Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. MSI GTX 1080 Gaming X 8G RGB Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=84af973360&e=872093acb5 http://www.kitguru.net MSI GTX 1080 Gaming X 8G RGB Review In recent weeks we have analysed GTX 1080 partner cards from ASUS and GIGABYTE, and today we look at the Gaming X 8G model from MSI. This graphics card is supplied with a beautiful looking custom dual fan cooler and is overclocked out of the box. How does it hold up against the Gigabyte and Asus models ? Read the review here: http://www.kitguru.net/components/graphic-cards/zardon/msi-gtx-1080-gaming-x-8g-rgb-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=84af973360&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  2. View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=376fa333c3&e=0c004f9c13) Samsung hopes to bring curved displays to the masses with its 27-inch CF591. The monitor has an MSRP of $349.99 and is discounted in Samsung’s online store (and others), dropping the price to just under the $300 mark. Even without the discount though, the CF591 is one of the more affordable high-end curved displays, though it’s not the cheapest one currently available. But Samsung hopes that it hit the sweet spot here by combining tempting features with a low-ish price. Curved monitors certainly look cool, but display makers have had a tough time making convincing arguments that they’re necessary... Samsung CF591 Curved Monitor Review (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=0ea7b2091a&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=1dc06330c7&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=b604be9a99&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=6eb3018f0f&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=08df026d89&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=9060770a37&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=c9df54874f&e=0c004f9c13 ============================================================
  3. -------- COOLER MASTER MASTERBOX 5 COMPUTER CASE REVIEW ( -at -) APH NETWORKS ------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Cooler Master MasterBox 5 Computer Case Review ( -at -) APH Networks * Description: The Cooler Master MasterBox 5 may not be the flashiest of cases, but it does a lot of things right in letting you Make It Yours. * Link: http://aphnetworks.com/reviews/cooler-master-masterbox-5 * Image: http://aphnetworks.com/review/cooler-master-masterbox-5/003.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com
  4. openSUSE Security Update: Security update for GraphicsMagick ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1724-1 Rating: important References: #965853 #983234 #983259 #983309 #983455 #983521 #983523 #983533 #983752 #983794 #983796 #983799 #983803 #984028 #984032 #984035 #984135 #984142 #984144 #984145 #984150 #984166 #984181 #984193 #984372 #984373 #984375 #984379 #984394 #984398 #984400 #984408 #984409 #984433 #984436 #985442 Cross-References: CVE-2014-9805 CVE-2014-9807 CVE-2014-9808 CVE-2014-9809 CVE-2014-9810 CVE-2014-9811 CVE-2014-9813 CVE-2014-9814 CVE-2014-9815 CVE-2014-9816 CVE-2014-9817 CVE-2014-9818 CVE-2014-9819 CVE-2014-9820 CVE-2014-9828 CVE-2014-9829 CVE-2014-9830 CVE-2014-9831 CVE-2014-9834 CVE-2014-9835 CVE-2014-9837 CVE-2014-9839 CVE-2014-9840 CVE-2014-9844 CVE-2014-9845 CVE-2014-9846 CVE-2014-9847 CVE-2014-9853 CVE-2015-8894 CVE-2015-8896 CVE-2015-8901 CVE-2015-8903 CVE-2016-2317 CVE-2016-2318 CVE-2016-5240 CVE-2016-5241 CVE-2016-5688 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes 37 vulnerabilities is now available. Description: GraphicsMagick was updated to fix 37 security issues. These security issues were fixed: - CVE-2014-9810: SEGV in dpx file handler (bsc#983803). - CVE-2014-9811: Crash in xwd file handler (bsc#984032). - CVE-2014-9813: Crash on corrupted viff file (bsc#984035). - CVE-2014-9814: NULL pointer dereference in wpg file handling (bsc#984193). - CVE-2014-9815: Crash on corrupted wpg file (bsc#984372). - CVE-2014-9816: Out of bound access in viff image (bsc#984398). - CVE-2014-9817: Heap buffer overflow in pdb file handling (bsc#984400). - CVE-2014-9818: Out of bound access on malformed sun file (bsc#984181). - CVE-2014-9819: Heap overflow in palm files (bsc#984142). - CVE-2014-9830: Handling of corrupted sun file (bsc#984135). - CVE-2014-9831: Handling of corrupted wpg file (bsc#984375). - CVE-2014-9837: Additional PNM sanity checks (bsc#984166). - CVE-2014-9834: Heap overflow in pict file (bsc#984436). - CVE-2014-9853: Memory leak in rle file handling (bsc#984408). - CVE-2015-8903: Denial of service (cpu) in vicar (bsc#983259). - CVE-2015-8901: MIFF file DoS (endless loop) (bsc#983234). - CVE-2016-5688: Various invalid memory reads in ImageMagick WPG (bsc#985442). - CVE-2015-8894: Double free in coders/tga.c:221 (bsc#983523). - CVE-2015-8896: Double free / integer truncation issue in coders/pict.c:2000 (bsc#983533). - CVE-2014-9807: Double free in pdb coder. (bsc#983794). - CVE-2014-9828: corrupted (too many colors) psd file (bsc#984028). - CVE-2014-9805: SEGV due to a corrupted pnm file. (bsc#983752). - CVE-2014-9808: SEGV due to corrupted dpc images. (bsc#983796). - CVE-2014-9820: Heap overflow in xpm files (bsc#984150). - CVE-2014-9839: Theoretical out of bound access in magick/colormap-private.h (bsc#984379). - CVE-2014-9809: SEGV due to corrupted xwd images. (bsc#983799). - CVE-2016-5240: SVG converting issue resulting in DoS (endless loop) (bsc#983309). - CVE-2014-9840: Out of bound access in palm file (bsc#984433). - CVE-2014-9847: Incorrect handling of "previous" image in the JNG decoder (bsc#984144). - CVE-2016-5241: Arithmetic exception (div by 0) in SVG conversion (bsc#983455). - CVE-2014-9845: Crash due to corrupted dib file (bsc#984394). - CVE-2014-9844: Out of bound issue in rle file (bsc#984373). - CVE-2014-9835: Heap overflow in wpf file (bsc#984145). - CVE-2014-9829: Out of bound access in sun file (bsc#984409). - CVE-2014-9846: Added checks to prevent overflow in rle file (bsc#983521). - CVE-2016-2317: Multiple vulnerabilities when parsing and processing SVG files (bsc#965853). - CVE-2016-2318: Multiple vulnerabilities when parsing and processing SVG files (bsc#965853). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-825=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): GraphicsMagick-1.3.20-9.1 GraphicsMagick-debuginfo-1.3.20-9.1 GraphicsMagick-debugsource-1.3.20-9.1 GraphicsMagick-devel-1.3.20-9.1 libGraphicsMagick++-Q16-3-1.3.20-9.1 libGraphicsMagick++-Q16-3-debuginfo-1.3.20-9.1 libGraphicsMagick++-devel-1.3.20-9.1 libGraphicsMagick-Q16-3-1.3.20-9.1 libGraphicsMagick-Q16-3-debuginfo-1.3.20-9.1 libGraphicsMagick3-config-1.3.20-9.1 libGraphicsMagickWand-Q16-2-1.3.20-9.1 libGraphicsMagickWand-Q16-2-debuginfo-1.3.20-9.1 perl-GraphicsMagick-1.3.20-9.1 perl-GraphicsMagick-debuginfo-1.3.20-9.1 References: https://www.suse.com/security/cve/CVE-2014-9805.html https://www.suse.com/security/cve/CVE-2014-9807.html https://www.suse.com/security/cve/CVE-2014-9808.html https://www.suse.com/security/cve/CVE-2014-9809.html https://www.suse.com/security/cve/CVE-2014-9810.html https://www.suse.com/security/cve/CVE-2014-9811.html https://www.suse.com/security/cve/CVE-2014-9813.html https://www.suse.com/security/cve/CVE-2014-9814.html https://www.suse.com/security/cve/CVE-2014-9815.html https://www.suse.com/security/cve/CVE-2014-9816.html https://www.suse.com/security/cve/CVE-2014-9817.html https://www.suse.com/security/cve/CVE-2014-9818.html https://www.suse.com/security/cve/CVE-2014-9819.html https://www.suse.com/security/cve/CVE-2014-9820.html https://www.suse.com/security/cve/CVE-2014-9828.html https://www.suse.com/security/cve/CVE-2014-9829.html https://www.suse.com/security/cve/CVE-2014-9830.html https://www.suse.com/security/cve/CVE-2014-9831.html https://www.suse.com/security/cve/CVE-2014-9834.html https://www.suse.com/security/cve/CVE-2014-9835.html https://www.suse.com/security/cve/CVE-2014-9837.html https://www.suse.com/security/cve/CVE-2014-9839.html https://www.suse.com/security/cve/CVE-2014-9840.html https://www.suse.com/security/cve/CVE-2014-9844.html https://www.suse.com/security/cve/CVE-2014-9845.html https://www.suse.com/security/cve/CVE-2014-9846.html https://www.suse.com/security/cve/CVE-2014-9847.html https://www.suse.com/security/cve/CVE-2014-9853.html https://www.suse.com/security/cve/CVE-2015-8894.html https://www.suse.com/security/cve/CVE-2015-8896.html https://www.suse.com/security/cve/CVE-2015-8901.html https://www.suse.com/security/cve/CVE-2015-8903.html https://www.suse.com/security/cve/CVE-2016-2317.html https://www.suse.com/security/cve/CVE-2016-2318.html https://www.suse.com/security/cve/CVE-2016-5240.html https://www.suse.com/security/cve/CVE-2016-5241.html https://www.suse.com/security/cve/CVE-2016-5688.html https://bugzilla.suse.com/965853 https://bugzilla.suse.com/983234 https://bugzilla.suse.com/983259 https://bugzilla.suse.com/983309 https://bugzilla.suse.com/983455 https://bugzilla.suse.com/983521 https://bugzilla.suse.com/983523 https://bugzilla.suse.com/983533 https://bugzilla.suse.com/983752 https://bugzilla.suse.com/983794 https://bugzilla.suse.com/983796 https://bugzilla.suse.com/983799 https://bugzilla.suse.com/983803 https://bugzilla.suse.com/984028 https://bugzilla.suse.com/984032 https://bugzilla.suse.com/984035 https://bugzilla.suse.com/984135 https://bugzilla.suse.com/984142 https://bugzilla.suse.com/984144 https://bugzilla.suse.com/984145 https://bugzilla.suse.com/984150 https://bugzilla.suse.com/984166 https://bugzilla.suse.com/984181 https://bugzilla.suse.com/984193 https://bugzilla.suse.com/984372 https://bugzilla.suse.com/984373 https://bugzilla.suse.com/984375 https://bugzilla.suse.com/984379 https://bugzilla.suse.com/984394 https://bugzilla.suse.com/984398 https://bugzilla.suse.com/984400 https://bugzilla.suse.com/984408 https://bugzilla.suse.com/984409 https://bugzilla.suse.com/984433 https://bugzilla.suse.com/984436 https://bugzilla.suse.com/985442 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  5. Title: Jabra Sport Pulse Wireless Earbuds Review ( -at -) NikKTech Description: The Sport Pulse Wireless Earbuds by Jabra may not feature the longest battery life in their category but thanks to the very good audio balance, excellent build quality and the integrated heart-rate monitor they are among the best of their kind (and did we mention Jabra has performed a significant price drop?). Article Link: http://www.nikktech.com/main/articles/audio/wireless-headsets/6686-jabra-spo rt-pulse-wireless-earbuds-review Image Link: http://www.nikktech.com/main/images/pics/reviews/jabra/sport_pulse/jabra_spo rt_pulsea.JPG A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : qemu Version : 1.1.2+dfsg-6a+deb7u13 CVE ID : CVE-2016-3710 CVE-2016-3712 Debian Bug : 823830 Several vulnerabilities were discovered in qemu, a fast processor emulator. CVE-2016-3710 Wei Xiao and Qinghao Tang of 360.cn Inc discovered an out-of-bounds read and write flaw in the QEMU VGA module. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the hosting QEMU process. CVE-2016-3712 Zuozhi Fzz of Alibaba Inc discovered potential integer overflow or out-of-bounds read access issues in the QEMU VGA module. A privileged guest user could use this flaw to mount a denial of service (QEMU process crash). For Debian 7 "Wheezy", these problems have been fixed in version 1.1.2+dfsg-6a+deb7u13. We recommend that you upgrade your qemu packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJXdjx5AAoJEAe4t7DqmBILIfgP/Awm4V4j5GXthrTxd3hSzyXv pzNHMbnbsIEqyQaDFGp7GiKSWUE9lsnKKQpvaZouIPB+aqIajZ+P56x1tiJI+j+M 0wI76AfZcm9pgWofhJRSsPozo3A8bVKqDvUSl5ClaqliX5Vak25C6Np9uEhtCFD4 o12OryYCAJqeikHqL+KoFBgCIDeBraURi2ICXL5xGx6YlwF3FLU+b4Q04hbBjyMn aya7NiS4NVOYAqL4BnRw8bb3N21hboQbh/rZDc2IzLT/8ITssBkax7K5L99klHnD 56PHIpVfYp75KNykgzKk7zXy+LPz0bEuZsCwQO4MIW2mrli8nQFdz8p8oDgywQPo DoxMufl0xYa5AuHwPyQzRBxhq3Zfwvnp3NRByidl6uueWfVz2E+Abhx4S/H40q91 LBTStJfEiGM0yHYvcsLz8oqduQQAFgbPgqLkzW/NWgjqU9Xhtf/OwD2FGvUuRzGe fCi31t3WMCjic6pH7mH8hB3F9euLO5R8pE/Y5YiIKAtCo635T9v6gdB8z9m+64Xm Zn6Q4rWUM+hDmyx0c7Yg6y4q7+fZScV3v0YesnajBr8zH9k4Q9w2nVNE43xGLJ+g kCv3+WTkC+JMEFJPcNG678G56kEMdpjBV0J86/E3bn7pP4S/BGxP4OWZbFaeAvkJ p0orsn/euaiuHTxpmopA =MJIR -----END PGP SIGNATURE-----
  7. *MSI GeForce GTX 1080 SEA HAWK X review* Oh we're going Hybrid today as we review a GeForce GTX 1080 being tested with Corsair hybrid cooling!, yes join us as we test the MSI GeForce GTX 1080 SEA HAWK X . The gear that everybody is waiting to see are the board partner cards, all custom, tweaked and cooled better and the SEA HAWK X certainly fits that description with its include AIO liquid cooler. Let's have a peek at the new 8 GB beast From MSI. Read the full review here <http://www.guru3d.com/articles-pages/msi-geforce-gtx-1080-sea-hawk-x-review,1.html>'>http://www.guru3d.com/articles-pages/msi-geforce-gtx-1080-sea-hawk-x-review,1.html> . URL: http://www.guru3d.com/articles-pages/msi-geforce-gtx-1080-sea-hawk-x-review,1.html <http://www.guru3d.com/articles-pages/msi-geforce-gtx-1080-sea-hawk-x-review,1.html> --
  8. ** TECHSPOT ------------------------------------------------------------ ** Umi Touch Review: All specs, no polish ------------------------------------------------------------ ** http://www.techspot.com/review/1199-umi-touch/ ------------------------------------------------------------ Umi is a relatively unknown Chinese manufacturer with a mission to make affordable devices with compelling feature sets. Priced at $160, the Touch carries a respectable list of specs including a 5.5-inch 1080p display, 13-megapixel Sony IMX328 camera, a huge 4,000 mAh battery, a metal design, and even a fingerprint sensor. Thank you. Julio Franco Executive Editor | TECHSPOT (http://www.techspot.com) ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  9. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : wireshark Version : 1.12.1+g01b65bf-4+deb8u6~deb7u2 CVE ID : CVE-2016-5350 CVE-2016-5351 CVE-2016-5353 CVE-2016-5354 CVE-2016-5355 CVE-2016-5356 CVE-2016-5357 CVE-2016-5359 The following vulnerabilities have been discovered in the Wheezy's Wireshark version: CVE-2016-5350 The SPOOLS dissector could go into an infinite loop CVE-2016-5351 The IEEE 802.11 dissector could crash CVE-2016-5353 The UMTS FP dissector could crash CVE-2016-5354 Some USB dissectors could crash CVE-2016-5355 The Toshiba file parser could crash CVE-2016-5356 The CoSine file parser could crash CVE-2016-5357 The NetScreen file parser could crash CVE-2016-5359 The WBXML dissector could go into an infinite loop For Debian 7 "Wheezy", these problems have been fixed in version 1.12.1+g01b65bf-4+deb8u6~deb7u2. We recommend that you upgrade your wireshark packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXdZBiAAoJEPZk0la0aRp99lcQAMun3of2REJEf4+ZG7Av/DQy W0VCoCrHTfv2yQolJfO87UF/WqPrP4F9m6tDSmJVgjH/WPhhlnJo6h+1krWADtD5 JRpO/tdYNXpZdh0UOMi59GO/PUkgvQ7XqP8M60vsS4q4kdoW8vgTAbWrbKzvjAGi xQISmn5L8/ZJlH2Vc1hikhojvkr+oQSDw9ydSmjL35y8x6PfFBnziRHAwp7khPFC WiAs/a72wKXcj0QxZVvDQOOKaq01lGnp84RT4fKyU6+bOSvG8C+fTDRGOx0on7xw 11WkDGw9cxE0beFYwtES3KLhRd3oAGg1RMnaA7ygDGCzPdqIBgS0X+5LuLUA20Nu gMnZenBmMx9/ym5Y+RDw0zQ3vvUqLT4Wq1vdySwK3of97EZEfZarC00eKJgjjQ1C 5EQwpczqWu7ftHFR5fmobHsQESJFr+FtOyfeFmdAjMm5HDfETiBcxMhMMNdgsoWf tRofMEKelenpYwf/UbU8PZ36P086ZgalraJ0cX5lZCusDJKfr9h/98kugjEuD9Qx gzyI1iz3QkhmM40VLFXZoxbaJlZXD05GTy0GJ0ihFoYU4E55Hvost8OvOPfdEJAh NWrxM9bvJ9lB268zBokq1DMU64ZRpmFvbmU9vZugYbTEbQ+BMxKrfpJ29nxsMgsG JHR8lrOD5q4Mze1Lwdf8 =SfkF -----END PGP SIGNATURE-----
  10. SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1709-1 Rating: important References: #971770 #972124 #981143 #983394 #986362 Cross-References: CVE-2016-4998 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has four fixes is now available. Description: The SUSE Linux Enterprise 12 kernel was updated to receive critical security and bugfixes. Security issue fixed: - CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362) The following non-security bugs were fixed: - KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770). - block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124). - rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394). - target/rbd: do not put snap_context twice (bsc#981143). - target/rbd: remove caw_mutex usage (bsc#981143). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1012=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1012=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1012=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1012=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1012=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1012=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): kernel-default-debuginfo-3.12.59-60.45.2 kernel-default-debugsource-3.12.59-60.45.2 kernel-default-extra-3.12.59-60.45.2 kernel-default-extra-debuginfo-3.12.59-60.45.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): kernel-obs-build-3.12.59-60.45.3 kernel-obs-build-debugsource-3.12.59-60.45.3 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): kernel-docs-3.12.59-60.45.4 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kernel-default-3.12.59-60.45.2 kernel-default-base-3.12.59-60.45.2 kernel-default-base-debuginfo-3.12.59-60.45.2 kernel-default-debuginfo-3.12.59-60.45.2 kernel-default-debugsource-3.12.59-60.45.2 kernel-default-devel-3.12.59-60.45.2 kernel-syms-3.12.59-60.45.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): kernel-xen-3.12.59-60.45.2 kernel-xen-base-3.12.59-60.45.2 kernel-xen-base-debuginfo-3.12.59-60.45.2 kernel-xen-debuginfo-3.12.59-60.45.2 kernel-xen-debugsource-3.12.59-60.45.2 kernel-xen-devel-3.12.59-60.45.2 - SUSE Linux Enterprise Server 12-SP1 (noarch): kernel-devel-3.12.59-60.45.1 kernel-macros-3.12.59-60.45.1 kernel-source-3.12.59-60.45.1 - SUSE Linux Enterprise Server 12-SP1 (s390x): kernel-default-man-3.12.59-60.45.2 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.59-60.45.2 kernel-ec2-debuginfo-3.12.59-60.45.2 kernel-ec2-debugsource-3.12.59-60.45.2 kernel-ec2-devel-3.12.59-60.45.2 kernel-ec2-extra-3.12.59-60.45.2 kernel-ec2-extra-debuginfo-3.12.59-60.45.2 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_45-default-1-2.3 kgraft-patch-3_12_59-60_45-xen-1-2.3 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): kernel-devel-3.12.59-60.45.1 kernel-macros-3.12.59-60.45.1 kernel-source-3.12.59-60.45.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kernel-default-3.12.59-60.45.2 kernel-default-debuginfo-3.12.59-60.45.2 kernel-default-debugsource-3.12.59-60.45.2 kernel-default-devel-3.12.59-60.45.2 kernel-default-extra-3.12.59-60.45.2 kernel-default-extra-debuginfo-3.12.59-60.45.2 kernel-syms-3.12.59-60.45.1 kernel-xen-3.12.59-60.45.2 kernel-xen-debuginfo-3.12.59-60.45.2 kernel-xen-debugsource-3.12.59-60.45.2 kernel-xen-devel-3.12.59-60.45.2 References: https://www.suse.com/security/cve/CVE-2016-4998.html https://bugzilla.suse.com/971770 https://bugzilla.suse.com/972124 https://bugzilla.suse.com/981143 https://bugzilla.suse.com/983394 https://bugzilla.suse.com/986362 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  11. SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1710-1 Rating: important References: #986362 Cross-References: CVE-2016-4998 Affected Products: SUSE Linux Enterprise Workstation Extension 12 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The SUSE Linux Enterprise 12 GA kernel was updated to receive one critical security fix. Security issue fixed: - CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12: zypper in -t patch SUSE-SLE-WE-12-2016-1013=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2016-1013=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2016-1013=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1013=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1013=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2016-1013=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12 (x86_64): kernel-default-debuginfo-3.12.60-52.54.2 kernel-default-debugsource-3.12.60-52.54.2 kernel-default-extra-3.12.60-52.54.2 kernel-default-extra-debuginfo-3.12.60-52.54.2 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): kernel-obs-build-3.12.60-52.54.3 kernel-obs-build-debugsource-3.12.60-52.54.3 - SUSE Linux Enterprise Software Development Kit 12 (noarch): kernel-docs-3.12.60-52.54.3 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): kernel-default-3.12.60-52.54.2 kernel-default-base-3.12.60-52.54.2 kernel-default-base-debuginfo-3.12.60-52.54.2 kernel-default-debuginfo-3.12.60-52.54.2 kernel-default-debugsource-3.12.60-52.54.2 kernel-default-devel-3.12.60-52.54.2 kernel-syms-3.12.60-52.54.1 - SUSE Linux Enterprise Server 12 (x86_64): kernel-xen-3.12.60-52.54.2 kernel-xen-base-3.12.60-52.54.2 kernel-xen-base-debuginfo-3.12.60-52.54.2 kernel-xen-debuginfo-3.12.60-52.54.2 kernel-xen-debugsource-3.12.60-52.54.2 kernel-xen-devel-3.12.60-52.54.2 - SUSE Linux Enterprise Server 12 (noarch): kernel-devel-3.12.60-52.54.1 kernel-macros-3.12.60-52.54.1 kernel-source-3.12.60-52.54.1 - SUSE Linux Enterprise Server 12 (s390x): kernel-default-man-3.12.60-52.54.2 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.60-52.54.2 kernel-ec2-debuginfo-3.12.60-52.54.2 kernel-ec2-debugsource-3.12.60-52.54.2 kernel-ec2-devel-3.12.60-52.54.2 kernel-ec2-extra-3.12.60-52.54.2 kernel-ec2-extra-debuginfo-3.12.60-52.54.2 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_60-52_54-default-1-2.3 kgraft-patch-3_12_60-52_54-xen-1-2.3 - SUSE Linux Enterprise Desktop 12 (noarch): kernel-devel-3.12.60-52.54.1 kernel-macros-3.12.60-52.54.1 kernel-source-3.12.60-52.54.1 - SUSE Linux Enterprise Desktop 12 (x86_64): kernel-default-3.12.60-52.54.2 kernel-default-debuginfo-3.12.60-52.54.2 kernel-default-debugsource-3.12.60-52.54.2 kernel-default-devel-3.12.60-52.54.2 kernel-default-extra-3.12.60-52.54.2 kernel-default-extra-debuginfo-3.12.60-52.54.2 kernel-syms-3.12.60-52.54.1 kernel-xen-3.12.60-52.54.2 kernel-xen-debuginfo-3.12.60-52.54.2 kernel-xen-debugsource-3.12.60-52.54.2 kernel-xen-devel-3.12.60-52.54.2 References: https://www.suse.com/security/cve/CVE-2016-4998.html https://bugzilla.suse.com/986362 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  12. CentOS Errata and Enhancement Advisory 2016:1375 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-1375.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 08a6bc752e27c15e9416e7e517f3d8196230222a0b48500feabb503a51526233 kmod-qla2xxx-8.07.00.33.07.3_k-1.el7_2.x86_64.rpm Source: 8c3640fe32a123a6f1630d3f3be4007be5c3a3bcbac94a6ea37c5ff21b921456 qla2xxx-8.07.00.33.07.3_k-1.el7_2.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  13. SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1707-1 Rating: important References: #898592 #940413 #946122 #949752 #956852 #957988 #957990 #959381 #960458 #961512 #963998 #965319 #965860 #965923 #967863 #968010 #968018 #968141 #968566 #968670 #968687 #969356 #970504 #970892 #970909 #970911 #970948 #970956 #970958 #970970 #971124 #971125 #971360 #971433 #971729 #972363 #973237 #973378 #973556 #973570 #975772 #975945 Cross-References: CVE-2015-1339 CVE-2015-7566 CVE-2015-8551 CVE-2015-8552 CVE-2015-8816 CVE-2016-2143 CVE-2016-2184 CVE-2016-2185 CVE-2016-2186 CVE-2016-2188 CVE-2016-2782 CVE-2016-2847 CVE-2016-3137 CVE-2016-3138 CVE-2016-3139 CVE-2016-3140 CVE-2016-3156 Affected Products: SUSE Linux Enterprise Real Time Extension 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves 17 vulnerabilities and has 25 fixes is now available. Description: The SUSE Linux Enterprise 11 SP4 Realtime kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2015-1339: Memory leak in the cuse_channel_release function in fs/fuse/cuse.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) or possibly have unspecified other impact by opening /dev/cuse many times (bnc#969356). - CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512). - CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks (bnc#957990). - CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks (bnc#957990). - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010). - CVE-2016-2143: The fork implementation in the Linux kernel on s390 platforms mishandles the case of four page-table levels, which allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h (bnc#970504). - CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125). - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124). - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958). - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956). - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670). - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948). - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970). - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911). - CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909). - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892). - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360). The following non-security bugs were fixed: - acpi / pci: Account for ARI in _PRT lookups (bsc#968566). - af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570). - alsa: pcm: Fix potential deadlock in OSS emulation (bsc#968018). - alsa: rawmidi: Fix race at copying & up[censored] the position (bsc#968018). - alsa: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018). - alsa: seq: Fix double port list deletion (bsc#968018). - alsa: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018). - alsa: seq: Fix leak of pool buffer at concurrent writes (bsc#968018). - alsa: seq: Fix lockdep warnings due to double mutex locks (bsc#968018). - alsa: seq: Fix race at closing in virmidi driver (bsc#968018). - alsa: seq: Fix yet another races among ALSA timer accesses (bsc#968018). - alsa: timer: Call notifier in the same spinlock (bsc#973378). - alsa: timer: Code cleanup (bsc#968018). - alsa: timer: Fix leftover link at closing (bsc#968018). - alsa: timer: Fix link corruption due to double start or stop (bsc#968018). - alsa: timer: Fix race between stop and interrupt (bsc#968018). - alsa: timer: Fix wrong instance passed to slave callbacks (bsc#968018). - alsa: timer: Protect the whole snd_timer_close() with open race (bsc#973378). - alsa: timer: Sync timer deletion at closing the system timer (bsc#973378). - alsa: timer: Use mod_timer() for rearming the system timer (bsc#973378). - dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752). - fs, seqfile: always allow oom killer (bnc#968687). - fs/seq_file: fallback to vmalloc allocation (bnc#968687). - fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687). - hpsa: fix issues with multilun devices (bsc#959381). - ibmvscsi: Remove unsupported host config MAD (bsc#973556). - iommu/vt-d: Improve fault handler error messages (bsc#975772). - iommu/vt-d: Ratelimit fault handler (bsc#975772). - ipv6: make fib6 serial number per namespace (bsc#965319). - ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852). - ipv6: per netns fib6 walkers (bsc#965319). - ipv6: per netns FIB garbage collection (bsc#965319). - ipv6: replace global gc_args with local variable (bsc#965319). - kabi, fs/seq_file: fallback to vmalloc allocation (bnc#968687). - kabi: Import kabi files from kernel 3.0.101-71 - kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319). - kabi: Restore kabi after lock-owner change (bnc#968141). - llist: Add llist_next() (fate#316876). - make vfree() safe to call from interrupt contexts (fate#316876). - mld, igmp: Fix reserved tailroom calculation (bsc#956852). - net/core: dev_mc_sync_multiple calls wrong helper (bsc#971433). - net/core: __hw_addr_create_ex does not initialize sync_cnt (bsc#971433). - net/core: __hw_addr_sync_one / _multiple broken (bsc#971433). - net/core: __hw_addr_unsync_one "from" address not marked synced (bsc#971433). - nfs4: treat lock owners as opaque values (bnc#968141). - nfsd4: return nfserr_symlink on v4 OPEN of non-regular file (bsc#973237). - nfsd: do not fail unchecked creates of non-special files (bsc#973237). - nfs: use smaller allocations for 'struct idmap' (bsc#965923). - pciback: check PF instead of VF for PCI_COMMAND_MEMORY (bsc#957990). - pciback: Save the number of MSI-X entries to be copied later (bsc#957988). - pci: Move pci_ari_enabled() to global header (bsc#968566). - pci: Update PCI VPD size patch to upstream: - PCI: Determine actual VPD size on first access (bsc#971729). - PCI: Update VPD definitions (bsc#971729). - rdma/ucma: Fix AB-BA deadlock (bsc#963998). - s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413). - scsi_dh_alua: Do not block request queue if workqueue is active (bsc#960458). - scsi: mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863). - skb: Add inline helper for getting the skb end offset from head (bsc#956852). - tcp: avoid order-1 allocations on wifi and tx path (bsc#956852). - tcp: fix skb_availroom() (bsc#956852). - usb: usbip: fix potential out-of-bounds write (bnc#975945). - vmxnet3: set carrier state properly on probe (bsc#972363). - vmxnet3: set netdev parant device before calling netdev_info (bsc#972363). - xfrm: do not segment UFO packets (bsc#946122). - xfs: fix sgid inheritance for subdirectories inheriting default acls [V3] (bsc#965860). - xhci: Workaround to get Intel xHCI reset working more reliably (bnc#898592). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time Extension 11-SP4: zypper in -t patch slertesp4-kernel-rt-12636=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-kernel-rt-12636=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time Extension 11-SP4 (x86_64): kernel-rt-3.0.101.rt130-54.1 kernel-rt-base-3.0.101.rt130-54.1 kernel-rt-devel-3.0.101.rt130-54.1 kernel-rt_trace-3.0.101.rt130-54.1 kernel-rt_trace-base-3.0.101.rt130-54.1 kernel-rt_trace-devel-3.0.101.rt130-54.1 kernel-source-rt-3.0.101.rt130-54.1 kernel-syms-rt-3.0.101.rt130-54.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64): kernel-rt-debuginfo-3.0.101.rt130-54.1 kernel-rt-debugsource-3.0.101.rt130-54.1 kernel-rt_debug-debuginfo-3.0.101.rt130-54.1 kernel-rt_debug-debugsource-3.0.101.rt130-54.1 kernel-rt_trace-debuginfo-3.0.101.rt130-54.1 kernel-rt_trace-debugsource-3.0.101.rt130-54.1 References: https://www.suse.com/security/cve/CVE-2015-1339.html https://www.suse.com/security/cve/CVE-2015-7566.html https://www.suse.com/security/cve/CVE-2015-8551.html https://www.suse.com/security/cve/CVE-2015-8552.html https://www.suse.com/security/cve/CVE-2015-8816.html https://www.suse.com/security/cve/CVE-2016-2143.html https://www.suse.com/security/cve/CVE-2016-2184.html https://www.suse.com/security/cve/CVE-2016-2185.html https://www.suse.com/security/cve/CVE-2016-2186.html https://www.suse.com/security/cve/CVE-2016-2188.html https://www.suse.com/security/cve/CVE-2016-2782.html https://www.suse.com/security/cve/CVE-2016-2847.html https://www.suse.com/security/cve/CVE-2016-3137.html https://www.suse.com/security/cve/CVE-2016-3138.html https://www.suse.com/security/cve/CVE-2016-3139.html https://www.suse.com/security/cve/CVE-2016-3140.html https://www.suse.com/security/cve/CVE-2016-3156.html https://bugzilla.suse.com/898592 https://bugzilla.suse.com/940413 https://bugzilla.suse.com/946122 https://bugzilla.suse.com/949752 https://bugzilla.suse.com/956852 https://bugzilla.suse.com/957988 https://bugzilla.suse.com/957990 https://bugzilla.suse.com/959381 https://bugzilla.suse.com/960458 https://bugzilla.suse.com/961512 https://bugzilla.suse.com/963998 https://bugzilla.suse.com/965319 https://bugzilla.suse.com/965860 https://bugzilla.suse.com/965923 https://bugzilla.suse.com/967863 https://bugzilla.suse.com/968010 https://bugzilla.suse.com/968018 https://bugzilla.suse.com/968141 https://bugzilla.suse.com/968566 https://bugzilla.suse.com/968670 https://bugzilla.suse.com/968687 https://bugzilla.suse.com/969356 https://bugzilla.suse.com/970504 https://bugzilla.suse.com/970892 https://bugzilla.suse.com/970909 https://bugzilla.suse.com/970911 https://bugzilla.suse.com/970948 https://bugzilla.suse.com/970956 https://bugzilla.suse.com/970958 https://bugzilla.suse.com/970970 https://bugzilla.suse.com/971124 https://bugzilla.suse.com/971125 https://bugzilla.suse.com/971360 https://bugzilla.suse.com/971433 https://bugzilla.suse.com/971729 https://bugzilla.suse.com/972363 https://bugzilla.suse.com/973237 https://bugzilla.suse.com/973378 https://bugzilla.suse.com/973556 https://bugzilla.suse.com/973570 https://bugzilla.suse.com/975772 https://bugzilla.suse.com/975945 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  14. Hi News Poster HardwareOverclock.com has just posted another review. Last week we have taken a look at the Enermax Ostrog ADV LED Tower. This Enermax Mid Tower case combines all features for gaming enthusiasts - providing enough space inside for high-end graphics cards, this case also comes with stunning lighting effects that will blow your mind. Title: Enermax Ostrog ADV LED Tower ( -at -) HardwareOverclock.com Link: http://hardwareoverclock.com/Enermax-Ostrog-ADV-LED-Tower.htm Image: http://hardwareoverclock.com/Case/Enermax-Ostrog-ADV-LED-013.jpg Thanks for posting Rene Ruf Chefredakteur HardwareOverclock.com <http://www.hardwareoverclock.com/> http://www.hardwareoverclock.com <mailto:admin ( -at -) hardwareoverclock.com> mailto:admin ( -at -) hardwareoverclock.com
  15. Yesterday we took an in-depth look at the new AMD Radeon RX 480 8GB reference card and found that it was a great card for gamers running 1920 x 1080 or 2560 x 1440 displays. The performance was pretty good for a $239 graphics card, but most gamers know that 8GB of GDDR5 memory is overkill if you are just going to be doing 1080P gaming. We had a number of people ask us about how the 4GB card performs since it costs less and $199 is more appealing to them. Let's find out together! Article Title: AMD Radeon RX 480 4GB versus Radeon RX 480 8GB ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/amd-radeon-rx-480-4gb-versus-radeon-rx-480-8gb_183576 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/news// =
  16. Yesterday we took an in-depth look at the new AMD Radeon RX 480 8GB reference card and found that it was a great card for gamers running 1920 x 1080 or 2560 x 1440 displays. The performance was pretty good for a $239 graphics card, but most gamers know that 8GB of GDDR5 memory is overkill if you are just going to be doing 1080P gaming. We had a number of people ask us about how the 4GB card performs since it costs less and $199 is more appealing to them. Let's find out together! Article Title: AMD Radeon RX 480 4GB versus Radeon RX 480 8GB ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/amd-radeon-rx-480-4gb-versus-radeon-rx-480-8gb_183576 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/news// =
  17. At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: The OpenGL Speed & Performance-Per-Watt From The Radeon RX 480 To HD 4850/4870 ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=23335 Summary: "With the Radeon RX 480 Linux review now being out of the way and our various other RX 480 Linux benchmarks, the latest results I have to share with being a benchmarking fanatic are RX 480 results with high-end AMD GPU tests of each generation going back to the Radeon HD 4850/4870 (RV770) days. This article has high-end GPUs from the RX 480 to RX 200, HD 7900, HD 6900, HD 6800, HD 5800, and HD 4800 series compared side-by-side with the latest open-source Radeon Linux graphics driver code. Not only is the raw performance being looked at but the system power consumption was also being polled in real-time for looking at the performance-per-Watt too. For any other benchmarking fanatics curious about the Radeon GPU evolution over the past eight years (RV770 launch in 2008), here are the numbers to enjoy." Please feel free to contact us with any questions or comments you may
  18. *Guru3D Rig of the Month - June 2016* Ya'll meet the June edition of the Guru3D Rig of the Month 2016. This months build is is called "Project p5yche" by Guru3D familiar Darwin P. The man in reality is a scientist, but likes to modify PCs. Meet his latest creation. Check out this poisonous green rig of the month here <http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-june-2016,1.html>'>http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-june-2016,1.html> . URL: http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-june-2016,1.html <http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-june-2016,1.html> --
  19. http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=a20592946c&e=8138df6da5 ** Benchmark Reviews Presents: ------------------------------------------------------------ Phanteks-Enthoo-Evolv-ATX-Glass-Computer-Case-Front-Angle-With-Logo TITLE: Phanteks Evolv Tempered Glass Case Review (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=6bc1411e7c&e=8138df6da5) QUOTE: The Phanteks Evolv Tempered Glass Case is the newest addition to the Enthoo series offered by Phanteks. This mid-tower case sports tempered glass side panels, a modular design, and an abundance of water cooling support. The Evolv Tempered Glass also features filtered ventilation, expandable RGB lighting, modular HDD/SSD options, PWM fan hub and three Phanteks Ph-F140SP 140mm fans pre-installed (two in the front, one in the rear). LINK: http://benchmarkreviews.us10.list-manage2.com/track/click?u=9a2f239b17114c9008e3dfda9&id=e8e6250007&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=4e1d3e4873&e=8138df6da5 ============================================================
  20. ------------------------------------------------------------ http://us7.campaign-archive1.com/?u=406e963590798a4aa1eab5f99&id=bbe04d3c06&e=168437af67 Dear News Affiliates, Custom PC Review recently published article(s) your readers may enjoy. We’d appreciate it if you could share it with them. Title: Review: AMD Radeon RX 480 8GB – Polaris Finally Arrives! (http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=17e28302d8&e=168437af67) Excerpt: "To serve those markets, AMD has unveiled three new products – the AMD Radeon RX 480, RX 470 and RX 460. AMD is expected to be releasing the Radeon RX 480 now while the others are set to release at a later date. Very little is known about the Radeon RX 470 and the Radeon RX 460 at this point, but it shouldn’t be too long now..." Thank you for your support, -- Sam Chen -- Editor-in-Chief -- Custom PC Review -- http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=74b9e2b132&e=168437af67 (http://custompcreview.us7.list-manage.com/track/click?u=406e963590798a4aa1eab5f99&id=9cf053b328&e=168437af67)
  21. AMD Radeon RX 480 8GB Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=82206cc911&e=872093acb5 http://www.kitguru.net AMD Radeon RX 480 8GB Review 2016 has been a slow year for graphics cards and while Nvidia launched their high end GTX1070 and GTX1080 solutions – they are strictly for the gaming audience with deeper pockets. AMD have approached their first 2016 GPU launch differently, opting to release their RX 480 – a mid range card priced at $199.99 firmly targeting the mass enthusiast gaming audience. Read the review here: http://www.kitguru.net/components/graphic-cards/zardon/amd-radeon-rx-480-8gb-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=82206cc911&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  22. AMD Radeon RX 480 8GB Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=82206cc911&e=872093acb5 http://www.kitguru.net AMD Radeon RX 480 8GB Review 2016 has been a slow year for graphics cards and while Nvidia launched their high end GTX1070 and GTX1080 solutions – they are strictly for the gaming audience with deeper pockets. AMD have approached their first 2016 GPU launch differently, opting to release their RX 480 – a mid range card priced at $199.99 firmly targeting the mass enthusiast gaming audience. Read the review here: http://www.kitguru.net/components/graphic-cards/zardon/amd-radeon-rx-480-8gb-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=82206cc911&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  23. At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: AMD Radeon RX 480 On Linux ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=23332 Summary: "After weeks of anticipation, AMD's high-end Radeon RX 480 "Polaris" graphics card is officially launching today! This graphics card starts at just $199 USD (or $239 USD for the 8GB version) and has day-one Linux support! There's available open-source driver support as well as an AMDGPU-PRO update that's expected today for those wanting to make use of this newer hybrid Linux driver stack. I've been testing the Radeon RX 480 under Linux the past week under both driver stacks and have my initial results to share this morning." Please feel free to contact us with any questions or comments you may
  24. Hi, here's our latest article, the AMD Radeon RX 480 Review (8GB Polaris) : http://hardwareheaven.us8.list-manage.com/track/click?u=5f10b37a5b27e9b9a52d71e56&id=5c40b8862e&e=c0d9d51784 A news post would be appreciated, thanks. ============================================== An email to industry contacts about our latest content.
  25. View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=ec30e493e7&e=0c004f9c13) AMD has been disseminating information about its Polaris architecture and the Radeon RX 480 for months now. If you’re a regular reader of HotHardware, you should already know that Polaris is AMD’s next-gen GPU architecture, designed for FinFET transistor technology. Polaris also ushers in the 4th generation of AMD’s GCN (Graphics Core Next) architecture. Some of the Radeon RX 480’s specifications were also revealed, along with the expected price point, and a number of the RX 480’s new features and capabilities, including support for the latest DisplayPort and HDMI standards. It seems AMD and its Radeon Technologies Group have been more vocal about this architecture and GPU prior to its launch than any other in recent memory. The only pieces to the Polaris and Radeon RX 480 puzzle that have remained under wraps have been actual performance and power characteristics, but we are here reveal those to you today... AMD Radeon RX 480 Review: Polaris Hitting The Sweet Spot (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e77f2e0b85&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=de0b5401d9&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f32cffdc99&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=344b623d05&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=1dc27ff526&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=0998ad2c67&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=ca4bcf71bc&e=0c004f9c13 ============================================================
×