Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. ** TECHSPOT ------------------------------------------------------------ ** AMD Radeon RX 480 Review ------------------------------------------------------------ ** http://www.techspot.com/review/1198-amd-radeon-rx-480/ ------------------------------------------------------------ Touted as the perfect VR solution for the masses, AMD is hoping to claw back a bit of market share with the new Radeon RX 480 which is aimed at the mainstream $200-250 segment, with other affordable Polaris GPUs expected to follow. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  2. Tt eSPORTS Contour Mobile Gaming Controller Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/tt-esports-contour-mobile-gaming-controller-review/ Image URL: http://www.thinkcomputers.org/reviews/ttesports_contour/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/ttesports_contour/small.jpg Quote: "Mobile gaming has been growing at a steady rate for a while now.  Being able to play games on your smartphone or tablet makes it extremely convenient and easy.  While touch-based games are great there are some pretty serious mobile games that are better played with a controller.  A controller gives you better control of your game and allows you to play better, especially on a phone or tablet.  Enter the Tt eSPORTS Contour, a mobile gaming controller made for iOS devices.  It is fashioned after an Xbox controller and will work seamlessly with your iPhone, iPod, or iPad.  Let's take a look and see what it is all about."
  3. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: AMD Radeon RX 480 CrossFire Link: http://www.techpowerup.com/reviews/AMD/RX_480_CrossFire Brief: In their marketing leading up to the Polaris launch today, AMD showed two Radeon RX 480 cards running in CrossFire, beating NVIDIA's GeForce GTX 1080 - at a much lower price point. We have a review of two of these cards running 16 games at 4 resolutions in CrossFire.
  4. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: AMD Radeon RX 480 8 GB Link: http://www.techpowerup.com/reviews/AMD/RX_480 Brief: Today AMD is introducing their new 14 nanometer Polaris architecture. The first card we are reviewing is the Radeon RX 480, a highly affordable 8 GB card that's set out to shatter current price/performance. In terms of performance you can expect speeds between GTX 980 and GTX 970.
  5. *Radeon RX 480 8GB reference review* The ebmargo has been lifted, join us as we review the Polaris GPU based Radeon RX 480. These puppies perform really well and will be rather affordable at 220 EURO for the 4 GB models with 260 EURO for the 8GB models. It's a graphics card series that will allow you to play your games in both the Full HD 1080P range as well as gaming in WQHD (2560x1440) range. Follow us into this review where we'll look at temperatures, noise, performance and go with the hotetst game titles on the globe. Read the full article right here <http://www.guru3d.com/articles-pages/amd-radeon-r9-rx-480-8gb-review,1.html>'>http://www.guru3d.com/articles-pages/amd-radeon-r9-rx-480-8gb-review,1.html> . URL: http://www.guru3d.com/articles-pages/amd-radeon-r9-rx-480-8gb-review,1.html <http://www.guru3d.com/articles-pages/amd-radeon-r9-rx-480-8gb-review,1.html> --
  6. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* AMD Radeon RX 480 8GB ( -at -) LanOC Reviews <http://lanoc.org/review/video-cards/7283-amd-radeon-rx-480-8gb> *DESCRIPTION:* Nvidia fans have had their fun with their recently introduced cards but in the middle of all of that, we have also been hearing more and more about Polaris, AMDs latest GPU architecture. Most of it was rumors, but at the beginning of this month AMD did host a Webcast at Computex and finally gave us some more information about it. The big news was that the new RX 480 was coming on June 29th, it will have impressively smooth VR, and its price would be $199. Well, I’ve had the RX 480 in the office for the last few days and today's the day that we can finally sit down and talk about how it performs. At its price point, we know that AMD isn’t looking to shake up the top of the charts, but it's clear they want to bring good performance to the mainstream gaming market. The high-end cards might be exciting, but this is the price range people are buying the most, I’m excited to find out if the RX 480 is worth all of the hype. *ARTICLE URL:* http://lanoc.org/review/video-cards/7283-amd-radeon-rx-480-8gb *LARGE IMAGE URL:* http://lanoc.org/images/reviews/2016/amd_rx480_8gb/title.jpg *SMALL IMAGE URL:* http://lanoc.org/images/reviews/2016/amd_rx480_8gb/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?format=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org <reviews ( -at -) lanoc.org>* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  7. Hardware Canucks is pleased to present our review of the new Radeon RX480 8GB graphics card. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/72889-radeon-rx480-8gb-performance-review.html *Quote:* *Fast, efficient and well priced, AMD's RX480 8GB is looking to dominate the mid-range. It may only cost just $239 but the RX480's performance strives to compete against NVIDIA's GTX 970. * We would appreciate it if you would post this in your News section. Regards, -- Hardware Canucks News Team
  8. AMD's Radeon RX 480 graphics card is its first to use the Polaris 10 GPU, built on 14-nm FinFET process technology. We dive in with our advanced frame-time benchmarking methods to see what this card's performance means for the $200 price point. Read more: http://techreport.com/review/30328/amd-radeon-rx-480-graphics-card-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
  9. The Radeon RX 480 is finally here and after weeks of leaks we can finally show you our performance numbers and tell you what we know about the card. As you likely already know the AMD Radeon RX 480 features the Polaris 10 GPU built on the 14nm FinFET process by Samsung and Global Foundaries. The AMD Radeon RX 480 has 5.8 TFLOPS of compute performance thanks to having with 36 Compute Units containing 2,304 stream processors based on the latest GCN 4.0 technology. Read on to see how the card performs in 7 games and two synthetic benchmarks at 1080P, 1440P and 4K display resolutions. We also overclock it to the max! Article Title: AMD Radeon RX 480 Video Card Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/amd-radeon-rx-480-video-card-review-polaris-arrives_183428[/size] Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
  10. SUSE Security Update: Security update for qemu ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1703-1 Rating: important References: #886378 #940929 #958491 #958917 #959005 #959386 #960334 #960708 #960725 #960835 #961332 #961333 #961358 #961556 #961691 #962320 #963782 #964411 #964413 #967969 #969121 #969122 #969350 #970036 #970037 #975128 #975136 #975700 #976109 #978158 #978160 #980711 #980723 #981266 Cross-References: CVE-2015-5745 CVE-2015-7549 CVE-2015-8504 CVE-2015-8558 CVE-2015-8567 CVE-2015-8568 CVE-2015-8613 CVE-2015-8619 CVE-2015-8743 CVE-2015-8744 CVE-2015-8745 CVE-2015-8817 CVE-2015-8818 CVE-2016-1568 CVE-2016-1714 CVE-2016-1922 CVE-2016-1981 CVE-2016-2197 CVE-2016-2198 CVE-2016-2538 CVE-2016-2841 CVE-2016-2857 CVE-2016-2858 CVE-2016-3710 CVE-2016-3712 CVE-2016-4001 CVE-2016-4002 CVE-2016-4020 CVE-2016-4037 CVE-2016-4439 CVE-2016-4441 CVE-2016-4952 Affected Products: SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 32 vulnerabilities and has two fixes is now available. Description: qemu was updated to fix 29 security issues. These security issues were fixed: - CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711) - CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723) - CVE-2016-4952: Avoid OOB access in Vmware PV SCSI emulation (bsc#981266) - CVE-2015-8817: Avoid OOB access in PCI dma I/O (bsc#969121) - CVE-2015-8818: Avoid OOB access in PCI dma I/O (bsc#969122) - CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158) - CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160) - CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109) - CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969) - CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350) - CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036) - CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037) - CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128) - CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136) - CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700) - CVE-2016-2197: Prevent AHCI NULL pointer dereference when using FIS CLB engine (bsc#964411) - CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929). - CVE-2015-7549: PCI null pointer dereferences (bsc#958917). - CVE-2015-8504: VNC floating point exception (bsc#958491). - CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005). - CVE-2015-8567: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386). - CVE-2015-8568: A guest repeatedly activating a vmxnet3 device can leak host memory (bsc#959386). - CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358). - CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334). - CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725). - CVE-2015-8744: Incorrect l2 header validation could have lead to a crash via assert(2) call (bsc#960835). - CVE-2015-8745: Reading IMR registers could have lead to a crash via assert(2) call (bsc#960708). - CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332). - CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691). - CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320). - CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782). - CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413). This non-security issue was fixed - bsc#886378: qemu truncates vhd images in virt-rescue Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1007=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1007=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): qemu-2.3.1-14.1 qemu-block-curl-2.3.1-14.1 qemu-block-curl-debuginfo-2.3.1-14.1 qemu-debugsource-2.3.1-14.1 qemu-guest-agent-2.3.1-14.1 qemu-guest-agent-debuginfo-2.3.1-14.1 qemu-lang-2.3.1-14.1 qemu-tools-2.3.1-14.1 qemu-tools-debuginfo-2.3.1-14.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): qemu-kvm-2.3.1-14.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le): qemu-ppc-2.3.1-14.1 qemu-ppc-debuginfo-2.3.1-14.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): qemu-ipxe-1.0.0-14.1 qemu-seabios-1.8.1-14.1 qemu-sgabios-8-14.1 qemu-vgabios-1.8.1-14.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): qemu-block-rbd-2.3.1-14.1 qemu-block-rbd-debuginfo-2.3.1-14.1 qemu-x86-2.3.1-14.1 - SUSE Linux Enterprise Server 12-SP1 (s390x): qemu-s390-2.3.1-14.1 qemu-s390-debuginfo-2.3.1-14.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): qemu-2.3.1-14.1 qemu-block-curl-2.3.1-14.1 qemu-block-curl-debuginfo-2.3.1-14.1 qemu-debugsource-2.3.1-14.1 qemu-kvm-2.3.1-14.1 qemu-tools-2.3.1-14.1 qemu-tools-debuginfo-2.3.1-14.1 qemu-x86-2.3.1-14.1 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): qemu-ipxe-1.0.0-14.1 qemu-seabios-1.8.1-14.1 qemu-sgabios-8-14.1 qemu-vgabios-1.8.1-14.1 References: https://www.suse.com/security/cve/CVE-2015-5745.html https://www.suse.com/security/cve/CVE-2015-7549.html https://www.suse.com/security/cve/CVE-2015-8504.html https://www.suse.com/security/cve/CVE-2015-8558.html https://www.suse.com/security/cve/CVE-2015-8567.html https://www.suse.com/security/cve/CVE-2015-8568.html https://www.suse.com/security/cve/CVE-2015-8613.html https://www.suse.com/security/cve/CVE-2015-8619.html https://www.suse.com/security/cve/CVE-2015-8743.html https://www.suse.com/security/cve/CVE-2015-8744.html https://www.suse.com/security/cve/CVE-2015-8745.html https://www.suse.com/security/cve/CVE-2015-8817.html https://www.suse.com/security/cve/CVE-2015-8818.html https://www.suse.com/security/cve/CVE-2016-1568.html https://www.suse.com/security/cve/CVE-2016-1714.html https://www.suse.com/security/cve/CVE-2016-1922.html https://www.suse.com/security/cve/CVE-2016-1981.html https://www.suse.com/security/cve/CVE-2016-2197.html https://www.suse.com/security/cve/CVE-2016-2198.html https://www.suse.com/security/cve/CVE-2016-2538.html https://www.suse.com/security/cve/CVE-2016-2841.html https://www.suse.com/security/cve/CVE-2016-2857.html https://www.suse.com/security/cve/CVE-2016-2858.html https://www.suse.com/security/cve/CVE-2016-3710.html https://www.suse.com/security/cve/CVE-2016-3712.html https://www.suse.com/security/cve/CVE-2016-4001.html https://www.suse.com/security/cve/CVE-2016-4002.html https://www.suse.com/security/cve/CVE-2016-4020.html https://www.suse.com/security/cve/CVE-2016-4037.html https://www.suse.com/security/cve/CVE-2016-4439.html https://www.suse.com/security/cve/CVE-2016-4441.html https://www.suse.com/security/cve/CVE-2016-4952.html https://bugzilla.suse.com/886378 https://bugzilla.suse.com/940929 https://bugzilla.suse.com/958491 https://bugzilla.suse.com/958917 https://bugzilla.suse.com/959005 https://bugzilla.suse.com/959386 https://bugzilla.suse.com/960334 https://bugzilla.suse.com/960708 https://bugzilla.suse.com/960725 https://bugzilla.suse.com/960835 https://bugzilla.suse.com/961332 https://bugzilla.suse.com/961333 https://bugzilla.suse.com/961358 https://bugzilla.suse.com/961556 https://bugzilla.suse.com/961691 https://bugzilla.suse.com/962320 https://bugzilla.suse.com/963782 https://bugzilla.suse.com/964411 https://bugzilla.suse.com/964413 https://bugzilla.suse.com/967969 https://bugzilla.suse.com/969121 https://bugzilla.suse.com/969122 https://bugzilla.suse.com/969350 https://bugzilla.suse.com/970036 https://bugzilla.suse.com/970037 https://bugzilla.suse.com/975128 https://bugzilla.suse.com/975136 https://bugzilla.suse.com/975700 https://bugzilla.suse.com/976109 https://bugzilla.suse.com/978158 https://bugzilla.suse.com/978160 https://bugzilla.suse.com/980711 https://bugzilla.suse.com/980723 https://bugzilla.suse.com/981266 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  11. CentOS Errata and Bugfix Advisory 2016:1349 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1349.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 9f8f2152738415ddef6509c16881468f8abedf7488490bfe724561ee7eb582c7 cmirror-2.02.130-5.el7_2.5.x86_64.rpm e23f39c92b83682c140324b0891d426bf538fbdc68cf7f267c2a87356816d89c device-mapper-1.02.107-5.el7_2.5.x86_64.rpm 0c3dc7d9d7957e749ad019f06e0cc1c87f3db76cb500457050ce2c3e46080b8b device-mapper-devel-1.02.107-5.el7_2.5.i686.rpm 4da48171c8f599255dd47809d5ed2cdbd23afe152c44540e4e6c41bb88cf7f6b device-mapper-devel-1.02.107-5.el7_2.5.x86_64.rpm b1f004cceca52345c14d2dec35b44d989d39003d3a0e37ae14ee08210296e157 device-mapper-event-1.02.107-5.el7_2.5.x86_64.rpm 6a8203ef009bd1dae1c2575bfaa89582a5d9b402e9a450ce3a787c22ead8f4a6 device-mapper-event-devel-1.02.107-5.el7_2.5.i686.rpm a2a822a1de226771fd00b9d6bce566def68a67b5c4ef1351f7d4e756a3d23e03 device-mapper-event-devel-1.02.107-5.el7_2.5.x86_64.rpm 44d8c251698d60f8bf82d71d774652c7743515edd9077a780bb33709303188e6 device-mapper-event-libs-1.02.107-5.el7_2.5.i686.rpm 59b65674dcab344b3d219b6961722bfd40780455bc0bce6bd02edd6dd768453c device-mapper-event-libs-1.02.107-5.el7_2.5.x86_64.rpm 8475f1a20a99c5f1d041187a531b5c5406c67bf84afb926096d11810f1a53d8e device-mapper-libs-1.02.107-5.el7_2.5.i686.rpm 4d964e6a7643010f2862791e2588e08f6011e4c656540d61d3ebe937ac9ce13a device-mapper-libs-1.02.107-5.el7_2.5.x86_64.rpm b7a90ef80f4e8ddb35257802a57c07660e1ddc7e2c4a9957edf382ff67ec1567 lvm2-2.02.130-5.el7_2.5.x86_64.rpm 65a4c81480d0efba21f0da7969a2f820d69e26934af24bf4fdb8c449a2d502dc lvm2-cluster-2.02.130-5.el7_2.5.x86_64.rpm 04d6d35438ff31602702872775f9fdc758c94d1e9656319dcfa09580ef21609d lvm2-devel-2.02.130-5.el7_2.5.i686.rpm e53af702e6143a89598e64754410bbdbb079fb3e5b657091d88f44fec28fa391 lvm2-devel-2.02.130-5.el7_2.5.x86_64.rpm abafec8cbed90c9e68a796b61235bab160be70a8d0a8290041d78c155d41804e lvm2-libs-2.02.130-5.el7_2.5.i686.rpm 6c0f6537d19eecc549c1c7adf01cdee3aa6d805b30496946fbcc73cb4b3fe582 lvm2-libs-2.02.130-5.el7_2.5.x86_64.rpm 39727f939e993c9baac491080ef3901b3d18536c3c4a7e12668bf381f15f99e9 lvm2-lockd-2.02.130-5.el7_2.5.x86_64.rpm 2f3b320f5108eef429344b89416a2fcf6e15a47e014faeff5b47c6a3ebe234a3 lvm2-python-libs-2.02.130-5.el7_2.5.x86_64.rpm 53316ba2995b27f5b7a4137817a66cd811c42c4ce286e682869d565f5bae76be lvm2-sysvinit-2.02.130-5.el7_2.5.x86_64.rpm Source: 399d8210953038b445e7ac3fc91fc13b517b11dc1a849f820f17296a27477a56 lvm2-2.02.130-5.el7_2.5.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  12. TUDIA ARCH ULTRA-LIGHT SHOCK-PROOF CASES PROTECT HUAWEI P9 & P9 PLUS WITHOUT ADDING WEIGHT ARCH’s Precision Cut Openings Perfectly Fit Huawei/Leica Unique Duel Lens Camera Design http://www.thomas-pr.com/136/photos/tudiaarchhuaweiblueside.html http://www.thomas-pr.com/136/photos/tudiaarchhuaweicolors.html Light-Weight at About ½ Ounce & Ultra-Thin Features Flexible Soft-Touch TPU with Raised Edges to Protect from Scratches -- Low-Cost at $9.90, Available in Blue, Black, Frosted Clear, & Gray Press Release: http://www.thomas-pr.com/tudia/tudiahuaweirelease.html St. Paul, MN, June 28, 2016 –TUDIA www.tudiaproducts.com (http://www.tudiaproducts.com/'>http://www.tudiaproducts.com/) , leading developer of smartphone accessories, launched today the incredibly thin, shock-proof TUDIA ARCH cases for the Huawei P9 (http://www.amazon.com/dp/B01FJBGN6Y) and P9 Plus (http://www.amazon.com/dp/B01FJBTDPM) . Light-weight at about ½ ounce, the TUDIA ARCH case protects the Huawei P9 and P9 Plus’ diamond-cut edged design from scratches and scuffs, accentuating the Huawei design with a durable skin made of high quality soft Thermoplastic Polyurethane (TPU) rubberized gel silicone with stylish TUDIA edging at the base of the case. Perfectly Fits Huawei Duel Lens Camera, Buttons & Connectors The TUDIA ARCH perfectly fits the Huawei/Leica uniquely designed duel lens camera, with precision cut openings that line up precisely with the phone’s cameras, buttons and connectors. The TUDIA ARCH is essential to protect your Huawei P9 and P9 Plus smartphone investment, featuring raised edges to protect the display from scratches, a lip compatible with most screen protectors, a soft feel and comfortable grip, and multiple colors of blue, black, frosted clear and gray – all at a low cost of only $9.90. TUDIA ARCH Cases for Huawei P9 & Huawei P9 Plus Features: * High quality Thermoplastic Polyurethane (TPU) rubberized gel silicone skin case. * Soft feel with comfortable grip. * Precision cut openings perfectly line up with the Huawei P9 and P9 Plus’ dual lens camera, buttons and ports for use without removing the case. * Case accentuates the Huawei P9 and P9 Plus design. * Case is compatible with most screen protectors. * Extremely durable flexible shell. * Raised edge design helps protect the display screen from scratches when faced down or when dropping. * Multiple color choices: black, blue, gray, and frosted clear. * Light-weight at .6 ounces. * Low-cost price: $9.90. Pricing & Availability Available in black, blue, gray, and frosted clear, the TUDIA ARCH for Huawei P9 and P9 Plus are priced at $9.90, available through Amazon for Huawei P9 at: http://www.amazon.com/dp/B01FJBGN6Y and Huawei P9 Plus at: http://www.amazon.com/dp/B01FJBTDPM. All TUDIA cases are covered with a 1 year warranty. For more information, see the website at: http://www.tudiaproducts.com (http://www.tudiaproducts.com/) , http://tudiaproducts.com/arch Facebook: https://www.facebook.com/tudiaproducts, Twitter: ( -at -) TudiaProducts (https://twitter.com/TudiaProducts) , YouTube Channel: https://www.youtube.com/channel/UCIjsjpSJluXhjneID9Qob8g. About TUDIA TUDIA creates smartphone accessories that stand out from the crowd, including refined protective cases that offer slimness and style, enhancing the natural beauty of electronic devices. TUDIA products are distributed by Aplars LLC, a leading e-commerce store for electronic products and accessories. Founded in 2011, Aplars carries a large selection of smartphone, MP3/iPod, digital camera, computer accessories and more. Aplars is expanding its line of electronics products to include cell phones, laptops, TVs and other devices. See http://www.tudiaproducts.com/klip/ and www.aplars.com (http://www.aplars.com/) for info. Photos: TUDIA Arch Case for Huawei P9 - blue side front: http://www.thomas-pr.com/136/photos/tudiaarchhuaweiblueside.html TUDIA Arch Case for Huawei P9 – colors: http://www.thomas-pr.com/136/photos/tudiaarchhuaweicolors.html TUDIA Arch Case for Huawei P9 Plus - blue back: http://www.thomas-pr.com/136/photos/tudiaarchhuaweiblueback.html TUDIA Arch Case for Huawei P9 Plus - Frosted Clear: http://www.thomas-pr.com/136/photos/tudiaarchhuaweifrosted.html TUDIA Logo: http://www.thomas-pr.com/136/photos/aplarstudialogo.html Press Release: http://www.thomas-pr.com/tudia/tudiahuaweirelease.html See other TUDIA Cases: TUDIA MERGE & ARCH cases for Samsung Galaxy S7 Release: http://www.thomas-pr.com/tudia/tudiagalaxys7release.html Press Contact: Karen Thomas/Eva Yutani Thomas PR (631) 549-7575 Emails: kthomas ( -at -) thomaspr.com (mailto:kthomas ( -at -) thomaspr.com) eyutani ( -at -) thomaspr.com (mailto:eyutani ( -at -) thomaspr.com) bkouwen ( -at -) thomas-pr.com (mailto:bkouwen ( -at -) thomas-pr.com) Website: http://www.thomas-pr.com (http://www.thomas-pr.com/) http://www.thomaspr.com (http://www.thomaspr.com'>http://www.thomaspr.com/'>http://www.thomaspr.com/) ============================================================ ** Facebook (https://www.facebook.com/karenthomaspr'>https://www.facebook.com/karenthomaspr) ** Facebook (https://www.facebook.com/karenthomaspr) ** Twitter (https://www.twitter.com/thomaspr/'>https://www.twitter.com/thomaspr/) ** Twitter (https://www.twitter.com/thomaspr/) ** Website (http://www.thomaspr.com) ** Website (http://www.thomaspr.com) ** (http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb7Hk5b'>http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb7Hk5b) ** Share (http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb7Hk5b) ** (http://twitter.com/intent/tweet?text=TUDIA+ARCH+Ultra-Light+%C2%BD+Once+Shock-Proof+Cases+Protect+Huawei+P9+%26+P9+Plus+Without+Adding+Weight:'>http://twitter.com/intent/tweet?text=TUDIA+ARCH+Ultra-Light+%C2%BD+Once+Shock-Proof+Cases+Protect+Huawei+P9+%26+P9+Plus+Without+Adding+Weight: http%3A%2F%2Feepurl.com%2Fb7Hk5b) ** Tweet (http://twitter.com/intent/tweet?text=TUDIA+ARCH+Ultra-Light+%C2%BD+Once+Shock-Proof+Cases+Protect+Huawei+P9+%26+P9+Plus+Without+Adding+Weight: http%3A%2F%2Feepurl.com%2Fb7Hk5b) ** (http://us7.forward-to-friend.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=3fd1296c01&e=0f97826edb'>http://us7.forward-to-friend.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=3fd1296c01&e=0f97826edb) ** Forward (http://us7.forward-to-friend.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=3fd1296c01&e=0f97826edb) ** (https://plus.google.com/share?url=http%3A%2F%2Feepurl.com%2Fb7Hk5b'>https://plus.google.com/share?url=http%3A%2F%2Feepurl.com%2Fb7Hk5b) ** +1 (https://plus.google.com/share?url=http%3A%2F%2Feepurl.com%2Fb7Hk5b) Copyright © 2016 Thomas PR, All rights reserved.
  13. SUSE Security Update: Security update for kvm ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1698-1 Rating: important References: #895528 #901508 #928393 #934069 #936132 #940929 #944463 #945404 #945987 #945989 #947159 #958491 #958917 #959005 #960334 #960725 #961332 #961333 #961358 #961556 #961691 #962320 #963782 #964413 #967969 #969350 #970036 #970037 #975128 #975136 #975700 #976109 #978158 #978160 #980711 #980723 Cross-References: CVE-2014-3615 CVE-2014-3689 CVE-2014-9718 CVE-2015-3214 CVE-2015-5239 CVE-2015-5278 CVE-2015-5279 CVE-2015-5745 CVE-2015-6855 CVE-2015-7295 CVE-2015-7549 CVE-2015-8504 CVE-2015-8558 CVE-2015-8613 CVE-2015-8619 CVE-2015-8743 CVE-2016-1568 CVE-2016-1714 CVE-2016-1922 CVE-2016-1981 CVE-2016-2198 CVE-2016-2538 CVE-2016-2841 CVE-2016-2857 CVE-2016-2858 CVE-2016-3710 CVE-2016-3712 CVE-2016-4001 CVE-2016-4002 CVE-2016-4020 CVE-2016-4037 CVE-2016-4439 CVE-2016-4441 Affected Products: SUSE Linux Enterprise Server 11-SP3-LTSS ______________________________________________________________________________ An update that solves 33 vulnerabilities and has three fixes is now available. Description: kvm was updated to fix 33 security issues. These security issues were fixed: - CVE-2016-4439: Avoid OOB access in 53C9X emulation (bsc#980711) - CVE-2016-4441: Avoid OOB access in 53C9X emulation (bsc#980723) - CVE-2016-3710: Fixed VGA emulation based OOB access with potential for guest escape (bsc#978158) - CVE-2016-3712: Fixed VGa emulation based DOS and OOB read access exploit (bsc#978160) - CVE-2016-4037: Fixed USB ehci based DOS (bsc#976109) - CVE-2016-2538: Fixed potential OOB access in USB net device emulation (bsc#967969) - CVE-2016-2841: Fixed OOB access / hang in ne2000 emulation (bsc#969350) - CVE-2016-2858: Avoid potential DOS when using QEMU pseudo random number generator (bsc#970036) - CVE-2016-2857: Fixed OOB access when processing IP checksums (bsc#970037) - CVE-2016-4001: Fixed OOB access in Stellaris enet emulated nic (bsc#975128) - CVE-2016-4002: Fixed OOB access in MIPSnet emulated controller (bsc#975136) - CVE-2016-4020: Fixed possible host data leakage to guest from TPR access (bsc#975700) - CVE-2015-3214: Fixed OOB read in i8254 PIC (bsc#934069) - CVE-2014-9718: Fixed the handling of malformed or short ide PRDTs to avoid any opportunity for guest to cause DoS by abusing that interface (bsc#928393) - CVE-2014-3689: Fixed insufficient parameter validation in rectangle functions (bsc#901508) - CVE-2014-3615: The VGA emulator in QEMU allowed local guest users to read host memory by setting the display to a high resolution (bsc#895528). - CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463). - CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989). - CVE-2015-5279: Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU allowed guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets (bsc#945987). - CVE-2015-5745: Buffer overflow in virtio-serial (bsc#940929). - CVE-2015-6855: hw/ide/core.c in QEMU did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404). - CVE-2015-7295: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allowed remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface (bsc#947159). - CVE-2015-7549: PCI null pointer dereferences (bsc#958917). - CVE-2015-8504: VNC floating point exception (bsc#958491). - CVE-2015-8558: Infinite loop in ehci_advance_state resulting in DoS (bsc#959005). - CVE-2015-8613: Wrong sized memset in megasas command handler (bsc#961358). - CVE-2015-8619: Potential DoS for long HMP sendkey command argument (bsc#960334). - CVE-2015-8743: OOB memory access in ne2000 ioport r/w functions (bsc#960725). - CVE-2016-1568: AHCI use-after-free in aio port commands (bsc#961332). - CVE-2016-1714: Potential OOB memory access in processing firmware configuration (bsc#961691). - CVE-2016-1922: NULL pointer dereference when processing hmp i/o command (bsc#962320). - CVE-2016-1981: Potential DoS (infinite loop) in e1000 device emulation by malicious privileged user within guest (bsc#963782). - CVE-2016-2198: Malicious privileged guest user were able to cause DoS by writing to read-only EHCI capabilities registers (bsc#964413). This non-security issue was fixed: - Fix case of IDE interface needing busy status set before flush (bsc#936132) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-kvm-12634=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): kvm-1.4.2-46.1 References: https://www.suse.com/security/cve/CVE-2014-3615.html https://www.suse.com/security/cve/CVE-2014-3689.html https://www.suse.com/security/cve/CVE-2014-9718.html https://www.suse.com/security/cve/CVE-2015-3214.html https://www.suse.com/security/cve/CVE-2015-5239.html https://www.suse.com/security/cve/CVE-2015-5278.html https://www.suse.com/security/cve/CVE-2015-5279.html https://www.suse.com/security/cve/CVE-2015-5745.html https://www.suse.com/security/cve/CVE-2015-6855.html https://www.suse.com/security/cve/CVE-2015-7295.html https://www.suse.com/security/cve/CVE-2015-7549.html https://www.suse.com/security/cve/CVE-2015-8504.html https://www.suse.com/security/cve/CVE-2015-8558.html https://www.suse.com/security/cve/CVE-2015-8613.html https://www.suse.com/security/cve/CVE-2015-8619.html https://www.suse.com/security/cve/CVE-2015-8743.html https://www.suse.com/security/cve/CVE-2016-1568.html https://www.suse.com/security/cve/CVE-2016-1714.html https://www.suse.com/security/cve/CVE-2016-1922.html https://www.suse.com/security/cve/CVE-2016-1981.html https://www.suse.com/security/cve/CVE-2016-2198.html https://www.suse.com/security/cve/CVE-2016-2538.html https://www.suse.com/security/cve/CVE-2016-2841.html https://www.suse.com/security/cve/CVE-2016-2857.html https://www.suse.com/security/cve/CVE-2016-2858.html https://www.suse.com/security/cve/CVE-2016-3710.html https://www.suse.com/security/cve/CVE-2016-3712.html https://www.suse.com/security/cve/CVE-2016-4001.html https://www.suse.com/security/cve/CVE-2016-4002.html https://www.suse.com/security/cve/CVE-2016-4020.html https://www.suse.com/security/cve/CVE-2016-4037.html https://www.suse.com/security/cve/CVE-2016-4439.html https://www.suse.com/security/cve/CVE-2016-4441.html https://bugzilla.suse.com/895528 https://bugzilla.suse.com/901508 https://bugzilla.suse.com/928393 https://bugzilla.suse.com/934069 https://bugzilla.suse.com/936132 https://bugzilla.suse.com/940929 https://bugzilla.suse.com/944463 https://bugzilla.suse.com/945404 https://bugzilla.suse.com/945987 https://bugzilla.suse.com/945989 https://bugzilla.suse.com/947159 https://bugzilla.suse.com/958491 https://bugzilla.suse.com/958917 https://bugzilla.suse.com/959005 https://bugzilla.suse.com/960334 https://bugzilla.suse.com/960725 https://bugzilla.suse.com/961332 https://bugzilla.suse.com/961333 https://bugzilla.suse.com/961358 https://bugzilla.suse.com/961556 https://bugzilla.suse.com/961691 https://bugzilla.suse.com/962320 https://bugzilla.suse.com/963782 https://bugzilla.suse.com/964413 https://bugzilla.suse.com/967969 https://bugzilla.suse.com/969350 https://bugzilla.suse.com/970036 https://bugzilla.suse.com/970037 https://bugzilla.suse.com/975128 https://bugzilla.suse.com/975136 https://bugzilla.suse.com/975700 https://bugzilla.suse.com/976109 https://bugzilla.suse.com/978158 https://bugzilla.suse.com/978160 https://bugzilla.suse.com/980711 https://bugzilla.suse.com/980723 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  14. The NVIDIA GeForce GTX 1080 video card is currently the most powerful graphics card in the world according to our own benchmarks. The GeForce GTX 1080 Founders Edition is a great card, but many are waiting for custom board partner cards that feature higher clock frequencies and custom cooling solutions to become readily available. NVIDIA GeForce GTX 1080 and GeForce GTX 1070 cards are still hard to find, but supply is slowly getting better. EVGA currently offers five different EVGA GeForce GTX 1080 models ranging in price from $609.99 for their base model all the way up to $699.99 for the Founders Edition. Today, we’ll be looking at the EVGA GTX 1080 SC Gaming that sports a pretty decent overclock straight out of the box and is priced right in the middle. Article Title: EVGA GeForce GTX 1080 SC Gaming ACX 3.0 Video Card Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/evga-geforce-gtx-1080-sc-gaming-acx-3-0-video-card-review_183371 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
  15. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: MSI GTX 1070 Gaming X 8 GB Link: http://www.techpowerup.com/reviews/MSI/GTX_1070_Gaming_X Brief: MSI's GeForce GTX 1070 Gaming X is an overclocked custom-design variant of the GTX 1070, which is whisper quiet even during heavy gaming thanks to its dual fan TwinFrozr thermal solution. We overclocked this $439 card in our review too, where it's even faster than the GeForce GTX 1080.
  16. Title: Raidmax Narwhal Midi Tower Review ( -at -) NikKTech Description: Thanks to its rugged looks, sturdy construction, plenty of interior space and packed features the Narwhal midi tower from Raidmax is worth checking out for yourselves. Article Link: http://www.nikktech.com/main/articles/pc-hardware/pc-cases/6684-raidmax-narw hal-midi-tower-review Image Link: http://www.nikktech.com/main/images/pics/reviews/raidmax/narwhal/raidmax_nar whalb.JPG A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  17. View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=d9ce0c555a&e=0c004f9c13) Razer bills the Blade Stealth as "The Ultimate Ultrabook" citing superior mobility, display quality, and performance to its competition. Onboard the Razer Blade Stealth packs an Intel Core i7-6500U/Intel HD Graphics 520, 8GB of LPDDR3 1866MHz dual channel RAM, up to 512GB of PCIe solid state storage, 45Wh Lithium-ion polymer battery, and a choice of a 2560x1440p QHD or 3840x2160 4K touch display. Our unit is the base model with a 128GB PCIe SSD and a QHD panel for an MSRP of $999. So is the Blade Stealth really the ultimate ultrabook? Razer Blade Stealth Review (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=68a94b182f&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=df8def5c69&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=4057b0b757&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=c313ffee6e&e=0c004f9c13 http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=5cfd838283&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e2f3afb918&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=7f0ba06a1f&e=0c004f9c13 ============================================================
  18. SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1696-1 Rating: important References: #662458 #676471 #889207 #897662 #899908 #903279 #908151 #928547 #931448 #937086 #940413 #942262 #943989 #944309 #945345 #951844 #953233 #957805 #958390 #959514 #960857 #962336 #962846 #962872 #963572 #964461 #964727 #965319 #966054 #966573 #967640 #968497 #968687 #968812 #968813 #969016 #970604 #970609 #970892 #970911 #970948 #970955 #970956 #970958 #970970 #971049 #971124 #971126 #971159 #971170 #971600 #971628 #971793 #971947 #972003 #972068 #972174 #972780 #972844 #972891 #972951 #973378 #973556 #973855 #974418 #974646 #974692 #975371 #975488 #975772 #975945 #976739 #976821 #976868 #977582 #977685 #978401 #978527 #978822 #979213 #979347 #983143 Cross-References: CVE-2014-9717 CVE-2016-1583 CVE-2016-2185 CVE-2016-2186 CVE-2016-2188 CVE-2016-2847 CVE-2016-3134 CVE-2016-3136 CVE-2016-3137 CVE-2016-3138 CVE-2016-3140 CVE-2016-3689 CVE-2016-3951 CVE-2016-4482 CVE-2016-4486 CVE-2016-4569 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 16 vulnerabilities and has 66 fixes is now available. Description: The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.59 to receive various security and bugfixes. Main feature additions: - Improved support for Clustered File System (CephFS, fate#318586). - Addition of kGraft patches now produces logging messages to simplify auditing (fate#317827). The following security bugs were fixed: - CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143). - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547). - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124). - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958). - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956). - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bsc#970948). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126 971793). - CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955). - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970). - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911 970970). - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892). - CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628). - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418). - CVE-2016-4482: Fixed information leak in devio (bnc#978401). - CVE-2016-4486: Fixed information leak in rtnetlink ( bsc#978822). - CVE-2016-4569: Fixed information leak in events via snd_timer_user_tinterrupt (bsc#979213). The following non-security bugs were fixed: - ALSA: timer: Call notifier in the same spinlock (bsc#973378). - ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378). - ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378). - ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378). - Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685). - Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844). - Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855). - Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685). - Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685). - Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685). - Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685). - Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844). - Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685). - Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685). - Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951). - Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951). - Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371). - CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049). - CacheFiles: Handle object being killed before being set up (bsc#971049). - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739). - Drivers: hv: util: Pass the channel information during the init call (bnc#978527). - Drivers: hv: utils: Invoke the poll function after handshake (bnc#978527). - Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read(). - Export helper function to set irq affinity in pci-hyperv. - FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049). - FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049). - FS-Cache: Fix cancellation of in-progress operation (bsc#971049). - FS-Cache: Handle a new operation submitted against a killed object (bsc#971049). - FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049). - FS-Cache: Out of line fscache_operation_init() (bsc#971049). - FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049). - FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049). - FS-Cache: Reduce cookie ref count if submit fails (bsc#971049). - FS-Cache: Synchronise object death state change vs operation submission (bsc#971049). - FS-Cache: The operation cancellation method needs calling in more places (bsc#971049). - FS-Cache: Timeout for releasepage() (bsc#971049). - FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049). - FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049). - Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309) - Fix kabi issue (bsc#971049). - Input: i8042 - lower log level for "no controller" message (bsc#945345). - NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003). - NVMe: Unify controller probe and resume (bsc#979347). - NVMe: init nvme queue before enabling irq (bsc#662458). - PCI/AER: Fix aer_inject error codes (bsc#931448). - PCI/AER: Log actual error causes in aer_inject (bsc#931448). - PCI/AER: Log aer_inject error injections (bsc#931448). - PCI/AER: Use dev_warn() in aer_inject (bsc#931448). - RDMA/ocrdma: Avoid reporting wrong completions in case of error CQEs (bsc#908151). - Revert "scsi: fix soft lockup in scsi_remove_target() on module removal" (bsc#970609). - SUNRPC: Fix large reads on NFS/RDMA (bsc#908151). - SUNRPC: remove KERN_INFO from dprintk() call sites (bsc#908151). - USB: usbip: fix potential out-of-bounds write (bnc#975945). - Use mainline variant of hyperv KVP IP failover patch (bnc#978527) - acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604). - acpi: Disable APEI error injection if securelevel is set (bsc#972891). - apparmor: Skip proc ns files (bsc#959514). - cachefiles: perform test on s_blocksize when opening cache file (bsc#971049). - ceph fscache: Introduce a routine for uncaching single no data page from fscache (). - ceph fscache: Uncaching no data page from fscache in readpage(). - ceph: Add fs/ceph as a supported module. - ceph: Asynchronous IO support. - ceph: Avoid to propagate the invalid page point. - ceph: Clean up if error occurred in finish_read(). - ceph: EIO all operations after forced umount. - ceph: Implement writev/pwritev for sync operation. - ceph: Remove racey watch/notify event infrastructure (bsc#964727) - ceph: Remove racey watch/notify event infrastructure (bsc#964727) - ceph: add acl for cephfs. - ceph: add acl, noacl options for cephfs mount. - ceph: add get_name() NFS export callback. - ceph: add get_parent() NFS export callback. - ceph: add imported caps when handling cap export message. - ceph: add inline data to pagecache. - ceph: add missing init_acl() for mkdir() and atomic_open(). - ceph: add open export target session helper. - ceph: add request to i_unsafe_dirops when getting unsafe reply. - ceph: additional debugfs output. - ceph: always re-send cap flushes when MDS recovers. - ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps). - ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions). - ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync). - ceph: avoid releasing caps that are being used. - ceph: avoid sending unnessesary FLUSHSNAP message. - ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename(). - ceph: cast PAGE_SIZE to size_t in ceph_sync_write(). - ceph: ceph_frag_contains_value can be boolean. - ceph: ceph_get_parent() can be static. - ceph: check OSD caps before read/write. - ceph: check buffer size in ceph_vxattrcb_layout(). - ceph: check caps in filemap_fault and page_mkwrite. - ceph: check directory's completeness before emitting directory entry. - ceph: check inode caps in ceph_d_revalidate. - ceph: check unsupported fallocate mode. - ceph: check zero length in ceph_sync_read(). - ceph: checking for IS_ERR instead of NULL. - ceph: cleanup unsafe requests when reconnecting is denied. - ceph: cleanup use of ceph_msg_get. - ceph: clear directory's completeness when creating file. - ceph: convert inline data to normal data before data write. - ceph: do not assume r_old_dentry[_dir] always set together. - ceph: do not chain inode updates to parent fsync. - ceph: do not grabs open file reference for aborted request. - ceph: do not include ceph.{file,dir}.layout vxattr in listxattr(). - ceph: do not include used caps in cap_wanted. - ceph: do not invalidate page cache when inode is no longer used. - ceph: do not mark dirty caps when there is no auth cap. - ceph: do not pre-allocate space for cap release messages. - ceph: do not set r_old_dentry_dir on link(). - ceph: do not trim auth cap when there are cap snaps. - ceph: do not zero i_wrbuffer_ref when reconnecting is denied. - ceph: drop cap releases in requests composed before cap reconnect. - ceph: drop extra open file reference in ceph_atomic_open(). - ceph: drop unconnected inodes. - ceph: exclude setfilelock requests when calculating oldest tid. - ceph: export ceph_session_state_name function. - ceph: fetch inline data when getting Fcr cap refs. - ceph: fix __dcache_readdir(). - ceph: fix a comment typo. - ceph: fix append mode write. - ceph: fix atomic_open snapdir. - ceph: fix bool assignments. - ceph: fix cache revoke race. - ceph: fix ceph_dir_llseek(). - ceph: fix ceph_fh_to_parent(). - ceph: fix ceph_removexattr(). - ceph: fix ceph_set_acl(). - ceph: fix ceph_writepages_start(). - ceph: fix dcache/nocache mount option. - ceph: fix dentry leaks. - ceph: fix directory fsync. - ceph: fix divide-by-zero in __validate_layout(). - ceph: fix double page_unlock() in page_mkwrite(). - ceph: fix dout() compile warnings in ceph_filemap_fault(). - ceph: fix file lock interruption. - ceph: fix flush tid comparision. - ceph: fix flushing caps. - ceph: fix llistxattr on symlink. - ceph: fix message length computation. - ceph: fix mksnap crash. - ceph: fix null pointer dereference in send_mds_reconnect(). - ceph: fix pr_fmt() redefinition. - ceph: fix queuing inode to mdsdir's snaprealm. - ceph: fix reading inline data when i_size > PAGE_SIZE. - ceph: fix request time stamp encoding. - ceph: fix reset_readdir(). - ceph: fix setting empty extended attribute. - ceph: fix sizeof(struct tYpO *) typo. - ceph: fix snap context leak in error path. - ceph: fix trim caps. - ceph: fix uninline data function. - ceph: flush cap release queue when trimming session caps. - ceph: flush inline version. - ceph: forbid mandatory file lock. - ceph: fscache: Update object store limit after file writing. - ceph: fscache: Wait for completion of object initialization. - ceph: fscache: add an interface to synchronize object store limit. - ceph: get inode size for each append write. - ceph: handle -ESTALE reply. - ceph: handle SESSION_FORCE_RO message. - ceph: handle cap export race in try_flush_caps(). - ceph: handle cap import atomically. - ceph: handle frag mismatch between readdir request and reply. - ceph: handle race between cap reconnect and cap release. - ceph: handle session flush message. - ceph: hold on to exclusive caps on complete directories. - ceph: implement readv/preadv for sync operation. - ceph: improve readahead for file holes. - ceph: improve reference tracking for snaprealm. - ceph: include time stamp in every MDS request. - ceph: include time stamp in replayed MDS requests. - ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support. - ceph: initialize inode before instantiating dentry. - ceph: introduce a new inode flag indicating if cached dentries are ordered. - ceph: introduce ceph_fill_fragtree(). - ceph: introduce global empty snap context. - ceph: invalidate dirty pages after forced umount. - ceph: keep i_snap_realm while there are writers. - ceph: kstrdup() memory handling. - ceph: let MDS adjust readdir 'frag'. - ceph: make ceph_forget_all_cached_acls() static inline. - ceph: make fsync() wait unsafe requests that created/modified inode. - ceph: make sure syncfs flushes all cap snaps. - ceph: make sure write caps are registered with auth MDS. - ceph: match wait_for_completion_timeout return type. - ceph: message versioning fixes. - ceph: move ceph_find_inode() outside the s_mutex. - ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks. - ceph: no need to get parent inode in ceph_open. - ceph: parse inline data in MClientReply and MClientCaps. - ceph: pre-allocate ceph_cap struct for ceph_add_cap(). - ceph: pre-allocate data structure that tracks caps flushing. - ceph: preallocate buffer for readdir reply. - ceph: print inode number for LOOKUPINO request. - ceph: properly apply umask when ACL is enabled. - ceph: properly handle XATTR_CREATE and XATTR_REPLACE. - ceph: properly mark empty directory as complete. - ceph: properly release page upon error. - ceph: properly zero data pages for file holes. - ceph: provide seperate {inode,file}_operations for snapdir. - ceph: queue cap release in __ceph_remove_cap(). - ceph: queue vmtruncate if necessary when handing cap grant/revoke. - ceph: ratelimit warn messages for MDS closes session. - ceph: re-send AIO write request when getting -EOLDSNAP error. - ceph: re-send flushing caps (which are revoked) in reconnect stage. - ceph: re-send requests when MDS enters reconnecting stage. - ceph: refactor readpage_nounlock() to make the logic clearer. - ceph: remember subtree root dirfrag's auth MDS. - ceph: remove exported caps when handling cap import message. - ceph: remove outdated frag information. - ceph: remove redundant code for max file size verification. - ceph: remove redundant declaration. - ceph: remove redundant memset(0). - ceph: remove redundant test of head->safe and silence static analysis warnings. - ceph: remove the useless judgement. - ceph: remove unused functions in ceph_frag.h. - ceph: remove unused stringification macros. - ceph: remove useless ACL check. - ceph: remove xattr when null value is given to setxattr(). - ceph: rename snapshot support. - ceph: replace comma with a semicolon. - ceph: request xattrs if xattr_version is zero. - ceph: reserve caps for file layout/lock MDS requests. - ceph: reset r_resend_mds after receiving -ESTALE. - ceph: return error for traceless reply race. - ceph: rework dcache readdir. - ceph: send TID of the oldest pending caps flush to MDS. - ceph: send client metadata to MDS. - ceph: set caps count after composing cap reconnect message. - ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference. - ceph: set mds_wanted when MDS reply changes a cap to auth cap. - ceph: show nocephx_require_signatures and notcp_nodelay options. - ceph: show non-default options only. - ceph: simplify ceph_fh_to_dentry(). - ceph: simplify two mount_timeout sites. - ceph: skip invalid dentry during dcache readdir. - ceph: support inline data feature. - ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL. - ceph: sync read inline data. - ceph: take snap_rwsem when accessing snap realm's cached_context. - ceph: track pending caps flushing accurately. - ceph: track pending caps flushing globally. - ceph: trim unused inodes before reconnecting to recovering MDS. - ceph: trivial comment fix. - ceph: update i_max_size even if inode version does not change. - ceph: update inode fields according to issued caps. - ceph: use %zu for len in ceph_fill_inline_data(). - ceph: use ceph_seq_cmp() to compare migrate_seq. - ceph: use empty snap context for uninline_data and get_pool_perm. - ceph: use fl->fl_file as owner identifier of flock and posix lock. - ceph: use fl->fl_type to decide flock operation. - ceph: use fpos_cmp() to compare dentry positions. - ceph: use getattr request to fetch inline data. - ceph: use i_size_{read,write} to get/set i_size. - ceph: use msecs_to_jiffies for time conversion. - ceph: use pagelist to present MDS request data. - ceph: use truncate_pagecache() instead of truncate_inode_pages(). - ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure. - client: include kernel version in client metadata. - cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646). - crush: add chooseleaf_stable tunable. - crush: decode and initialize chooseleaf_stable. - crush: ensure bucket id is valid before indexing buckets array. - crush: ensure take bucket value is valid. - crush: fix crash from invalid 'take' argument. - crush: sync up with userspace. - crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390). - crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390). - dasd: fix hanging system after LCU changes (bnc#968497, LTC#136671). - drm/core: Preserve the framebuffer after removing it (bsc#968812). - drm/i915: do not warn if backlight unexpectedly enabled (boo#972068). - drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780). - drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813). - drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813). - ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA implementations (bsc#942262). - ext4: fix races between page faults and hole punching (bsc#972174). - ext4: fix races of writeback with punch hole and zero range (bsc#972174). - fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687). - fs, seqfile: always allow oom killer (bnc#968687). - fs/ceph/debugfs.c: replace seq_printf by seq_puts. - fs/ceph: replace pr_warning by pr_warn. - fs/pipe.c: skip file_update_time on frozen fs (bsc#975488). - ibmvscsi: Remove unsupported host config MAD (bsc#973556). - iommu/vt-d: Improve fault handler error messages (bsc#975772). - iommu/vt-d: Ratelimit fault handler (bsc#975772). - ipv6: make fib6 serial number per namespace (bsc#965319). - ipv6: per netns FIB garbage collection (bsc#965319). - ipv6: per netns fib6 walkers (bsc#965319). - ipv6: replace global gc_args with local variable (bsc#965319). - kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel(). - kABI: protect function file_open_root. - kABI: protect include in evm. - kABI: protect struct user_struct. - kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573). - kabi/severities: Allow changes in zpci_* symbols (bsc#974692) - kabi/severities: Whitelist libceph and rbd (bsc#964727). - kabi: kgr, add reserved fields. - kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846). - kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319). - kgr: add TAINT_KGRAFT. - kgr: add kgraft annotation to hwrng kthread. - kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls. - kgr: add objname to kgr_patch_fun struct. - kgr: add sympos and objname to error and debug messages. - kgr: add sympos as disambiguator field to kgr_patch_fun structure. - kgr: add sympos to sysfs. - kgr: call kgr_init_ftrace_ops() only for loaded objects. - kgr: change to kallsyms_on_each_symbol iterator. - kgr: define pr_fmt and modify all pr_* messages. - kgr: do not print error for !abort_if_missing symbols (bnc#943989). - kgr: do not return and print an error only if the object is not loaded. - kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572). - kgr: fix an asymmetric dealing with delayed module loading. - kgr: fix redirection on s390x arch (bsc#903279). - kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel(). - kgr: handle btrfs kthreads (bnc#889207). - kgr: kmemleak, really mark the kthread safe after an interrupt. - kgr: kmemleak, really mark the kthread safe after an interrupt. - kgr: log when modifying kernel. - kgr: mark kernel unsupported upon patch revert. - kgr: mark some more missed kthreads (bnc#962336). - kgr: remove abort_if_missing flag. - kgr: usb/storage: do not emit thread awakened (bnc#899908). - kgraft/gfs2: Do not block livepatching in the log daemon for too long. - kgraft/xen: Do not block livepatching in the XEN blkif kthread. - libceph: Avoid holding the zero page on ceph_msgr_slab_init errors. - libceph: Fix ceph_tcp_sendpage()'s more boolean usage. - libceph: MOSDOpReply v7 encoding. - libceph: Remove spurious kunmap() of the zero page. - libceph: a couple tweaks for wait loops. - libceph: add nocephx_sign_messages option. - libceph: advertise support for TUNABLES5. - libceph: advertise support for keepalive2. - libceph: allow setting osd_req_op's flags. - libceph: check data_len in ->alloc_msg(). - libceph: clear messenger auth_retry flag if we fault. - libceph: clear msg->con in ceph_msg_release() only. - libceph: do not access invalid memory in keepalive2 path. - libceph: do not spam dmesg with stray reply warnings. - libceph: drop authorizer check from cephx msg signing routines. - libceph: evaluate osd_req_op_data() arguments only once. - libceph: fix authorizer invalidation, take 2. - libceph: fix ceph_msg_revoke(). - libceph: fix wrong name "Ceph filesystem for Linux". - libceph: introduce ceph_x_authorizer_cleanup(). - libceph: invalidate AUTH in addition to a service ticket. - libceph: kill off ceph_x_ticket_handler::validity. - libceph: move ceph_file_layout helpers to ceph_fs.h. - libceph: msg signing callouts do not need con argument. - libceph: nuke time_sub(). - libceph: properly release STAT request's raw_data_in. - libceph: remove con argument in handle_reply(). - libceph: remove outdated comment. - libceph: remove the unused macro AES_KEY_SIZE. - libceph: rename con_work() to ceph_con_workfn(). - libceph: set 'exists' flag for newly up osd. - libceph: stop duplicating client fields in messenger. - libceph: store timeouts in jiffies, verify user input. - libceph: treat sockaddr_storage with uninitialized family as blank. - libceph: use keepalive2 to verify the mon session is alive. - libceph: use list_for_each_entry_safe. - libceph: use list_next_entry instead of list_entry_next. - libceph: use local variable cursor instead of &msg->cursor. - libceph: use the right footer size when skipping a message. - libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846). - mds: check cap ID when handling cap export message. - mmc: Allow forward compatibility for eMMC (bnc#966054). - mmc: sdhci: Allow for irq being shared (bnc#977582). - mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640). - nfs-rdma: Fix for FMR leaks (bsc#908151). - nfs: fix high load average due to callback thread sleeping (bsc#971170). - nvme: fix max_segments integer truncation (bsc#676471). - ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947). - ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947). - ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947). - pipe: limit the per-user amount of pages allocated in pipes (bsc#970948). - powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc ( -at -) 976821). - powerpc/book3s64: Remove __end_handlers marker (bsc#976821). - rbd: bump queue_max_segments. - rbd: delete an unnecessary check before rbd_dev_destroy(). - rbd: do not free rbd_dev outside of the release callback. - rbd: do not put snap_context twice in rbd_queue_workfn(). - rbd: drop null test before destroy functions. - rbd: plug rbd_dev->header.object_prefix memory leak. - rbd: rbd_wq comment is obsolete. - rbd: remove duplicate calls to rbd_dev_mapping_clear(). - rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails. - rbd: set device_type::release instead of device::release. - rbd: set max_sectors explicitly. - rbd: store rbd_options in rbd_device. - rbd: terminate rbd_opts_tokens with Opt_err. - rbd: timeout watch teardown on unmap with mount_timeout. - rbd: use GFP_NOIO consistently for request allocations (bsc#971159). - rbd: use writefull op for object size writes. - reduce m_start() cost.. (bsc#966573). - s390/compat: correct restore of high gprs on signal return (bnc#968497, LTC#137571). - s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413). - s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445). - s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445). - s390/pci: extract software counters from fmb (bnc#974692, LTC#139445). - s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444). - s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401). - s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442). - s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442). - s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442). - s390/zcrypt: HWRNG registration cause kernel panic on CEX hotplug (bnc#968497, LTC#138409). - scsi-bnx2fc-handle_scsi_retry_delay - scsi-bnx2fc-soft_lockup_when_rmmod - scsi: Add intermediate STARGET_REMOVE state to scsi_target_state (bsc#970609). - scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016). - sd: get disk reference in sd_check_events() (bnc#897662). - supported.conf: Add bridge.ko for OpenStack (bsc#971600) - supported.conf: add pci-hyperv - supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461) - svcrdma: Fence LOCAL_INV work requests (bsc#908151). - svcrdma: advertise the correct max payload (bsc#908151). - svcrdma: fix offset calculation for non-page aligned sge entries (bsc#908151). - svcrdma: fix printk when memory allocation fails (bsc#908151). - svcrdma: refactor marshalling logic (bsc#908151). - svcrdma: send_write() must not overflow the device's max sge (bsc#908151). - target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872). - target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872). - target: Fix LUN_RESET active TMR descriptor handling (bsc#962872). - target: Fix TAS handling for multi-session se_node_acls (bsc#962872). - target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872). - target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872). - tcp: convert cached rtt from usec to jiffies when feeding initial rto (bsc#937086). - vgaarb: Add more context to error messages (bsc#976868). - xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604). - xprtrdma: Allocate missing pagelist (bsc#908151). - xprtrdma: Avoid deadlock when credit window is reset (bsc#908151). - xprtrdma: Disconnect on registration failure (bsc#908151). - xprtrdma: Ensure ia->ri_id->qp is not NULL when reconnecting (bsc#908151). - xprtrdma: Fall back to MTHCAFMR when FRMR is not supported (bsc#908151). - xprtrdma: Limit work done by completion handler (bsc#908151). - xprtrdma: Make rpcrdma_ep_destroy() return void (bsc#908151). - xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks() in process context (bsc#908151). - xprtrdma: Reduce the number of hardway buffer allocations (bsc#908151). - xprtrdma: Remove BOUNCEBUFFERS memory registration mode (bsc#908151). - xprtrdma: Remove BUG_ON() call sites (bsc#908151). - xprtrdma: Remove MEMWINDOWS registration modes (bsc#908151). - xprtrdma: Remove REGISTER memory registration mode (bsc#908151). - xprtrdma: Remove Tavor MTU setting (bsc#908151). - xprtrdma: Reset connection timeout after successful reconnect (bsc#908151). - xprtrdma: Simplify rpcrdma_deregister_external() synopsis (bsc#908151). - xprtrdma: Split the completion queue (bsc#908151). - xprtrdma: Use macros for reconnection timeout constants (bsc#908151). - xprtrdma: mind the device's max fast register page list depth (bsc#908151). - xprtrdma: mount reports "Invalid mount option" if memreg mode not supported (bsc#908151). - xprtrmda: Reduce calls to ib_poll_cq() in completion handlers (bsc#908151). - xprtrmda: Reduce lock contention in completion handlers (bsc#908151). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1004=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1004=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1004=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1004=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1004=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1004=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): kernel-default-debuginfo-3.12.59-60.41.2 kernel-default-debugsource-3.12.59-60.41.2 kernel-default-extra-3.12.59-60.41.2 kernel-default-extra-debuginfo-3.12.59-60.41.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): kernel-obs-build-3.12.59-60.41.2 kernel-obs-build-debugsource-3.12.59-60.41.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): kernel-docs-3.12.59-60.41.8 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kernel-default-3.12.59-60.41.2 kernel-default-base-3.12.59-60.41.2 kernel-default-base-debuginfo-3.12.59-60.41.2 kernel-default-debuginfo-3.12.59-60.41.2 kernel-default-debugsource-3.12.59-60.41.2 kernel-default-devel-3.12.59-60.41.2 kernel-syms-3.12.59-60.41.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): kernel-devel-3.12.59-60.41.2 kernel-macros-3.12.59-60.41.2 kernel-source-3.12.59-60.41.2 - SUSE Linux Enterprise Server 12-SP1 (x86_64): kernel-xen-3.12.59-60.41.2 kernel-xen-base-3.12.59-60.41.2 kernel-xen-base-debuginfo-3.12.59-60.41.2 kernel-xen-debuginfo-3.12.59-60.41.2 kernel-xen-debugsource-3.12.59-60.41.2 kernel-xen-devel-3.12.59-60.41.2 - SUSE Linux Enterprise Server 12-SP1 (s390x): kernel-default-man-3.12.59-60.41.2 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.59-60.41.2 kernel-ec2-debuginfo-3.12.59-60.41.2 kernel-ec2-debugsource-3.12.59-60.41.2 kernel-ec2-devel-3.12.59-60.41.2 kernel-ec2-extra-3.12.59-60.41.2 kernel-ec2-extra-debuginfo-3.12.59-60.41.2 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_41-default-1-2.1 kgraft-patch-3_12_59-60_41-xen-1-2.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kernel-default-3.12.59-60.41.2 kernel-default-debuginfo-3.12.59-60.41.2 kernel-default-debugsource-3.12.59-60.41.2 kernel-default-devel-3.12.59-60.41.2 kernel-default-extra-3.12.59-60.41.2 kernel-default-extra-debuginfo-3.12.59-60.41.2 kernel-syms-3.12.59-60.41.1 kernel-xen-3.12.59-60.41.2 kernel-xen-debuginfo-3.12.59-60.41.2 kernel-xen-debugsource-3.12.59-60.41.2 kernel-xen-devel-3.12.59-60.41.2 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): kernel-devel-3.12.59-60.41.2 kernel-macros-3.12.59-60.41.2 kernel-source-3.12.59-60.41.2 References: https://www.suse.com/security/cve/CVE-2014-9717.html https://www.suse.com/security/cve/CVE-2016-1583.html https://www.suse.com/security/cve/CVE-2016-2185.html https://www.suse.com/security/cve/CVE-2016-2186.html https://www.suse.com/security/cve/CVE-2016-2188.html https://www.suse.com/security/cve/CVE-2016-2847.html https://www.suse.com/security/cve/CVE-2016-3134.html https://www.suse.com/security/cve/CVE-2016-3136.html https://www.suse.com/security/cve/CVE-2016-3137.html https://www.suse.com/security/cve/CVE-2016-3138.html https://www.suse.com/security/cve/CVE-2016-3140.html https://www.suse.com/security/cve/CVE-2016-3689.html https://www.suse.com/security/cve/CVE-2016-3951.html https://www.suse.com/security/cve/CVE-2016-4482.html https://www.suse.com/security/cve/CVE-2016-4486.html https://www.suse.com/security/cve/CVE-2016-4569.html https://bugzilla.suse.com/662458 https://bugzilla.suse.com/676471 https://bugzilla.suse.com/889207 https://bugzilla.suse.com/897662 https://bugzilla.suse.com/899908 https://bugzilla.suse.com/903279 https://bugzilla.suse.com/908151 https://bugzilla.suse.com/928547 https://bugzilla.suse.com/931448 https://bugzilla.suse.com/937086 https://bugzilla.suse.com/940413 https://bugzilla.suse.com/942262 https://bugzilla.suse.com/943989 https://bugzilla.suse.com/944309 https://bugzilla.suse.com/945345 https://bugzilla.suse.com/951844 https://bugzilla.suse.com/953233 https://bugzilla.suse.com/957805 https://bugzilla.suse.com/958390 https://bugzilla.suse.com/959514 https://bugzilla.suse.com/960857 https://bugzilla.suse.com/962336 https://bugzilla.suse.com/962846 https://bugzilla.suse.com/962872 https://bugzilla.suse.com/963572 https://bugzilla.suse.com/964461 https://bugzilla.suse.com/964727 https://bugzilla.suse.com/965319 https://bugzilla.suse.com/966054 https://bugzilla.suse.com/966573 https://bugzilla.suse.com/967640 https://bugzilla.suse.com/968497 https://bugzilla.suse.com/968687 https://bugzilla.suse.com/968812 https://bugzilla.suse.com/968813 https://bugzilla.suse.com/969016 https://bugzilla.suse.com/970604 https://bugzilla.suse.com/970609 https://bugzilla.suse.com/970892 https://bugzilla.suse.com/970911 https://bugzilla.suse.com/970948 https://bugzilla.suse.com/970955 https://bugzilla.suse.com/970956 https://bugzilla.suse.com/970958 https://bugzilla.suse.com/970970 https://bugzilla.suse.com/971049 https://bugzilla.suse.com/971124 https://bugzilla.suse.com/971126 https://bugzilla.suse.com/971159 https://bugzilla.suse.com/971170 https://bugzilla.suse.com/971600 https://bugzilla.suse.com/971628 https://bugzilla.suse.com/971793 https://bugzilla.suse.com/971947 https://bugzilla.suse.com/972003 https://bugzilla.suse.com/972068 https://bugzilla.suse.com/972174 https://bugzilla.suse.com/972780 https://bugzilla.suse.com/972844 https://bugzilla.suse.com/972891 https://bugzilla.suse.com/972951 https://bugzilla.suse.com/973378 https://bugzilla.suse.com/973556 https://bugzilla.suse.com/973855 https://bugzilla.suse.com/974418 https://bugzilla.suse.com/974646 https://bugzilla.suse.com/974692 https://bugzilla.suse.com/975371 https://bugzilla.suse.com/975488 https://bugzilla.suse.com/975772 https://bugzilla.suse.com/975945 https://bugzilla.suse.com/976739 https://bugzilla.suse.com/976821 https://bugzilla.suse.com/976868 https://bugzilla.suse.com/977582 https://bugzilla.suse.com/977685 https://bugzilla.suse.com/978401 https://bugzilla.suse.com/978527 https://bugzilla.suse.com/978822 https://bugzilla.suse.com/979213 https://bugzilla.suse.com/979347 https://bugzilla.suse.com/983143 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  19. SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1696-1 Rating: important References: #662458 #676471 #889207 #897662 #899908 #903279 #908151 #928547 #931448 #937086 #940413 #942262 #943989 #944309 #945345 #951844 #953233 #957805 #958390 #959514 #960857 #962336 #962846 #962872 #963572 #964461 #964727 #965319 #966054 #966573 #967640 #968497 #968687 #968812 #968813 #969016 #970604 #970609 #970892 #970911 #970948 #970955 #970956 #970958 #970970 #971049 #971124 #971126 #971159 #971170 #971600 #971628 #971793 #971947 #972003 #972068 #972174 #972780 #972844 #972891 #972951 #973378 #973556 #973855 #974418 #974646 #974692 #975371 #975488 #975772 #975945 #976739 #976821 #976868 #977582 #977685 #978401 #978527 #978822 #979213 #979347 #983143 Cross-References: CVE-2014-9717 CVE-2016-1583 CVE-2016-2185 CVE-2016-2186 CVE-2016-2188 CVE-2016-2847 CVE-2016-3134 CVE-2016-3136 CVE-2016-3137 CVE-2016-3138 CVE-2016-3140 CVE-2016-3689 CVE-2016-3951 CVE-2016-4482 CVE-2016-4486 CVE-2016-4569 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 16 vulnerabilities and has 66 fixes is now available. Description: The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.59 to receive various security and bugfixes. Main feature additions: - Improved support for Clustered File System (CephFS, fate#318586). - Addition of kGraft patches now produces logging messages to simplify auditing (fate#317827). The following security bugs were fixed: - CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143). - CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547). - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124). - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958). - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956). - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bsc#970948). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126 971793). - CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955). - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970). - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911 970970). - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892). - CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628). - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418). - CVE-2016-4482: Fixed information leak in devio (bnc#978401). - CVE-2016-4486: Fixed information leak in rtnetlink ( bsc#978822). - CVE-2016-4569: Fixed information leak in events via snd_timer_user_tinterrupt (bsc#979213). The following non-security bugs were fixed: - ALSA: timer: Call notifier in the same spinlock (bsc#973378). - ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378). - ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378). - ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378). - Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685). - Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844). - Btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855). - Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685). - Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685). - Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685). - Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685). - Btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844). - Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685). - Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685). - Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951). - Btrfs: qgroup: return EINVAL if level of parent is not higher than child's (bsc#972951). - Btrfs: teach backref walking about backrefs with underflowed offset values (bsc#975371). - CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049). - CacheFiles: Handle object being killed before being set up (bsc#971049). - Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739). - Drivers: hv: util: Pass the channel information during the init call (bnc#978527). - Drivers: hv: utils: Invoke the poll function after handshake (bnc#978527). - Drivers: hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read(). - Export helper function to set irq affinity in pci-hyperv. - FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049). - FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049). - FS-Cache: Fix cancellation of in-progress operation (bsc#971049). - FS-Cache: Handle a new operation submitted against a killed object (bsc#971049). - FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049). - FS-Cache: Out of line fscache_operation_init() (bsc#971049). - FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049). - FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049). - FS-Cache: Reduce cookie ref count if submit fails (bsc#971049). - FS-Cache: Synchronise object death state change vs operation submission (bsc#971049). - FS-Cache: The operation cancellation method needs calling in more places (bsc#971049). - FS-Cache: Timeout for releasepage() (bsc#971049). - FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049). - FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049). - Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309) - Fix kabi issue (bsc#971049). - Input: i8042 - lower log level for "no controller" message (bsc#945345). - NFSv4.1: do not use machine credentials for CLOSE when using 'sec=sys' (bsc#972003). - NVMe: Unify controller probe and resume (bsc#979347). - NVMe: init nvme queue before enabling irq (bsc#662458). - PCI/AER: Fix aer_inject error codes (bsc#931448). - PCI/AER: Log actual error causes in aer_inject (bsc#931448). - PCI/AER: Log aer_inject error injections (bsc#931448). - PCI/AER: Use dev_warn() in aer_inject (bsc#931448). - RDMA/ocrdma: Avoid reporting wrong completions in case of error CQEs (bsc#908151). - Revert "scsi: fix soft lockup in scsi_remove_target() on module removal" (bsc#970609). - SUNRPC: Fix large reads on NFS/RDMA (bsc#908151). - SUNRPC: remove KERN_INFO from dprintk() call sites (bsc#908151). - USB: usbip: fix potential out-of-bounds write (bnc#975945). - Use mainline variant of hyperv KVP IP failover patch (bnc#978527) - acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604). - acpi: Disable APEI error injection if securelevel is set (bsc#972891). - apparmor: Skip proc ns files (bsc#959514). - cachefiles: perform test on s_blocksize when opening cache file (bsc#971049). - ceph fscache: Introduce a routine for uncaching single no data page from fscache (). - ceph fscache: Uncaching no data page from fscache in readpage(). - ceph: Add fs/ceph as a supported module. - ceph: Asynchronous IO support. - ceph: Avoid to propagate the invalid page point. - ceph: Clean up if error occurred in finish_read(). - ceph: EIO all operations after forced umount. - ceph: Implement writev/pwritev for sync operation. - ceph: Remove racey watch/notify event infrastructure (bsc#964727) - ceph: Remove racey watch/notify event infrastructure (bsc#964727) - ceph: add acl for cephfs. - ceph: add acl, noacl options for cephfs mount. - ceph: add get_name() NFS export callback. - ceph: add get_parent() NFS export callback. - ceph: add imported caps when handling cap export message. - ceph: add inline data to pagecache. - ceph: add missing init_acl() for mkdir() and atomic_open(). - ceph: add open export target session helper. - ceph: add request to i_unsafe_dirops when getting unsafe reply. - ceph: additional debugfs output. - ceph: always re-send cap flushes when MDS recovers. - ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps). - ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions). - ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync). - ceph: avoid releasing caps that are being used. - ceph: avoid sending unnessesary FLUSHSNAP message. - ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename(). - ceph: cast PAGE_SIZE to size_t in ceph_sync_write(). - ceph: ceph_frag_contains_value can be boolean. - ceph: ceph_get_parent() can be static. - ceph: check OSD caps before read/write. - ceph: check buffer size in ceph_vxattrcb_layout(). - ceph: check caps in filemap_fault and page_mkwrite. - ceph: check directory's completeness before emitting directory entry. - ceph: check inode caps in ceph_d_revalidate. - ceph: check unsupported fallocate mode. - ceph: check zero length in ceph_sync_read(). - ceph: checking for IS_ERR instead of NULL. - ceph: cleanup unsafe requests when reconnecting is denied. - ceph: cleanup use of ceph_msg_get. - ceph: clear directory's completeness when creating file. - ceph: convert inline data to normal data before data write. - ceph: do not assume r_old_dentry[_dir] always set together. - ceph: do not chain inode updates to parent fsync. - ceph: do not grabs open file reference for aborted request. - ceph: do not include ceph.{file,dir}.layout vxattr in listxattr(). - ceph: do not include used caps in cap_wanted. - ceph: do not invalidate page cache when inode is no longer used. - ceph: do not mark dirty caps when there is no auth cap. - ceph: do not pre-allocate space for cap release messages. - ceph: do not set r_old_dentry_dir on link(). - ceph: do not trim auth cap when there are cap snaps. - ceph: do not zero i_wrbuffer_ref when reconnecting is denied. - ceph: drop cap releases in requests composed before cap reconnect. - ceph: drop extra open file reference in ceph_atomic_open(). - ceph: drop unconnected inodes. - ceph: exclude setfilelock requests when calculating oldest tid. - ceph: export ceph_session_state_name function. - ceph: fetch inline data when getting Fcr cap refs. - ceph: fix __dcache_readdir(). - ceph: fix a comment typo. - ceph: fix append mode write. - ceph: fix atomic_open snapdir. - ceph: fix bool assignments. - ceph: fix cache revoke race. - ceph: fix ceph_dir_llseek(). - ceph: fix ceph_fh_to_parent(). - ceph: fix ceph_removexattr(). - ceph: fix ceph_set_acl(). - ceph: fix ceph_writepages_start(). - ceph: fix dcache/nocache mount option. - ceph: fix dentry leaks. - ceph: fix directory fsync. - ceph: fix divide-by-zero in __validate_layout(). - ceph: fix double page_unlock() in page_mkwrite(). - ceph: fix dout() compile warnings in ceph_filemap_fault(). - ceph: fix file lock interruption. - ceph: fix flush tid comparision. - ceph: fix flushing caps. - ceph: fix llistxattr on symlink. - ceph: fix message length computation. - ceph: fix mksnap crash. - ceph: fix null pointer dereference in send_mds_reconnect(). - ceph: fix pr_fmt() redefinition. - ceph: fix queuing inode to mdsdir's snaprealm. - ceph: fix reading inline data when i_size > PAGE_SIZE. - ceph: fix request time stamp encoding. - ceph: fix reset_readdir(). - ceph: fix setting empty extended attribute. - ceph: fix sizeof(struct tYpO *) typo. - ceph: fix snap context leak in error path. - ceph: fix trim caps. - ceph: fix uninline data function. - ceph: flush cap release queue when trimming session caps. - ceph: flush inline version. - ceph: forbid mandatory file lock. - ceph: fscache: Update object store limit after file writing. - ceph: fscache: Wait for completion of object initialization. - ceph: fscache: add an interface to synchronize object store limit. - ceph: get inode size for each append write. - ceph: handle -ESTALE reply. - ceph: handle SESSION_FORCE_RO message. - ceph: handle cap export race in try_flush_caps(). - ceph: handle cap import atomically. - ceph: handle frag mismatch between readdir request and reply. - ceph: handle race between cap reconnect and cap release. - ceph: handle session flush message. - ceph: hold on to exclusive caps on complete directories. - ceph: implement readv/preadv for sync operation. - ceph: improve readahead for file holes. - ceph: improve reference tracking for snaprealm. - ceph: include time stamp in every MDS request. - ceph: include time stamp in replayed MDS requests. - ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support. - ceph: initialize inode before instantiating dentry. - ceph: introduce a new inode flag indicating if cached dentries are ordered. - ceph: introduce ceph_fill_fragtree(). - ceph: introduce global empty snap context. - ceph: invalidate dirty pages after forced umount. - ceph: keep i_snap_realm while there are writers. - ceph: kstrdup() memory handling. - ceph: let MDS adjust readdir 'frag'. - ceph: make ceph_forget_all_cached_acls() static inline. - ceph: make fsync() wait unsafe requests that created/modified inode. - ceph: make sure syncfs flushes all cap snaps. - ceph: make sure write caps are registered with auth MDS. - ceph: match wait_for_completion_timeout return type. - ceph: message versioning fixes. - ceph: move ceph_find_inode() outside the s_mutex. - ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks. - ceph: no need to get parent inode in ceph_open. - ceph: parse inline data in MClientReply and MClientCaps. - ceph: pre-allocate ceph_cap struct for ceph_add_cap(). - ceph: pre-allocate data structure that tracks caps flushing. - ceph: preallocate buffer for readdir reply. - ceph: print inode number for LOOKUPINO request. - ceph: properly apply umask when ACL is enabled. - ceph: properly handle XATTR_CREATE and XATTR_REPLACE. - ceph: properly mark empty directory as complete. - ceph: properly release page upon error. - ceph: properly zero data pages for file holes. - ceph: provide seperate {inode,file}_operations for snapdir. - ceph: queue cap release in __ceph_remove_cap(). - ceph: queue vmtruncate if necessary when handing cap grant/revoke. - ceph: ratelimit warn messages for MDS closes session. - ceph: re-send AIO write request when getting -EOLDSNAP error. - ceph: re-send flushing caps (which are revoked) in reconnect stage. - ceph: re-send requests when MDS enters reconnecting stage. - ceph: refactor readpage_nounlock() to make the logic clearer. - ceph: remember subtree root dirfrag's auth MDS. - ceph: remove exported caps when handling cap import message. - ceph: remove outdated frag information. - ceph: remove redundant code for max file size verification. - ceph: remove redundant declaration. - ceph: remove redundant memset(0). - ceph: remove redundant test of head->safe and silence static analysis warnings. - ceph: remove the useless judgement. - ceph: remove unused functions in ceph_frag.h. - ceph: remove unused stringification macros. - ceph: remove useless ACL check. - ceph: remove xattr when null value is given to setxattr(). - ceph: rename snapshot support. - ceph: replace comma with a semicolon. - ceph: request xattrs if xattr_version is zero. - ceph: reserve caps for file layout/lock MDS requests. - ceph: reset r_resend_mds after receiving -ESTALE. - ceph: return error for traceless reply race. - ceph: rework dcache readdir. - ceph: send TID of the oldest pending caps flush to MDS. - ceph: send client metadata to MDS. - ceph: set caps count after composing cap reconnect message. - ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference. - ceph: set mds_wanted when MDS reply changes a cap to auth cap. - ceph: show nocephx_require_signatures and notcp_nodelay options. - ceph: show non-default options only. - ceph: simplify ceph_fh_to_dentry(). - ceph: simplify two mount_timeout sites. - ceph: skip invalid dentry during dcache readdir. - ceph: support inline data feature. - ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL. - ceph: sync read inline data. - ceph: take snap_rwsem when accessing snap realm's cached_context. - ceph: track pending caps flushing accurately. - ceph: track pending caps flushing globally. - ceph: trim unused inodes before reconnecting to recovering MDS. - ceph: trivial comment fix. - ceph: update i_max_size even if inode version does not change. - ceph: update inode fields according to issued caps. - ceph: use %zu for len in ceph_fill_inline_data(). - ceph: use ceph_seq_cmp() to compare migrate_seq. - ceph: use empty snap context for uninline_data and get_pool_perm. - ceph: use fl->fl_file as owner identifier of flock and posix lock. - ceph: use fl->fl_type to decide flock operation. - ceph: use fpos_cmp() to compare dentry positions. - ceph: use getattr request to fetch inline data. - ceph: use i_size_{read,write} to get/set i_size. - ceph: use msecs_to_jiffies for time conversion. - ceph: use pagelist to present MDS request data. - ceph: use truncate_pagecache() instead of truncate_inode_pages(). - ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure. - client: include kernel version in client metadata. - cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646). - crush: add chooseleaf_stable tunable. - crush: decode and initialize chooseleaf_stable. - crush: ensure bucket id is valid before indexing buckets array. - crush: ensure take bucket value is valid. - crush: fix crash from invalid 'take' argument. - crush: sync up with userspace. - crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390). - crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390). - dasd: fix hanging system after LCU changes (bnc#968497, LTC#136671). - drm/core: Preserve the framebuffer after removing it (bsc#968812). - drm/i915: do not warn if backlight unexpectedly enabled (boo#972068). - drm/i915: set backlight duty cycle after backlight enable for gen4 (boo#972780). - drm/radeon: fix-up some float to fixed conversion thinkos (bsc#968813). - drm/radeon: use HDP_MEM_COHERENCY_FLUSH_CNTL for sdma as well (bsc#968813). - ext4: Fix softlockups in SEEK_HOLE and SEEK_DATA implementations (bsc#942262). - ext4: fix races between page faults and hole punching (bsc#972174). - ext4: fix races of writeback with punch hole and zero range (bsc#972174). - fs, seq_file: fallback to vmalloc instead of oom kill processes (bnc#968687). - fs, seqfile: always allow oom killer (bnc#968687). - fs/ceph/debugfs.c: replace seq_printf by seq_puts. - fs/ceph: replace pr_warning by pr_warn. - fs/pipe.c: skip file_update_time on frozen fs (bsc#975488). - ibmvscsi: Remove unsupported host config MAD (bsc#973556). - iommu/vt-d: Improve fault handler error messages (bsc#975772). - iommu/vt-d: Ratelimit fault handler (bsc#975772). - ipv6: make fib6 serial number per namespace (bsc#965319). - ipv6: per netns FIB garbage collection (bsc#965319). - ipv6: per netns fib6 walkers (bsc#965319). - ipv6: replace global gc_args with local variable (bsc#965319). - kABI: kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel(). - kABI: protect function file_open_root. - kABI: protect include in evm. - kABI: protect struct user_struct. - kabi fix for patches.fixes/reduce-m_start-cost (bsc#966573). - kabi/severities: Allow changes in zpci_* symbols (bsc#974692) - kabi/severities: Whitelist libceph and rbd (bsc#964727). - kabi: kgr, add reserved fields. - kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846). - kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319). - kgr: add TAINT_KGRAFT. - kgr: add kgraft annotation to hwrng kthread. - kgr: add kgraft annotations to kthreads' wait_event_freezable() API calls. - kgr: add objname to kgr_patch_fun struct. - kgr: add sympos and objname to error and debug messages. - kgr: add sympos as disambiguator field to kgr_patch_fun structure. - kgr: add sympos to sysfs. - kgr: call kgr_init_ftrace_ops() only for loaded objects. - kgr: change to kallsyms_on_each_symbol iterator. - kgr: define pr_fmt and modify all pr_* messages. - kgr: do not print error for !abort_if_missing symbols (bnc#943989). - kgr: do not return and print an error only if the object is not loaded. - kgr: do not use WQ_MEM_RECLAIM workqueue (bnc#963572). - kgr: fix an asymmetric dealing with delayed module loading. - kgr: fix redirection on s390x arch (bsc#903279). - kgr: fix subtle race with kgr_module_init(), going notifier and kgr_modify_kernel(). - kgr: handle btrfs kthreads (bnc#889207). - kgr: kmemleak, really mark the kthread safe after an interrupt. - kgr: kmemleak, really mark the kthread safe after an interrupt. - kgr: log when modifying kernel. - kgr: mark kernel unsupported upon patch revert. - kgr: mark some more missed kthreads (bnc#962336). - kgr: remove abort_if_missing flag. - kgr: usb/storage: do not emit thread awakened (bnc#899908). - kgraft/gfs2: Do not block livepatching in the log daemon for too long. - kgraft/xen: Do not block livepatching in the XEN blkif kthread. - libceph: Avoid holding the zero page on ceph_msgr_slab_init errors. - libceph: Fix ceph_tcp_sendpage()'s more boolean usage. - libceph: MOSDOpReply v7 encoding. - libceph: Remove spurious kunmap() of the zero page. - libceph: a couple tweaks for wait loops. - libceph: add nocephx_sign_messages option. - libceph: advertise support for TUNABLES5. - libceph: advertise support for keepalive2. - libceph: allow setting osd_req_op's flags. - libceph: check data_len in ->alloc_msg(). - libceph: clear messenger auth_retry flag if we fault. - libceph: clear msg->con in ceph_msg_release() only. - libceph: do not access invalid memory in keepalive2 path. - libceph: do not spam dmesg with stray reply warnings. - libceph: drop authorizer check from cephx msg signing routines. - libceph: evaluate osd_req_op_data() arguments only once. - libceph: fix authorizer invalidation, take 2. - libceph: fix ceph_msg_revoke(). - libceph: fix wrong name "Ceph filesystem for Linux". - libceph: introduce ceph_x_authorizer_cleanup(). - libceph: invalidate AUTH in addition to a service ticket. - libceph: kill off ceph_x_ticket_handler::validity. - libceph: move ceph_file_layout helpers to ceph_fs.h. - libceph: msg signing callouts do not need con argument. - libceph: nuke time_sub(). - libceph: properly release STAT request's raw_data_in. - libceph: remove con argument in handle_reply(). - libceph: remove outdated comment. - libceph: remove the unused macro AES_KEY_SIZE. - libceph: rename con_work() to ceph_con_workfn(). - libceph: set 'exists' flag for newly up osd. - libceph: stop duplicating client fields in messenger. - libceph: store timeouts in jiffies, verify user input. - libceph: treat sockaddr_storage with uninitialized family as blank. - libceph: use keepalive2 to verify the mon session is alive. - libceph: use list_for_each_entry_safe. - libceph: use list_next_entry instead of list_entry_next. - libceph: use local variable cursor instead of &msg->cursor. - libceph: use the right footer size when skipping a message. - libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846). - mds: check cap ID when handling cap export message. - mmc: Allow forward compatibility for eMMC (bnc#966054). - mmc: sdhci: Allow for irq being shared (bnc#977582). - mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640). - nfs-rdma: Fix for FMR leaks (bsc#908151). - nfs: fix high load average due to callback thread sleeping (bsc#971170). - nvme: fix max_segments integer truncation (bsc#676471). - ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947). - ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947). - ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947). - pipe: limit the per-user amount of pages allocated in pipes (bsc#970948). - powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc ( -at -) 976821). - powerpc/book3s64: Remove __end_handlers marker (bsc#976821). - rbd: bump queue_max_segments. - rbd: delete an unnecessary check before rbd_dev_destroy(). - rbd: do not free rbd_dev outside of the release callback. - rbd: do not put snap_context twice in rbd_queue_workfn(). - rbd: drop null test before destroy functions. - rbd: plug rbd_dev->header.object_prefix memory leak. - rbd: rbd_wq comment is obsolete. - rbd: remove duplicate calls to rbd_dev_mapping_clear(). - rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails. - rbd: set device_type::release instead of device::release. - rbd: set max_sectors explicitly. - rbd: store rbd_options in rbd_device. - rbd: terminate rbd_opts_tokens with Opt_err. - rbd: timeout watch teardown on unmap with mount_timeout. - rbd: use GFP_NOIO consistently for request allocations (bsc#971159). - rbd: use writefull op for object size writes. - reduce m_start() cost.. (bsc#966573). - s390/compat: correct restore of high gprs on signal return (bnc#968497, LTC#137571). - s390/pageattr: do a single TLB flush for change_page_attr (bsc#940413). - s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445). - s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445). - s390/pci: extract software counters from fmb (bnc#974692, LTC#139445). - s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444). - s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401). - s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442). - s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442). - s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442). - s390/zcrypt: HWRNG registration cause kernel panic on CEX hotplug (bnc#968497, LTC#138409). - scsi-bnx2fc-handle_scsi_retry_delay - scsi-bnx2fc-soft_lockup_when_rmmod - scsi: Add intermediate STARGET_REMOVE state to scsi_target_state (bsc#970609). - scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016). - sd: get disk reference in sd_check_events() (bnc#897662). - supported.conf: Add bridge.ko for OpenStack (bsc#971600) - supported.conf: add pci-hyperv - supported.conf:Add drivers/infiniband/hw/ocrdma/ocrdma.ko to supported.conf (bsc#964461) - svcrdma: Fence LOCAL_INV work requests (bsc#908151). - svcrdma: advertise the correct max payload (bsc#908151). - svcrdma: fix offset calculation for non-page aligned sge entries (bsc#908151). - svcrdma: fix printk when memory allocation fails (bsc#908151). - svcrdma: refactor marshalling logic (bsc#908151). - svcrdma: send_write() must not overflow the device's max sge (bsc#908151). - target: Drop incorrect ABORT_TASK put for completed commands (bsc#962872). - target: Fix LUN_RESET active I/O handling for ACK_KREF (bsc#962872). - target: Fix LUN_RESET active TMR descriptor handling (bsc#962872). - target: Fix TAS handling for multi-session se_node_acls (bsc#962872). - target: Fix race with SCF_SEND_DELAYED_TAS handling (bsc#962872). - target: Fix remote-port TMR ABORT + se_cmd fabric stop (bsc#962872). - tcp: convert cached rtt from usec to jiffies when feeding initial rto (bsc#937086). - vgaarb: Add more context to error messages (bsc#976868). - xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604). - xprtrdma: Allocate missing pagelist (bsc#908151). - xprtrdma: Avoid deadlock when credit window is reset (bsc#908151). - xprtrdma: Disconnect on registration failure (bsc#908151). - xprtrdma: Ensure ia->ri_id->qp is not NULL when reconnecting (bsc#908151). - xprtrdma: Fall back to MTHCAFMR when FRMR is not supported (bsc#908151). - xprtrdma: Limit work done by completion handler (bsc#908151). - xprtrdma: Make rpcrdma_ep_destroy() return void (bsc#908151). - xprtrdma: RPC/RDMA must invoke xprt_wake_pending_tasks() in process context (bsc#908151). - xprtrdma: Reduce the number of hardway buffer allocations (bsc#908151). - xprtrdma: Remove BOUNCEBUFFERS memory registration mode (bsc#908151). - xprtrdma: Remove BUG_ON() call sites (bsc#908151). - xprtrdma: Remove MEMWINDOWS registration modes (bsc#908151). - xprtrdma: Remove REGISTER memory registration mode (bsc#908151). - xprtrdma: Remove Tavor MTU setting (bsc#908151). - xprtrdma: Reset connection timeout after successful reconnect (bsc#908151). - xprtrdma: Simplify rpcrdma_deregister_external() synopsis (bsc#908151). - xprtrdma: Split the completion queue (bsc#908151). - xprtrdma: Use macros for reconnection timeout constants (bsc#908151). - xprtrdma: mind the device's max fast register page list depth (bsc#908151). - xprtrdma: mount reports "Invalid mount option" if memreg mode not supported (bsc#908151). - xprtrmda: Reduce calls to ib_poll_cq() in completion handlers (bsc#908151). - xprtrmda: Reduce lock contention in completion handlers (bsc#908151). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2016-1004=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1004=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1004=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2016-1004=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2016-1004=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1004=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): kernel-default-debuginfo-3.12.59-60.41.2 kernel-default-debugsource-3.12.59-60.41.2 kernel-default-extra-3.12.59-60.41.2 kernel-default-extra-debuginfo-3.12.59-60.41.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): kernel-obs-build-3.12.59-60.41.2 kernel-obs-build-debugsource-3.12.59-60.41.2 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): kernel-docs-3.12.59-60.41.8 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kernel-default-3.12.59-60.41.2 kernel-default-base-3.12.59-60.41.2 kernel-default-base-debuginfo-3.12.59-60.41.2 kernel-default-debuginfo-3.12.59-60.41.2 kernel-default-debugsource-3.12.59-60.41.2 kernel-default-devel-3.12.59-60.41.2 kernel-syms-3.12.59-60.41.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): kernel-devel-3.12.59-60.41.2 kernel-macros-3.12.59-60.41.2 kernel-source-3.12.59-60.41.2 - SUSE Linux Enterprise Server 12-SP1 (x86_64): kernel-xen-3.12.59-60.41.2 kernel-xen-base-3.12.59-60.41.2 kernel-xen-base-debuginfo-3.12.59-60.41.2 kernel-xen-debuginfo-3.12.59-60.41.2 kernel-xen-debugsource-3.12.59-60.41.2 kernel-xen-devel-3.12.59-60.41.2 - SUSE Linux Enterprise Server 12-SP1 (s390x): kernel-default-man-3.12.59-60.41.2 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.59-60.41.2 kernel-ec2-debuginfo-3.12.59-60.41.2 kernel-ec2-debugsource-3.12.59-60.41.2 kernel-ec2-devel-3.12.59-60.41.2 kernel-ec2-extra-3.12.59-60.41.2 kernel-ec2-extra-debuginfo-3.12.59-60.41.2 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_41-default-1-2.1 kgraft-patch-3_12_59-60_41-xen-1-2.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kernel-default-3.12.59-60.41.2 kernel-default-debuginfo-3.12.59-60.41.2 kernel-default-debugsource-3.12.59-60.41.2 kernel-default-devel-3.12.59-60.41.2 kernel-default-extra-3.12.59-60.41.2 kernel-default-extra-debuginfo-3.12.59-60.41.2 kernel-syms-3.12.59-60.41.1 kernel-xen-3.12.59-60.41.2 kernel-xen-debuginfo-3.12.59-60.41.2 kernel-xen-debugsource-3.12.59-60.41.2 kernel-xen-devel-3.12.59-60.41.2 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): kernel-devel-3.12.59-60.41.2 kernel-macros-3.12.59-60.41.2 kernel-source-3.12.59-60.41.2 References: https://www.suse.com/security/cve/CVE-2014-9717.html https://www.suse.com/security/cve/CVE-2016-1583.html https://www.suse.com/security/cve/CVE-2016-2185.html https://www.suse.com/security/cve/CVE-2016-2186.html https://www.suse.com/security/cve/CVE-2016-2188.html https://www.suse.com/security/cve/CVE-2016-2847.html https://www.suse.com/security/cve/CVE-2016-3134.html https://www.suse.com/security/cve/CVE-2016-3136.html https://www.suse.com/security/cve/CVE-2016-3137.html https://www.suse.com/security/cve/CVE-2016-3138.html https://www.suse.com/security/cve/CVE-2016-3140.html https://www.suse.com/security/cve/CVE-2016-3689.html https://www.suse.com/security/cve/CVE-2016-3951.html https://www.suse.com/security/cve/CVE-2016-4482.html https://www.suse.com/security/cve/CVE-2016-4486.html https://www.suse.com/security/cve/CVE-2016-4569.html https://bugzilla.suse.com/662458 https://bugzilla.suse.com/676471 https://bugzilla.suse.com/889207 https://bugzilla.suse.com/897662 https://bugzilla.suse.com/899908 https://bugzilla.suse.com/903279 https://bugzilla.suse.com/908151 https://bugzilla.suse.com/928547 https://bugzilla.suse.com/931448 https://bugzilla.suse.com/937086 https://bugzilla.suse.com/940413 https://bugzilla.suse.com/942262 https://bugzilla.suse.com/943989 https://bugzilla.suse.com/944309 https://bugzilla.suse.com/945345 https://bugzilla.suse.com/951844 https://bugzilla.suse.com/953233 https://bugzilla.suse.com/957805 https://bugzilla.suse.com/958390 https://bugzilla.suse.com/959514 https://bugzilla.suse.com/960857 https://bugzilla.suse.com/962336 https://bugzilla.suse.com/962846 https://bugzilla.suse.com/962872 https://bugzilla.suse.com/963572 https://bugzilla.suse.com/964461 https://bugzilla.suse.com/964727 https://bugzilla.suse.com/965319 https://bugzilla.suse.com/966054 https://bugzilla.suse.com/966573 https://bugzilla.suse.com/967640 https://bugzilla.suse.com/968497 https://bugzilla.suse.com/968687 https://bugzilla.suse.com/968812 https://bugzilla.suse.com/968813 https://bugzilla.suse.com/969016 https://bugzilla.suse.com/970604 https://bugzilla.suse.com/970609 https://bugzilla.suse.com/970892 https://bugzilla.suse.com/970911 https://bugzilla.suse.com/970948 https://bugzilla.suse.com/970955 https://bugzilla.suse.com/970956 https://bugzilla.suse.com/970958 https://bugzilla.suse.com/970970 https://bugzilla.suse.com/971049 https://bugzilla.suse.com/971124 https://bugzilla.suse.com/971126 https://bugzilla.suse.com/971159 https://bugzilla.suse.com/971170 https://bugzilla.suse.com/971600 https://bugzilla.suse.com/971628 https://bugzilla.suse.com/971793 https://bugzilla.suse.com/971947 https://bugzilla.suse.com/972003 https://bugzilla.suse.com/972068 https://bugzilla.suse.com/972174 https://bugzilla.suse.com/972780 https://bugzilla.suse.com/972844 https://bugzilla.suse.com/972891 https://bugzilla.suse.com/972951 https://bugzilla.suse.com/973378 https://bugzilla.suse.com/973556 https://bugzilla.suse.com/973855 https://bugzilla.suse.com/974418 https://bugzilla.suse.com/974646 https://bugzilla.suse.com/974692 https://bugzilla.suse.com/975371 https://bugzilla.suse.com/975488 https://bugzilla.suse.com/975772 https://bugzilla.suse.com/975945 https://bugzilla.suse.com/976739 https://bugzilla.suse.com/976821 https://bugzilla.suse.com/976868 https://bugzilla.suse.com/977582 https://bugzilla.suse.com/977685 https://bugzilla.suse.com/978401 https://bugzilla.suse.com/978527 https://bugzilla.suse.com/978822 https://bugzilla.suse.com/979213 https://bugzilla.suse.com/979347 https://bugzilla.suse.com/983143 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  20. TITLE: be quiet! Dark Base Pro 900 Review ( -at -) Vortez CONTENT: The Dark Base Pro 900 is the first chassis to arrive from the Dark Base family. This new release is regarded as be quiet's flagship solution - promising to deliver on quality, features and performance. Inside, this case is optimised for high-end hardware including monolithic CPU coolers, big graphics cards and a plethora of water cooling radiators. Dark Base Pro 900 also boasts a number of spe[censored]ed features which seek to innovate - sounds interesting? Let's crack on! LINK: http://www.vortez.net/review.php?id=1181 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
  21. *Be Quiet! Dark Base 900 PRO review* Let's check out the latest from the be quiet team. Starting today they will offer the lovely Dark Base 900 PRO tower chassis. The all new enthusiast class chassis from be quiet! is full of intricate little features like a Qi wireless charger for your phone, and what about a full window side-panel made out of tempered glass? Check out the full review here <http://www.guru3d.com/articles-pages/be-quiet-dark-base-900-pro-review,1.html>'>http://www.guru3d.com/articles-pages/be-quiet-dark-base-900-pro-review,1.html> . URL: http://www.guru3d.com/articles-pages/be-quiet-dark-base-900-pro-review,1.html <http://www.guru3d.com/articles-pages/be-quiet-dark-base-900-pro-review,1.html> --
  22. UK Gaming Computers Styx Mini-ITX System Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=3910ae209f&e=872093acb5 http://www.kitguru.net UK Gaming Computers Styx Mini-ITX System Review There is no doubt that the PC industry has set its sights on the living room. It is this trend which has brought us Steam Machines, the Steam Controller and lapboards such as the Roccat Sova and Corsair Lapdog. UK Gaming Computers aims to harness this drive for living room gaming with its Styx system, a small and stylish PC perfectly suited for being connected to a HDTV. Read the review here: http://www.kitguru.net/desktop-pc/dominic-moass/uk-gaming-computers-styx-mini-itx-system-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=3910ae209f&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  23. ** TECHSPOT ------------------------------------------------------------ ** Acer Chromebook 14 Review ------------------------------------------------------------ ** http://www.techspot.com/review/1194-acer-chromebook-14/ ------------------------------------------------------------ The Acer Chromebook 14 is a svelte machine that aims for a perfect blend of style, features and performance. It looks and feels 'premium' but unlike the Pixel, this laptop comes in at just $300, powered by a quad-core Intel Celeron N3160 processor and Intel HD Graphics 400 alongside 4GB of LPDDR3 RAM and 32GB of flash storage. Thank you. Julio Franco Executive Editor | TECHSPOT (http://www.techspot.com) ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  24. Welcome to the Ubuntu Weekly Newsletter, Issue 471 for the week June 20 - 26, 2016. == Links to UWN == * Wiki page: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Issue471 == In This Issue == * Welcome New Members and Developers * Ubuntu Stats * Arizona Xenial Xerus, Ubuntu 16.04 LTS, Release Party 3.0 Final Report * Upcoming Ubuntu 16.04 presentations in Felton and San Francisco * Announcing Ubuntu at Texas Linux Fest 2016 * Daniel Holbach: Being among the first in a new community * Dustin Kirkland: HOWTO: Classic, apt-based Ubuntu 16.04 LTS Server on the rpi2! * Ubuntu App Developer Blog: Snapd 2.0.9: full snap confinement on Elementary 0.4 * Kubuntu: Kubuntu Dojo 2 - Kubuntu Ninjas * Xubuntu: Looking for memorable and fun Xubuntu stories! * Dustin Kirkland: HOWTO: Host your own SNAP store! * Ubuntu Membership Board call for nominations * Ubuntu Cloud News * In The Blogosphere * Full Circle Magazine #110 * Other Articles of Interest * Featured Audio and Video * Weekly Ubuntu Development Team Meetings * Upcoming Meetings and Events * Updates and Security for 12.04, 14.04, 15.10 and 16.04 * And much more! == General Community News == === Welcome New Members and Developers === On behalf of the Ubuntu Council, David Pires writes to inform that vasa1's application for Ubuntu Membership was accepted: * Vasa1: ForumID: http://ubuntuorg/member.php?u=449866 | Launchpad: https://launchpad.net/~aesouza2008 | Wiki: https://wiki.ubuntu.com/vasa1 https://lists.ubuntu.com/archives/ubuntu-news-team/2016-June/002501.html == Ubuntu Stats == === Bug Stats === * Open (123572) +173 over last week * Critical (370) +7 over last week * Unconfirmed (60919) +115 over last week As always, the Bug Squad needs more help. If you want to get started, please see https://wiki.ubuntu.com/BugSquad === Ask Ubuntu Top 5 Questions this week === ==== Most Active Questions ==== * Generate white noise to calm a baby http://askubuntu.com/questions/789465/generate-white-noise-to-calm-a-baby * I seem to have deleted all my files while removing the wine from the home directory http://askubuntu.com/questions/790532/i-seem-to-have-deleted-all-my-files-while-removing-the-wine-from-the-home-direct * How do you protect Ubuntu login? http://askubuntu.com/questions/790088/how-do-you-protect-ubuntu-login * How to create my own terminal commands [closed] http://askubuntu.com/questions/789476/how-to-create-my-own-terminal-commands * How to compile a c++ program from notepad++? [on hold] http://askubuntu.com/questions/790008/how-to-compile-a-c-program-from-notepad ==== Top Voted New Questions ==== * Generate white noise to calm a baby http://askubuntu.com/questions/789465/ * How do you protect Ubuntu login? http://askubuntu.com/questions/790088/ * I seem to have deleted all my files while removing the wine from the home directory http://askubuntu.com/questions/790532/ * How to name a file to be the very first in Nautilus? http://askubuntu.com/questions/790255/ * Wired conncetion icon is displayed instead of Wifi icon - Ubuntu 16.04 http://askubuntu.com/questions/789843/ People Contributing the best questions and answers this week: Byte Commander (http://askubuntu.com/users/367990/byte-commander), Rinzwind (http://askubuntu.com/users/15811/rinzwind), Victoralm (http://askubuntu.com/users/260670/victoralm), heemayl (http://askubuntu.com/users/216503/heemayl) and Sneetsher (http://askubuntu.com/users/26246/sneetsher) Ask (and answer!) questions at http://askubuntu.com == LoCo News == === Arizona Xenial Xerus, Ubuntu 16.04 LTS, Release Party 3.0 Final Report === MajB writes a summary on their Xenial Xerus release party which was held on April 21, 2016. He raves that the party was a success. He states that there were technical discussions about systemd, writing ISOs to USB sticks, and plans for the future. http://azloco.com/node/241 === Upcoming Ubuntu 16.04 presentations in Felton and San Francisco === Elizabeth K. Joseph provides us with details concerning her upcoming Ubuntu 16.04 presentations in Felton and San Francisco. The article contains details concerning where and when the presentations will be held in addition to an RSVP link for the San Francisco release party in July. https://lists.ubuntu.com/archives/ubuntu-us-ca/2016-June/002737.html === Announcing Ubuntu at Texas Linux Fest 2016 === Jose Antonio Rey announces that Ubuntu will have a presence at Texas Linux Fest 2016, July 8-9th. He states that there will be Ubuntu computers, as well as some Nexus 4 phones running Ubuntu to demonstrate convergence. https://lists.ubuntu.com/archives/ubuntu-us-tx/2016-June/000720.html == LoCo Events == The following LoCo team events are currently scheduled in the next two weeks: * Tempe Ubuntu Hour, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3394-tempe-ubuntu-hour/ Looking beyond the next two weeks? Visit the LoCo Team Portal to browse upcoming events around the world: http://loco.ubuntu.com/events/ == The Planet == === Daniel Holbach: Being among the first in a new community === Daniel Holbach tells us about Snappy Playpen; a project where early snap contributors hung out and thrashed out ideas and problems, and even had fun. Daniel lists some of the achievements before inviting you to come join the fun in week 3 concentrating on server apps and electron based apps. Finally Daniel thanks those involved. https://daniel.holba.ch/blog/2016/06/being-among-the-first-in-a-new-community/ === Dustin Kirkland: HOWTO: Classic, apt-based Ubuntu 16.04 LTS Server on the rpi2! === Dustin Kirkland blogs about Ubuntu Core being the "snappiest way" to run Ubuntu on a Raspberry Pi 2. If however you still want to run the classic apt/deb, Dustin provides instructions to download and write to microSD the Pi image with further instructions about its use. http://blog.dustinkirkland.com/2016/06/howto-classic-apt-based-ubuntu-server.html === Ubuntu App Developer Blog: Snapd 2.0.9: full snap confinement on Elementary 0.4 === David Calle writes that a new snapd is heading to your 16.04 systems, and outlines the included changes, and what's coming in the next snapd release (and available if you want to install from source). http://developer.ubuntu.com/en/blog/2016/06/23/snapd-209-full-snap-confinement-elementary-04/ === Kubuntu: Kubuntu Dojo 2 - Kubuntu Ninjas === Are you interested in being a developer? then come join the Kubuntu Dojo on Thursday June 30 ( -at -) 1800 UTC. This is the second free course and covers Debian & Ubuntu packaging. Read for details. http://www.kubuntu.org/news/kubuntu-dojo-2-kubuntu-ninjas/ === Xubuntu: Looking for memorable and fun Xubuntu stories! === To celebrate Xubuntu's tenth birthday a new campaign and competition is being announced. If you have a fun or memorable Xubuntu story you may wish to enter the competition. Prizes are five sets of Xubuntu stickers from UnixStickers.com with two also receiving Xubuntu t-shirt. http://xubuntu.org/news/looking-memorable-fun-xubuntu-stories/ === Dustin Kirkland: HOWTO: Host your own SNAP store! === Dustin Kirkland provides us with an overview of how to setup a SNAP store on any platform that supports SNAPs. This guide reveals how simple it is to create and use SNAP stores to distribute software across Ubuntu devices. http://blog.dustinkirkland.com/2016/06/howto-host-your-own-snap-store.html == Other Community News == === Ubuntu Membership Board call for nominations === Svetlana Belkin announces that seven members of the Membership Board are nearing the end of their two year term, and a call out for members who'd like to be considered for the Board to apply/be nominated. What's required and how to apply is detailed, and applications close July 1st ( -at -) 12:00 UTC. http://fridge.ubuntu.com/2016/06/20/ubuntu-membership-board-call-for-nominations-4/ == Ubuntu Cloud News == * A New Research Cloud on Ubuntu OpenStack - http://insights.ubuntu.com/2016/06/20/a-new-research-cloud-on-ubuntu-openstack/ == In The Blogosphere == === Why You Should Use Ubuntu LTS === Matt Hartley of Datamation writes that "one of the most common issues I see among newer Linux users is the desire to upgrade their distribution needlessly to a new bleeding-edge version." In this article he lets us know why people would be "better off" sticking to a stable version, citing an Ubuntu LTS, that has been out for a while. http://www.datamation.com/open-source/why-you-should-use-ubuntu-lts-1.html === Canonical changes the game by announcing universal snap packages === "Canonical had a game changing announcement up its sleeve, one that could seriously shift the Linux landscape." Jack Wallen explains why universal snap packages are a major step forward for Linux and open source. http://www.techrepublic.com/article/canonical-changes-the-game-by-announcing-universal-snap-packages/ === Shuttleworth Doesn't Expect Other OSes to Want to Fetch Snaps from Ubuntu Store === Marius Nestor of Softpedia reports on Mark Shuttleworth's responses to criticism over the the Snappy server not being released with the broader Snaps announcement. He writes that according to Mark Shuttleworth, "the simplest approach for application developers to deliver their apps as Snaps from their own store would be to offer them over HTTP." http://news.softpedia.com/news/shuttleworth-doesn-t-expect-other-oses-to-want-to-fetch-snaps-from-ubuntu-store-505601.shtml === Intel Skylake Graphics: Windows 10 vs. Ubuntu 16.04 + Latest Open-Source Driver Code === Michael Larabel of Phoronix shares the results of his latest tests of the Intel Skylake graphics on Windows versus the latest open source drivers on Ubuntu 16.04. After sharing a series of results, he writes: "While the open-source Intel driver stack is getting faster in some of the tests with Linux 4.7 and Mesa 12.1-dev, the Linux numbers across the board for GpuTest were noticeably slower compared to Windows 10 Pro x64 with the latest Intel proprietary driver." http://www.phoronix.com/scan.php?page=article&item=intel-win10-mesa121&num=1 == In Other News == === Full Circle Magazine #110 === Full Circle - the independent magazine for the Ubuntu Linux community are proud to announce the release of issue one hundred and ten. This month: * Command & Conquer * How-To : Python, Install Ubuntu with Clonezilla & VirtualBox, and Migrating From VAX * Graphics : Inkscape * Linux Labs: Ubuntu on my Chromebook and Small LTSP Installation Pt. 2 * Book Review: Learn to program with Minecraft * Ubuntu Games: Dota 2 Reborn, and Vassal plus: News, Q&A, and soooo much more. Get it while it's hot! http://fullcirclemagazine.org/issue-110 == Other Articles of Interest == * Flatpak Officially Released for Next-Generation, Standalone GNU/Linux Apps - http://news.softpedia.com/news/flatpak-officially-released-for-next-generation-standalone-gnu-linux-apps-505589.shtml == Featured Audio and Video == === Ubuntu Community Team Q&A - 21st June 2016 === Watch the Ubuntu Community Team in their regular weekly Q&A Links they posted on irc include: * http://google.com/+SnapcraftIo * https://twitter.com/snapcraftio * https://www.facebook.com/snapcraftio * https://github.com/kyrofa/nextcloud-snap/blob/master/snapcraft.yaml === Ubuntu Podcast from the UK LoCo: S09E17 - Sherlock Holmes' Smarter Brother - Ubuntu Podcast === "It's Episode Seventeen of Season Nine of the Ubuntu Podcast! Mark Johnson, Alan Pope, Laura Cowen, Martin Wimpress, and Mycroftare here and speaking to your brain." http://ubuntupodcast.org/2016/06/23/s09e17-sherlock-holmes-smarter-brother/ === Full Circle Weekly News #23 === Just a quick message to let you know that Full Circle Weekly News #23 is out: http://fullcirclemagazine.org/podcast/full-circle-weekly-news-23/ and, Full Circle Magazine #110 came out a couple of days ago: http://fullcirclemagazine.org/issue-110 The show is also available via: RSS: http://fullcirclemagazine.org/feed/podcast Stitcher Radio: http://www.stitcher.com/s?fid=85347&refid=stpr TuneIn Radio: http://tunein.com/radio/Full-Circle-Weekly-News-p855064/ and PlayerFM: https://player.fm/series/the-full-circle-weekly-news == Weekly Ubuntu Development Team Meetings == * Kernel Team - June 21, 2016 - https://wiki.ubuntu.com/KernelTeam/Newsletter/2016-06-21 * Security Team - June 20, 2016 - https://wiki.ubuntu.com/MeetingLogs/Security/20160620 * Server Team - June 21, 2016 - https://wiki.ubuntu.com/MeetingLogs/Server/20160621 == Upcoming Meetings and Events == For upcoming meetings and events please visit the calendars at fridge.ubuntu.com: http://fridge.ubuntu.com/calendars/ == Updates and Security for 12.04, 14.04, 15.10 and 16.04 == === Security Updates === * [uSN-3009-1] Dnsmasq vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-June/003467.html * [uSN-3010-1] Expat vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-June/003466.html * [uSN-3011-1] HAProxy vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-June/003468.html * [uSN-3012-1] Wget vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-June/003469.html * [uSN-3013-1] XML-RPC for C and C++ vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-June/003470.html * [uSN-3014-1] Spice vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-June/003471.html === Ubuntu 12.04 Updates === * wget 1.13.4-2ubuntu1.4 - https://lists.ubuntu.com/archives/precise-changes/2016-June/025345.html * xmlrpc-c 1.16.33-3.1ubuntu5.2 - https://lists.ubuntu.com/archives/precise-changes/2016-June/025346.html * dpkg 1.16.1.2ubuntu7.8 - https://lists.ubuntu.com/archives/precise-changes/2016-June/025347.html * shim-signed 1.15~12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-June/025348.html * linux-lts-trusty 3.13.0-91.138~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-June/025349.html * linux-signed-lts-trusty 3.13.0-91.138~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-June/025350.html * linux-meta-lts-trusty 3.13.0.91.82 - https://lists.ubuntu.com/archives/precise-changes/2016-June/025351.html * linux-lts-trusty_3.13.0-91.138~precise1_amd64.tar.gz - - https://lists.ubuntu.com/archives/precise-changes/2016-June/025352.html End of Life - April 2017 === Ubuntu 14.04 Updates === * wget 1.15-1ubuntu1.14.04.2 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022230.html * grub2 2.02~beta2-9ubuntu1.8 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022231.html * grub2-signed 1.34.9 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022232.html * spice 0.12.4-0nocelt2ubuntu1.3 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022233.html * spice 0.12.4-0nocelt2ubuntu1.3 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022234.html * linux-signed-lts-xenial 4.4.0-26.45~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022235.html * linux-lts-xenial 4.4.0-26.45~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022236.html * linux-meta-lts-xenial 4.4.0.26.16 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022237.html * linux-lts-xenial_4.4.0-26.45~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022238.html * linux-keystone 3.13.0-60.88 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022239.html * linux-meta-keystone 3.13.0.60.58 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022240.html * linux-lts-xenial 4.4.0-27.46~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022241.html * linux-signed-lts-xenial 4.4.0-27.46~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022242.html * linux-meta-lts-xenial 4.4.0.27.17 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022243.html * linux-lts-xenial_4.4.0-27.46~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022244.html * walinuxagent 2.1.3-0ubuntu4~ubuntu14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022245.html * sssd 1.11.8-0ubuntu0.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022246.html * dpkg 1.17.5ubuntu5.7 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022247.html * mpm-itk 2.4.6-01-1ubuntu1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022248.html * apache2 2.4.7-1ubuntu4.10 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022249.html * debian-installer 20101020ubuntu318.39 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022252.html * shim-signed 1.15~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022250.html * dkms 2.2.0.3-1.1ubuntu5.14.04.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022251.html * grub2 2.02~beta2-9ubuntu1.9 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022253.html * dh-golang 1.13~0ubuntu0~14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022254.html * libqb 0.16.0.real-1ubuntu5 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022255.html * openldap 2.4.31-1+nmu2ubuntu8.3 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022256.html * grub2-signed 1.34.10 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022257.html * linux-signed 3.13.0-91.138 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022258.html * linux 3.13.0-91.138 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022259.html * linux-meta 3.13.0.91.97 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022260.html * linux_3.13.0-91.138_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022261.html * linux-signed-lts-utopic 3.16.0-76.98~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022262.html * linux-lts-utopic 3.16.0-76.98~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022263.html * linux-meta-lts-utopic 3.16.0.76.67 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022264.html * linux-lts-utopic_3.16.0-76.98~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022265.html * linux-signed-lts-xenial 4.4.0-28.47~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022266.html * linux-lts-xenial 4.4.0-28.47~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022267.html * linux-meta-lts-xenial 4.4.0.28.18 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022268.html * linux-lts-xenial_4.4.0-28.47~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022269.html * linux-lts-wily 4.2.0-41.48~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022270.html * linux-signed-lts-wily 4.2.0-41.48~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022271.html * linux-meta-lts-wily 4.2.0.41.33 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022272.html * linux-lts-wily_4.2.0-41.48~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022273.html * linux-lts-vivid 3.19.0-64.72~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022274.html * linux-signed-lts-vivid 3.19.0-64.72~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022275.html * linux-meta-lts-vivid 3.19.0.64.46 - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022276.html * linux-lts-vivid_3.19.0-64.72~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-June/022277.html End of Life - April 2019 === Ubuntu 15.10 Updates === * wget 1.16.1-1ubuntu1.1 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013366.html * spice 0.12.5-1.1ubuntu2.1 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013367.html * spice 0.12.5-1.1ubuntu2.1 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013368.html * shim-signed 1.15~15.10.1 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013369.html * dkms 2.2.0.3-2ubuntu6.2 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013370.html * heat 1:5.0.1-0ubuntu3.1 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013371.html * linux 4.2.0-41.48 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013372.html * linux-meta 4.2.0.41.44 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013373.html * linux-signed 4.2.0-41.48 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013374.html * linux_4.2.0-41.48_amd64.tar.gz - - https://lists.ubuntu.com/archives/wily-changes/2016-June/013375.html * linux-raspi2 4.2.0-1033.43 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013376.html * linux-meta-raspi2 4.2.0.1033.36 - https://lists.ubuntu.com/archives/wily-changes/2016-June/013377.html End of Life - July 2016 === Ubuntu 16.04 Updates === * wget 1.17.1-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013613.html * gnome-taquin 3.20.2-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013614.html * gnome-software 3.20.1+git20160617.1.0440874.ubuntu-xenial-0ubuntu1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013615.html * llvm-defaults 0.33ubuntu3.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013616.html * dh-make 2.201605~xenial1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013617.html * appstream-glib 0.5.13-1ubuntu2 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013618.html * ubuntu-docs 16.04.4 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013619.html * grub2 2.02~beta2-36ubuntu3.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013620.html * grub2-signed 1.66.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013621.html * gstreamer-vaapi 1.8.2-1~ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013622.html * glib2.0 2.48.1-1~ubuntu16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013623.html * spice 0.12.6-4ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013624.html * spice 0.12.6-4ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013625.html * linux-signed 4.4.0-26.45 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013626.html * linux 4.4.0-26.45 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013627.html * linux-meta 4.4.0.26.27 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013628.html * linux-raspi2 4.4.0-1014.18 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013629.html * linux-meta-raspi2 4.4.0.1014.14 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013630.html * linux_4.4.0-26.45_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013631.html * linux-snapdragon 4.4.0-1017.20 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013632.html * linux-meta-snapdragon 4.4.0.1017.9 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013633.html * software-properties 0.96.20.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013634.html * docker.io 1.11.2-0ubuntu4~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013635.html * linux 4.4.0-27.46 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013636.html * linux-signed 4.4.0-27.46 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013637.html * linux-meta 4.4.0.27.28 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013638.html * linux_4.4.0-27.46_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013639.html * linux-raspi2 4.4.0-1015.19 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013641.html * linux-meta-raspi2 4.4.0.1015.15 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013640.html * linux-snapdragon 4.4.0-1018.21 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013642.html * linux-meta-snapdragon 4.4.0.1018.10 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013643.html * juju-mongodb3.2 3.2.4-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013644.html * nodejs 4.2.6~dfsg-1ubuntu4.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013645.html * valgrind 1:3.11.0-1ubuntu4.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013646.html * ceph 10.2.0-0ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013647.html * mysql-5.7 5.7.12-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013648.html * snapd 2.0.9 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013649.html * runc 0.1.1-0ubuntu5~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013650.html * containerd 0.2.1-0ubuntu3~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013651.html * shim-signed 1.15~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013652.html * heat 1:6.0.0-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013653.html * golang-1.6 1.6.2-0ubuntu5~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013654.html * linux-firmware 1.157.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013655.html * lshw 02.17-1.1ubuntu3.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013656.html * horizon 2:9.0.1-0ubuntu2 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013657.html * lsb 9.20160110ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013658.html * gdb 7.11.1-0ubuntu1~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013659.html * php-ast 0.1.1-1build1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013660.html * zfs-linux 0.6.5.6-0ubuntu10 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013661.html * gst-plugins-bad1.0 1.8.2-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013662.html * gst-plugins-good1.0 1.8.2-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013663.html * gst-plugins-base1.0 1.8.2-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013664.html * gst-plugins-ugly1.0 1.8.2-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013665.html * gstreamer1.0 1.8.2-1~ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013666.html * gst-libav1.0 1.8.2-1~ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013667.html * lightdm 1.18.2-0ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013668.html * multipath-tools 0.5.0+git1.656f8865-5ubuntu2.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013669.html * ubuntu-themes 14.04+16.04.20160621-0ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013670.html * software-properties 0.96.20.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013671.html * evolution 3.18.5.2-0ubuntu3.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013672.html * evolution-indicator 0.2.20-0ubuntu23 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013673.html * linux-firmware 1.157.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013674.html * fusionforge 6.0.3+20151023-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013675.html * bash 4.3-14ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013676.html * linux-signed 4.4.0-28.47 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013677.html * linux 4.4.0-28.47 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013678.html * linux-meta 4.4.0.28.30 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013679.html * linux_4.4.0-28.47_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013680.html * linux-raspi2 4.4.0-1016.22 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013681.html * linux-meta-raspi2 4.4.0.1016.16 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013682.html * linux-snapdragon 4.4.0-1019.22 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013683.html * linux-meta-snapdragon 4.4.0.1019.11 - https://lists.ubuntu.com/archives/xenial-changes/2016-June/013684.html End of Life - April 2021 == Subscribe == Get your copy of the Ubuntu Weekly Newsletter delivered each week to you via email at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-news == Archives == You can always find older Ubuntu Weekly Newsletter issues at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter == Additional Ubuntu News == As always you can find more news and announcements at: http://insights.ubuntu.com/ and http://fridge.ubuntu.com/ == Conclusion == Thank you for reading the Ubuntu Weekly Newsletter. See you next week! == Credits == The Ubuntu Weekly Newsletter is brought to you by: * Elizabeth K. Joseph * Chris Guiver * Chris Sirrs * Leonard Viator * And many others == Glossary of Terms == Other acronyms can be found at https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/glossary == Ubuntu - Get Involved == The Ubuntu community consists of individuals and teams, working on different aspects of the distribution, giving advice and technical support, and helping to promote Ubuntu to a wider audience. No contribution is too small, and anyone can help. It's your chance to get in on all the community fun associated with developing and promoting Ubuntu. http://community.ubuntu.com/contribute/ Or get involved with the Ubuntu Weekly Newsletter team! We always need summary writers and editors, if you're interested, learn more at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Join == Feedback == This document is maintained by the Ubuntu Weekly News Team. If you have a story idea or suggestions for the Weekly Newsletter, join the
  25. http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=cb53036bb7&e=8138df6da5 ** Benchmark Reviews Presents: ------------------------------------------------------------ bloody_b188_different_backlight TITLE: Bloody B188 Light Strike Keyboard Review (http://benchmarkreviews.us10.list-manage2.com/track/click?u=9a2f239b17114c9008e3dfda9&id=219e494445&e=8138df6da5) QUOTE: In this article, Benchmark Reviews looks at the A4Tech Bloody LED B188 Light Strike Keys Gaming Keyboard, the low-cost entrant in Bloody’s keyboard lineup. Bloody keeps the cost down by using rubber-dome switches for most of the keys, saving their pricier infrared mechanical switches for the 8 special gaming keys. LINK: http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=485d4f0560&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=3e9bc6c2ff&e=8138df6da5 ============================================================
×