Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. CentOS Errata and Security Advisory 2016:1392 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1392.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: c86b3d368508a59cd16d64e04a1bc193d775c7fbd451fc13d7a7c2f7c1a23043 thunderbird-45.2-1.el7.centos.x86_64.rpm Source: 0afe6ca8e844277a55e85ad18c97c5bc1f3554c517181d4711904ac434947f08 thunderbird-45.2-1.el7.centos.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  2. CentOS Errata and Enhancement Advisory 2016:1394 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1394.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 2a1c1b67665db54057507583ecdf00b98a14ffe148d8306e18522bf654d258cf kmod-i40evf-1.5.10_k-1.el7_2.x86_64.rpm Source: 69581fb96f87613531f5b8532435e908f99e286402c42f3b6335da009c3f5f0b i40evf-1.5.10_k-1.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  3. CentOS Errata and Enhancement Advisory 2016:1394 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1394.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 38665ae0af8a8192bebd09c5f624f7acf95a07b8ab6197ae20766c79c327ad9a kmod-i40e-1.5.10_k-1.el7_2.x86_64.rpm Source: 05c0b3ff6a502a50a80a5024fcb158604723884cd8e5dddfcc40001420a021cb i40e-1.5.10_k-1.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  4. CentOS Errata and Security Advisory 2016:1392 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1392.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 4bb99c7b348a1507e1aac8a03f31c3c030fba5ed556ed4841f9a34ddecbda953 thunderbird-45.2-1.el6.centos.i686.rpm x86_64: 60a356711d21bb97f9c2ea44226bbb08ff09156303329a74b4366c9e85294647 thunderbird-45.2-1.el6.centos.x86_64.rpm Source: 9872bdd23676d96e6ddb0761d1190d25277e35d53ab3f7388f2a266a58693d55 thunderbird-45.2-1.el6.centos.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  5. Welcome to the Ubuntu Weekly Newsletter, Issue 473 for the week July 4 - 10, 2016. == Links to UWN == * Wiki page: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Issue473 == In This Issue == * Ubuntu 15.10 (Wily Werewolf) reaches End of Life on July 28 2016 * Welcome New Members and Developers * Ubuntu Stats * LoCo Events * Zygmunt Krynicki: snapd 2.0.10 released to Fedora COPR * Stephen M. Webb: Previewing the New Unity * Ubuntu App Developer Blog: Shaping up universal snaps * Stephen M. Webb: X11 Applications and Unity 8 * Zygmunt Krynicki: Fresh bite-sized bugs in snappy * Ubuntu App Developer Blog: Announcing new snap desktop launchers * Daniel Pocock: Can you help with monitoring packages in Debian and Ubuntu? * Ubuntu Studio: Backports, the benefits and the consequences. * Daniel Holbach: Contributing to the world of snaps * Canonical Design Team: Getting Vanilla ready for v1: the roadmap * Canonical Design Team: See our designs on Behance and Dribble * Chuck Short: Live migration with nova-lxd * Adolfo Jayme Barrientos: Can you run the Unity desktop environment on Windows? Yes! * 10 Desktop Snaps written in June * Ubuntu Phone News * Canonical News * In The Press * In The Blogosphere * Featured Audio and Video * Weekly Ubuntu Development Team Meetings * Upcoming Meetings and Events * Updates and Security for 12.04, 14.04, 15.10 and 16.04 * And much more! == General Community News == === Ubuntu 15.10 (Wily Werewolf) reaches End of Life on July 28 2016 === Adam Conrad announces that Ubuntu 15.10 (Wily Werewolf) reaches its end of life on July 28, 2016. In this announcement you can also find a link to instructions to upgrade 15.10 to the latest version of Ubuntu. https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003492.html === Welcome New Members and Developers === The Ubuntu Membership board welcomed a new Ubuntu member from AskUbuntu: * David Mohammed (Wiki: https://wiki.ubuntu.com/fossfreedom | LP: https://launchpad.net/~fossfreedom | AskUbuntu: http://askubuntu.com/users/14356/fossfreedom) https://lists.ubuntu.com/archives/ubuntu-news-team/2016-July/002516.html == Ubuntu Stats == === Bug Stats === * Open (123880) +92 over last week * Critical (360) -6 over last week * Unconfirmed (61053) +19 over last week As always, the Bug Squad needs more help. If you want to get started, please see https://wiki.ubuntu.com/BugSquad === Ask Ubuntu Top 5 Questions this week === ==== Most Active Questions ==== * Why doesn't the command "ls | file" work? http://askubuntu.com/questions/795599/why-doesnt-the-command-ls-file-work * How can I download lubuntu with nothing more than dial-up? http://askubuntu.com/questions/794492/how-can-i-download-lubuntu-with-nothing-more-than-dial-up * Why does redirecting sed output to same input file make my machine unresponsive? http://askubuntu.com/questions/795713/why-does-redirecting-sed-output-to-same-input-file-make-my-machine-unresponsive * Forgot passphrase (encrypted hard drive), how can I use my computer again? http://askubuntu.com/questions/796737/forgot-passphrase-encrypted-hard-drive-how-can-i-use-my-computer-again * Is there a project to motivate schools to use Ubuntu? http://askubuntu.com/questions/795121/is-there-a-project-to-motivate-schools-to-use-ubuntu ==== Top Voted New Questions ==== * Is there a project to motivate schools to use Ubuntu? http://askubuntu.com/questions/795121/ * Why doesn't the command "ls | file" work? http://askubuntu.com/questions/795599/ * How to set the first picture of every folders as their folder icons? http://askubuntu.com/questions/796256/ * Forgot passphrase (encrypted hard drive), how can I use my computer again? http://askubuntu.com/questions/796737/ * Why is my sorted file bigger? http://askubuntu.com/questions/796947/ People Contributing the best questions and answers this week: Jacob Vlijm (http://askubuntu.com/users/72216/jacob-vlijm), terdon (http://askubuntu.com/users/85695/terdon), andrew.46 (http://askubuntu.com/users/57576/andrew-46), John Kugelman (http://askubuntu.com/users/141470/john-kugelman) and Rinzwind (http://askubuntu.com/users/15811/rinzwind) Ask (and answer!) questions at http://askubuntu.com == LoCo Events == The following LoCo team events are currently scheduled in the next two weeks: * Festival de creacion e intercambio de llaves, Ubuntu Venezuela Team: http://loco.ubuntu.com/events/ubuntu-ve/3391-festival-de-creacion-e-intercambio-de-llaves/ * AZLOCO Install-fest/Linux Workshop, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3397-azloco-install-fest/linux-workshop/ Looking beyond the next two weeks? Visit the LoCo Team Portal to browse upcoming events around the world: http://loco.ubuntu.com/events/ == The Planet == === Zygmunt Krynicki: snapd 2.0.10 released to Fedora COPR === Zygmunt Krynicki announced that "Fedora users can now get snapd 2.0.10 from the COPR repository. There are many bug fixes and new features in this release." He goes on to include a full list of fixes in his blog. http://www.zygoon.pl/2016/07/snapd-2010-released-to-fedora-copr.html === Stephen M. Webb: Previewing the New Unity === Stephen M. Webb previews the new unity from Canonical. He writes that Unity 8 has been on phones and tablets for nearly a year now, however, it is not quite ready for the consumer desktop. He says, "Our current goal is to make the Unity 8 desktop available in the Ubuntu 16.10 release coming up this October as an alternative login session on the ISO (installation image)." https://bregmatter.wordpress.com/2016/07/04/previewing-the-new-unity/ === Ubuntu App Developer Blog: Shaping up universal snaps === David Planella writes that Snap user and developer experience is a major focus at the next Heidelberg, Germany meeting, from 18-22 July. Projects such as Debian, Elementary OS, Fedora, KDE, Kubuntu, MATE or VLC have already confirmed participation at the event. He also includes a link to apply for participation. http://developer.ubuntu.com/en/blog/2016/07/04/shaping-universal-snaps/ === Stephen M. Webb: X11 Applications and Unity 8 === Stephen M. Webb writes that convergence has been a big topic in the community, with a goal to have one Ubuntu version for all devices. He shares details about how Unity 8, which is a graphical shell that presents a way to surface and launch applications and display some information, brings us convergence. He writes, "Part of the magic underlying Unity 8 is the Mir compositing display server, which replaces the venerable X11 display server" and goes on to explain how Libertine will be used to run X11 applications in Mir on Unity 8. https://bregmatter.wordpress.com/2016/07/04/x11-applications-and-unity-8/ === Zygmunt Krynicki: Fresh bite-sized bugs in snappy === Zygmunt Krynicki writes how you can get involved in the snappy project, sharing that that there are plenty of new bugs to work on and extends the invitation to anyone wanting to help. http://www.zygoon.pl/2016/07/fresh-bite-sized-bugs-in-snappy.html === Ubuntu App Developer Blog: Announcing new snap desktop launchers === Didier Roche, writing for the Ubuntu App Developer Blog, announces new desktop launchers. "The goal," he writes, "was to streamline the experience and make sure that all following user visible features are working, independent of the toolkit or technology you are using." HE shares that there are currently 5 launchers, depending on the technology you want to support: gtk2, gtk3, qt4, qt5 and glib-only for a lightweight, non graphical app, but needing basic integration like GSettings and MIME types. http://developer.ubuntu.com/en/blog/2016/07/06/announcing-new-snap-desktop-launchers/ === Daniel Pocock: Can you help with monitoring packages in Debian and Ubuntu? === Daniel Pocock writes about monitoring packages in Debian and Ubuntu, the uses of them, and how to help maintain monitoring packages in Debian. He writes, "Monitoring packages are for everyone. Even if you are a single user or developer with a single desktop or laptop and no servers, you may still find some of these packages useful." https://danielpocock.com/help-monitoring-packages-in-debian-and-ubuntu === Ubuntu Studio: Backports, the benefits and the consequences. === The Ubuntu Studio team announces that backports are coming soon to 14.04 and 16.04, explaining that these are development versions of software ported to stable releases. They explain the potential pitfalls of making these upgrades and offer advice on how to do it. While not released yet, they provide a road map of upcoming backports, with the Ardour application being the first to come. http://ubuntustudio.org/2016/07/backports-the-benefits-and-the-consequences/ === Daniel Holbach: Contributing to the world of snaps === Daniel Holbach points out some small but meaningful ways that you can contribute to Snappy. He briefly highlights contributing to snapd and Snapcraft, but goes on to talk about contributing to documentation, answering questions on AskUbuntu, and much more. https://daniel.holba.ch/blog/2016/07/contributing-to-the-world-of-snaps/ === Canonical Design Team: Getting Vanilla ready for v1: the roadmap === Inayaili de Leon Persson reports that Vanilla is expecting its first official release in early September 2016. Inayaili reminds us how projects need short, mid and long term goals to help them achieve intended results and lists some of those (via link to Trello roadmap) for Vanilla. The purpose of the blog post is to document the process that a Vanilla pattern should follow, which includes a diagram showing steps before submission through to full acceptance, but please note that this is still a work-in-progress. http://design.canonical.com/2016/07/getting-vanilla-ready-for-v1-the-roadmap/ === Canonical Design Team: See our designs on Behance and Dribble === Steph Wilson quickly shares links to the Canonical Design Team Dribble and Bechance pages, noting they may be helpful for design inspiration. http://design.canonical.com/2016/07/follow-us-on-behance-and-dribble-for-all-the-latest-designs/ === Chuck Short: Live migration with nova-lxd === Chuck Short briefs us on goals for nova-lxd's 16.04 development cycle, giving differences being used for 16.10 leading to live migration. A demo video of this migration is provided, plus commands necessary to implement. https://zulcss.wordpress.com/2016/07/08/live-migration-with-nova-lxd/ === Adolfo Jayme Barrientos: Can you run the Unity desktop environment on Windows? Yes! === Adolfo Jayme Barrientos briefly showcases using the Unity 7 desktop environment on Windows 10 using the new Windows Subsystem for Linux. https://fitoschido.wordpress.com/2016/07/09/unity-compiz-on-windows-ubuntu/ == Other Community News == === 10 Desktop Snaps written in June === Didier Roche tells us about ten (10) favorite Snaps created during June, which include Krita, Jenkins, Cassandra, Freecad, Shout, Nextcloud, Htop, Moon-buggy, Hangups and Webdm. Some apps have links to 'uapp Explorer' (the unofficial app viewer for Ubuntu Touch). http://insights.ubuntu.com/2016/07/07/10-desktop-snaps-written-in-june/ == Ubuntu Phone News == === New uNav for Ubuntu Phone! Convergence + Fast POIs + Offline maps! === Marcos Costales writes about the newly released uNav system for the Ubuntu phone. The main improvements being the convergence over many devices, fast and custom POIs and offline maps. http://thinkonbytes.blogspot.com/2016/07/new-unav-for-ubuntu-phone-convergence.html === The difference an OTA can make! === Amrisha Prashar talks about the importance of Over-the Air (OTA) updates for improving the performance of a device still in development. She talks about Ubuntu's first convergence device, the Aquaris M10 Ubuntu Edition tablet and how the overall functioning has been upped by the recent OTA-11 updates. http://insights.ubuntu.com/2016/07/07/the-difference-an-ota-can-make/ === uWriter for Ubuntu Phone: A basic offline word processor === Marcos Costales from blogs about uWriter, a free word processor for the Ubuntu Phone. He summarizes the whole experience in one word: "productivity". http://thinkonbytes.blogspot.com/2016/07/uwriter-for-ubuntu-phone-basic-offline.html === Getting started: Creating Ubuntu Apps with Cordova === David Barth writes about his meeting with the Cordova development team at the recently held Phonegap Day EU. He shares about how both the teams had jointly hosted workshops for developing ubuntu apps with Cordova and also starting the release process for the cordova-ubuntu.4.3.4 http://insights.ubuntu.com/2016/07/07/getting-started-creating-ubuntu-apps-with-cordova/ == Canonical News == * e-shelter and Canonical launch Joint Managed OpenStack Private Cloud - http://insights.ubuntu.com/2016/07/05/e-shelter-and-canonical-launch-joint-managed-openstack-private-cloud/ * Canonical and Pivotal Collaborate to Deliver Cloud Native Platform - http://insights.ubuntu.com/2016/07/06/canonical-and-pivotal-collaborate-to-deliver-cloud-native-platform/ * Mycroft: The open source answer to natural language platforms - http://insights.ubuntu.com/2016/07/07/mycroft-the-open-source-answer-to-natural-language-platforms/ * Digital Signage meets IoT Series continues! - http://insights.ubuntu.com/2016/07/07/digital-signage-meets-iot-series-continues/ == In The Press == === Canonical-Pivotal partnership makes Ubuntu preferred Linux distro for Cloud Foundry === Ron Miller of TechCrunch writes about the announcement regarding the official partnership between Canonical and Pivotal, creators of the open source cloud development platform Cloud Foundry. He explains that with this announcement, not only does Ubuntu become the default Linux distro for the platform, but it also gives users additional support from Canonical nd Ubuntu. He goes on to note that the two companies will be working on a security certification framework, naturally based around Ubuntu. https://techcrunch.com/2016/07/06/canonical-pivotal-partnership-makes-ubuntu-preferred-linux-distro-for-cloud-foundry/ === Dell XPS 13 Developer Edition review === Matt Farrington-Smith from The Inquirer reviews the newly released Dell XPS 13 laptop running on Ubuntu 14.04 SP1. This detailed review starts off with the hardware specs and the design of the laptop and continues into the software specs in the following page. He talks about the ease of installation and points out difficulties in moving from a Windows based OS to a Linux distro. http://www.theinquirer.net/inquirer/review/2464058/dell-xps-13-developer-edition-review == In The Blogosphere == === Dekko Is Shaping Up Nicely for Desktop Convergence === Joey-Elijah Sneddon from OMG! Ubuntu! speaks about Ubuntu's native email client, Dekko, and its growth into an email client for Ubuntu desktop. He quotes that the current version is apt for Ubuntu phone and tablet and will surely be developed into a standard Ubuntu desktop issue in the near future. http://www.omgubuntu.co.uk/2016/07/desktop-dekko-email-app-convergence === A No Frills Weather Applet for Ubuntu === "Just something clear, and concise, and to the point," Joey-Elijah Sneddon from OMG! Ubuntu! talks about a new Ubuntu weather indicator. http://www.omgubuntu.co.uk/2016/07/no-frills-weather-indicator-applet-ubuntu === NVIDIA Announces The GeForce GTX 1060, Linux Tests Happening === Michael Larabel from Phoronix discusses about NVIDIA's newly released GeForce GTX 1060 pascal graphics card and its subsequent testing in Ubuntu Linux. Laden with ample pictures of the product, he closes with a briefing about the NVidia Linux drivers for the new graphics card. http://www.phoronix.com/scan.php?page=article&item=nvidia-gtx1060-soft&num=1 === Ubuntu Touch OTA-13 to Introduce a New Power Manager for Ubuntu Phones, Tablets === Marius Nestor from Softpedia writes about the soon to be released OTA-12 updates for Ubuntu phones and tablets. He quotes that nothing new is to be expected other than bug fixes and goes on about the next update after OTA-12, the OTA-13 musing that the release might be having an entirely new power management package. http://news.softpedia.com/news/ubuntu-touch-ota-13-to-introduce-a-new-power-manager-for-ubuntu-phones-tablets-505979.shtml === Snap Packages vs. Flatpaks: The Differences and Which One You Should Use === Derrik Deiner from Make Tech Easier compare and contrasts about the two leading packaging software, Snappy , an Ubuntu based software developed by Canonical and Flatpaks, more of an open source version offering similar functionality. In answering "which is better?" he sums up by betting on both, stating two is better than one. Editorial comment from UWN staff: This article provides valuable information comparing the formats, but it is worthy to note that Snaps are not actually "hard-coded to use the Snap package store" run by Canonical as the article states, it is possible to run your own snap repository. https://www.maketecheasier.com/snap-packages-vs-flatpacks/ === Nexus 6 Is Now an Unofficial Ubuntu Phone, Wi-Fi & Bluetooth Support Coming Soon === Marius Nestor from Softpedia writes about an exclusive interview with Marius Gripsgard, a developer of unoffical ubuntu softwares for various devices. With the recent software updates to Ubuntu Touch phones like OnePlus and Nexus 5, he reports that the Ubuntu software might be up and running in the next edition of nexus, the Nexus 6. http://news.softpedia.com/news/nexus-6-is-now-an-unofficial-ubuntu-phone-wi-fi-bluetooth-support-coming-soon-506050.shtml === 32-bit Linux is Disappearing: What It Means for the Channel === Christopher Tozzi of The Var Guy reviews the implications of Dimitri John Ledkov's proposal to end support for 32-bit processors in Ubuntu by April 2018. He suggests that as hardware has become more and more similar, it will make the job of software vendors significantly easier. On the other hand, he notes that mobile platforms are becoming increasingly more complex, with x86 builds becoming as common as ARM ones. http://thevarguy.com/open-source-application-software-companies/32-bit-linux-disappearing-what-it-means-channel === Star Cloud PCG03U is a compact Ubuntu PC for $90 === Brad Linder from Liliputing writes about the Star Cloud PCG03U, a small computer running Ubuntu 14.04 LTS. He writes, "...at $90, it's certainly an affordable option for folks looking for a small, fanless, low-power Ubuntu computer that you can use in the living room or in an office." http://liliputing.com/2016/07/star-cloud-pcg03u-compact-ubuntu-pc-90.html == Featured Audio and Video == === Ubuntu Community Team Q&A - 5th July 2016 === The Ubuntu community team convenes again for their weekly Q&A session in which they discuss community news and field questions from the audience. === Ubuntu Podcast from the UK LoCo: S09E19 - Perfectly Preserved Brain - Ubuntu Podcast === In this week's edition of the Ubuntu Podcast, the hosts discuss AMD's recently released Linux drivers, Mozilla's first round of funding for its Mission Partners program, and the 0day exploit for Lenovo's Thinkpad System Management Mode. The hosts also cover several community related news items including the release of Snapcraft 2.12 and uNav offline maps. http://ubuntupodcast.org/2016/07/07/s09e19-perfectly-preserved-brain/ === Full Circle Weekly News #25 === Just a quick message to let you know that Full Circle Weekly News #25 is out: http://fullcirclemagazine.org/podcast/full-circle-weekly-news-25 and, Full Circle Magazine #110 came out a couple of weeks ago: http://fullcirclemagazine.org/issue-110 The show is also available via: RSS: http://fullcirclemagazine.org/feed/podcast Stitcher Radio: http://www.stitcher.com/s?fid=85347&refid=stpr TuneIn Radio: http://tunein.com/radio/Full-Circle-Weekly-News-p855064/ and PlayerFM: https://player.fm/series/the-full-circle-weekly-news == Weekly Ubuntu Development Team Meetings == * Kernel Team - July 5, 2016 - https://wiki.ubuntu.com/KernelTeam/Newsletter/2016-07-05 * Server Team - July 5, 2016 - https://wiki.ubuntu.com/MeetingLogs/Server/20160705 == Upcoming Meetings and Events == For upcoming meetings and events please visit the calendars at fridge.ubuntu.com: http://fridge.ubuntu.com/calendars/ == Updates and Security for 12.04, 14.04, 15.10 and 16.04 == === Security Updates === * [uSN-3024-1] Tomcat vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003487.html * [uSN-3025-1] GIMP vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003488.html * [uSN-3026-1] libimobiledevice vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003489.html * [uSN-3026-2] libusbmuxd vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003490.html * [uSN-3027-1] Tomcat vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-July/003491.html === Ubuntu 12.04 Updates === * tzdata 2016e-0ubuntu0.12.04 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025399.html * passenger 2.2.11debian-2+deb6u1ubuntu12.04.2 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025400.html * tomcat6 6.0.35-1ubuntu3.7 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025401.html * gimp 2.6.12-1ubuntu1.4 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025402.html * passenger 2.2.11debian-2+deb6u1ubuntu12.04.2 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025403.html * gimp 2.6.12-1ubuntu1.4 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025404.html * tomcat6 6.0.35-1ubuntu3.7 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025405.html * tzdata 2016f-0ubuntu0.12.04 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025406.html * tzdata 2016f-0ubuntu0.12.04 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025407.html * tzdata 2016f-0ubuntu0.12.04 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025408.html * shim-signed 1.17~12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025409.html * grub2 1.99-21ubuntu3.20 - https://lists.ubuntu.com/archives/precise-changes/2016-July/025410.html End of Life - April 2017 === Ubuntu 14.04 Updates === * libqb 0.16.0.real-1ubuntu5 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022387.html * nova 1:2014.1.5-0ubuntu1.5 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022388.html * nova 1:2014.1.5-0ubuntu1.5 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022389.html * grub2-signed 1.34.13 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022390.html * xserver-xorg-video-vmware-lts-xenial 1:13.1.0-2ubuntu3~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022391.html * xserver-xorg-video-vesa-lts-xenial 1:2.3.4-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022392.html * xserver-xorg-video-trident-lts-xenial 1:1.3.7-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022393.html * xserver-xorg-video-tdfx-lts-xenial 1:1.4.6-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022394.html * xserver-xorg-video-sisusb-lts-xenial 1:0.9.6-2build5~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022395.html * xserver-xorg-video-siliconmotion-lts-xenial 1:1.7.8-1ubuntu6~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022396.html * xserver-xorg-video-savage-lts-xenial 1:2.3.8-1ubuntu3~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022397.html * xserver-xorg-video-r128-lts-xenial 6.10.0-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022398.html * xserver-xorg-video-qxl-lts-xenial 0.1.4-3ubuntu3~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022399.html * xserver-xorg-video-openchrome-lts-xenial 1:0.3.3+git20160310-1~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022400.html * xserver-xorg-video-nouveau-lts-xenial 1:1.0.12-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022401.html * xserver-xorg-video-neomagic-lts-xenial 1:1.2.9-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022402.html * xserver-xorg-video-mga-lts-xenial 1:1.6.4-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022403.html * xserver-xorg-video-mach64-lts-xenial 6.9.5-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022404.html * xserver-xorg-video-intel-lts-xenial 2:2.99.917+git20160325-1ubuntu1~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022405.html * xserver-xorg-video-geode-lts-xenial 2.11.18-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022406.html * xserver-xorg-video-freedreno-lts-xenial 1.4.0-1build1~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022407.html * xserver-xorg-video-fbdev-lts-xenial 1:0.4.4-1build5~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022410.html * xserver-xorg-video-dummy-lts-xenial 1:0.3.7-1build5~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022408.html * xserver-xorg-video-cirrus-lts-xenial 1:1.5.3-1ubuntu3~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022409.html * xserver-xorg-video-ati-lts-xenial 1:7.7.0-1~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022411.html * xserver-xorg-video-amdgpu-lts-xenial 1.1.0-1~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022412.html * xserver-xorg-input-void-lts-xenial 1:1.4.1-1build2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022413.html * xserver-xorg-input-vmmouse-lts-xenial 1:13.1.0-1ubuntu2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022414.html * xserver-xorg-input-synaptics-lts-xenial 1.8.2-1ubuntu3~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022415.html * xserver-xorg-input-joystick-lts-xenial 1:1.6.2-1build4~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022416.html * xserver-xorg-input-evdev-lts-xenial 1:2.10.1-1ubuntu2~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022417.html * xf86-input-wacom-lts-xenial 1:0.32.0-0ubuntu3~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022418.html * xf86-input-mtrack-lts-xenial 0.3.1-1build1~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022419.html * tzdata 2016e-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022420.html * tomcat7 7.0.52-1ubuntu0.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022421.html * gimp 2.8.10-0ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022422.html * libimobiledevice 1.1.5+git20140313.bafe6a9e-0ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022423.html * gimp 2.8.10-0ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022424.html * tomcat7 7.0.52-1ubuntu0.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022425.html * tzdata 2016f-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022426.html * libimobiledevice 1.1.5+git20140313.bafe6a9e-0ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022427.html * openldap 2.4.31-1+nmu2ubuntu8.3 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022428.html * unity 7.2.6+14.04.20160408-0ubuntu1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022429.html * unity 7.2.6+14.04.20160408-0ubuntu1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022430.html * tzdata 2016f-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022431.html * tzdata 2016f-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022432.html * qemu 2.0.0+dfsg-2ubuntu1.25 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022433.html * vmware-view-client 4.1.0-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022434.html * xorg-lts-xenial 1:7.7+13ubuntu3~trusty1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022435.html * shim-signed 1.17~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-July/022436.html End of Life - April 2019 === Ubuntu 15.10 Updates === * xen 4.5.1-0ubuntu1.4 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013420.html * xen 4.5.1-0ubuntu1.4 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013421.html * tzdata 2016e-0ubuntu0.15.10 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013422.html * tomcat7 7.0.64-1ubuntu0.3 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013423.html * gimp 2.8.14-1ubuntu2.1 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013424.html * libimobiledevice 1.1.6+dfsg-3.1ubuntu0.1 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013425.html * libusbmuxd 1.0.9-1ubuntu0.1 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013426.html * gimp 2.8.14-1ubuntu2.1 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013427.html * tomcat7 7.0.64-1ubuntu0.3 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013428.html * tzdata 2016f-0ubuntu0.15.10 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013429.html * libimobiledevice 1.1.6+dfsg-3.1ubuntu0.1 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013430.html * libusbmuxd 1.0.9-1ubuntu0.1 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013431.html * tzdata 2016f-0ubuntu0.15.10 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013432.html * tzdata 2016f-0ubuntu0.15.10 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013433.html * shim-signed 1.17~15.10.1 - https://lists.ubuntu.com/archives/wily-changes/2016-July/013434.html End of Life - July 2016 === Ubuntu 16.04 Updates === * mozc 2.17.2116.102+gitfd0f5b34+dfsg-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013865.html * abiword 3.0.1-6ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013866.html * gnome-documents 3.18.3-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013867.html * command-not-found 0.3ubuntu16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013868.html * gnome-taquin 3.20.2-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013869.html * gnome-software 3.20.1+git20160617.1.0440874.ubuntu-xenial-0ubuntu1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013870.html * dh-make 2.201605~xenial1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013871.html * zfs-linux 0.6.5.6-0ubuntu10 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013872.html * ubuntu-themes 14.04+16.04.20160621-0ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013873.html * linux-firmware 1.157.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013874.html * bash 4.3-14ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013875.html * software-properties 0.96.20.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013876.html * golang-gopkg-macaroon.v1 0.0~git20150121.0.ab3940c-0ubuntu1~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013877.html * gcc-5 5.4.0-6ubuntu1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013878.html * mu-cade 0.11.dfsg1-11~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013879.html * librtas 2.0.0-1ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013880.html * photutils 0.2.1-5ubuntu1~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013881.html * gimp 2.8.16-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013882.html * ubuntu-defaults-builder 0.55~16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013883.html * wcsaxes 0.6-5ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013884.html * tzdata 2016e-0ubuntu0.16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013885.html * gimp 2.8.16-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013886.html * tomcat7 7.0.68-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013887.html * libimobiledevice 1.2.0+dfsg-3~ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013888.html * libusbmuxd 1.0.10-2ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013889.html * tomcat7 7.0.68-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013890.html * tzdata 2016f-0ubuntu0.16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013891.html * libimobiledevice 1.2.0+dfsg-3~ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013892.html * libusbmuxd 1.0.10-2ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013893.html * spl-linux 0.6.5.6-0ubuntu4 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013894.html * percona-server-5.6 5.6.22-rel71.0-0ubuntu4.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013895.html * libtsm 3-1build0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013896.html * fpgatools 0.0+201212-1build0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013897.html * percona-xtradb-cluster-5.6 5.6.21-25.8-0ubuntu3.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013898.html * gambas3 3.8.4-2ubuntu3.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013899.html * fonts-cantarell 0.0.24-1~ubuntu16.04.0 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013900.html * percona-xtrabackup 2.2.3-2.1build1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013901.html * ubuntu-mate-settings 16.04.5.3 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013902.html * powerpc-utils 1.3.1-2ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013903.html * tzdata 2016f-0ubuntu0.16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013904.html * tzdata 2016f-0ubuntu0.16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013905.html * live-build 3.0~a57-1ubuntu25.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013906.html * containerd 0.2.1-0ubuntu4~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013907.html * lsb 9.20160110ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013908.html * tomcat8 8.0.32-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013909.html * tomcat8 8.0.32-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013910.html * lsb 9.20160110ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013911.html * nuitka 0.5.21.2+ds-1~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013912.html * python3.5 3.5.2-2~16.01 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013913.html * docker.io 1.11.2-0ubuntu5~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013914.html * shim-signed 1.17~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013915.html * plasma-framework 5.18.0-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013916.html * starpu-contrib 1.1.5-0ubuntu4.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013917.html * gcc-5-cross 24ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013918.html * gcc-5-cross-ports 10ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013919.html * snapd 2.0.10 - https://lists.ubuntu.com/archives/xenial-changes/2016-July/013920.html End of Life - April 2021 == Subscribe == Get your copy of the Ubuntu Weekly Newsletter delivered each week to you via email at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-news == Archives == You can always find older Ubuntu Weekly Newsletter issues at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter == Additional Ubuntu News == As always you can find more news and announcements at: http://insights.ubuntu.com/ and http://fridge.ubuntu.com/ == Conclusion == Thank you for reading the Ubuntu Weekly Newsletter. See you next week! == Credits == The Ubuntu Weekly Newsletter is brought to you by: * Elizabeth K. Joseph * Walter Lapchynski * Leonard Viator * Simon Quigley * Chris Guiver * Athul Muralidhar * Chris Sirrs * And many others == Glossary of Terms == Other acronyms can be found at https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/glossary == Ubuntu - Get Involved == The Ubuntu community consists of individuals and teams, working on different aspects of the distribution, giving advice and technical support, and helping to promote Ubuntu to a wider audience. No contribution is too small, and anyone can help. It's your chance to get in on all the community fun associated with developing and promoting Ubuntu. http://community.ubuntu.com/contribute/ Or get involved with the Ubuntu Weekly Newsletter team! We always need summary writers and editors, if you're interested, learn more at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Join == Feedback == This document is maintained by the Ubuntu Weekly News Team. If you have a story idea or suggestions for the Weekly Newsletter, join the
  6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Pre-registration for the Flock conference (August 2-5 in Kraków) will close at 1700 UTC (1:00pm US-Eastern, 7:00pm Central Europe) on Wednesday, 2016-Jul-13. If you *are* pre-registered, and do not intend to come to Flock, please email to notify the team. FAQ === Q: What does pre-registration cutoff mean? A: We will accept attendees for Flock even on the days of the conference without a registration. However, we need to set a cutoff point to calculate budget for swag, meals, etc. If you are not registered to attend Flock before Wednesday, we cannot guarantee meals, a T-shirt, or the ability to attend evening events. Q: Can I still attend Flock if I'm not pre-registered? A: Absolutely. Attendance is free and open even if you're not pre-registered. You may get, for example, a hand-printed badge, and you may not get swag. But you are still welcome to attend. Q: If I didn't pre-register, can I attend social events? A: The Flock team will try to accommodate everyone, and this has worked out in the past. However, because some social events are paid based on the number of pre-registrations, spots cannot be guaranteed for those who don't pre-register. Q: If I'm a speaker, should I be pre-registered? A: Yes, you should be, but *YOU* are responsible for pre-registering. Visit to pre-register before the deadline! A reminder is also going out to speakers via their mailing list. If you have other questions, email and the friendly Flock staff will do their best to answer. - -- Paul W. Frields http://paul.frields.org/ gpg fingerprint: 3DA6 A0AC 6D58 FEC4 0233 5906 ACDB C937 BD11 3717 http://redhat.com/ - - - - http://pfrields.fedorapeople.org/ The open source story continues to grow: http://opensource.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXg/DmrNvJN70RNxcRAo3cAKDBdZI/qbI9NYwc4caMrdjuvcGQDwCgqrKc xSst3KgyD5yjOp2OPz7SHEY= =cYAf -----END PGP SIGNATURE----- --
  7. We have posted a new solid state report!! ------------------------------------------------------------ http://us7.campaign-archive1.com/?u=3d9b6193ffd32dd60e84fc74b&id=4ddfe89064&e=1230c2ab07 http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=98ac9c9da9&e=1230c2ab07 TITLE: Samsung 850 EVO SSD Review (4TB) – Bigger than Ever!!! LINK: http://thessdreview.us7.list-manage1.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=9f00f110ed&e=1230c2ab07 PHOTO: http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=52b9642c0a&e=1230c2ab07 INFO: Samsung is a force to be reckoned with in the SSD market. With such a large share, they are the biggest player there is. This allows them to push the boundaries of what products they can deliver and when. In today’s case, Samsung has just released another update to their 850 EVO line, this time it is huge. First launched in late 2014 (http://thessdreview.us7.list-manage1.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=ecfee89801&e=1230c2ab07) , the Samsung 850 EVO has been one of the most successful storage products yet. With so many sold and consumers demanding more capacity, they initially expanded their capacity range to 2TB last year (http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=94dd2526b2&e=1230c2ab07) , however, if you thought a 2TB SSD was enough, think again. Today we have in our hands a 4TB 850 EVO with their latest 48-layer V-NAND (http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=be3d4fede7&e=1230c2ab07) . That’s right, a 4TB consumer SSD! Because you wanted it, they delivered. With 4TB of capacity, the Samsung 850 EVO is the largest consumer SSD out. SSDs are now starting to nip at the heels of HDDs in terms of shear storage capacity and we don’t expect it to be much longer until SSDs match or exceed them, though the price may not be as great as we hope. Because of its large capacity, it comes with an even larger price tag. $1499.99 to be exact (http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=4b72595777&e=1230c2ab07) . While that is the cost of a whole gaming system and out of the reach of many, if you have the need for a drive of this size and the ability to buy one, there is nothing else currently comparable…except for something of the enterprise flavor, but if that were the case, you probably wouldn’t mind a few of these on top as backup drives now would you? We sure wouldn’t! Anyways, the thought of a 4TB in a laptop or desktop system used to be a dream to many, but now it can be a reality to some. Enough with the gibber gabber, let’s get on with the review shall we? _________________________________________________________________________________________
  8. Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,Modders have it so easy these days. I remember a time when modding actually required skill.Subject: Cooler Master Masterbox 5 Case Review ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/reviews/cases/cm_masterbox-5Quote: The modular aspect of the MasterBox 5 gives end-users the chance to spend more money on their components and put together a really nice looking system without having to break out the Dremel.A news posting would be appreciated.ThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved
  9. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: EVGA GeForce GTX 1070 SuperClocked 8 GB Link: http://www.techpowerup.com/reviews/EVGA/GTX_1070_SC Brief: EVGA's GeForce GTX 1070 SuperClocked comes with the company's new ACX 3.0 thermal solution, which uses a dual-fan, dual-slot heatsink to keep the card cool no matter what you throw at it. The card is also the quietest GTX 1070 we tested so far - even quieter than the MSI GTX 1070 Gaming.
  10. SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1782-1 Rating: important References: #983234 #983253 #983259 #983292 #983305 #983308 #983521 #983523 #983533 #983739 #983746 #983752 #983774 #983794 #983796 #983799 #983803 #984018 #984023 #984028 #984032 #984035 #984135 #984137 #984142 #984144 #984145 #984150 #984160 #984166 #984181 #984184 #984185 #984186 #984187 #984193 #984370 #984372 #984373 #984374 #984375 #984379 #984394 #984398 #984400 #984401 #984408 #984409 #984433 #984436 #985442 #985448 #985451 #985456 #985460 #986608 #986609 Cross-References: CVE-2014-9805 CVE-2014-9806 CVE-2014-9807 CVE-2014-9808 CVE-2014-9809 CVE-2014-9810 CVE-2014-9811 CVE-2014-9812 CVE-2014-9813 CVE-2014-9814 CVE-2014-9815 CVE-2014-9816 CVE-2014-9817 CVE-2014-9818 CVE-2014-9819 CVE-2014-9820 CVE-2014-9822 CVE-2014-9823 CVE-2014-9824 CVE-2014-9826 CVE-2014-9828 CVE-2014-9829 CVE-2014-9830 CVE-2014-9831 CVE-2014-9834 CVE-2014-9835 CVE-2014-9836 CVE-2014-9837 CVE-2014-9838 CVE-2014-9839 CVE-2014-9840 CVE-2014-9842 CVE-2014-9844 CVE-2014-9845 CVE-2014-9846 CVE-2014-9847 CVE-2014-9849 CVE-2014-9851 CVE-2014-9853 CVE-2014-9854 CVE-2015-8894 CVE-2015-8896 CVE-2015-8897 CVE-2015-8898 CVE-2015-8901 CVE-2015-8902 CVE-2015-8903 CVE-2016-4562 CVE-2016-4563 CVE-2016-4564 CVE-2016-5687 CVE-2016-5688 CVE-2016-5689 CVE-2016-5690 CVE-2016-5691 CVE-2016-5841 CVE-2016-5842 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes 57 vulnerabilities is now available. Description: ImageMagick was updated to fix 55 security issues. These security issues were fixed: - CVE-2014-9810: SEGV in dpx file handler (bsc#983803). - CVE-2014-9811: Crash in xwd file handler (bsc#984032). - CVE-2014-9812: NULL pointer dereference in ps file handling (bsc#984137). - CVE-2014-9813: Crash on corrupted viff file (bsc#984035). - CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193). - CVE-2014-9815: Crash on corrupted wpg file (bsc#984372). - CVE-2014-9816: Out of bound access in viff image (bsc#984398). - CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400). - CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181). - CVE-2014-9819: Heap overflow in palm files (bsc#984142). - CVE-2014-9830: Handling of corrupted sun file (bsc#984135). - CVE-2014-9831: Handling of corrupted wpg file (bsc#984375). - CVE-2014-9836: Crash in xpm file handling (bsc#984023). - CVE-2014-9851: Crash when parsing resource block (bsc#984160). - CVE-2016-5689: NULL ptr dereference in dcm coder (bsc#985460). - CVE-2014-9853: Memory leak in rle file handling (bsc#984408). - CVE-2015-8902: PDB file DoS (CPU consumption) (bsc#983253). - CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259). - CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234). - CVE-2014-9834: Heap overflow in pict file (bsc#984436). - CVE-2014-9806: Prevent file descriptr leak due to corrupted file (bsc#983774). - CVE-2014-9838: Out of memory crash in magick/cache.c (bsc#984370). - CVE-2014-9854: Filling memory during identification of TIFF image (bsc#984184). - CVE-2015-8898: Prevent null pointer access in magick/constitute.c (bsc#983746). - CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523). - CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533). - CVE-2015-8897: Out of bounds error in SpliceImage (bsc#983739). - CVE-2016-5690: Bad foor loop in DCM coder (bsc#985451). - CVE-2016-5691: Checks for pixel.red/green/blue in dcm coder (bsc#985456). - CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752). - CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796). - CVE-2014-9820: heap overflow in xpm files (bsc#984150). - CVE-2014-9823: heap overflow in palm file (bsc#984401). - CVE-2014-9822: heap overflow in quantum file (bsc#984187). - CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379). - CVE-2014-9824: Heap overflow in psd file (bsc#984185). - CVE-2014-9809: Fix a SEGV due to corrupted xwd images. (bsc#983799). - CVE-2014-9826: Incorrect error handling in sun files (bsc#984186). - CVE-2014-9842: Memory leak in psd handling (bsc#984374). - CVE-2016-5687: Out of bounds read in DDS coder (bsc#985448). - CVE-2014-9840: Out of bound access in palm file (bsc#984433). - CVE-2014-9847: Incorrect handling of "previous" image in the JNG decoder (bsc#984144). - CVE-2014-9846: Added checks to prevent overflow in rle file. (bsc#983521). - CVE-2014-9845: Crash due to corrupted dib file (bsc#984394). - CVE-2014-9844: Out of bound issue in rle file (bsc#984373). - CVE-2014-9849: Crash in png coder (bsc#984018). - CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442). - CVE-2014-9807: Fix a double free in pdb coder. (bsc#983794). - CVE-2014-9829: Out of bound access in sun file (bsc#984409). - CVE-2016-4564: The DrawImage function in MagickCore/draw.c in ImageMagick made an incorrect function call in attempting to locate the next token, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983308). - CVE-2016-4563: The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick mishandled the relationship between the BezierQuantum value and certain strokes data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983305). - CVE-2016-4562: The DrawDashPolygon function in MagickCore/draw.c in ImageMagick mishandled calculations of certain vertices integer data, which allowed remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file (bsc#983292). - CVE-2014-9837: Additional PNM sanity checks (bsc#984166). - CVE-2014-9835: Heap overflow in wpf file (bsc#984145). - CVE-2014-9828: Corrupted (too many colors) psd file (bsc#984028). - CVE-2016-5841: Integer overflow could have read to RCE (bnc#986609). - CVE-2016-5842: Out-of-bounds read in MagickCore/property.c:1396 could have lead to memory leak (bnc#986608). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-ImageMagick-12643=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-ImageMagick-12643=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-ImageMagick-12643=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): ImageMagick-6.4.3.6-7.45.1 ImageMagick-devel-6.4.3.6-7.45.1 libMagick++-devel-6.4.3.6-7.45.1 libMagick++1-6.4.3.6-7.45.1 libMagickWand1-6.4.3.6-7.45.1 perl-PerlMagick-6.4.3.6-7.45.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64 s390x x86_64): libMagickWand1-32bit-6.4.3.6-7.45.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libMagickCore1-6.4.3.6-7.45.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): libMagickCore1-32bit-6.4.3.6-7.45.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): ImageMagick-debuginfo-6.4.3.6-7.45.1 ImageMagick-debugsource-6.4.3.6-7.45.1 References: https://www.suse.com/security/cve/CVE-2014-9805.html https://www.suse.com/security/cve/CVE-2014-9806.html https://www.suse.com/security/cve/CVE-2014-9807.html https://www.suse.com/security/cve/CVE-2014-9808.html https://www.suse.com/security/cve/CVE-2014-9809.html https://www.suse.com/security/cve/CVE-2014-9810.html https://www.suse.com/security/cve/CVE-2014-9811.html https://www.suse.com/security/cve/CVE-2014-9812.html https://www.suse.com/security/cve/CVE-2014-9813.html https://www.suse.com/security/cve/CVE-2014-9814.html https://www.suse.com/security/cve/CVE-2014-9815.html https://www.suse.com/security/cve/CVE-2014-9816.html https://www.suse.com/security/cve/CVE-2014-9817.html https://www.suse.com/security/cve/CVE-2014-9818.html https://www.suse.com/security/cve/CVE-2014-9819.html https://www.suse.com/security/cve/CVE-2014-9820.html https://www.suse.com/security/cve/CVE-2014-9822.html https://www.suse.com/security/cve/CVE-2014-9823.html https://www.suse.com/security/cve/CVE-2014-9824.html https://www.suse.com/security/cve/CVE-2014-9826.html https://www.suse.com/security/cve/CVE-2014-9828.html https://www.suse.com/security/cve/CVE-2014-9829.html https://www.suse.com/security/cve/CVE-2014-9830.html https://www.suse.com/security/cve/CVE-2014-9831.html https://www.suse.com/security/cve/CVE-2014-9834.html https://www.suse.com/security/cve/CVE-2014-9835.html https://www.suse.com/security/cve/CVE-2014-9836.html https://www.suse.com/security/cve/CVE-2014-9837.html https://www.suse.com/security/cve/CVE-2014-9838.html https://www.suse.com/security/cve/CVE-2014-9839.html https://www.suse.com/security/cve/CVE-2014-9840.html https://www.suse.com/security/cve/CVE-2014-9842.html https://www.suse.com/security/cve/CVE-2014-9844.html https://www.suse.com/security/cve/CVE-2014-9845.html https://www.suse.com/security/cve/CVE-2014-9846.html https://www.suse.com/security/cve/CVE-2014-9847.html https://www.suse.com/security/cve/CVE-2014-9849.html https://www.suse.com/security/cve/CVE-2014-9851.html https://www.suse.com/security/cve/CVE-2014-9853.html https://www.suse.com/security/cve/CVE-2014-9854.html https://www.suse.com/security/cve/CVE-2015-8894.html https://www.suse.com/security/cve/CVE-2015-8896.html https://www.suse.com/security/cve/CVE-2015-8897.html https://www.suse.com/security/cve/CVE-2015-8898.html https://www.suse.com/security/cve/CVE-2015-8901.html https://www.suse.com/security/cve/CVE-2015-8902.html https://www.suse.com/security/cve/CVE-2015-8903.html https://www.suse.com/security/cve/CVE-2016-4562.html https://www.suse.com/security/cve/CVE-2016-4563.html https://www.suse.com/security/cve/CVE-2016-4564.html https://www.suse.com/security/cve/CVE-2016-5687.html https://www.suse.com/security/cve/CVE-2016-5688.html https://www.suse.com/security/cve/CVE-2016-5689.html https://www.suse.com/security/cve/CVE-2016-5690.html https://www.suse.com/security/cve/CVE-2016-5691.html https://www.suse.com/security/cve/CVE-2016-5841.html https://www.suse.com/security/cve/CVE-2016-5842.html https://bugzilla.suse.com/983234 https://bugzilla.suse.com/983253 https://bugzilla.suse.com/983259 https://bugzilla.suse.com/983292 https://bugzilla.suse.com/983305 https://bugzilla.suse.com/983308 https://bugzilla.suse.com/983521 https://bugzilla.suse.com/983523 https://bugzilla.suse.com/983533 https://bugzilla.suse.com/983739 https://bugzilla.suse.com/983746 https://bugzilla.suse.com/983752 https://bugzilla.suse.com/983774 https://bugzilla.suse.com/983794 https://bugzilla.suse.com/983796 https://bugzilla.suse.com/983799 https://bugzilla.suse.com/983803 https://bugzilla.suse.com/984018 https://bugzilla.suse.com/984023 https://bugzilla.suse.com/984028 https://bugzilla.suse.com/984032 https://bugzilla.suse.com/984035 https://bugzilla.suse.com/984135 https://bugzilla.suse.com/984137 https://bugzilla.suse.com/984142 https://bugzilla.suse.com/984144 https://bugzilla.suse.com/984145 https://bugzilla.suse.com/984150 https://bugzilla.suse.com/984160 https://bugzilla.suse.com/984166 https://bugzilla.suse.com/984181 https://bugzilla.suse.com/984184 https://bugzilla.suse.com/984185 https://bugzilla.suse.com/984186 https://bugzilla.suse.com/984187 https://bugzilla.suse.com/984193 https://bugzilla.suse.com/984370 https://bugzilla.suse.com/984372 https://bugzilla.suse.com/984373 https://bugzilla.suse.com/984374 https://bugzilla.suse.com/984375 https://bugzilla.suse.com/984379 https://bugzilla.suse.com/984394 https://bugzilla.suse.com/984398 https://bugzilla.suse.com/984400 https://bugzilla.suse.com/984401 https://bugzilla.suse.com/984408 https://bugzilla.suse.com/984409 https://bugzilla.suse.com/984433 https://bugzilla.suse.com/984436 https://bugzilla.suse.com/985442 https://bugzilla.suse.com/985448 https://bugzilla.suse.com/985451 https://bugzilla.suse.com/985456 https://bugzilla.suse.com/985460 https://bugzilla.suse.com/986608 https://bugzilla.suse.com/986609 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  11. <div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_extra"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr">Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated.</div><div dir="ltr"><br><b>Title:</b> Bitdefender BOX Home Network Security</div><div dir="ltr"><br><strong>Link:  </strong><font color="#1155cc"><u><a href="http://bigbruin.com/content/bitdefender-box_1" target="_blank">http://bigbruin.com/content/<wbr>bitdefender-box_1</a></u></font></div><div dir="ltr"><strong></strong><br><strong>Image (250x250):  </strong><font color="#1155cc"><u><a href="http://bigbruin.com/images/articles/908/promo_1.jpg" target="_blank">http://bigbruin.com/images/<wbr>articles/908/promo_1.jpg</a></u></font></div><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><div class="gmail_quote"><b> </b><div><strong>Quote:</strong></div><div><strong><br></strong></div><div>The Bitdefender BOX is a hardware device that is designed to protect all devices on a user's network (including IoT devices) from malware, viruses, hackers, ransomware, phishing, etc. A vulnerability assessment feature checks your devices to make sure you don't unknowingly have your guard down, which could allow data theft, malicious attacks, or other intrusions. The box also incorporates Active Threat Control (ATC) which is designed to flag suspicious behavior.<br></div><div><br>Best regards,<br><br>Jason<br><a href="http://www.bigbruin.com/" target="_blank"><font color="#0066cc">www.bigbruin.com</font></a><br><br><span style="color:rgb(102,102,102)">---</span><br style="color:rgb(102,102,102)"><br style="color:rgb(102,102,102)"><span style="color:rgb(102,102,102)">If you have tech news of your own, please
  12. ASUS GTX 950-2G “Unplugged†Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=da597ae8ef&e=872093acb5 http://www.kitguru.net ASUS GTX 950-2G “Unplugged†Review Back in early 2014 Nvidia first demonstrated its Maxwell architecture, based on a 28nm process, and in unorthodox fashion the first graphics card to emerge was the low-power GTX 750 Ti. It wasn’t until later on that year that Maxwell was rolled-out to the high performance segment, with the GTX 980. Read the review here: http://www.kitguru.net/components/ryan-martin/asus-gtx-950-2g-unplugged-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend2.com/forward?u=bfb2b902b5fb045ad6f841f98&id=da597ae8ef&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  13. ** TECHSPOT ------------------------------------------------------------ ** Intel Skull Canyon NUC6i7KYK Review ------------------------------------------------------------ ** http://www.techspot.com/review/1202-intel-skull-canyon-nuc6i7kyk/ ------------------------------------------------------------ In an effort to capture some of the lucrative gaming market, Intel has developed a new NUC aimed at enthusiasts and gamers with the Iris Pro Graphics 580. The Skull Canyon NUC6i7KYK is marketed for "intense gameplay," but we'll have to see about that. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  14. ** TECHSPOT ------------------------------------------------------------ ** Intel Skull Canyon NUC6i7KYK Review ------------------------------------------------------------ ** http://www.techspot.com/review/1202-intel-skull-canyon-nuc6i7kyk/ ------------------------------------------------------------ Intel's brand new NUC is targeting gamers with the Iris Pro Graphics 580. The NUC6i7KYK is said to be designed for intense game play but it's not meant as a cost effective gaming solution. The barebones NUC6i7KYK sells for $630 and requires you to bring your own storage, memory and OS, which could easily push the price beyond $1,000. Thank you. Julio Franco Executive Editor | TECHSPOT (http://www.techspot.com) ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  15. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: thunderbird security update Advisory ID: RHSA-2016:1392-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1392 Issue date: 2016-07-11 CVE Names: CVE-2016-2818 ===================================================================== 1. Summary: An update for thunderbird is now available for Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 45.2.0. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2818) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Christian Holler, Gary Kwong, Jesse Ruderman, Tyson Smith, Timothy Nikkel, Sylvestre Ledru, Julian Seward, Olli Pettay, and Karl Tomlinson as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of Thunderbird must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1342887 - CVE-2016-2818 Mozilla: Miscellaneous memory safety hazards (rv:45.2) (MFSA 2016-49) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: thunderbird-45.2-1.el5_11.src.rpm i386: thunderbird-45.2-1.el5_11.i386.rpm thunderbird-debuginfo-45.2-1.el5_11.i386.rpm x86_64: thunderbird-45.2-1.el5_11.x86_64.rpm thunderbird-debuginfo-45.2-1.el5_11.x86_64.rpm Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server): Source: thunderbird-45.2-1.el5_11.src.rpm i386: thunderbird-45.2-1.el5_11.i386.rpm thunderbird-debuginfo-45.2-1.el5_11.i386.rpm x86_64: thunderbird-45.2-1.el5_11.x86_64.rpm thunderbird-debuginfo-45.2-1.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: thunderbird-45.2-1.el6_8.src.rpm i386: thunderbird-45.2-1.el6_8.i686.rpm thunderbird-debuginfo-45.2-1.el6_8.i686.rpm x86_64: thunderbird-45.2-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.2-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: thunderbird-45.2-1.el6_8.src.rpm i386: thunderbird-45.2-1.el6_8.i686.rpm thunderbird-debuginfo-45.2-1.el6_8.i686.rpm ppc64: thunderbird-45.2-1.el6_8.ppc64.rpm thunderbird-debuginfo-45.2-1.el6_8.ppc64.rpm s390x: thunderbird-45.2-1.el6_8.s390x.rpm thunderbird-debuginfo-45.2-1.el6_8.s390x.rpm x86_64: thunderbird-45.2-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.2-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: thunderbird-45.2-1.el6_8.src.rpm i386: thunderbird-45.2-1.el6_8.i686.rpm thunderbird-debuginfo-45.2-1.el6_8.i686.rpm x86_64: thunderbird-45.2-1.el6_8.x86_64.rpm thunderbird-debuginfo-45.2-1.el6_8.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: thunderbird-45.2-1.el7_2.src.rpm x86_64: thunderbird-45.2-1.el7_2.x86_64.rpm thunderbird-debuginfo-45.2-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: thunderbird-45.2-1.el7_2.src.rpm ppc64le: thunderbird-45.2-1.el7_2.ppc64le.rpm thunderbird-debuginfo-45.2-1.el7_2.ppc64le.rpm x86_64: thunderbird-45.2-1.el7_2.x86_64.rpm thunderbird-debuginfo-45.2-1.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: thunderbird-45.2-1.el7_2.src.rpm x86_64: thunderbird-45.2-1.el7_2.x86_64.rpm thunderbird-debuginfo-45.2-1.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2818 https://access.redhat.com/security/updates/classification/#important https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird45.2 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXgy+cXlSAg2UNWIIRAvkfAJsFLiTIyWDAZ5xIGOJkxo06Xap4ZwCgj5gl GiE0mPJYo1nN4SyLU8EyZig= =/l4A -----END PGP SIGNATURE----- --
  16. openSUSE Security Update: Security update for Mozilla Thunderbird ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1778-1 Rating: important References: #969894 #977333 #977375 #977376 #983549 #984126 #984637 #986162 Cross-References: CVE-2016-1952 CVE-2016-1953 CVE-2016-1954 CVE-2016-1955 CVE-2016-1956 CVE-2016-1957 CVE-2016-1960 CVE-2016-1961 CVE-2016-1964 CVE-2016-1974 CVE-2016-1977 CVE-2016-2790 CVE-2016-2791 CVE-2016-2792 CVE-2016-2793 CVE-2016-2794 CVE-2016-2795 CVE-2016-2796 CVE-2016-2797 CVE-2016-2798 CVE-2016-2799 CVE-2016-2800 CVE-2016-2801 CVE-2016-2802 CVE-2016-2806 CVE-2016-2807 CVE-2016-2815 CVE-2016-2818 Affected Products: openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that fixes 28 vulnerabilities is now available. Description: This update contains Mozilla Thunderbird 45.2. (boo#983549) It fixes security issues mostly affecting the e-mail program when used in a browser context, such as viewing a web page or HTMl formatted e-mail. The following vulnerabilities were fixed: - CVE-2016-2818, CVE-2016-2815: Memory safety bugs (boo#983549, MFSA2016-49) Contains the following security fixes from the 45.1 release: (boo#977333) - CVE-2016-2806, CVE-2016-2807: Miscellaneous memory safety hazards (boo#977375, boo#977376, MFSA 2016-39) Contains the following security fixes from the 45.0 release: (boo#969894) - CVE-2016-1952, CVE-2016-1953: Miscellaneous memory safety hazards (MFSA 2016-16) - CVE-2016-1954: Local file overwriting and potential privilege escalation through CSP reports (MFSA 2016-17) - CVE-2016-1955: CSP reports fail to strip location information for embedded iframe pages (MFSA 2016-18) - CVE-2016-1956: Linux video memory DOS with Intel drivers (MFSA 2016-19) - CVE-2016-1957: Memory leak in libstagefright when deleting an array during MP4 processing (MFSA 2016-20) - CVE-2016-1960: Use-after-free in HTML5 string parser (MFSA 2016-23) - CVE-2016-1961: Use-after-free in SetBody (MFSA 2016-24) - CVE-2016-1964: Use-after-free during XML transformations (MFSA 2016-27) - CVE-2016-1974: Out-of-bounds read in HTML parser following a failed allocation (MFSA 2016-34) The graphite font shaping library was disabled, addressing the following font vulnerabilities: - MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/ CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/ CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/ CVE-2016-2800/CVE-2016-2801/CVE-2016-2802 The following tracked packaging changes are included: - fix build issues with gcc/binutils combination used in Leap 42.2 (boo#984637) - gcc6 fixes (boo#986162) - running on 48bit va aarch64 (boo#984126) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-851=1 - openSUSE 13.2: zypper in -t patch openSUSE-2016-851=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): MozillaThunderbird-45.2-16.1 MozillaThunderbird-buildsymbols-45.2-16.1 MozillaThunderbird-debuginfo-45.2-16.1 MozillaThunderbird-debugsource-45.2-16.1 MozillaThunderbird-devel-45.2-16.1 MozillaThunderbird-translations-common-45.2-16.1 MozillaThunderbird-translations-other-45.2-16.1 - openSUSE 13.2 (i586 x86_64): MozillaThunderbird-45.2-43.1 MozillaThunderbird-buildsymbols-45.2-43.1 MozillaThunderbird-debuginfo-45.2-43.1 MozillaThunderbird-debugsource-45.2-43.1 MozillaThunderbird-devel-45.2-43.1 MozillaThunderbird-translations-common-45.2-43.1 MozillaThunderbird-translations-other-45.2-43.1 References: https://www.suse.com/security/cve/CVE-2016-1952.html https://www.suse.com/security/cve/CVE-2016-1953.html https://www.suse.com/security/cve/CVE-2016-1954.html https://www.suse.com/security/cve/CVE-2016-1955.html https://www.suse.com/security/cve/CVE-2016-1956.html https://www.suse.com/security/cve/CVE-2016-1957.html https://www.suse.com/security/cve/CVE-2016-1960.html https://www.suse.com/security/cve/CVE-2016-1961.html https://www.suse.com/security/cve/CVE-2016-1964.html https://www.suse.com/security/cve/CVE-2016-1974.html https://www.suse.com/security/cve/CVE-2016-1977.html https://www.suse.com/security/cve/CVE-2016-2790.html https://www.suse.com/security/cve/CVE-2016-2791.html https://www.suse.com/security/cve/CVE-2016-2792.html https://www.suse.com/security/cve/CVE-2016-2793.html https://www.suse.com/security/cve/CVE-2016-2794.html https://www.suse.com/security/cve/CVE-2016-2795.html https://www.suse.com/security/cve/CVE-2016-2796.html https://www.suse.com/security/cve/CVE-2016-2797.html https://www.suse.com/security/cve/CVE-2016-2798.html https://www.suse.com/security/cve/CVE-2016-2799.html https://www.suse.com/security/cve/CVE-2016-2800.html https://www.suse.com/security/cve/CVE-2016-2801.html https://www.suse.com/security/cve/CVE-2016-2802.html https://www.suse.com/security/cve/CVE-2016-2806.html https://www.suse.com/security/cve/CVE-2016-2807.html https://www.suse.com/security/cve/CVE-2016-2815.html https://www.suse.com/security/cve/CVE-2016-2818.html https://bugzilla.suse.com/969894 https://bugzilla.suse.com/977333 https://bugzilla.suse.com/977375 https://bugzilla.suse.com/977376 https://bugzilla.suse.com/983549 https://bugzilla.suse.com/984126 https://bugzilla.suse.com/984637 https://bugzilla.suse.com/986162 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  17. openSUSE Security Update: Security update for Mozilla Thunderbird ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1769-1 Rating: important References: #969894 #977333 #977375 #977376 #983549 #984126 #984637 #986162 Cross-References: CVE-2016-1952 CVE-2016-1953 CVE-2016-1954 CVE-2016-1955 CVE-2016-1956 CVE-2016-1957 CVE-2016-1960 CVE-2016-1961 CVE-2016-1964 CVE-2016-1974 CVE-2016-1977 CVE-2016-2790 CVE-2016-2791 CVE-2016-2792 CVE-2016-2793 CVE-2016-2794 CVE-2016-2795 CVE-2016-2796 CVE-2016-2797 CVE-2016-2798 CVE-2016-2799 CVE-2016-2800 CVE-2016-2801 CVE-2016-2802 CVE-2016-2806 CVE-2016-2807 CVE-2016-2815 CVE-2016-2818 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 28 vulnerabilities is now available. Description: This update contains Mozilla Thunderbird 45.2. (boo#983549) It fixes security issues mostly affecting the e-mail program when used in a browser context, such as viewing a web page or HTMl formatted e-mail. The following vulnerabilities were fixed: - CVE-2016-2818, CVE-2016-2815: Memory safety bugs (boo#983549, MFSA2016-49) Contains the following security fixes from the 45.1 release: (boo#977333) - CVE-2016-2806, CVE-2016-2807: Miscellaneous memory safety hazards (boo#977375, boo#977376, MFSA 2016-39) Contains the following security fixes from the 45.0 release: (boo#969894) - CVE-2016-1952, CVE-2016-1953: Miscellaneous memory safety hazards (MFSA 2016-16) - CVE-2016-1954: Local file overwriting and potential privilege escalation through CSP reports (MFSA 2016-17) - CVE-2016-1955: CSP reports fail to strip location information for embedded iframe pages (MFSA 2016-18) - CVE-2016-1956: Linux video memory DOS with Intel drivers (MFSA 2016-19) - CVE-2016-1957: Memory leak in libstagefright when deleting an array during MP4 processing (MFSA 2016-20) - CVE-2016-1960: Use-after-free in HTML5 string parser (MFSA 2016-23) - CVE-2016-1961: Use-after-free in SetBody (MFSA 2016-24) - CVE-2016-1964: Use-after-free during XML transformations (MFSA 2016-27) - CVE-2016-1974: Out-of-bounds read in HTML parser following a failed allocation (MFSA 2016-34) The graphite font shaping library was disabled, addressing the following font vulnerabilities: - MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/ CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/ CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/ CVE-2016-2800/CVE-2016-2801/CVE-2016-2802 The following tracked packaging changes are included: - fix build issues with gcc/binutils combination used in Leap 42.2 (boo#984637) - gcc6 fixes (boo#986162) - running on 48bit va aarch64 (boo#984126) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2016-851=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 s390x x86_64): MozillaThunderbird-45.2-6.1 MozillaThunderbird-debuginfo-45.2-6.1 MozillaThunderbird-debugsource-45.2-6.1 MozillaThunderbird-devel-45.2-6.1 MozillaThunderbird-translations-common-45.2-6.1 MozillaThunderbird-translations-other-45.2-6.1 - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): MozillaThunderbird-buildsymbols-45.2-6.1 References: https://www.suse.com/security/cve/CVE-2016-1952.html https://www.suse.com/security/cve/CVE-2016-1953.html https://www.suse.com/security/cve/CVE-2016-1954.html https://www.suse.com/security/cve/CVE-2016-1955.html https://www.suse.com/security/cve/CVE-2016-1956.html https://www.suse.com/security/cve/CVE-2016-1957.html https://www.suse.com/security/cve/CVE-2016-1960.html https://www.suse.com/security/cve/CVE-2016-1961.html https://www.suse.com/security/cve/CVE-2016-1964.html https://www.suse.com/security/cve/CVE-2016-1974.html https://www.suse.com/security/cve/CVE-2016-1977.html https://www.suse.com/security/cve/CVE-2016-2790.html https://www.suse.com/security/cve/CVE-2016-2791.html https://www.suse.com/security/cve/CVE-2016-2792.html https://www.suse.com/security/cve/CVE-2016-2793.html https://www.suse.com/security/cve/CVE-2016-2794.html https://www.suse.com/security/cve/CVE-2016-2795.html https://www.suse.com/security/cve/CVE-2016-2796.html https://www.suse.com/security/cve/CVE-2016-2797.html https://www.suse.com/security/cve/CVE-2016-2798.html https://www.suse.com/security/cve/CVE-2016-2799.html https://www.suse.com/security/cve/CVE-2016-2800.html https://www.suse.com/security/cve/CVE-2016-2801.html https://www.suse.com/security/cve/CVE-2016-2802.html https://www.suse.com/security/cve/CVE-2016-2806.html https://www.suse.com/security/cve/CVE-2016-2807.html https://www.suse.com/security/cve/CVE-2016-2815.html https://www.suse.com/security/cve/CVE-2016-2818.html https://bugzilla.suse.com/969894 https://bugzilla.suse.com/977333 https://bugzilla.suse.com/977375 https://bugzilla.suse.com/977376 https://bugzilla.suse.com/983549 https://bugzilla.suse.com/984126 https://bugzilla.suse.com/984637 https://bugzilla.suse.com/986162 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  18. openSUSE Security Update: Security update for Mozilla Thunderbird ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1769-1 Rating: important References: #969894 #977333 #977375 #977376 #983549 #984126 #984637 #986162 Cross-References: CVE-2016-1952 CVE-2016-1953 CVE-2016-1954 CVE-2016-1955 CVE-2016-1956 CVE-2016-1957 CVE-2016-1960 CVE-2016-1961 CVE-2016-1964 CVE-2016-1974 CVE-2016-1977 CVE-2016-2790 CVE-2016-2791 CVE-2016-2792 CVE-2016-2793 CVE-2016-2794 CVE-2016-2795 CVE-2016-2796 CVE-2016-2797 CVE-2016-2798 CVE-2016-2799 CVE-2016-2800 CVE-2016-2801 CVE-2016-2802 CVE-2016-2806 CVE-2016-2807 CVE-2016-2815 CVE-2016-2818 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 28 vulnerabilities is now available. Description: This update contains Mozilla Thunderbird 45.2. (boo#983549) It fixes security issues mostly affecting the e-mail program when used in a browser context, such as viewing a web page or HTMl formatted e-mail. The following vulnerabilities were fixed: - CVE-2016-2818, CVE-2016-2815: Memory safety bugs (boo#983549, MFSA2016-49) Contains the following security fixes from the 45.1 release: (boo#977333) - CVE-2016-2806, CVE-2016-2807: Miscellaneous memory safety hazards (boo#977375, boo#977376, MFSA 2016-39) Contains the following security fixes from the 45.0 release: (boo#969894) - CVE-2016-1952, CVE-2016-1953: Miscellaneous memory safety hazards (MFSA 2016-16) - CVE-2016-1954: Local file overwriting and potential privilege escalation through CSP reports (MFSA 2016-17) - CVE-2016-1955: CSP reports fail to strip location information for embedded iframe pages (MFSA 2016-18) - CVE-2016-1956: Linux video memory DOS with Intel drivers (MFSA 2016-19) - CVE-2016-1957: Memory leak in libstagefright when deleting an array during MP4 processing (MFSA 2016-20) - CVE-2016-1960: Use-after-free in HTML5 string parser (MFSA 2016-23) - CVE-2016-1961: Use-after-free in SetBody (MFSA 2016-24) - CVE-2016-1964: Use-after-free during XML transformations (MFSA 2016-27) - CVE-2016-1974: Out-of-bounds read in HTML parser following a failed allocation (MFSA 2016-34) The graphite font shaping library was disabled, addressing the following font vulnerabilities: - MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/ CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/ CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/ CVE-2016-2800/CVE-2016-2801/CVE-2016-2802 The following tracked packaging changes are included: - fix build issues with gcc/binutils combination used in Leap 42.2 (boo#984637) - gcc6 fixes (boo#986162) - running on 48bit va aarch64 (boo#984126) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2016-851=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 s390x x86_64): MozillaThunderbird-45.2-6.1 MozillaThunderbird-debuginfo-45.2-6.1 MozillaThunderbird-debugsource-45.2-6.1 MozillaThunderbird-devel-45.2-6.1 MozillaThunderbird-translations-common-45.2-6.1 MozillaThunderbird-translations-other-45.2-6.1 - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): MozillaThunderbird-buildsymbols-45.2-6.1 References: https://www.suse.com/security/cve/CVE-2016-1952.html https://www.suse.com/security/cve/CVE-2016-1953.html https://www.suse.com/security/cve/CVE-2016-1954.html https://www.suse.com/security/cve/CVE-2016-1955.html https://www.suse.com/security/cve/CVE-2016-1956.html https://www.suse.com/security/cve/CVE-2016-1957.html https://www.suse.com/security/cve/CVE-2016-1960.html https://www.suse.com/security/cve/CVE-2016-1961.html https://www.suse.com/security/cve/CVE-2016-1964.html https://www.suse.com/security/cve/CVE-2016-1974.html https://www.suse.com/security/cve/CVE-2016-1977.html https://www.suse.com/security/cve/CVE-2016-2790.html https://www.suse.com/security/cve/CVE-2016-2791.html https://www.suse.com/security/cve/CVE-2016-2792.html https://www.suse.com/security/cve/CVE-2016-2793.html https://www.suse.com/security/cve/CVE-2016-2794.html https://www.suse.com/security/cve/CVE-2016-2795.html https://www.suse.com/security/cve/CVE-2016-2796.html https://www.suse.com/security/cve/CVE-2016-2797.html https://www.suse.com/security/cve/CVE-2016-2798.html https://www.suse.com/security/cve/CVE-2016-2799.html https://www.suse.com/security/cve/CVE-2016-2800.html https://www.suse.com/security/cve/CVE-2016-2801.html https://www.suse.com/security/cve/CVE-2016-2802.html https://www.suse.com/security/cve/CVE-2016-2806.html https://www.suse.com/security/cve/CVE-2016-2807.html https://www.suse.com/security/cve/CVE-2016-2815.html https://www.suse.com/security/cve/CVE-2016-2818.html https://bugzilla.suse.com/969894 https://bugzilla.suse.com/977333 https://bugzilla.suse.com/977375 https://bugzilla.suse.com/977376 https://bugzilla.suse.com/983549 https://bugzilla.suse.com/984126 https://bugzilla.suse.com/984637 https://bugzilla.suse.com/986162 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  19. Hi, 2 new GRs have been started: - debian-private list will remain private: https://www.debian.org/vote/2016/vote_002 - Replace "Chairman" with "Chair" throughout the Debian Constitution https://www.debian.org/vote/2016/vote_003 Kurt Roeckx Debian Project Secretary
  20. openSUSE Security Update: Security update for Mozilla Thunderbird ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1767-1 Rating: important References: #969894 #977333 #977375 #977376 #983549 #984126 #984637 #986162 Cross-References: CVE-2016-1952 CVE-2016-1953 CVE-2016-1954 CVE-2016-1955 CVE-2016-1956 CVE-2016-1957 CVE-2016-1960 CVE-2016-1961 CVE-2016-1964 CVE-2016-1974 CVE-2016-1977 CVE-2016-2790 CVE-2016-2791 CVE-2016-2792 CVE-2016-2793 CVE-2016-2794 CVE-2016-2795 CVE-2016-2796 CVE-2016-2797 CVE-2016-2798 CVE-2016-2799 CVE-2016-2800 CVE-2016-2801 CVE-2016-2802 CVE-2016-2806 CVE-2016-2807 CVE-2016-2815 CVE-2016-2818 Affected Products: openSUSE 13.1 ______________________________________________________________________________ An update that fixes 28 vulnerabilities is now available. Description: This update contains Mozilla Thunderbird 45.2. (boo#983549) It fixes security issues mostly affecting the e-mail program when used in a browser context, such as viewing a web page or HTMl formatted e-mail. The following vulnerabilities were fixed: - CVE-2016-2818, CVE-2016-2815: Memory safety bugs (boo#983549, MFSA2016-49) Contains the following security fixes from the 45.1 release: (boo#977333) - CVE-2016-2806, CVE-2016-2807: Miscellaneous memory safety hazards (boo#977375, boo#977376, MFSA 2016-39) Contains the following security fixes from the 45.0 release: (boo#969894) - CVE-2016-1952, CVE-2016-1953: Miscellaneous memory safety hazards (MFSA 2016-16) - CVE-2016-1954: Local file overwriting and potential privilege escalation through CSP reports (MFSA 2016-17) - CVE-2016-1955: CSP reports fail to strip location information for embedded iframe pages (MFSA 2016-18) - CVE-2016-1956: Linux video memory DOS with Intel drivers (MFSA 2016-19) - CVE-2016-1957: Memory leak in libstagefright when deleting an array during MP4 processing (MFSA 2016-20) - CVE-2016-1960: Use-after-free in HTML5 string parser (MFSA 2016-23) - CVE-2016-1961: Use-after-free in SetBody (MFSA 2016-24) - CVE-2016-1964: Use-after-free during XML transformations (MFSA 2016-27) - CVE-2016-1974: Out-of-bounds read in HTML parser following a failed allocation (MFSA 2016-34) The graphite font shaping library was disabled, addressing the following font vulnerabilities: - MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/ CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/ CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/ CVE-2016-2800/CVE-2016-2801/CVE-2016-2802 The following tracked packaging changes are included: - fix build issues with gcc/binutils combination used in Leap 42.2 (boo#984637) - gcc6 fixes (boo#986162) - running on 48bit va aarch64 (boo#984126) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch 2016-848=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): MozillaThunderbird-45.2-70.83.1 MozillaThunderbird-buildsymbols-45.2-70.83.1 MozillaThunderbird-debuginfo-45.2-70.83.1 MozillaThunderbird-debugsource-45.2-70.83.1 MozillaThunderbird-devel-45.2-70.83.1 MozillaThunderbird-translations-common-45.2-70.83.1 MozillaThunderbird-translations-other-45.2-70.83.1 References: https://www.suse.com/security/cve/CVE-2016-1952.html https://www.suse.com/security/cve/CVE-2016-1953.html https://www.suse.com/security/cve/CVE-2016-1954.html https://www.suse.com/security/cve/CVE-2016-1955.html https://www.suse.com/security/cve/CVE-2016-1956.html https://www.suse.com/security/cve/CVE-2016-1957.html https://www.suse.com/security/cve/CVE-2016-1960.html https://www.suse.com/security/cve/CVE-2016-1961.html https://www.suse.com/security/cve/CVE-2016-1964.html https://www.suse.com/security/cve/CVE-2016-1974.html https://www.suse.com/security/cve/CVE-2016-1977.html https://www.suse.com/security/cve/CVE-2016-2790.html https://www.suse.com/security/cve/CVE-2016-2791.html https://www.suse.com/security/cve/CVE-2016-2792.html https://www.suse.com/security/cve/CVE-2016-2793.html https://www.suse.com/security/cve/CVE-2016-2794.html https://www.suse.com/security/cve/CVE-2016-2795.html https://www.suse.com/security/cve/CVE-2016-2796.html https://www.suse.com/security/cve/CVE-2016-2797.html https://www.suse.com/security/cve/CVE-2016-2798.html https://www.suse.com/security/cve/CVE-2016-2799.html https://www.suse.com/security/cve/CVE-2016-2800.html https://www.suse.com/security/cve/CVE-2016-2801.html https://www.suse.com/security/cve/CVE-2016-2802.html https://www.suse.com/security/cve/CVE-2016-2806.html https://www.suse.com/security/cve/CVE-2016-2807.html https://www.suse.com/security/cve/CVE-2016-2815.html https://www.suse.com/security/cve/CVE-2016-2818.html https://bugzilla.suse.com/969894 https://bugzilla.suse.com/977333 https://bugzilla.suse.com/977375 https://bugzilla.suse.com/977376 https://bugzilla.suse.com/983549 https://bugzilla.suse.com/984126 https://bugzilla.suse.com/984637 https://bugzilla.suse.com/986162 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  21. CentOS Errata and Enhancement Advisory 2016:1390 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1390.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 3ca04e56e7e50aaaca87c41de77cafd8ce7cf263a5c5ac90b748b40697d508ff kmod-rtsx_usb-0.1_rh1-1.el7_2.x86_64.rpm Source: cc23d2231ff30dbdc46e02764978d18d49caa7115d93a2ff5b9b57f6b0db61e0 rtsx_usb-0.1_rh1-1.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  22. CentOS Errata and Enhancement Advisory 2016:1390 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1390.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 3ca04e56e7e50aaaca87c41de77cafd8ce7cf263a5c5ac90b748b40697d508ff kmod-rtsx_usb-0.1_rh1-1.el7_2.x86_64.rpm Source: cc23d2231ff30dbdc46e02764978d18d49caa7115d93a2ff5b9b57f6b0db61e0 rtsx_usb-0.1_rh1-1.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  23. CentOS Errata and Enhancement Advisory 2016:1390 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1390.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 3ca04e56e7e50aaaca87c41de77cafd8ce7cf263a5c5ac90b748b40697d508ff kmod-rtsx_usb-0.1_rh1-1.el7_2.x86_64.rpm Source: cc23d2231ff30dbdc46e02764978d18d49caa7115d93a2ff5b9b57f6b0db61e0 rtsx_usb-0.1_rh1-1.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  24. CentOS Errata and Enhancement Advisory 2016:1390 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1390.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 89b552cce1a54801c5d8f77a296885a6f2be44bc2e2b8b2e0421902d4d47d9f3 kmod-rtsx_usb_sdmmc-0.1_rh1-1.el7_2.x86_64.rpm Source: bd0c23cdf6c494f2ddf5e41b5e887028afe7a50618d2a761df37bc11137e82c8 rtsx_usb_sdmmc-0.1_rh1-1.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  25. -------- OCZ RD400A 512GB SOLID STATE DRIVE REVIEW ( -at -) APH NETWORKS ------------ Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: OCZ RD400A 512GB Solid State Drive Review ( -at -) APH Networks * Description: Watching the OCZ RD400A 512GB benchmark against all the other SSDs we have tested in the past is like watching an Olympic heavyweight boxer fight a bunch of five year old kids: There is simply no competition. * Link: http://aphnetworks.com/reviews/ocz-rd400a-512gb * Image: http://aphnetworks.com/review/ocz-rd400a-512gb/004.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
×