Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1865-1 Rating: important References: #989901 Cross-References: CVE-2016-1705 CVE-2016-1706 CVE-2016-1707 CVE-2016-1708 CVE-2016-1709 CVE-2016-1710 CVE-2016-1711 CVE-2016-5127 CVE-2016-5128 CVE-2016-5129 CVE-2016-5130 CVE-2016-5131 CVE-2016-5132 CVE-2016-5133 CVE-2016-5134 CVE-2016-5135 CVE-2016-5136 CVE-2016-5137 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes 18 vulnerabilities is now available. Description: Chromium was updated to 52.0.2743.82 to fix the following security issues (boo#989901): - CVE-2016-1706: Sandbox escape in PPAPI - CVE-2016-1707: URL spoofing on iOS - CVE-2016-1708: Use-after-free in Extensions - CVE-2016-1709: Heap-buffer-overflow in sfntly - CVE-2016-1710: Same-origin bypass in Blink - CVE-2016-1711: Same-origin bypass in Blink - CVE-2016-5127: Use-after-free in Blink - CVE-2016-5128: Same-origin bypass in V8 - CVE-2016-5129: Memory corruption in V8 - CVE-2016-5130: URL spoofing - CVE-2016-5131: Use-after-free in libxml - CVE-2016-5132: Limited same-origin bypass in Service Workers - CVE-2016-5133: Origin confusion in proxy authentication - CVE-2016-5134: URL leakage via PAC script - CVE-2016-5135: Content-Security-Policy bypass - CVE-2016-5136: Use after free in extensions - CVE-2016-5137: History sniffing with HSTS and CSP - CVE-2016-1705: Various fixes from internal audits, fuzzing and other initiatives Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-901=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): chromedriver-52.0.2743.82-111.1 chromium-52.0.2743.82-111.1 chromium-desktop-gnome-52.0.2743.82-111.1 chromium-desktop-kde-52.0.2743.82-111.1 chromium-ffmpegsumo-52.0.2743.82-111.1 - openSUSE 13.2 (x86_64): chromedriver-debuginfo-52.0.2743.82-111.1 chromium-debuginfo-52.0.2743.82-111.1 chromium-debugsource-52.0.2743.82-111.1 chromium-ffmpegsumo-debuginfo-52.0.2743.82-111.1 References: https://www.suse.com/security/cve/CVE-2016-1705.html https://www.suse.com/security/cve/CVE-2016-1706.html https://www.suse.com/security/cve/CVE-2016-1707.html https://www.suse.com/security/cve/CVE-2016-1708.html https://www.suse.com/security/cve/CVE-2016-1709.html https://www.suse.com/security/cve/CVE-2016-1710.html https://www.suse.com/security/cve/CVE-2016-1711.html https://www.suse.com/security/cve/CVE-2016-5127.html https://www.suse.com/security/cve/CVE-2016-5128.html https://www.suse.com/security/cve/CVE-2016-5129.html https://www.suse.com/security/cve/CVE-2016-5130.html https://www.suse.com/security/cve/CVE-2016-5131.html https://www.suse.com/security/cve/CVE-2016-5132.html https://www.suse.com/security/cve/CVE-2016-5133.html https://www.suse.com/security/cve/CVE-2016-5134.html https://www.suse.com/security/cve/CVE-2016-5135.html https://www.suse.com/security/cve/CVE-2016-5136.html https://www.suse.com/security/cve/CVE-2016-5137.html https://bugzilla.suse.com/989901 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mysql55-mysql security update Advisory ID: RHSA-2016:1480-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1480.html Issue date: 2016-07-25 CVE Names: CVE-2015-4792 CVE-2015-4802 CVE-2015-4815 CVE-2015-4826 CVE-2015-4830 CVE-2015-4836 CVE-2015-4858 CVE-2015-4861 CVE-2015-4870 CVE-2015-4913 CVE-2016-0505 CVE-2016-0546 CVE-2016-0596 CVE-2016-0597 CVE-2016-0598 CVE-2016-0600 CVE-2016-0606 CVE-2016-0608 CVE-2016-0609 CVE-2016-0616 CVE-2016-0640 CVE-2016-0641 CVE-2016-0642 CVE-2016-0643 CVE-2016-0644 CVE-2016-0646 CVE-2016-0647 CVE-2016-0648 CVE-2016-0649 CVE-2016-0650 CVE-2016-0651 CVE-2016-0666 CVE-2016-2047 CVE-2016-3452 CVE-2016-3471 CVE-2016-3477 CVE-2016-3521 CVE-2016-3615 CVE-2016-5440 CVE-2016-5444 ===================================================================== 1. Summary: An update for mysql55-mysql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon, mysqld, and many client programs. The following packages have been upgraded to a newer upstream version: mysql55-mysql (5.5.50). Security Fix(es): * This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pages, listed in the References section. (CVE-2015-4792, CVE-2015-4802, CVE-2015-4815, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4870, CVE-2015-4913, CVE-2016-0505, CVE-2016-0546, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0606, CVE-2016-0608, CVE-2016-0609, CVE-2016-0616, CVE-2016-0640, CVE-2016-0641, CVE-2016-0642, CVE-2016-0643, CVE-2016-0644, CVE-2016-0646, CVE-2016-0647, CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0651, CVE-2016-0666, CVE-2016-2047, CVE-2016-3452, CVE-2016-3471, CVE-2016-3477, CVE-2016-3521, CVE-2016-3615, CVE-2016-5440, CVE-2016-5444) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the MySQL server daemon (mysqld) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1274752 - CVE-2015-4792 mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) 1274756 - CVE-2015-4802 mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) 1274759 - CVE-2015-4815 mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) 1274766 - CVE-2015-4826 mysql: unspecified vulnerability related to Server:Types (CPU October 2015) 1274767 - CVE-2015-4830 mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) 1274771 - CVE-2015-4836 mysql: unspecified vulnerability related to Server:SP (CPU October 2015) 1274773 - CVE-2015-4858 mysql: unspecified vulnerability related to Server:DML (CPU October 2015) 1274776 - CVE-2015-4861 mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) 1274781 - CVE-2015-4870 mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) 1274794 - CVE-2015-4913 mysql: unspecified vulnerability related to Server:DML (CPU October 2015) 1301492 - CVE-2016-0505 mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) 1301493 - CVE-2016-0546 mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) 1301496 - CVE-2016-0596 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) 1301497 - CVE-2016-0597 mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) 1301498 - CVE-2016-0598 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) 1301501 - CVE-2016-0600 mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) 1301504 - CVE-2016-0606 mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) 1301506 - CVE-2016-0608 mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) 1301507 - CVE-2016-0609 mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) 1301510 - CVE-2016-0616 mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) 1301874 - CVE-2016-2047 mysql: ssl-validate-cert incorrect hostname check 1329239 - CVE-2016-0640 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) 1329241 - CVE-2016-0641 mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU April 2016) 1329243 - CVE-2016-0642 mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) 1329245 - CVE-2016-0643 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) 1329247 - CVE-2016-0644 mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) 1329248 - CVE-2016-0646 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) 1329249 - CVE-2016-0647 mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) 1329251 - CVE-2016-0648 mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) 1329252 - CVE-2016-0649 mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) 1329253 - CVE-2016-0650 mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) 1329254 - CVE-2016-0651 mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) 1329270 - CVE-2016-0666 mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) 1358201 - CVE-2016-3452 mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) 1358203 - CVE-2016-3471 mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) 1358205 - CVE-2016-3477 mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016) 1358209 - CVE-2016-3521 mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016) 1358212 - CVE-2016-3615 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016) 1358218 - CVE-2016-5440 mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016) 1358223 - CVE-2016-5444 mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016) 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: mysql55-mysql-5.5.50-1.el6.src.rpm x86_64: mysql55-mysql-5.5.50-1.el6.x86_64.rpm mysql55-mysql-bench-5.5.50-1.el6.x86_64.rpm mysql55-mysql-debuginfo-5.5.50-1.el6.x86_64.rpm mysql55-mysql-devel-5.5.50-1.el6.x86_64.rpm mysql55-mysql-libs-5.5.50-1.el6.x86_64.rpm mysql55-mysql-server-5.5.50-1.el6.x86_64.rpm mysql55-mysql-test-5.5.50-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: mysql55-mysql-5.5.50-1.el6.src.rpm x86_64: mysql55-mysql-5.5.50-1.el6.x86_64.rpm mysql55-mysql-bench-5.5.50-1.el6.x86_64.rpm mysql55-mysql-debuginfo-5.5.50-1.el6.x86_64.rpm mysql55-mysql-devel-5.5.50-1.el6.x86_64.rpm mysql55-mysql-libs-5.5.50-1.el6.x86_64.rpm mysql55-mysql-server-5.5.50-1.el6.x86_64.rpm mysql55-mysql-test-5.5.50-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7): Source: mysql55-mysql-5.5.50-1.el6.src.rpm x86_64: mysql55-mysql-5.5.50-1.el6.x86_64.rpm mysql55-mysql-bench-5.5.50-1.el6.x86_64.rpm mysql55-mysql-debuginfo-5.5.50-1.el6.x86_64.rpm mysql55-mysql-devel-5.5.50-1.el6.x86_64.rpm mysql55-mysql-libs-5.5.50-1.el6.x86_64.rpm mysql55-mysql-server-5.5.50-1.el6.x86_64.rpm mysql55-mysql-test-5.5.50-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: mysql55-mysql-5.5.50-1.el6.src.rpm x86_64: mysql55-mysql-5.5.50-1.el6.x86_64.rpm mysql55-mysql-bench-5.5.50-1.el6.x86_64.rpm mysql55-mysql-debuginfo-5.5.50-1.el6.x86_64.rpm mysql55-mysql-devel-5.5.50-1.el6.x86_64.rpm mysql55-mysql-libs-5.5.50-1.el6.x86_64.rpm mysql55-mysql-server-5.5.50-1.el6.x86_64.rpm mysql55-mysql-test-5.5.50-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: mysql55-mysql-5.5.50-1.el7.src.rpm x86_64: mysql55-mysql-5.5.50-1.el7.x86_64.rpm mysql55-mysql-bench-5.5.50-1.el7.x86_64.rpm mysql55-mysql-debuginfo-5.5.50-1.el7.x86_64.rpm mysql55-mysql-devel-5.5.50-1.el7.x86_64.rpm mysql55-mysql-libs-5.5.50-1.el7.x86_64.rpm mysql55-mysql-server-5.5.50-1.el7.x86_64.rpm mysql55-mysql-test-5.5.50-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: mysql55-mysql-5.5.50-1.el7.src.rpm x86_64: mysql55-mysql-5.5.50-1.el7.x86_64.rpm mysql55-mysql-bench-5.5.50-1.el7.x86_64.rpm mysql55-mysql-debuginfo-5.5.50-1.el7.x86_64.rpm mysql55-mysql-devel-5.5.50-1.el7.x86_64.rpm mysql55-mysql-libs-5.5.50-1.el7.x86_64.rpm mysql55-mysql-server-5.5.50-1.el7.x86_64.rpm mysql55-mysql-test-5.5.50-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: mysql55-mysql-5.5.50-1.el7.src.rpm x86_64: mysql55-mysql-5.5.50-1.el7.x86_64.rpm mysql55-mysql-bench-5.5.50-1.el7.x86_64.rpm mysql55-mysql-debuginfo-5.5.50-1.el7.x86_64.rpm mysql55-mysql-devel-5.5.50-1.el7.x86_64.rpm mysql55-mysql-libs-5.5.50-1.el7.x86_64.rpm mysql55-mysql-server-5.5.50-1.el7.x86_64.rpm mysql55-mysql-test-5.5.50-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: mysql55-mysql-5.5.50-1.el7.src.rpm x86_64: mysql55-mysql-5.5.50-1.el7.x86_64.rpm mysql55-mysql-bench-5.5.50-1.el7.x86_64.rpm mysql55-mysql-debuginfo-5.5.50-1.el7.x86_64.rpm mysql55-mysql-devel-5.5.50-1.el7.x86_64.rpm mysql55-mysql-libs-5.5.50-1.el7.x86_64.rpm mysql55-mysql-server-5.5.50-1.el7.x86_64.rpm mysql55-mysql-test-5.5.50-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-4792 https://access.redhat.com/security/cve/CVE-2015-4802 https://access.redhat.com/security/cve/CVE-2015-4815 https://access.redhat.com/security/cve/CVE-2015-4826 https://access.redhat.com/security/cve/CVE-2015-4830 https://access.redhat.com/security/cve/CVE-2015-4836 https://access.redhat.com/security/cve/CVE-2015-4858 https://access.redhat.com/security/cve/CVE-2015-4861 https://access.redhat.com/security/cve/CVE-2015-4870 https://access.redhat.com/security/cve/CVE-2015-4913 https://access.redhat.com/security/cve/CVE-2016-0505 https://access.redhat.com/security/cve/CVE-2016-0546 https://access.redhat.com/security/cve/CVE-2016-0596 https://access.redhat.com/security/cve/CVE-2016-0597 https://access.redhat.com/security/cve/CVE-2016-0598 https://access.redhat.com/security/cve/CVE-2016-0600 https://access.redhat.com/security/cve/CVE-2016-0606 https://access.redhat.com/security/cve/CVE-2016-0608 https://access.redhat.com/security/cve/CVE-2016-0609 https://access.redhat.com/security/cve/CVE-2016-0616 https://access.redhat.com/security/cve/CVE-2016-0640 https://access.redhat.com/security/cve/CVE-2016-0641 https://access.redhat.com/security/cve/CVE-2016-0642 https://access.redhat.com/security/cve/CVE-2016-0643 https://access.redhat.com/security/cve/CVE-2016-0644 https://access.redhat.com/security/cve/CVE-2016-0646 https://access.redhat.com/security/cve/CVE-2016-0647 https://access.redhat.com/security/cve/CVE-2016-0648 https://access.redhat.com/security/cve/CVE-2016-0649 https://access.redhat.com/security/cve/CVE-2016-0650 https://access.redhat.com/security/cve/CVE-2016-0651 https://access.redhat.com/security/cve/CVE-2016-0666 https://access.redhat.com/security/cve/CVE-2016-2047 https://access.redhat.com/security/cve/CVE-2016-3452 https://access.redhat.com/security/cve/CVE-2016-3471 https://access.redhat.com/security/cve/CVE-2016-3477 https://access.redhat.com/security/cve/CVE-2016-3521 https://access.redhat.com/security/cve/CVE-2016-3615 https://access.redhat.com/security/cve/CVE-2016-5440 https://access.redhat.com/security/cve/CVE-2016-5444 https://access.redhat.com/security/updates/classification/#important http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixMSQL https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-48.html https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-49.html https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-50.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXldXlXlSAg2UNWIIRAkJ4AJ0bP0tGYsDHtfMVokekaUz6j3M1xgCfd4Cj 5cGIM0LEN9PAfI6wHwWQD2Y= =/zx2 -----END PGP SIGNATURE----- --
  3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: mariadb55-mariadb security update Advisory ID: RHSA-2016:1481-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1481.html Issue date: 2016-07-25 CVE Names: CVE-2015-4792 CVE-2015-4802 CVE-2015-4815 CVE-2015-4816 CVE-2015-4819 CVE-2015-4826 CVE-2015-4830 CVE-2015-4836 CVE-2015-4858 CVE-2015-4861 CVE-2015-4870 CVE-2015-4879 CVE-2015-4913 CVE-2016-0505 CVE-2016-0546 CVE-2016-0596 CVE-2016-0597 CVE-2016-0598 CVE-2016-0600 CVE-2016-0606 CVE-2016-0608 CVE-2016-0609 CVE-2016-0616 CVE-2016-0640 CVE-2016-0641 CVE-2016-0642 CVE-2016-0643 CVE-2016-0644 CVE-2016-0646 CVE-2016-0647 CVE-2016-0648 CVE-2016-0649 CVE-2016-0650 CVE-2016-0651 CVE-2016-0666 CVE-2016-2047 CVE-2016-3452 CVE-2016-3471 CVE-2016-5444 ===================================================================== 1. Summary: An update for mariadb55-mariadb is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: MariaDB is a multi-user, multi-threaded SQL database server. For all practical purposes, MariaDB is binary-compatible with MySQL. The following packages have been upgraded to a newer upstream version: mariadb55-mariadb (5.5.49). Security Fix(es): * It was found that the MariaDB client library did not properly check host names against server identities noted in the X.509 certificates when establishing secure connections using TLS/SSL. A man-in-the-middle attacker could possibly use this flaw to impersonate a server to a client. (CVE-2016-2047) * This update fixes several vulnerabilities in the MariaDB database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pages, listed in the References section. (CVE-2015-4792, CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4870, CVE-2015-4879, CVE-2015-4913, CVE-2016-0505, CVE-2016-0546, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0606, CVE-2016-0608, CVE-2016-0609, CVE-2016-0616, CVE-2016-0640, CVE-2016-0641, CVE-2016-0642, CVE-2016-0643, CVE-2016-0644, CVE-2016-0646, CVE-2016-0647, CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0651, CVE-2016-0666, CVE-2016-3452, CVE-2016-3471, CVE-2016-5444) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1274752 - CVE-2015-4792 mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) 1274756 - CVE-2015-4802 mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) 1274759 - CVE-2015-4815 mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) 1274761 - CVE-2015-4816 mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) 1274764 - CVE-2015-4819 mysql: unspecified vulnerability related to Client programs (CPU October 2015) 1274766 - CVE-2015-4826 mysql: unspecified vulnerability related to Server:Types (CPU October 2015) 1274767 - CVE-2015-4830 mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) 1274771 - CVE-2015-4836 mysql: unspecified vulnerability related to Server:SP (CPU October 2015) 1274773 - CVE-2015-4858 mysql: unspecified vulnerability related to Server:DML (CPU October 2015) 1274776 - CVE-2015-4861 mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) 1274781 - CVE-2015-4870 mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) 1274783 - CVE-2015-4879 mysql: unspecified vulnerability related to Server:DML (CPU October 2015) 1274794 - CVE-2015-4913 mysql: unspecified vulnerability related to Server:DML (CPU October 2015) 1301492 - CVE-2016-0505 mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) 1301493 - CVE-2016-0546 mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) 1301496 - CVE-2016-0596 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) 1301497 - CVE-2016-0597 mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) 1301498 - CVE-2016-0598 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) 1301501 - CVE-2016-0600 mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) 1301504 - CVE-2016-0606 mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) 1301506 - CVE-2016-0608 mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) 1301507 - CVE-2016-0609 mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) 1301510 - CVE-2016-0616 mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) 1301874 - CVE-2016-2047 mysql: ssl-validate-cert incorrect hostname check 1329239 - CVE-2016-0640 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) 1329241 - CVE-2016-0641 mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU April 2016) 1329243 - CVE-2016-0642 mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) 1329245 - CVE-2016-0643 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) 1329247 - CVE-2016-0644 mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) 1329248 - CVE-2016-0646 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) 1329249 - CVE-2016-0647 mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) 1329251 - CVE-2016-0648 mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) 1329252 - CVE-2016-0649 mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) 1329253 - CVE-2016-0650 mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) 1329254 - CVE-2016-0651 mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) 1329270 - CVE-2016-0666 mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) 1358201 - CVE-2016-3452 mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) 1358203 - CVE-2016-3471 mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) 1358223 - CVE-2016-5444 mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016) 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6): Source: mariadb55-mariadb-5.5.49-1.el6.src.rpm x86_64: mariadb55-mariadb-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-bench-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-debuginfo-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-devel-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-libs-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-server-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-test-5.5.49-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6): Source: mariadb55-mariadb-5.5.49-1.el6.src.rpm x86_64: mariadb55-mariadb-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-bench-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-debuginfo-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-devel-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-libs-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-server-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-test-5.5.49-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7): Source: mariadb55-mariadb-5.5.49-1.el6.src.rpm x86_64: mariadb55-mariadb-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-bench-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-debuginfo-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-devel-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-libs-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-server-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-test-5.5.49-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6): Source: mariadb55-mariadb-5.5.49-1.el6.src.rpm x86_64: mariadb55-mariadb-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-bench-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-debuginfo-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-devel-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-libs-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-server-5.5.49-1.el6.x86_64.rpm mariadb55-mariadb-test-5.5.49-1.el6.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: mariadb55-mariadb-5.5.49-1.el7.src.rpm x86_64: mariadb55-mariadb-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-bench-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-debuginfo-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-devel-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-libs-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-server-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-test-5.5.49-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: mariadb55-mariadb-5.5.49-1.el7.src.rpm x86_64: mariadb55-mariadb-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-bench-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-debuginfo-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-devel-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-libs-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-server-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-test-5.5.49-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: mariadb55-mariadb-5.5.49-1.el7.src.rpm x86_64: mariadb55-mariadb-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-bench-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-debuginfo-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-devel-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-libs-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-server-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-test-5.5.49-1.el7.x86_64.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: mariadb55-mariadb-5.5.49-1.el7.src.rpm x86_64: mariadb55-mariadb-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-bench-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-debuginfo-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-devel-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-libs-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-server-5.5.49-1.el7.x86_64.rpm mariadb55-mariadb-test-5.5.49-1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-4792 https://access.redhat.com/security/cve/CVE-2015-4802 https://access.redhat.com/security/cve/CVE-2015-4815 https://access.redhat.com/security/cve/CVE-2015-4816 https://access.redhat.com/security/cve/CVE-2015-4819 https://access.redhat.com/security/cve/CVE-2015-4826 https://access.redhat.com/security/cve/CVE-2015-4830 https://access.redhat.com/security/cve/CVE-2015-4836 https://access.redhat.com/security/cve/CVE-2015-4858 https://access.redhat.com/security/cve/CVE-2015-4861 https://access.redhat.com/security/cve/CVE-2015-4870 https://access.redhat.com/security/cve/CVE-2015-4879 https://access.redhat.com/security/cve/CVE-2015-4913 https://access.redhat.com/security/cve/CVE-2016-0505 https://access.redhat.com/security/cve/CVE-2016-0546 https://access.redhat.com/security/cve/CVE-2016-0596 https://access.redhat.com/security/cve/CVE-2016-0597 https://access.redhat.com/security/cve/CVE-2016-0598 https://access.redhat.com/security/cve/CVE-2016-0600 https://access.redhat.com/security/cve/CVE-2016-0606 https://access.redhat.com/security/cve/CVE-2016-0608 https://access.redhat.com/security/cve/CVE-2016-0609 https://access.redhat.com/security/cve/CVE-2016-0616 https://access.redhat.com/security/cve/CVE-2016-0640 https://access.redhat.com/security/cve/CVE-2016-0641 https://access.redhat.com/security/cve/CVE-2016-0642 https://access.redhat.com/security/cve/CVE-2016-0643 https://access.redhat.com/security/cve/CVE-2016-0644 https://access.redhat.com/security/cve/CVE-2016-0646 https://access.redhat.com/security/cve/CVE-2016-0647 https://access.redhat.com/security/cve/CVE-2016-0648 https://access.redhat.com/security/cve/CVE-2016-0649 https://access.redhat.com/security/cve/CVE-2016-0650 https://access.redhat.com/security/cve/CVE-2016-0651 https://access.redhat.com/security/cve/CVE-2016-0666 https://access.redhat.com/security/cve/CVE-2016-2047 https://access.redhat.com/security/cve/CVE-2016-3452 https://access.redhat.com/security/cve/CVE-2016-3471 https://access.redhat.com/security/cve/CVE-2016-5444 https://access.redhat.com/security/updates/classification/#moderate http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixMSQL http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html#AppendixMSQL http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixMSQL https://mariadb.com/kb/en/mariadb/mariadb-5545-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5546-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXldfvXlSAg2UNWIIRAnFQAJ4/xBm4yDsH9PfR5scbjRyGCHW3wACfRiqP nzXoZGdTSXmmasSr2IAYBv0= =QzIH -----END PGP SIGNATURE----- --
  4. ------------------------------------------------------------ http://us7.campaign-archive1.com/?u=406e963590798a4aa1eab5f99&id=e8736ee0af&e=2c7a1c459a Dear News Affiliates, Custom PC Review recently published article(s) your readers may enjoy. We’d appreciate it if you could share it with them. Title: Review: APC Power Saving Back-UPS Pro 1500VA (BR1500G) (http://custompcreview.us7.list-manage1.com/track/click?u=406e963590798a4aa1eab5f99&id=5ebce27a56&e=2c7a1c459a) Excerpt: "Generally when most people purchase a new PC, one of the most important things they overlook is a quality UPS, or uninterruptible power supply. We’re definitely guilty of it since sometimes we don’t even run a UPS and we for sure don’t always recommend people pick up a UPS despite how crucial it is when it comes to protecting the computer..." Thank you for your support, -- Sam Chen -- Editor-in-Chief -- Custom PC Review -- http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=16592b6838&e=2c7a1c459a (http://custompcreview.us7.list-manage2.com/track/click?u=406e963590798a4aa1eab5f99&id=e18a874d1a&e=2c7a1c459a)
  5. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Tesoro Interview Link: http://www.techpowerup.com/reviews/Tesoro/Tesoro_Interview Brief: We speak to Tesoro, which kicked the door into the highly competitive gaming peripherals market with some winning products such as the Durandal keyboard. Our talk takes us through some of the company's important near-future plans.
  6. ** TECHSPOT ------------------------------------------------------------ ** Best Computer Cases of 2016 ------------------------------------------------------------ ** http://www.techspot.com/bestof/cases/ ------------------------------------------------------------ You may have a monster graphics card, a sweet water-cooling setup, and multi-colored braided cables, but your rig's potential is wasted if they're crammed into a case that doesn't complement the hardware. What you need is a shiny new chassis, and we've gathered the best you can buy today. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  7. Title: NVIDIA GeForce GTX 1080 Founders Edition 8GB Graphics Card Review ( -at -) NikKTech Description: Thanks to a massive performance increase compared to previous generation models and several new and innovative technologies it's no wonder that the brand new GeForce GTX 1080 Founders Edition 8GB graphics card by NVIDIA has taken the market by storm. Article Link: http://www.nikktech.com/main/articles/pc-hardware/graphics-cards/6760-nvidia -geforce-gtx-1080-founders-edition-8gb-graphics-card-review Image Link: http://www.nikktech.com/main/images/pics/reviews/nvidia/gtx_1080_fe/geforce_ gtx_1080_foundersa.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  8. Package : squid3 Version : 3.1.20-2.2+deb7u6 CVE ID : CVE-2016-4051 A buffer overflow in the Squid 3's cache manager, identified by the CVE-2016-4051, was addressed by the DLA-478-1 and the Debian package version 3.1.20-2.2+deb7u6. However, the fix was incomplete and thus a new upload has been needed. For Debian 7 "Wheezy", this problem has been fixed in version 3.1.20-2.2+deb7u6. We recommend that you upgrade your squid3 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
  9. Package : squid3 Version : 3.1.20-2.2+deb7u6 CVE ID : CVE-2016-4051 A buffer overflow in the Squid 3's cache manager, identified by the CVE-2016-4051, was addressed by the DLA-478-1 and the Debian package version 3.1.20-2.2+deb7u6. However, the fix was incomplete and thus a new upload has been needed. For Debian 7 "Wheezy", this problem has been fixed in version 3.1.20-2.2+deb7u6. We recommend that you upgrade your squid3 packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
  10. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] bind (SSA:2016-204-01) New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/bind-9.10.4_P2-i586-1_slack14.2.txz: Upgraded. Fixed a security issue: getrrsetbyname with a non absolute name could trigger an infinite recursion bug in lwresd and named with lwres configured if when combined with a search list entry the resulting name is too long. (CVE-2016-2775) [RT #42694] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.9.9_P2-i486-1_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.9.9_P2-x86_64-1_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.9.9_P2-i486-1_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.9.9_P2-x86_64-1_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bind-9.9.9_P2-i486-1_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bind-9.9.9_P2-x86_64-1_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.9.9_P2-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.9.9_P2-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.9.9_P2-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.9.9_P2-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.10.4_P2-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.10.4_P2-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.10.4_P2-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.10.4_P2-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: cfb2b607cd09d42e3647318d78fde310 bind-9.9.9_P2-i486-1_slack13.0.txz Slackware x86_64 13.0 package: 93be76e6f30c427e3df716d1a5d1c75f bind-9.9.9_P2-x86_64-1_slack13.0.txz Slackware 13.1 package: db496174c2c387bca3bd4bf9c2193e8b bind-9.9.9_P2-i486-1_slack13.1.txz Slackware x86_64 13.1 package: 66e7c65014b102e98735ef10ad752a51 bind-9.9.9_P2-x86_64-1_slack13.1.txz Slackware 13.37 package: 80ee4d63e6de0a2cb5a4a6fe52fa5f9e bind-9.9.9_P2-i486-1_slack13.37.txz Slackware x86_64 13.37 package: 62e43f6e05e63a6a39d7e02b52e35fdd bind-9.9.9_P2-x86_64-1_slack13.37.txz Slackware 14.0 package: 08269a9cf82e706dc52c2ac02f6a07d5 bind-9.9.9_P2-i486-1_slack14.0.txz Slackware x86_64 14.0 package: ca8895c50273465f657a5c19afca1732 bind-9.9.9_P2-x86_64-1_slack14.0.txz Slackware 14.1 package: 0386780ec9c21ebc8eb20051ab885d48 bind-9.9.9_P2-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 7e56afc3e4f9539dd583e1122bea02f3 bind-9.9.9_P2-x86_64-1_slack14.1.txz Slackware 14.2 package: 809333b70180d137ea1a45d2aded503d bind-9.10.4_P2-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 569f79b79ce22ec86a8d09be661e4815 bind-9.10.4_P2-x86_64-1_slack14.2.txz Slackware -current package: 05dd39f0119f85552d9b8a66cb13f976 n/bind-9.10.4_P2-i586-1.txz Slackware x86_64 -current package: 9c5607e7aeba3d91f4cefb1b18bf4d9a n/bind-9.10.4_P2-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg bind-9.10.4_P2-i586-1_slack14.2.txz Then, restart the name server: # /etc/rc.d/rc.bind restart +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
  11. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Logitech MX Master ( -at -) LanOC Reviews <http://lanoc.org/review/input-devices/7297-logitech-mx-master> *DESCRIPTION:* I honestly can’t think of the last time I took a look at a mouse that wasn’t directly marketed towards gaming. That mostly has to do with the companies we work with, but with Logitech, I’ve been trying to get an MX Master in my hands all the way back from its launch. This is because even just checking out the feature list I was impressed with what they were doing with the MX Master. Well recently they finally sent one out and I’ve been spending time using it on my main PC. So today I’m going to run through its features and find out if the MX Master lives up to the hype that I had built up in my head. *ARTICLE URL:* http://lanoc.org/review/input-devices/7297-logitech-mx-master *LARGE IMAGE URL:* http://lanoc.org/images/reviews/2016/logitech_mx_master/title.jpg *SMALL IMAGE URL:* http://lanoc.org/images/reviews/2016/logitech_mx_master/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?format=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org <reviews ( -at -) lanoc.org>* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org MSN/Skype: wes ( -at -) lanoc.org Phone: 419-605-0828 ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  12. Not all new SSDs go inside your computer. We take a quick look at Samsung's latest V-NAND-powered external drive, the Portable SSD T3, to see what it's like to put 2TB of fast storage in one's pocket. Read more: http://techreport.com/review/29971/samsung-portable-ssd-t3-reviewed -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
  13. To see how mobile VR plays in the real world, we gave a dozen kids a a Samsung Galaxy S6, a Gear VR headset, a Bluetooth controller, and a copy of Minecraft VR Edition. Is this the ultimate test for the platform, or is it just chaos? Read more: http://techreport.com/review/30080/we-threw-a-minecraft-party-to-test-samsung-gear-vr-headset --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
  14. -------- AUDIOENGINE HD6 DESKTOP COMPUTER SPEAKERS REVIEW ( -at -) APH NETWORKS ----- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Audioengine HD6 Desktop Computer Speakers Review ( -at -) APH Networks * Description: If heaven is installing a new sound system, they will be getting the Audioengine HD6. * Link: http://aphnetworks.com/reviews/audioengine-hd6 * Image: http://aphnetworks.com/review/audioengine-hd6/003.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
  15. Case Mod Friday: Phanteks Evolv ATX Tempered Glass Edition ( -at -) ThinkComputers.org Feature Link: http://www.thinkcomputers.org/case-mod-friday-phanteks-evolv-atx-tempered-glass-edition/ Image URL: http://thinkcomputers.org/articles/casemodfriday/ggf-phanteks-email.jpg Alt Image URL: http://thinkcomputers.org/articles/casemodfriday/ggf-phanteks-small.jpg Quote: "Welcome to another Case Mod Friday showcase! This week we have GGF Lan Party's "Phanteks Evolv ATX Tempered Glass Edition" build. Here is what they had to say about it, "We've finished our Phanteks Evolv ATX Tempered Glass Edition build and this time we have gone with a funky yellow theme. Once again we've added a custom stats screen in the build as we find these really add that special touch."
  16. news

    Wine release 1.9.15

    The Wine development release 1.9.15 is now available. What's new in this release (see below for details): - More shader instructions in Direct3D. - Performance improvements in GDI. - Better multi-joystick support on macOS. - Active Scripting improvements. - Additional stream support in the C++ runtime. - Various bug fixes. The source is available from the following locations: http://dl.winehq.org/wine/source/1.9/wine-1.9.15.tar.bz2 http://mirrors.ibiblio.org/wine/source/1.9/wine-1.9.15.tar.bz2 Binary packages for various distributions will be available from: http://www.winehq.org/download You will find documentation on http://www.winehq.org/documentation You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details. Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list. ---------------------------------------------------------------- Bugs fixed in 1.9.15 (total 22): 2905 Kings Quest 8 crashes while loading a saved game 14821 Kirikiri based games update screen slowly 21891 info zip 3.0 won't append to existing archive 33225 Metacell demo can't play music in mp3 format 36653 Tesla Effect (game): Video sequences display green screen. 37361 Scottrade Elite 2013 fails data streaming after about 90% of logins 37429 Post provider setup of WMI core 1.5 installer needs advapi32.dll.WmiQueryGuidInformation stub 37977 Multiple applications using VBScript/JScript need scripting host 'WScript.Quit' implementation 38475 Unused variable in glsl_shader.c 38997 Non-deterministic device id assignment when using more than one joystick/gamepad (multiplayer). Unable to deactivate joystick through registry or wine control applet 39845 Randomly "WinMorse2.exe" doesn't work under Wine. 40760 GOG Galaxy crashes with unimplemented function vcruntime140.dll.set_unexpected 40764 Bloodrayne 1-2 hang when playing videos 40822 Aliens vs. Triangles demo needs WINED3DFMT_R32_SINT format 40861 Kingsoft Office 2012 needs ntoskrnl.exe.IoAttachDevice 40872 Gauntlet requires dcl_immediateConstantBuffer support 40887 Nook eReader 2.5.3.4630 needs ncrypt.dll.NCryptOpenStorageProvider 40915 Max Payne demo installer displays highlighted text 40923 Alone in the Dark (2008) crashes on launch with msvcrt assertion 40932 [GAME] RAN GS crashes when starting (needs msvcp90.dll.?_Random_device ( -at -) tr1 ( -at -) std ( -at -) ( -at -) YAIXZ) 40939 dlls/msvcr100 - error building on NetBSD 40959 mIRC: Crash on running code to see if mIRC is running in Wine. ---------------------------------------------------------------- Changes since 1.9.14: Aaryaman Vasishta (7): d3drm: Store reference to IDirect3DRM in d3drm_device_create(). d3drm: Move struct d3drm_device to d3drm_private.h. d3drm: Rearrange version 1, 2 functions after version 3 for IDirect3DRMDevice*. d3drm: Implement IDirect3DRMDevice*::Add/DeleteDestroyCallback. d3drm: Fix IDirect3DRMDevice{2-3}::GetDirect3DDevice2 return values on failure. d3drm: Implement IDirect3DRMDevice*::InitFromD3D. d3drm: Implement IDirect3DRMDevice{2-3}::InitFromD3D2. Akihiro Sagawa (1): mciqtz32: Use dB unit when setting audio volume. Alex Henrie (8): include: Add FolderItems2 and FolderItems3. shell32: Print RIIDs as strings in shell dispatch TRACE statements. shell32: Stub out FolderItems. shell32/tests: Add tests for FolderItems. shell32: Return E_INVALIDARG from FolderItems functions on null output. shell32: Set output interfaces to NULL in FolderItems functions. shell32/tests: Free winetest BSTR after use. shell32/tests: Change to temp dir to be able to remove winetest dir. Alexandre Julliard (8): server: Add a helper function to create a symlink to an existing object. server: Add a helper function to create session directories and symlinks. kernel32: Store synchronization objects under the session directory. user32: Store window station objects under the session directory. configure: Set the libwine soname on Android. winegcc: Set the soname of all dlls on Android. loader: The preloader is not supported on Android, don't try to use it. server: Avoid unaligned access when printing x86 floating point registers. Alistair Leslie-Hughes (3): inetcomm: Improve IMimeBody GetHandle return value. inetcomm: GetBody returns MIME_E_NOT_FOUND when no parent found. vcruntime140: Forward set_unexpected. Andrey Gusev (5): po: Update Ukrainian translation. avifil32: Use debugstr_guid() in TRACE() message. hlink: Use debugstr_guid() in FIXME() message. ole32: Use debugstr_guid() in TRACE() messages. shell32: Use debugstr_guid() and debugstr_w() in TRACE() messages. Aurimas Fišeras (1): po: Update Lithuanian translation. Austin English (5): ntoskrnl.exe: Add IoAttachDevice stub. include: Add more NTE_* definitions. include: Add initial ncrypt.h. ncrypt: Add some stub functions. shell32: Add SHGetPropertyStoreForWindow stub. David Lawrie (5): winejoystick.drv: Print location ID in debugstr_device on the Mac. winejoystick.drv: Sort devices by location ID on the Mac. dinput: Print location ID in debugstr_device on the Mac. dinput: Sort devices by location ID on the Mac. dinput: Alter function name and code style. Dmitry Timoshkov (2): ntdll: Add support for fs segment in ThreadDescriptorTableEntry query. kernel32/tests: Add tests for GetThreadSelectorEntry. Hans Leidekker (11): webservices: Use a long double variable in format_double. sspicli: New dll. sspicli: Implement SspiEncodeStringsAsAuthIdentity. sspicli: Implement SspiZeroAuthIdentity. sspicli: Implement SspiEncodeAuthIdentityAsStrings. sspicli: Implement SspiFreeAuthIdentity. sspicli: Implement SspiLocalFree. secur32: Forward Sspi functions to sspicli. credui: Add a stub implementation of CredUIPromptForWindowsCredentialsW. credui: Add stub implementations of CredPackAuthenticationBufferW and CredUnpackAuthenticationBufferW. credui: Use the input identity passed to SspiPromptForCredentialsW. Henri Verbeet (15): wined3d: Synchronise WINED3D_CS_OP_PRESENT resource access. wined3d: Synchronise WINED3D_CS_OP_CLEAR resource access. wined3d: Synchronise WINED3D_CS_OP_DRAW resource access. d3d10: Validate offsets in parse_shader() (AFL). d3d10: Validate offsets and size in parse_fx10_type() (AFL). d3drm/tests: Fix some IDirect3D2 reference leaks. wined3d: Also try DRIVER_MODEL_NT6X in init_driver_info(). wined3d: Get rid of redundant NULL checks for event query "extendedData". wined3d: Fail event query creation when event queries are not supported. wined3d: Get rid of redundant ARB_occlusion_query checks. wined3d: Get rid of redundant ARB_timer_query checks. wined3d: Use a single allocation for event queries. wined3d: Use a single allocation for occlusion queries. wined3d: Use a single allocation for timestamp queries. wined3d: Introduce a separate function for creating timestamp disjoint queries. Hugh McMaster (8): regedit: Use output_message() in regproc.c for better internationalization. regedit: Use Unicode when printing system error messages. regedit: Open export file with a wide-character stream. regedit: Use Unicode for registry key paths. regedit: Rewrite processRegLinesA into an ANSI version of processRegLinesW. regedit: Use generic ARRAY_SIZE macro to allow for broader use. regedit: Output the registry data type as a string when it is used in error messages. reg: Handle a special case for Default values and 'reg query'. Huw D. M. Davies (10): gdi32: Add back the extents test. gdi32: Use the get_mono_dc_colors() helper. gdi32: Add a mask_rect primitive for use when the src is 1bpp. gdi32: Use alloc_gdi_path() to create the path. gdi32: Change get_gdi_flat_path() to return an opaque path pointer. gdi32: Reduce the number of memory allocations required for gdi paths. gdi32: Copy 1-bpp pixels one byte at a time. gdi32: Add helpers to allocate, grow and free regions. gdi32: Add a small rectangle buffer to reduce memory allocation. gdi32: Use an internal version of LPtoDP that takes a DC * where possible. Iván Matellanes (21): msvcirt: Reset the pointers on file sync in most cases. msvcirt: Add stub for class istream. msvcirt: Implement istream constructors/destructors. msvcirt: Implement istream::eatwhite. msvcirt: Implement istream::gcount. msvcirt: Implement istream::ipfx. msvcirt: Implement istream::isfx. msvcirt: Implement istream::get for strings. msvcirt: Implement istream::get for single characters. msvcirt: Implement istream::get for streambufs. msvcirt: Implement istream::getline. msvcirt: Implement istream::ignore. msvcirt: Implement istream::peek. msvcirt: Implement istream::putback. msvcirt: Implement istream::read. msvcirt: Implement istream::seekg. msvcirt: Implement istream::sync. msvcirt: Implement istream::tellg. msvcirt: Implement istream::getint. msvcirt: Implement istream::getdouble. msvcirt: Implement istream::ws. Jacek Caban (15): gdi32: Make CreateDIBSection hotpatchable. kernel32: Make MapViewOfFile and VirtualAlloc hotpatchable. mshtml/tests: Use relative URLs in navigation.js. mshtml: Use bind_to_tree callback to parse dynamically added scripts. mshtml: Moved getting text from ScriptBSC to separated function. mshtml: Moved parsing external script to OnStopBinding callback. mshtml: Store external script text in HTMLScriptElement object. mshtml: Merge parse_extern_script and bind_script. mshtml: Moved script execution logic from HTMLScriptElement::put_src to script BSC. mshtml: Set loaded script ready state if binding failed. mshtml: Set interactive script ready state change in the right places. mshtml: Load dynamically created script elements asynchronously. mshtml: Added asynchronous script loading tests. jscript: Use IDispatch* as iface_to_jsdisp argument type. jscript: Optimize iface_to_jsdisp by using vtbl comparison. Jan Schmidt (7): winegstreamer: Don't replace internal bus. winegstreamer: Don't store decodebin explicitly. winegstreamer: Do conversion before flipping. winegstreamer: Fix refcounting for videoflip. d3d9: Adjust D3DCOLOR_ARGB to avoid shift overflow. quartz: Images in Direct3D surfaces must be top-down. quartz: Return the fullscreen status in Videorenderer. John Sheu (1): kernel32/tests: Add some tests for fiber-local storage. Julian Rüger (1): po: Update German translation. Józef Kucia (25): d3d11: Implement d3d11_immediate_context_RSGetScissorRects(). d3d10core/tests: Add test for immediate constant buffer. wined3d: Use uintBitsToFloat() for float immediate shader constants. wined3d: Set load_local_constsF in shader_init(). d3d11/tests: Add test for writing floating-point specials to render target. d3d10core/tests: Add test for writing floating-point specials to render target. wined3d: Recognize SM5 vocp register. wined3d: Implement SM4 umin instruction. wined3d: Recognize SM4.1 lod opcode. wined3d: Recognize SM4.1 samplepos opcode. wined3d: Recognize SM4.1 sampleinfo opcode. wined3d: Recognize SM5 ubfe opcode. wined3d: Add ARB_vertex_type_2_10_10_10_rev extension. wined3d: Store vertex attribute size instead of component size in wined3d_format. wined3d: Add support for WINEDFMT_R10G10B10A2_UNORM vertex format. d3d11/tests: Add test for DXGI_FORMAT_R10G10B10A2_UNORM vertex format. d3d10core/tests: Add test for DXGI_FORMAT_R10G10B10A2_UNORM vertex format. wined3d: Enable rendering to integer textures. d3d11/tests: Add test for bitwise shader instructions. d3d10core/tests: Add test for some shader instructions. d3d11: Validate "MiscFlags" and "StructureByteStride" for raw and structured buffers. d3d11/tests: Add more tests for structured and raw buffers. d3d10core/tests: Add test for CreateBuffer() with invalid misc flags. d3d11: Allow creating UAVs for structured buffers with NULL description. d3d11: Allow creating SRVs for structured buffers with NULL description. Ken Thomases (3): kernel32: Overhaul the handling of argv in set_process_name(). winemac: Only call -[NSApplication unhide:] if the app is actually hidden. winemac: Call -removeFromSuperview on a view before adding it to a superview, on 10.9 and earlier. Kim Malmo (1): po: Update Norwegian translation. Kirill K. Smirnov (1): winex11.drv: Avoid passing NULL to memcpy (clang). Matteo Bruni (4): wined3d: Update vertex shader when the swizzle map changes. wined3d: Check BLENDWEIGHT and BLENDINDICES FFP attributes for fixups. d3d8: Use a union in tss_lookup. (Coverity). ddraw: Use a union in tss_lookup. (Coverity). Michael Müller (4): ntdll: Use sysinfo to report correct number of physical pages. kernel32/tests: Add tests for UnmapViewOfFile with unaligned pointer. ntdll: NtUnmapViewOfSection should succeed for all offsets within the mapped range. kernel32: In Win9x mode UnmapViewOfFile requires base address of a mapping. Michael Stefaniuc (43): windowscodecs: Remove a redundant NULL check before HeapFree(). winepulse: Remove a redundant NULL check before HeapFree(). comctl32: Use InflateRect() too when expanding in just one axis. explorerframe: Use the proper RECT APIs. explorerframe/tests: Use SetRect() instead of open coding it. explorerframe/tests: The width is between the RECT left and right fields. explorerframe/tests: Use EqualRect() instead of open coding it. wordpad: Use InflateRect() instead of open coding it. riched20: Get rid of casts from COM objects to interfaces. riched20/tests: Use InflateRect() too when expanding in just one axis. ieframe: Use InflateRect() instead of open coding it. hhctrl: Use SetRect() instead of open coding it. d3d9: Use SetRect() instead of open coding it. d3dxof: Avoid casts from COM objects to interfaces. d3dcompiler/tests: Avoid using the LPD3DBLOB COM iface type. taskmgr: Remove some old commented out code, mostly C++. taskmgr: Use SetRect() instead of open coding it. mshtml: Use SetRect() instead of open coding it. maintainers: D3dxof is a D3D helper library too. avifil32: Use atomic operations to manipulate the refcount. avifil32: Clean up the IClassFactory creation. avifil32: Avoid using the LPCLASSFACTORY COM iface type. dmsynth: Simplify error handling when creating a DMSynthSink object. avifil32: Move CreateEditableStream() to avoid exporting a helper. avifil32: Avoid casts of IAVIEditStream to the COM object. avifil32/tests: Add some basic COM tests for AVIEditStream. avifil32: Avoid casts from COM objects to ifaces. usp10/tests: Use SetRect() instead of open coding it. strmbase: Don't cast IQualityControl to the COM object. strmbase: Avoid a COM object to interface cast. amstream: Avoid using the LPUNKNOWN COM iface type. mshtml: Avoid using LPSTREAM. user32: Use SetRect() instead of open coding it. user32: Simplify a RECT copy. dmsynth: The DMSynth{,Sink} COM objects don't support aggregation. dmsynth/tests: Move the dll availability check to a separate function. dmsynth/tests: Add COM tests for DMSynth and DMSynthSink. dmsynth: Lock/unlock the module only on creation/desctruction. msctf: Don't crash on NULL input in EnumLanguageProfiles(). msctf: Avoid a cast from IEnumTfLanguageProfiles to the COM object. hlink/tests: Use wine_dbgstr_guid() to print a REFIID. shlwapi/tests: Use wine_dbgstr_guid() to trace REFIIDs. comctl32: Avoid using the LPSTREAM COM iface type. Nikolay Sivov (25): webservices/tests: Fix WsCreateMessage() arguments (Clang). webservices/tests: Fix WsReadValue type argument values (Clang). mshtml: Fix a typo in a trace message. msscript: Implement some connection point methods. xmllite/writer: Close open tag with WriteFullEndElement(). xmllite/writer: Implement WriteCharEntity(). xmllite/writer: Fix formatted output with WriteFullEndElement(). comctl32/trackbar: Update thumb on range change. comctl32/trackbar: Fix mouse position to thumb position conversion rounding. dwrite: Ignore fonts with dot-prefixed names. po: Update Russian translation. wbemdisp: Fix a crash on null interface pointer. msscript: Initial support for hosting script engines. dwrite: Use more intuitive naming for layout stages. dwrite: Validate CreateTextFormat() arguments. dwrite: Implement SetTrimming() for layout. msscript: Implement Timeout property. dwrite: Implement GetOverhangMetrics() for trimming sign. dwrite/tests: A couple of tests for matching with invalid font properties. dwrite: Filter invalid weight in SetFontWeight(). msscript: Implement SetAdvise/GetAdvise. msscript: Added IServiceProvider stub. msscript: Added IActiveScriptSiteWindow stub. msscript: Implement Reset(). comctl32/tooltips: Fix TTM_GETMARGIN/TTM_SETMARGIN handling. Piotr Caban (2): msi: Don't validate platform while checking if transform is applicable. msvcr100: Fix compilation on NetBSD (conflicting fenv_t definitions). Piotr Chruściel (1): server: Move the \BaseNamedObjects symlink in \Sessions\0 to \Sessions\1\BaseNamedObjects. Sebastian Lackner (11): secur32: Define missing gnutls_kx_algorithm_t constants for gnutls versions < 3. kernel32/tests: Use inline implementation of NtCurrentTeb for debugger tests. ntdll/tests: Use inline implementation of NtCurrentTeb for exception tests. ntdll/tests: Use inline implementation of NtCurrentTeb for rtl tests. opengl32/tests: Include wgl.h and remove duplicate declarations. dmsynth: Fix a module refcounting regression. kernel32/tests: Use inline implementation of NtCurrentTeb for process tests. vcomp: Implement 16-bit atomic instructions. vcomp/tests: Add tests for 16-bit atomic instructions. vcomp: Implement 8-bit atomic instructions. vcomp/tests: Add tests for 8-bit atomic instructions. Stefan Dösinger (1): ddraw/tests: Skip A4R4G4B4 ckey tests on Nvidia. -- Alexandre Julliard julliard ( -at -) winehq.org
  17. Thermaltake Smart Power Management Platform Overview ( -at -) ThinkComputers.org Article Link: http://www.thinkcomputers.org/thermaltakes-smart-power-management-tracks-your-pcs-power-use-more/ Image URL: http://www.thinkcomputers.org/articles/spm-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/spm-small.jpg Quote: "We of course know Thermaltake for making great power supplies. Did you know they have a cloud service that tracks and analyzes PC electricity consumption? This is their Smart Power Management (SPM) platform. The platform is free and works with any of Thermaltake’s DPS G power supplies. So why track your PC’s electricity consumption? It allows you to observe and learn your own energy consumption whereby altering your behavior to achieve the goal of reducing CO2 emission together to contribute on slowing global warming. On top of that you can track how much it costs to have your PC running, total uptime, VGA monitoring, set alerts for temperature, and it even has a remote feature where you can shutdown your PC. Let’s see what the SPM platform is all about and why you should use it if you have a Thermaltake DPS G Series power supply."
  18. *Anidees AI-Crystal Tempered Glass review* Anidees released their all new AI-Crystal PC mid tower chassis, a product series that is designed for ease of use and terrific looks as the side panels and the front panel have been fitted with nice dark tempered glass. And that gives this chassis series a little extra boom-boom-pow. Wanna have a peek? Read the full review here <http://www.guru3d.com/articles-pages/anidees-ai-crystal-tempered-glass-review,1.html>'>http://www.guru3d.com/articles-pages/anidees-ai-crystal-tempered-glass-review,1.html> . URL: http://www.guru3d.com/articles-pages/anidees-ai-crystal-tempered-glass-review,1.html <http://www.guru3d.com/articles-pages/anidees-ai-crystal-tempered-glass-review,1.html> --
  19. A news post would be great. OCC has published a review on the MSI GTX 1060 Gaming X 6G Here is a quote from the review: Quote: â€ÂAs you might expect, the MSI GTX 1060 Gaming X 6G is going to outperform a card that comes with lower baseline core clock speeds, even if they are at the top end of the Gaming App range of speeds by default. In just about every test, MSI's GTX 1060 Gaming X 6G delivered higher FPS levels than the Founders Edition card. After the launch of the GTX 1080 and 1070 Gaming X cards, MSI took some heat about the Gaming X cards running at the Gaming App overclock settings by default. Some felt this was an unfair advantage that was not clearly advertised. The card does run faster by default than the advertised clock speeds, however you have the option of using MSI's Gaming App to slow things down a bit.†Title: MSI GTX 1060 Gaming X 6G Review Link: http://www.overclockersclub.com/reviews/msi_gtx1060_gaming_x_6g/ Img: http://www.overclockersclub.com/siteimages/articles/msi_gtx1060_gaming_x_6g/6_thumb.jpg
  20. View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=7754d4ba70&e=0c004f9c13) NVIDIA has historically taken a somewhat different approach when announcing its newest Titan-branded graphics cards, that differs from the measured, methodical launches of its more mainstream consumer products. Tonight’s announcement, however, takes the cake. We just received details from NVIDIA regarding an upcoming ultra-powerful, Pascal-based Titan X, featuring a 12 billion transistor GPU, codenamed GP102. The email’s subject began with “SURPRISE†and the body started with, “It began with a betâ€Â. NVIDIA is obviously having a little fun with this one. NVIDIA Drops Pascal Bomb With GP102-Based TITAN X, 60 Percent Faster Than Its Predecessor (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=525af33642&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=d063807dae&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=da0c9eaad6&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=8944ea98fc&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=89da30706b&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f653db5681&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=9b33121671&e=0c004f9c13 ============================================================
  21. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] gimp (SSA:2016-203-01) New gimp packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/gimp-2.8.18-i586-1_slack14.2.txz: Upgraded. This release fixes a security issue: Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/gimp-2.8.18-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/gimp-2.8.18-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/gimp-2.8.18-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/gimp-2.8.18-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/gimp-2.8.18-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/gimp-2.8.18-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/gimp-2.8.18-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/gimp-2.8.18-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.0 package: 36cb0b80c948b3012ee5e2130186cc7f gimp-2.8.18-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 180c06dbd99264d71608cf8bb080fdfa gimp-2.8.18-x86_64-1_slack14.0.txz Slackware 14.1 package: 453923367e46e220f712832cc7dbeaef gimp-2.8.18-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 07f00caa7ff13ef6d0bb0cdc6ae94911 gimp-2.8.18-x86_64-1_slack14.1.txz Slackware 14.2 package: 099fd28f2dadb1234e4e2ba7285e3477 gimp-2.8.18-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 1446172cd7c363ca66edd2f7053f54bd gimp-2.8.18-x86_64-1_slack14.2.txz Slackware -current package: 5e987d454c571fae7d78d4ecce595d3f xap/gimp-2.8.18-i586-1.txz Slackware x86_64 -current package: f9418d356da32a50dbd1029125abb422 xap/gimp-2.8.18-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg gimp-2.8.18-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
  22. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] php (SSA:2016-203-02) New php packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/php-5.6.24-i586-1_slack14.2.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.24 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.6.24-i486-1_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.6.24-x86_64-1_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.6.24-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.6.24-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/php-5.6.24-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/php-5.6.24-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.6.24-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.6.24-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.0 package: 712cc177c9ac10f3d58e871ff27260dc php-5.6.24-i486-1_slack14.0.txz Slackware x86_64 14.0 package: 47f6ad4a81517f5b2959abc73475742b php-5.6.24-x86_64-1_slack14.0.txz Slackware 14.1 package: aea6a8869946186781e55c5ecec952b0 php-5.6.24-i486-1_slack14.1.txz Slackware x86_64 14.1 package: ab16db742762605b9b219b37cdd7e8db php-5.6.24-x86_64-1_slack14.1.txz Slackware 14.2 package: c88a731667e741443712267d9b30286a php-5.6.24-i586-1_slack14.2.txz Slackware x86_64 14.2 package: ed5b31c94e2fb91f0e6c40051f51da1c php-5.6.24-x86_64-1_slack14.2.txz Slackware -current package: c25a85fece34101d35b8785022cef94d n/php-5.6.24-i586-1.txz Slackware x86_64 -current package: 17f8886fc0901cea6d593170ea00fe7b n/php-5.6.24-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg php-5.6.24-i586-1_slack14.2.txz Then, restart Apache httpd: # /etc/rc.d/rc.httpd stop # /etc/rc.d/rc.httpd start +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
  23. If you ware looking for an NVIDIA GeForce GTX 1070 graphics card to purchase you will quickly find that there are 21 different models widely available from NVIDIA’s board partners in North America. Gigabyte alone has five different models to pick from as you have Gigabyte GeForce GTX 1070 Founders Edition for those that are looking for the NVIDIA reference design and then four custom cards. The card that we are looking at today is the Gigabyte GTX 1070 G1 Gaming. Article Title: Gigabyte GeForce GTX 1070 G1 Gaming ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/gigabyte-geforce-gtx-1070-g1-gaming-video-card-review_184427 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
  24. Nvidia's second Pascal graphics card, the GeForce GTX 1070, aims to set a new bar for graphics performance in the $379-and-up price range. We put MSI's GeForce GTX 1070 Gaming Z card through the wringer to see how a more affordable Pascal card performs. Read more: http://techreport.com/review/30413/nvidia-geforce-gtx-1070-graphics-card-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
  25. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: ASUS RX 480 STRIX OC 8 GB Link: http://www.techpowerup.com/reviews/ASUS/RX_480_STRIX_OC Brief: The ASUS RX 480 STRIX OC is the first custom design variant of the RX 480 that we are reviewing. It comes with the same cooler as the STRIX GTX 1080, which ensures excellent temperatures. ASUS has also improved power capability of their card, it's coming with an 8-pin power connector now.
×