x86_64.rpm libtiff-tools-4.0.3-25.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libtiff-4.0.3-25.el7_2.src.rpm x86_64: libtiff-4.0.3-25.el7_2.i686.rpm libtiff-4.0.3-25.el7_2.x86_64.rpm libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm libtiff-devel-4.0.3-25.el7_2.i686.rpm libtiff-devel-4.0.3-25.el7_2.x86_64.rpm libtiff-static-4.0.3-25.el7_2.i686.rpm libtiff-static-4.0.3-25.el7_2.x86_64.rpm libtiff-tools-4.0.3-25.el7_2.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libtiff-4.0.3-25.el7_2.src.rpm ppc64: libtiff-4.0.3-25.el7_2.ppc.rpm libtiff-4.0.3-25.el7_2.ppc64.rpm libtiff-debuginfo-4.0.3-25.el7_2.ppc.rpm libtiff-debuginfo-4.0.3-25.el7_2.ppc64.rpm libtiff-devel-4.0.3-25.el7_2.ppc.rpm libtiff-devel-4.0.3-25.el7_2.ppc64.rpm ppc64le: libtiff-4.0.3-25.el7_2.ppc64le.rpm libtiff-debuginfo-4.0.3-25.el7_2.ppc64le.rpm libtiff-devel-4.0.3-25.el7_2.ppc64le.rpm s390x: libtiff-4.0.3-25.el7_2.s390.rpm libtiff-4.0.3-25.el7_2.s390x.rpm libtiff-debuginfo-4.0.3-25.el7_2.s390.rpm libtiff-debuginfo-4.0.3-25.el7_2.s390x.rpm libtiff-devel-4.0.3-25.el7_2.s390.rpm libtiff-devel-4.0.3-25.el7_2.s390x.rpm x86_64: libtiff-4.0.3-25.el7_2.i686.rpm libtiff-4.0.3-25.el7_2.x86_64.rpm libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm libtiff-devel-4.0.3-25.el7_2.i686.rpm libtiff-devel-4.0.3-25.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libtiff-debuginfo-4.0.3-25.el7_2.ppc.rpm libtiff-debuginfo-4.0.3-25.el7_2.ppc64.rpm libtiff-static-4.0.3-25.el7_2.ppc.rpm libtiff-static-4.0.3-25.el7_2.ppc64.rpm libtiff-tools-4.0.3-25.el7_2.ppc64.rpm ppc64le: libtiff-debuginfo-4.0.3-25.el7_2.ppc64le.rpm libtiff-static-4.0.3-25.el7_2.ppc64le.rpm libtiff-tools-4.0.3-25.el7_2.ppc64le.rpm s390x: libtiff-debuginfo-4.0.3-25.el7_2.s390.rpm libtiff-debuginfo-4.0.3-25.el7_2.s390x.rpm libtiff-static-4.0.3-25.el7_2.s390.rpm libtiff-static-4.0.3-25.el7_2.s390x.rpm libtiff-tools-4.0.3-25.el7_2.s390x.rpm x86_64: libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm libtiff-static-4.0.3-25.el7_2.i686.rpm libtiff-static-4.0.3-25.el7_2.x86_64.rpm libtiff-tools-4.0.3-25.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libtiff-4.0.3-25.el7_2.src.rpm x86_64: libtiff-4.0.3-25.el7_2.i686.rpm libtiff-4.0.3-25.el7_2.x86_64.rpm libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm libtiff-devel-4.0.3-25.el7_2.i686.rpm libtiff-devel-4.0.3-25.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm libtiff-static-4.0.3-25.el7_2.i686.rpm libtiff-static-4.0.3-25.el7_2.x86_64.rpm libtiff-tools-4.0.3-25.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-8127 https://access.redhat.com/security/cve/CVE-2014-8129 https://access.redhat.com/security/cve/CVE-2014-8130 https://access.redhat.com/security/cve/CVE-2014-9330 https://access.redhat.com/security/cve/CVE-2014-9655 https://access.redhat.com/security/cve/CVE-2015-1547 https://access.redhat.com/security/cve/CVE-2015-7554 https://access.redhat.com/security/cve/CVE-2015-8665 https://access.redhat.com/security/cve/CVE-2015-8668 https://access.redhat.com/security/cve/CVE-2015-8683 https://access.redhat.com/security/cve/CVE-2015-8781 https://access.redhat.com/security/cve/CVE-2015-8782 https://access.redhat.com/security/cve/CVE-2015-8783 https://access.redhat.com/security/cve/CVE-2015-8784 https://access.redhat.com/security/cve/CVE-2016-3632 https://access.redhat.com/security/cve/CVE-2016-3945 https://access.redhat.com/security/cve/CVE-2016-3990 https://access.redhat.com/security/cve/CVE-2016-3991 https://access.redhat.com/security/cve/CVE-2016-5320 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXoNKIXlSAg2UNWIIRAn0mAJ49V9uRtJCn4vAWPIfVZ3ptCa4NDQCbBuTb H5YX3gD3gJu8C4EadiP+wtg= =Z4gh -----END PGP SIGNATURE----- --
  18. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libtiff security update Advisory ID: RHSA-2016:1547-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1547.html Issue date: 2016-08-02 CVE Names: CVE-2014-8127 CVE-2014-8129 CVE-2014-8130 CVE-2014-9330 CVE-2014-9655 CVE-2015-1547 CVE-2015-7554 CVE-2015-8665 CVE-2015-8668 CVE-2015-8683 CVE-2015-8781 CVE-2015-8782 CVE-2015-8783 CVE-2015-8784 CVE-2016-3632 CVE-2016-3945 CVE-2016-3990 CVE-2016-3991 CVE-2016-5320 ===================================================================== 1. Summary: An update for libtiff is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2014-9655, CVE-2015-1547, CVE-2015-8784, CVE-2015-8683, CVE-2015-8665, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2016-3990, CVE-2016-5320) * Multiple flaws have been discovered in various libtiff tools (bmp2tiff, pal2rgb, thumbnail, tiff2bw, tiff2pdf, tiffcrop, tiffdither, tiffsplit, tiff2rgba). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. (CVE-2014-8127, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330, CVE-2015-7554, CVE-2015-8668, CVE-2016-3632, CVE-2016-3945, CVE-2016-3991) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running applications linked against libtiff must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1177893 - CVE-2014-9330 libtiff: Out-of-bounds reads followed by a crash in bmp2tiff 1185805 - CVE-2014-8127 libtiff: out-of-bounds read with malformed TIFF image in multiple tools 1185815 - CVE-2014-8129 libtiff: out-of-bounds read/write with malformed TIFF image in tiff2pdf 1185817 - CVE-2014-8130 libtiff: divide by zero in the tiffdither tool 1190703 - CVE-2014-9655 libtiff: use of uninitialized memory in putcontig8bitYCbCr21tile and NeXTDecode 1190709 - CVE-2015-1547 libtiff: use of uninitialized memory in NeXTDecode 1294417 - CVE-2015-7554 libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags 1294425 - CVE-2015-8668 libtiff: OOB read in bmp2tiff 1294427 - CVE-2015-8683 libtiff: Out-of-bounds when reading CIE Lab image format files 1294444 - CVE-2015-8665 libtiff: Out-of-bounds read in tif_getimage.c 1301649 - CVE-2015-8781 CVE-2015-8782 CVE-2015-8783 libtiff: invalid assertion 1301652 - CVE-2015-8784 libtiff: out-of-bound write in NeXTDecode() 1325093 - CVE-2016-3945 libtiff: out-of-bounds write in the tiff2rgba tool 1325095 - CVE-2016-3632 libtiff: out-of-bounds write in _TIFFVGetField function 1326246 - CVE-2016-3990 libtiff: out-of-bounds write in horizontalDifference8() 1326249 - CVE-2016-3991 libtiff: out-of-bounds write in loadImage() function 1346687 - CVE-2016-5320 libtiff: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: libtiff-3.9.4-18.el6_8.src.rpm i386: libtiff-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm x86_64: libtiff-3.9.4-18.el6_8.i686.rpm libtiff-3.9.4-18.el6_8.x86_64.rpm libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-devel-3.9.4-18.el6_8.i686.rpm libtiff-static-3.9.4-18.el6_8.i686.rpm x86_64: libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm libtiff-devel-3.9.4-18.el6_8.i686.rpm libtiff-devel-3.9.4-18.el6_8.x86_64.rpm libtiff-static-3.9.4-18.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: libtiff-3.9.4-18.el6_8.src.rpm x86_64: libtiff-3.9.4-18.el6_8.i686.rpm libtiff-3.9.4-18.el6_8.x86_64.rpm libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm libtiff-devel-3.9.4-18.el6_8.i686.rpm libtiff-devel-3.9.4-18.el6_8.x86_64.rpm libtiff-static-3.9.4-18.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: libtiff-3.9.4-18.el6_8.src.rpm i386: libtiff-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-devel-3.9.4-18.el6_8.i686.rpm ppc64: libtiff-3.9.4-18.el6_8.ppc.rpm libtiff-3.9.4-18.el6_8.ppc64.rpm libtiff-debuginfo-3.9.4-18.el6_8.ppc.rpm libtiff-debuginfo-3.9.4-18.el6_8.ppc64.rpm libtiff-devel-3.9.4-18.el6_8.ppc.rpm libtiff-devel-3.9.4-18.el6_8.ppc64.rpm s390x: libtiff-3.9.4-18.el6_8.s390.rpm libtiff-3.9.4-18.el6_8.s390x.rpm libtiff-debuginfo-3.9.4-18.el6_8.s390.rpm libtiff-debuginfo-3.9.4-18.el6_8.s390x.rpm libtiff-devel-3.9.4-18.el6_8.s390.rpm libtiff-devel-3.9.4-18.el6_8.s390x.rpm x86_64: libtiff-3.9.4-18.el6_8.i686.rpm libtiff-3.9.4-18.el6_8.x86_64.rpm libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm libtiff-devel-3.9.4-18.el6_8.i686.rpm libtiff-devel-3.9.4-18.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-static-3.9.4-18.el6_8.i686.rpm ppc64: libtiff-debuginfo-3.9.4-18.el6_8.ppc64.rpm libtiff-static-3.9.4-18.el6_8.ppc64.rpm s390x: libtiff-debuginfo-3.9.4-18.el6_8.s390x.rpm libtiff-static-3.9.4-18.el6_8.s390x.rpm x86_64: libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm libtiff-static-3.9.4-18.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: libtiff-3.9.4-18.el6_8.src.rpm i386: libtiff-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-devel-3.9.4-18.el6_8.i686.rpm x86_64: libtiff-3.9.4-18.el6_8.i686.rpm libtiff-3.9.4-18.el6_8.x86_64.rpm libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm libtiff-devel-3.9.4-18.el6_8.i686.rpm libtiff-devel-3.9.4-18.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: libtiff-debuginfo-3.9.4-18.el6_8.i686.rpm libtiff-static-3.9.4-18.el6_8.i686.rpm x86_64: libtiff-debuginfo-3.9.4-18.el6_8.x86_64.rpm libtiff-static-3.9.4-18.el6_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-8127 https://access.redhat.com/security/cve/CVE-2014-8129 https://access.redhat.com/security/cve/CVE-2014-8130 https://access.redhat.com/security/cve/CVE-2014-9330 https://access.redhat.com/security/cve/CVE-2014-9655 https://access.redhat.com/security/cve/CVE-2015-1547 https://access.redhat.com/security/cve/CVE-2015-7554 https://access.redhat.com/security/cve/CVE-2015-8665 https://access.redhat.com/security/cve/CVE-2015-8668 https://access.redhat.com/security/cve/CVE-2015-8683 https://access.redhat.com/security/cve/CVE-2015-8781 https://access.redhat.com/security/cve/CVE-2015-8782 https://access.redhat.com/security/cve/CVE-2015-8783 https://access.redhat.com/security/cve/CVE-2015-8784 https://access.redhat.com/security/cve/CVE-2016-3632 https://access.redhat.com/security/cve/CVE-2016-3945 https://access.redhat.com/security/cve/CVE-2016-3990 https://access.redhat.com/security/cve/CVE-2016-3991 https://access.redhat.com/security/cve/CVE-2016-5320 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXoNKeXlSAg2UNWIIRAsVZAJ940rmw6jTuzv+WQ7T1G+tfn9S1GQCgnVTY Fsfa3CmoWEoMPE+ZNQBpeTQ= =vyQ/ -----END PGP SIGNATURE----- --
  19. Hello Everyone, HiTech Legion has released a new article. Hopefully your readers will find it interesting. Review: Zotac GeForce GTX 1060 AMP Edition Review <http://www.hitechlegion.com/video-cards/48928-zotac-geforce-gtx-1060-amp-edition-review> ( -at -) HiTech Legion Snippet: /"The heart of the Zotac GTX 1060 AMP! Edition is the Nvidia GP106 GPU. What this GPU has done is finally put resolutions that are higher than 1080p into the hands of gamers who can’t afford the highest end graphics cards, but who still want to enjoy high quality visuals are decent framerates." / Article Url: http://www.hitechlegion.com/video-cards/48928-zotac-geforce-gtx-1060-amp-edition-review Image Url: http://www.hitechlegion.com/images/videocards/zotac_1060/zotac_gtx_1060_amp_box.jpg Thank You for Helping us grow and we would appreciate your future support.
  20. Press Invite: Dlodlo V1 VR Glasses NY Press Launch - World’s Lightest Portable Immersive VR Glasses View this email in your browser (http://us7.campaign-archive2.com/?u=ea42f2f1144c19c74ba3bc89b&id=313717dba4&e=0f97826edb) Invite below. Please RSVP by Wed if you haven't rsvped yet. Thanks - Karen --------------------------------------------------------- You’re Invited to the VR New World.. DLODLO V1 VIRTUAL REALITY GLASSES NY PRESS LAUNCH World’s Lightest Portable Immersive VR Glasses MONDAY, AUGUST 8^th, 2016 3:00 PM Marriott Marquis Times Square 1535 Broadway/between 45^th & 46^th St. 7th Floor, Astor Ballroom NY City Hors d'oeuvres & Cocktails Experience the World’s Lightest VR Glasses for Yourself RSVP: (mailto:kthomas ( -at -) thomaspr.com) Karen Thomas/Eva Yutani Thomas Public Relations, Inc. (631) 549-7575 kthomas ( -at -) thomaspr.com (mailto:kthomas ( -at -) thomaspr.com) / eyutani ( -at -) thomaspr.com (mailto:eyutani ( -at -) thomaspr.com) http://www.thomas-pr.com (http://www.thomas-pr.com/'>http://www.thomas-pr.com/) Info at: http://www.dlodlo.com (http://www.dlodlo.com/) ============================================================ ** (http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb_9SvT'>http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb_9SvT) ** Share (http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb_9SvT) ** (http://twitter.com/intent/tweet?text=Dlodlo+V1+VR+Glasses+NY+Press+Launch+Invite+-+World%E2%80%99s+Lightest+Portable+Immersive+Virtual+Reality+Glasses:'>http://twitter.com/intent/tweet?text=Dlodlo+V1+VR+Glasses+NY+Press+Launch+Invite+-+World%E2%80%99s+Lightest+Portable+Immersive+Virtual+Reality+Glasses: http%3A%2F%2Feepurl.com%2Fb_9SvT) ** Tweet (http://twitter.com/intent/tweet?text=Dlodlo+V1+VR+Glasses+NY+Press+Launch+Invite+-+World%E2%80%99s+Lightest+Portable+Immersive+Virtual+Reality+Glasses: http%3A%2F%2Feepurl.com%2Fb_9SvT) ** (http://us7.forward-to-friend1.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=313717dba4&e=0f97826edb'>http://us7.forward-to-friend1.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=313717dba4&e=0f97826edb) ** Forward (http://us7.forward-to-friend1.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=313717dba4&e=0f97826edb) ** (https://www.facebook.com/app_scoped_user_id/742740573/) ** (https://www.twitter.com/thomaspr/) ** (http://www.thomas-pr.com) Copyright © 2016 Thomas PR, All rights reserved.
  21. TITLE: Corsair ML Pro Series Review ( -at -) Vortez CONTENT: Corsair has finally released their ML series of PWM fans, in 120mm and 140mm. What makes these fans different is their bearings. They use magnetic levitation. In theory, these fans should never wear out. Both sizes have square frames, so they will fit handily on radiators. You can also use them as replacement fans for all in one coolers. Here we shall review Corsair's new ML Pro series. LINK: http://www.vortez.net/review.php?id=1192 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
  22. CentOS Errata and Security Advisory 2016:1547 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1547.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 1701fdf308e42109a8c84a4c28b88a189ac5013592f61651da3711909e4c02f2 libtiff-3.9.4-18.el6_8.i686.rpm 81877483ff255596cf278e47ec7d9248a8adaa3d36c5430e726e1d9e2cf99d84 libtiff-devel-3.9.4-18.el6_8.i686.rpm d436dbca6a7294667656eaabe5cfcf2169050b5e48003a1c66f67dfbc561e283 libtiff-static-3.9.4-18.el6_8.i686.rpm x86_64: 1701fdf308e42109a8c84a4c28b88a189ac5013592f61651da3711909e4c02f2 libtiff-3.9.4-18.el6_8.i686.rpm 9115b1a909b80cf146f972cc9e38adee45818bc5997571f4ba20dbe082717c90 libtiff-3.9.4-18.el6_8.x86_64.rpm 81877483ff255596cf278e47ec7d9248a8adaa3d36c5430e726e1d9e2cf99d84 libtiff-devel-3.9.4-18.el6_8.i686.rpm fedc1887876906e4ceef08a52a258872dbdb35c625fb9f5826e3b593b25ee7b2 libtiff-devel-3.9.4-18.el6_8.x86_64.rpm eb12631cde623b9be36d2c04b96f1e0794ea4a38e9c83de8a824b47fa68895c6 libtiff-static-3.9.4-18.el6_8.x86_64.rpm Source: cdcf05901d605fa2969161d91a724e57aa508f9f0a12cb55b50891bf9649cf41 libtiff-3.9.4-18.el6_8.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  23. SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1937-1 Rating: important References: #662458 #676471 #897662 #928547 #944309 #945345 #947337 #950998 #951844 #953048 #953233 #954847 #956491 #957805 #957986 #957990 #958390 #958463 #960857 #962742 #962846 #963762 #964727 #965087 #966245 #967640 #968667 #969016 #970114 #970506 #970604 #970609 #970948 #971049 #971770 #971947 #972124 #972933 #973378 #973499 #973570 #974165 #974308 #974620 #974646 #974692 #975533 #975772 #975788 #976739 #976821 #976868 #977417 #977582 #977685 #978401 #978469 #978527 #978822 #979169 #979213 #979347 #979419 #979485 #979489 #979521 #979548 #979867 #979879 #979922 #980246 #980348 #980371 #980706 #981038 #981143 #981344 #982282 #982354 #982544 #982698 #983143 #983213 #983318 #983394 #983721 #983904 #983977 #984148 #984456 #984755 #985232 #985978 #986362 #986569 #986572 #986811 #988215 #988498 #988552 Cross-References: CVE-2014-9717 CVE-2014-9904 CVE-2015-7833 CVE-2015-8539 CVE-2015-8551 CVE-2015-8552 CVE-2015-8845 CVE-2016-0758 CVE-2016-1583 CVE-2016-2053 CVE-2016-2847 CVE-2016-3672 CVE-2016-3707 CVE-2016-4470 CVE-2016-4482 CVE-2016-4486 CVE-2016-4565 CVE-2016-4569 CVE-2016-4578 CVE-2016-4805 CVE-2016-4997 CVE-2016-5244 CVE-2016-5828 CVE-2016-5829 Affected Products: SUSE Linux Enterprise Real Time Extension 12-SP1 ______________________________________________________________________________ An update that solves 24 vulnerabilities and has 76 fixes is now available. Description: The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.61 to receive various security and bugfixes. Main feature additions: - Improved support for Clustered File System (CephFS, fate#318586). The following security bugs were fixed: - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547). - CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811). - CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998). - CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463). - CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks (bnc#957990). - CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks (bnc#957990). - CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533). - CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867). - CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143). - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762). - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948). - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308). - CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246). - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755). - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401). - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822). - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548). - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213). - CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879). - CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362). - CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213). - CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569). - CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572). The following non-security bugs were fixed: - ALSA: hrtimer: Handle start/stop more properly (bsc#973378). - Add wait_event_cmd() (bsc#953048). - Btrfs: be more precise on errors when getting an inode from disk (bsc#981038). - Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685). - Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844). - Btrfs: do not use src fd for printk (bsc#980348). - Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685). - Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685). - Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685). - Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685). - Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685). - Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685). - Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038). - Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933). - Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844). - CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049). - CacheFiles: Handle object being killed before being set up (bsc#971049). - EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521). - EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521). - EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521). - EDAC/sb_edac: Fix computation of channel address (bsc#979521). - EDAC: Correct channel count limit (bsc#979521). - EDAC: Remove arbitrary limit on number of channels (bsc#979521). - EDAC: Use static attribute groups for managing sysfs entries (bsc#979521). - FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049). - FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049). - FS-Cache: Fix cancellation of in-progress operation (bsc#971049). - FS-Cache: Handle a new operation submitted against a killed object (bsc#971049). - FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049). - FS-Cache: Out of line fscache_operation_init() (bsc#971049). - FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049). - FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049). - FS-Cache: Reduce cookie ref count if submit fails (bsc#971049). - FS-Cache: Synchronise object death state change vs operation submission (bsc#971049). - FS-Cache: The operation cancellation method needs calling in more places (bsc#971049). - FS-Cache: Timeout for releasepage() (bsc#971049). - FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049). - FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049). - Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309) - Fix kabi issue (bsc#971049). - Input: i8042 - lower log level for "no controller" message (bsc#945345). - KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770). - MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491). - NVMe: Unify controller probe and resume (bsc#979347). - NVMe: init nvme queue before enabling irq (bsc#662458). - PCI/AER: Clear error status registers during enumeration and restore (bsc#985978). - Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469). - Revert "scsi: fix soft lockup in scsi_remove_target() on module removal" (bsc#970609). - SCSI: Increase REPORT_LUNS timeout (bsc#982282). - USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698). - Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference. - Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece. - Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570). - Use mainline variant of hyperv KVP IP failover patch (bnc#978527) - VSOCK: Fix lockdep issue (bsc#977417). - VSOCK: sock_put wasn't safe to call in interrupt context (bsc#977417). - Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739). - base: make module_create_drivers_dir race-free (bnc#983977). - block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124). - cachefiles: perform test on s_blocksize when opening cache file (bsc#971049). - cdc_ncm: workaround for EM7455 "silent" data interface (bnc#988552). - ceph fscache: Introduce a routine for uncaching single no data page from fscache. - ceph fscache: Uncaching no data page from fscache in readpage(). - ceph: Asynchronous IO support. - ceph: Avoid to propagate the invalid page point. - ceph: Clean up if error occurred in finish_read(). - ceph: EIO all operations after forced umount. - ceph: Implement writev/pwritev for sync operation. - ceph: Remove racey watch/notify event infrastructure (bsc#964727) - ceph: Remove racey watch/notify event infrastructure (bsc#964727) - ceph: add acl for cephfs. - ceph: add acl, noacl options for cephfs mount. - ceph: add get_name() NFS export callback. - ceph: add get_parent() NFS export callback. - ceph: add imported caps when handling cap export message. - ceph: add inline data to pagecache. - ceph: add missing init_acl() for mkdir() and atomic_open(). - ceph: add open export target session helper. - ceph: add request to i_unsafe_dirops when getting unsafe reply. - ceph: additional debugfs output. - ceph: always re-send cap flushes when MDS recovers. - ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps). - ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions). - ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync). - ceph: avoid releasing caps that are being used. - ceph: avoid sending unnessesary FLUSHSNAP message. - ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename(). - ceph: cast PAGE_SIZE to size_t in ceph_sync_write(). - ceph: ceph_frag_contains_value can be boolean. - ceph: ceph_get_parent() can be static. - ceph: check OSD caps before read/write. - ceph: check buffer size in ceph_vxattrcb_layout(). - ceph: check caps in filemap_fault and page_mkwrite. - ceph: check directory's completeness before emitting directory entry. - ceph: check inode caps in ceph_d_revalidate. - ceph: check unsupported fallocate mode. - ceph: check zero length in ceph_sync_read(). - ceph: checking for IS_ERR instead of NULL. - ceph: cleanup unsafe requests when reconnecting is denied. - ceph: cleanup use of ceph_msg_get. - ceph: clear directory's completeness when creating file. - ceph: convert inline data to normal data before data write. - ceph: do not assume r_old_dentry[_dir] always set together. - ceph: do not chain inode updates to parent fsync. - ceph: do not grabs open file reference for aborted request. - ceph: do not include ceph.{file,dir}.layout vxattr in listxattr(). - ceph: do not include used caps in cap_wanted. - ceph: do not invalidate page cache when inode is no longer used. - ceph: do not mark dirty caps when there is no auth cap. - ceph: do not pre-allocate space for cap release messages. - ceph: do not set r_old_dentry_dir on link(). - ceph: do not trim auth cap when there are cap snaps. - ceph: do not zero i_wrbuffer_ref when reconnecting is denied. - ceph: drop cap releases in requests composed before cap reconnect. - ceph: drop extra open file reference in ceph_atomic_open(). - ceph: drop unconnected inodes. - ceph: exclude setfilelock requests when calculating oldest tid. - ceph: export ceph_session_state_name function. - ceph: fetch inline data when getting Fcr cap refs. - ceph: fix __dcache_readdir(). - ceph: fix a comment typo. - ceph: fix append mode write. - ceph: fix atomic_open snapdir. - ceph: fix bool assignments. - ceph: fix cache revoke race. - ceph: fix ceph_dir_llseek(). - ceph: fix ceph_fh_to_parent(). - ceph: fix ceph_removexattr(). - ceph: fix ceph_set_acl(). - ceph: fix ceph_writepages_start(). - ceph: fix dcache/nocache mount option. - ceph: fix dentry leaks. - ceph: fix directory fsync. - ceph: fix divide-by-zero in __validate_layout(). - ceph: fix double page_unlock() in page_mkwrite(). - ceph: fix dout() compile warnings in ceph_filemap_fault(). - ceph: fix file lock interruption. - ceph: fix flush tid comparision. - ceph: fix flushing caps. - ceph: fix llistxattr on symlink. - ceph: fix message length computation. - ceph: fix mksnap crash. - ceph: fix null pointer dereference in send_mds_reconnect(). - ceph: fix pr_fmt() redefinition. - ceph: fix queuing inode to mdsdir's snaprealm. - ceph: fix reading inline data when i_size greater than PAGE_SIZE. - ceph: fix request time stamp encoding. - ceph: fix reset_readdir(). - ceph: fix setting empty extended attribute. - ceph: fix sizeof(struct tYpO *) typo. - ceph: fix snap context leak in error path. - ceph: fix trim caps. - ceph: fix uninline data function. - ceph: flush cap release queue when trimming session caps. - ceph: flush inline version. - ceph: forbid mandatory file lock. - ceph: fscache: Update object store limit after file writing. - ceph: fscache: Wait for completion of object initialization. - ceph: fscache: add an interface to synchronize object store limit. - ceph: get inode size for each append write. - ceph: handle -ESTALE reply. - ceph: handle SESSION_FORCE_RO message. - ceph: handle cap export race in try_flush_caps(). - ceph: handle cap import atomically. - ceph: handle frag mismatch between readdir request and reply. - ceph: handle race between cap reconnect and cap release. - ceph: handle session flush message. - ceph: hold on to exclusive caps on complete directories. - ceph: implement readv/preadv for sync operation. - ceph: improve readahead for file holes. - ceph: improve reference tracking for snaprealm. - ceph: include time stamp in every MDS request. - ceph: include time stamp in replayed MDS requests. - ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support. - ceph: initialize inode before instantiating dentry. - ceph: introduce a new inode flag indicating if cached dentries are ordered. - ceph: introduce ceph_fill_fragtree(). - ceph: introduce global empty snap context. - ceph: invalidate dirty pages after forced umount. - ceph: keep i_snap_realm while there are writers. - ceph: kstrdup() memory handling. - ceph: let MDS adjust readdir 'frag'. - ceph: make ceph_forget_all_cached_acls() static inline. - ceph: make fsync() wait unsafe requests that created/modified inode. - ceph: make sure syncfs flushes all cap snaps. - ceph: make sure write caps are registered with auth MDS. - ceph: match wait_for_completion_timeout return type. - ceph: message versioning fixes. - ceph: move ceph_find_inode() outside the s_mutex. - ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks. - ceph: no need to get parent inode in ceph_open. - ceph: parse inline data in MClientReply and MClientCaps. - ceph: pre-allocate ceph_cap struct for ceph_add_cap(). - ceph: pre-allocate data structure that tracks caps flushing. - ceph: preallocate buffer for readdir reply. - ceph: print inode number for LOOKUPINO request. - ceph: properly apply umask when ACL is enabled. - ceph: properly handle XATTR_CREATE and XATTR_REPLACE. - ceph: properly mark empty directory as complete. - ceph: properly release page upon error. - ceph: properly zero data pages for file holes. - ceph: provide seperate {inode,file}_operations for snapdir. - ceph: queue cap release in __ceph_remove_cap(). - ceph: queue vmtruncate if necessary when handing cap grant/revoke. - ceph: ratelimit warn messages for MDS closes session. - ceph: re-send AIO write request when getting -EOLDSNAP error. - ceph: re-send flushing caps (which are revoked) in reconnect stage. - ceph: re-send requests when MDS enters reconnecting stage. - ceph: refactor readpage_nounlock() to make the logic clearer. - ceph: remember subtree root dirfrag's auth MDS. - ceph: remove exported caps when handling cap import message. - ceph: remove outdated frag information. - ceph: remove redundant code for max file size verification. - ceph: remove redundant declaration. - ceph: remove redundant memset(0). - ceph: remove redundant test of head->safe and silence static analysis warnings. - ceph: remove the useless judgement. - ceph: remove unused functions in ceph_frag.h. - ceph: remove unused stringification macros. - ceph: remove useless ACL check. - ceph: remove xattr when null value is given to setxattr(). - ceph: rename snapshot support. - ceph: replace comma with a semicolon. - ceph: request xattrs if xattr_version is zero. - ceph: reserve caps for file layout/lock MDS requests. - ceph: reset r_resend_mds after receiving -ESTALE. - ceph: return error for traceless reply race. - ceph: rework dcache readdir. - ceph: send TID of the oldest pending caps flush to MDS. - ceph: send client metadata to MDS. - ceph: set caps count after composing cap reconnect message. - ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference. - ceph: set mds_wanted when MDS reply changes a cap to auth cap. - ceph: show nocephx_require_signatures and notcp_nodelay options. - ceph: show non-default options only. - ceph: simplify ceph_fh_to_dentry(). - ceph: simplify two mount_timeout sites. - ceph: skip invalid dentry during dcache readdir. - ceph: support inline data feature. - ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL. - ceph: sync read inline data. - ceph: take snap_rwsem when accessing snap realm's cached_context. - ceph: tolerate bad i_size for symlink inode (bsc#985232). - ceph: track pending caps flushing accurately. - ceph: track pending caps flushing globally. - ceph: trim unused inodes before reconnecting to recovering MDS. - ceph: trivial comment fix. - ceph: update i_max_size even if inode version does not change. - ceph: update inode fields according to issued caps. - ceph: use %zu for len in ceph_fill_inline_data(). - ceph: use ceph_seq_cmp() to compare migrate_seq. - ceph: use empty snap context for uninline_data and get_pool_perm. - ceph: use fl->fl_file as owner identifier of flock and posix lock. - ceph: use fl->fl_type to decide flock operation. - ceph: use fpos_cmp() to compare dentry positions. - ceph: use getattr request to fetch inline data. - ceph: use i_size_{read,write} to get/set i_size. - ceph: use msecs_to_jiffies for time conversion. - ceph: use pagelist to present MDS request data. - ceph: use truncate_pagecache() instead of truncate_inode_pages(). - ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure. - client: include kernel version in client metadata. - cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646). - crush: add chooseleaf_stable tunable. - crush: decode and initialize chooseleaf_stable. - crush: ensure bucket id is valid before indexing buckets array. - crush: ensure take bucket value is valid. - crush: fix crash from invalid 'take' argument. - crush: sync up with userspace. - crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390). - crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390). - drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904). - drm/mgag200: Add support for a new rev of G200e (bsc#983904). - drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904). - drm/mgag200: remove unused variables (bsc#983904). - drm: qxl: Workaround for buggy user-space (bsc#981344). - efifb: Add support for 64-bit frame buffer addresses (bsc#973499). - efifb: Fix 16 color palette entry calculation (bsc#983318). - efifb: Fix KABI of screen_info struct (bsc#973499). - ehci-pci: enable interrupt on BayTrail (bnc#947337). - enic: set netdev->vlan_features (bsc#966245). - fs/ceph/debugfs.c: replace seq_printf by seq_puts. - fs/ceph: replace pr_warning by pr_warn. - hid-elo: kill not flush the work (bnc#982354). - hv: util: Pass the channel information during the init call (bnc#978527). - hv: utils: Invoke the poll function after handshake (bnc#978527). - hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read(). - iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772). - ipvs: count pre-established TCP states as active (bsc#970114). - kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736). - kabi/severities: Allow changes in zpci_* symbols (bsc#974692) - kabi/severities: Whitelist libceph and rbd (bsc#964727). - kabi/severities: Whitelist libceph and rbd. - kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544). - kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846). - kgraft/gfs2: Do not block livepatching in the log daemon for too long. - kgraft/xen: Do not block livepatching in the XEN blkif kthread. - libceph: Avoid holding the zero page on ceph_msgr_slab_init errors. - libceph: Fix ceph_tcp_sendpage()'s more boolean usage. - libceph: MOSDOpReply v7 encoding. - libceph: Remove spurious kunmap() of the zero page. - libceph: a couple tweaks for wait loops. - libceph: add nocephx_sign_messages option. - libceph: advertise support for TUNABLES5. - libceph: advertise support for keepalive2. - libceph: allow setting osd_req_op's flags. - libceph: check data_len in ->alloc_msg(). - libceph: clear messenger auth_retry flag if we fault. - libceph: clear msg->con in ceph_msg_release() only. - libceph: do not access invalid memory in keepalive2 path. - libceph: do not spam dmesg with stray reply warnings. - libceph: drop authorizer check from cephx msg signing routines. - libceph: evaluate osd_req_op_data() arguments only once. - libceph: fix authorizer invalidation, take 2. - libceph: fix ceph_msg_revoke(). - libceph: fix wrong name "Ceph filesystem for Linux". - libceph: handle writefull for OSD op extent init (bsc#980706). - libceph: introduce ceph_x_authorizer_cleanup(). - libceph: invalidate AUTH in addition to a service ticket. - libceph: kill off ceph_x_ticket_handler::validity. - libceph: move ceph_file_layout helpers to ceph_fs.h. - libceph: msg signing callouts do not need con argument. - libceph: nuke time_sub(). - libceph: properly release STAT request's raw_data_in. - libceph: remove con argument in handle_reply(). - libceph: remove outdated comment. - libceph: remove the unused macro AES_KEY_SIZE. - libceph: rename con_work() to ceph_con_workfn(). - libceph: set 'exists' flag for newly up osd. - libceph: stop duplicating client fields in messenger. - libceph: store timeouts in jiffies, verify user input. - libceph: treat sockaddr_storage with uninitialized family as blank. - libceph: use keepalive2 to verify the mon session is alive. - libceph: use list_for_each_entry_safe. - libceph: use list_next_entry instead of list_entry_next. - libceph: use local variable cursor instead of msg->cursor. - libceph: use the right footer size when skipping a message. - libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846). - md/raid56: Do not perform reads to support writes until stripe is ready. - md/raid5: Ensure a batch member is not handled prematurely (bsc#953048). - md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE. - md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048). - md/raid5: allow the stripe_cache to grow and shrink (bsc#953048). - md/raid5: always set conf->prev_chunk_sectors and ->prev_algo (bsc#953048). - md/raid5: avoid races when changing cache size (bsc#953048). - md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048). - md/raid5: be more selective about distributing flags across batch (bsc#953048). - md/raid5: break stripe-batches when the array has failed (bsc#953048). - md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048). - md/raid5: change ->>inactive_blocked to a bit-flag (bsc#953048). - md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048). - md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048). - md/raid5: close recently introduced race in stripe_head management. - md/raid5: consider up[censored] reshape_position at start of reshape (bsc#953048). - md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048). - md/raid5: do not do chunk aligned read on degraded array (bsc#953048). - md/raid5: do not index beyond end of array in need_this_block() (bsc#953048). - md/raid5: do not let shrink_slab shrink too far (bsc#953048). - md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048). - md/raid5: ensure device failure recorded before write request returns (bsc#953048). - md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048). - md/raid5: fix allocation of 'scribble' array (bsc#953048). - md/raid5: fix another livelock caused by non-aligned writes (bsc#953048). - md/raid5: fix handling of degraded stripes in batches (bsc#953048). - md/raid5: fix init_stripe() inconsistencies (bsc#953048). - md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048). - md/raid5: fix newly-broken locking in get_active_stripe. - md/raid5: handle possible race as reshape completes (bsc#953048). - md/raid5: ignore released_stripes check (bsc#953048). - md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048). - md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048). - md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048). - md/raid5: need_this_block: tidy/fix last condition (bsc#953048). - md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048). - md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048). - md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048). - md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list. - md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048). - md/raid5: remove incorrect "min_t()" when calculating writepos (bsc#953048). - md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048). - md/raid5: separate large if clause out of fetch_block() (bsc#953048). - md/raid5: separate out the easy conditions in need_this_block (bsc#953048). - md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048). - md/raid5: strengthen check on reshape_position at run (bsc#953048). - md/raid5: switch to use conf->chunk_sectors in place of mddev->chunk_sectors where possible (bsc#953048). - md/raid5: use ->lock to protect accessing raid5 sysfs attributes (bsc#953048). - md/raid5: use bio_list for the list of bios to return (bsc#953048). - md: be careful when testing resync_max against curr_resync_completed (bsc#953048). - md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048). - md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048). - md: remove unwanted white space from md.c (bsc#953048). - md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048). - mds: check cap ID when handling cap export message. - mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721). - mmc: sdhci: Allow for irq being shared (bnc#977582). - mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640). - net/qlge: Avoids recursive EEH error (bsc#954847). - net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667). - net: Start with correct mac_len in skb_network_protocol (bsc#968667). - net: disable fragment reassembly if high_thresh is set to zero (bsc#970506). - net: fix wrong mac_len calculation for vlans (bsc#968667). - netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544). - netfilter: bridge: do not leak skb in error paths (bsc#982544). - netfilter: bridge: forward IPv6 fragmented packets (bsc#982544). - nvme: do not poll the CQ from the kthread (bsc#975788, bsc#965087). - nvme: fix max_segments integer truncation (bsc#676471). - ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947). - ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947). - ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947). - perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489). - perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489). - powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc ( -at -) 976821). - powerpc/book3s64: Remove __end_handlers marker (bsc#976821). - qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590). - raid5: Retry R5_ReadNoMerge flag when hit a read error. - raid5: add a new flag to track if a stripe can be batched (bsc#953048). - raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048). - raid5: avoid release list until last reference of the stripe (bsc#953048). - raid5: batch adjacent full stripe write (bsc#953048). - raid5: check faulty flag for array status during recovery (bsc#953048). - raid5: check_reshape() shouldn't call mddev_suspend (bsc#953048). - raid5: fix a race of stripe count check. - raid5: fix broken async operation chain (bsc#953048). - raid5: get_active_stripe avoids device_lock. - raid5: handle expansion/resync case with stripe batching (bsc#953048). - raid5: handle io error of batch list (bsc#953048). - raid5: make_request does less prepare wait. - raid5: relieve lock contention in get_active_stripe(). - raid5: relieve lock contention in get_active_stripe(). - raid5: revert e9e4c377e2f563 to fix a livelock (bsc#953048). - raid5: speedup sync_request processing (bsc#953048). - raid5: track overwrite disk count (bsc#953048). - raid5: update analysis state for failed stripe (bsc#953048). - raid5: use flex_array for scribble data (bsc#953048). - rbd: bump queue_max_segments. - rbd: delete an unnecessary check before rbd_dev_destroy(). - rbd: do not free rbd_dev outside of the release callback. - rbd: do not put snap_context twice in rbd_queue_workfn(). - rbd: drop null test before destroy functions. - rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394). - rbd: plug rbd_dev->header.object_prefix memory leak. - rbd: rbd_wq comment is obsolete. - rbd: remove duplicate calls to rbd_dev_mapping_clear(). - rbd: report unsupported features to syslog (bsc#979169). - rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails. - rbd: set device_type::release instead of device::release. - rbd: set max_sectors explicitly. - rbd: store rbd_options in rbd_device. - rbd: terminate rbd_opts_tokens with Opt_err. - rbd: timeout watch teardown on unmap with mount_timeout. - rbd: use writefull op for object size writes. - rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c. - s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736). - s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736). - s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736). - s390/3270: fix view reference counting (bnc#979922, LTC#141736). - s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736). - s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736). - s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456). - s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445). - s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445). - s390/pci: extract software counters from fmb (bnc#974692, LTC#139445). - s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444). - s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401). - s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442). - s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442). - s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442). - s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106). - s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138). - sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521). - sb_edac: Fix support for systems with two home agents per socket (bsc#979521). - sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521). - sb_edac: look harder for DDRIO on Haswell systems (bsc#979521). - sb_edac: support for Broadwell -EP and -EX (bsc#979521). - sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498). - sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498). - sched/x86: Fix up typo in topology detection (bsc#974165). - sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498). - scsi-bnx2fc-handle_scsi_retry_delay - scsi-bnx2fc-soft_lockup_when_rmmod - scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016). - sd: get disk reference in sd_check_events() (bnc#897662). - target/rbd: do not put snap_context twice (bsc#981143). - target/rbd: do not put snap_context twice (bsc#981143). - target/rbd: remove caw_mutex usage (bsc#981143). - target/rbd: remove caw_mutex usage (bsc#981143). - usb: quirk to stop runtime PM for Intel 7260 (bnc#984456). - vgaarb: Add more context to error messages (bsc#976868). - wait: introduce wait_event_exclusive_cmd (bsc#953048). - x86 EDAC, sb_edac.c: Repair damage introduced when "fixing" channel address (bsc#979521). - x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521). - x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165). - x86/efi: parse_efi_setup() build fix (bsc#979485). - x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620). - x86: standardize mmap_rnd() usage (bnc#974308). - xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604). - xfs: fix premature enospc on inode allocation (bsc#984148). - xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148). - xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time Extension 12-SP1: zypper in -t patch SUSE-SLE-RT-12-SP1-2016-1133=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time Extension 12-SP1 (x86_64): kernel-compute-3.12.61-60.18.1 kernel-compute-base-3.12.61-60.18.1 kernel-compute-base-debuginfo-3.12.61-60.18.1 kernel-compute-debuginfo-3.12.61-60.18.1 kernel-compute-debugsource-3.12.61-60.18.1 kernel-compute-devel-3.12.61-60.18.1 kernel-compute_debug-debuginfo-3.12.61-60.18.1 kernel-compute_debug-debugsource-3.12.61-60.18.1 kernel-compute_debug-devel-3.12.61-60.18.1 kernel-compute_debug-devel-debuginfo-3.12.61-60.18.1 kernel-rt-3.12.61-60.18.1 kernel-rt-base-3.12.61-60.18.1 kernel-rt-base-debuginfo-3.12.61-60.18.1 kernel-rt-debuginfo-3.12.61-60.18.1 kernel-rt-debugsource-3.12.61-60.18.1 kernel-rt-devel-3.12.61-60.18.1 kernel-rt_debug-debuginfo-3.12.61-60.18.1 kernel-rt_debug-debugsource-3.12.61-60.18.1 kernel-rt_debug-devel-3.12.61-60.18.1 kernel-rt_debug-devel-debuginfo-3.12.61-60.18.1 kernel-syms-rt-3.12.61-60.18.1 - SUSE Linux Enterprise Real Time Extension 12-SP1 (noarch): kernel-devel-rt-3.12.61-60.18.1 kernel-source-rt-3.12.61-60.18.1 References: https://www.suse.com/security/cve/CVE-2014-9717.html https://www.suse.com/security/cve/CVE-2014-9904.html https://www.suse.com/security/cve/CVE-2015-7833.html https://www.suse.com/security/cve/CVE-2015-8539.html https://www.suse.com/security/cve/CVE-2015-8551.html https://www.suse.com/security/cve/CVE-2015-8552.html https://www.suse.com/security/cve/CVE-2015-8845.html https://www.suse.com/security/cve/CVE-2016-0758.html https://www.suse.com/security/cve/CVE-2016-1583.html https://www.suse.com/security/cve/CVE-2016-2053.html https://www.suse.com/security/cve/CVE-2016-2847.html https://www.suse.com/security/cve/CVE-2016-3672.html https://www.suse.com/security/cve/CVE-2016-3707.html https://www.suse.com/security/cve/CVE-2016-4470.html https://www.suse.com/security/cve/CVE-2016-4482.html https://www.suse.com/security/cve/CVE-2016-4486.html https://www.suse.com/security/cve/CVE-2016-4565.html https://www.suse.com/security/cve/CVE-2016-4569.html https://www.suse.com/security/cve/CVE-2016-4578.html https://www.suse.com/security/cve/CVE-2016-4805.html https://www.suse.com/security/cve/CVE-2016-4997.html https://www.suse.com/security/cve/CVE-2016-5244.html https://www.suse.com/security/cve/CVE-2016-5828.html https://www.suse.com/security/cve/CVE-2016-5829.html https://bugzilla.suse.com/662458 https://bugzilla.suse.com/676471 https://bugzilla.suse.com/897662 https://bugzilla.suse.com/928547 https://bugzilla.suse.com/944309 https://bugzilla.suse.com/945345 https://bugzilla.suse.com/947337 https://bugzilla.suse.com/950998 https://bugzilla.suse.com/951844 https://bugzilla.suse.com/953048 https://bugzilla.suse.com/953233 https://bugzilla.suse.com/954847 https://bugzilla.suse.com/956491 https://bugzilla.suse.com/957805 https://bugzilla.suse.com/957986 https://bugzilla.suse.com/957990 https://bugzilla.suse.com/958390 https://bugzilla.suse.com/958463 https://bugzilla.suse.com/960857 https://bugzilla.suse.com/962742 https://bugzilla.suse.com/962846 https://bugzilla.suse.com/963762 https://bugzilla.suse.com/964727 https://bugzilla.suse.com/965087 https://bugzilla.suse.com/966245 https://bugzilla.suse.com/967640 https://bugzilla.suse.com/968667 https://bugzilla.suse.com/969016 https://bugzilla.suse.com/970114 https://bugzilla.suse.com/970506 https://bugzilla.suse.com/970604 https://bugzilla.suse.com/970609 https://bugzilla.suse.com/970948 https://bugzilla.suse.com/971049 https://bugzilla.suse.com/971770 https://bugzilla.suse.com/971947 https://bugzilla.suse.com/972124 https://bugzilla.suse.com/972933 https://bugzilla.suse.com/973378 https://bugzilla.suse.com/973499 https://bugzilla.suse.com/973570 https://bugzilla.suse.com/974165 https://bugzilla.suse.com/974308 https://bugzilla.suse.com/974620 https://bugzilla.suse.com/974646 https://bugzilla.suse.com/974692 https://bugzilla.suse.com/975533 https://bugzilla.suse.com/975772 https://bugzilla.suse.com/975788 https://bugzilla.suse.com/976739 https://bugzilla.suse.com/976821 https://bugzilla.suse.com/976868 https://bugzilla.suse.com/977417 https://bugzilla.suse.com/977582 https://bugzilla.suse.com/977685 https://bugzilla.suse.com/978401 https://bugzilla.suse.com/978469 https://bugzilla.suse.com/978527 https://bugzilla.suse.com/978822 https://bugzilla.suse.com/979169 https://bugzilla.suse.com/979213 https://bugzilla.suse.com/979347 https://bugzilla.suse.com/979419 https://bugzilla.suse.com/979485 https://bugzilla.suse.com/979489 https://bugzilla.suse.com/979521 https://bugzilla.suse.com/979548 https://bugzilla.suse.com/979867 https://bugzilla.suse.com/979879 https://bugzilla.suse.com/979922 https://bugzilla.suse.com/980246 https://bugzilla.suse.com/980348 https://bugzilla.suse.com/980371 https://bugzilla.suse.com/980706 https://bugzilla.suse.com/981038 https://bugzilla.suse.com/981143 https://bugzilla.suse.com/981344 https://bugzilla.suse.com/982282 https://bugzilla.suse.com/982354 https://bugzilla.suse.com/982544 https://bugzilla.suse.com/982698 https://bugzilla.suse.com/983143 https://bugzilla.suse.com/983213 https://bugzilla.suse.com/983318 https://bugzilla.suse.com/983394 https://bugzilla.suse.com/983721 https://bugzilla.suse.com/983904 https://bugzilla.suse.com/983977 https://bugzilla.suse.com/984148 https://bugzilla.suse.com/984456 https://bugzilla.suse.com/984755 https://bugzilla.suse.com/985232 https://bugzilla.suse.com/985978 https://bugzilla.suse.com/986362 https://bugzilla.suse.com/986569 https://bugzilla.suse.com/986572 https://bugzilla.suse.com/986811 https://bugzilla.suse.com/988215 https://bugzilla.suse.com/988498 https://bugzilla.suse.com/988552 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  24. SUSE Security Update: Security update for bsdtar ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1939-1 Rating: important References: #920870 #984990 #985609 #985669 #985675 #985682 #985698 Cross-References: CVE-2015-2304 CVE-2015-8918 CVE-2015-8920 CVE-2015-8921 CVE-2015-8924 CVE-2015-8929 CVE-2016-4809 Affected Products: SUSE Studio Onsite 1.3 SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: bsdtar was updated to fix seven security issues. These security issues were fixed: - CVE-2015-8929: Memory leak in tar parser (bsc#985669). - CVE-2016-4809: Memory allocate error with symbolic links in cpio archives (bsc#984990). - CVE-2015-8920: Stack out of bounds read in ar parser (bsc#985675). - CVE-2015-8921: Global out of bounds read in mtree parser (bsc#985682). - CVE-2015-8924: Heap buffer read overflow in tar (bsc#985609). - CVE-2015-8918: Overlapping memcpy in CAB parser (bsc#985698). - CVE-2015-2304: Reject absolute paths in input mode of bsdcpio exactly when '..' is rejected (bsc#920870). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-bsdtar-12672=1 - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-bsdtar-12672=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-bsdtar-12672=1 - SUSE Manager 2.1: zypper in -t patch sleman21-bsdtar-12672=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-bsdtar-12672=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-bsdtar-12672=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-bsdtar-12672=1 - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-bsdtar-12672=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-bsdtar-12672=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-bsdtar-12672=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64): libarchive-devel-2.5.5-9.1 - SUSE OpenStack Cloud 5 (x86_64): libarchive2-2.5.5-9.1 - SUSE Manager Proxy 2.1 (x86_64): libarchive2-2.5.5-9.1 - SUSE Manager 2.1 (s390x x86_64): libarchive2-2.5.5-9.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libarchive-devel-2.5.5-9.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libarchive2-2.5.5-9.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): libarchive2-2.5.5-9.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): libarchive2-2.5.5-9.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): libarchive2-2.5.5-9.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): bsdtar-debuginfo-2.5.5-9.1 bsdtar-debugsource-2.5.5-9.1 References: https://www.suse.com/security/cve/CVE-2015-2304.html https://www.suse.com/security/cve/CVE-2015-8918.html https://www.suse.com/security/cve/CVE-2015-8920.html https://www.suse.com/security/cve/CVE-2015-8921.html https://www.suse.com/security/cve/CVE-2015-8924.html https://www.suse.com/security/cve/CVE-2015-8929.html https://www.suse.com/security/cve/CVE-2016-4809.html https://bugzilla.suse.com/920870 https://bugzilla.suse.com/984990 https://bugzilla.suse.com/985609 https://bugzilla.suse.com/985669 https://bugzilla.suse.com/985675 https://bugzilla.suse.com/985682 https://bugzilla.suse.com/985698 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  25. 20 of the Worst PC Setups – July 2016 ( -at -) ThinkComputers.org Article Link: http://www.thinkcomputers.org/20-of-the-worst-pc-setups-july-2016/ Image URL: http://www.thinkcomputers.org/articles/worstpc-july16-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/worstpc-july16-small.jpg Quote: "I’m sure at some point you’ve had a bad PC setup. Maybe moving into a new place, waiting for a new desk to arrive or you just ran out of room. I can remember my horrible PC setups from when I was living at the dorms in college. If you have ever ventured over to the Shitty Battlestations sub-reddit you will find a lot of horrible PC setups. We will are going to pick 20 each month and feature them as 20 of the Worst PC setups for that month. Here are some of the bad ones from July!"
×