news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
A news post would be great. OCC has published a review on the MSI GTX 1080 & GTX 1070 Gaming X 8G Video Cards Here is a quote from the review: Quote: â€ÂThe boost clock speeds of the Pascal GPU from NVIDIA cycle the boost clock speed up or down as you hit power or temperature targets. I saw this with the Founders Edition cards and it happens on the MSI cards as well. The key here is that MSI's Twin Frozr cooling design is more effective at keeping the temperatures low and the clock speeds high to increase gaming FPS performance. It's a strategy that works. Using large Torx 2.0 fans with dispersion blade technology on the ball bearing fans, there is an increase in airflow of 22% over traditional fan blade designs. Couple that with the large heat sink with 6mm and 8mm direct contact heat pipes and you get an excellent cooling design that keeps temperatures in check, even under a heavy 3D load. Both the GTX 1080 Gaming X 8G and GTX 1070 Gaming X 8G showed significant cooling performance gains over the Founders Edition cooling solution, with much less noise. There is no doubt that MSI's Twin Frozr VI technology is a step forward in cooling performance that shows tangible results.†Title: MSI GTX 1080 & GTX 1070 Gaming X 8G Review Link: http://www.overclockersclub.com/reviews/msi_gtx1080_gtx1070_gaming_x_8g/ Img: http://www.overclockersclub.com/siteimages/articles/msi_gtx1080_gtx1070_gaming_x_8g/8_thumb.jpg
-
Building A Massive L-Shaped Desk For A Better Workflow, More Monitors & Space
news posted a topic in Upcoming News
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Building A Massive L-Shaped Desk For A Better Workflow, More Monitors & Space ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=23283 Summary: "For the Phoronix 12th birthday and in trying to make a more efficient workflow and some general improvements to reinvigorate my general 100 hour work weeks across the span of Phoronix Media, I decided to set out on building a new desk this past week. Here's the result with having a massive, 8 and 10 foot sides to a L-shaped wooden and steel desk." Please feel free to contact us with any questions or comments you may -
Deep Learning & CUDA Benchmarks On The GeForce GTX 1080 Under Linux
news posted a topic in Upcoming News
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Deep Learning & CUDA Benchmarks On The GeForce GTX 1080 Under Linux ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=23281 Summary: "Last week I published the first Linux review of the GeForce GTX 1080 followed by some performance-per-Watt and OpenGL results from the GTX 1080 going as far back as the 9800GTX, among other interesting follow-up tests with OpenGL/Vulkan/OpenCL. Since then one of the most popular requests has been for doing some deep learning benchmarks on the GTX 1080 along with some CUDA benchmarks, for those not relying upon OpenCL for open GPGPU computing. Here are some raw performance numbers as well as performance-per-Watt in the CUDA space." Please feel free to contact us with any questions or comments you may -
Fractal Design Define Nano S mITX Computer Case Review @ APH Networks
news posted a topic in Upcoming News
-------- FRACTAL DESIGN DEFINE NANO S MITX COMPUTER CASE REVIEW ( -at -) APH NETWORKS ------------------------------------------------------------ Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Fractal Design Define Nano S mITX Computer Case Review ( -at -) APH Networks * Description: The Fractal Design Define Nano S may be a shrunken Define S, but it proves Fractal Design knows cases, and knows them well. * Link: http://aphnetworks.com/reviews/fractal-design-define-nano-s * Image: http://aphnetworks.com/review/fractal-design-define-nano-s/004.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5 -
Title: Sandberg ThunderStorm Gaming Keyboard Review ( -at -) NikKTech Description: If you're out in the market looking for a keyboard to give your son on his birthday or if you just like fancy looking keyboards then the ThunderStorm Keyboard by Sandberg is just that. Article Link: http://www.nikktech.com/main/articles/peripherals/keyboards/6639-sandberg-th understorm-gaming-keyboard-review Image Link: http://www.nikktech.com/main/images/pics/reviews/sandberg/thunderstorm/sandb erg_thunderstormb.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
TITLE: Corsair VOID RGB USB Review ( -at -) Vortez CONTENT: This is our second outing from the VOID family of Corsair gaming headsets, we previously had a look at the Void Surround, a versatile analogue stereo headset that ships with a USB dongle. This time we go on a date with the VOID RGB USB, a dedicated USB gaming headset that had all the digital features and controls built in, including, as you would guess, RGB lighting. Dolby Surround returns to supply the virtual 7.1 rendering that is delivered by powerful 50mm neodymium drivers. The headband and earcups use memory foam covered in a microfibre mesh to keep things all snug. LINK: http://www.vortez.net/review.php?id=1173 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
openSUSE Security Update: Security update for MozillaFirefox, mozilla-nss ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1557-1 Rating: important References: #980384 #981695 #983549 #983632 #983638 #983639 #983640 #983643 #983644 #983646 #983649 #983651 #983652 #983653 #983655 Cross-References: CVE-2016-1950 CVE-2016-2815 CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 CVE-2016-2824 CVE-2016-2825 CVE-2016-2828 CVE-2016-2829 CVE-2016-2831 CVE-2016-2832 CVE-2016-2833 CVE-2016-2834 Affected Products: openSUSE 13.1 ______________________________________________________________________________ An update that solves 14 vulnerabilities and has one errata is now available. Description: This update to Mozilla Firefox 47 fixes the following issues (boo#983549): Security fixes: - CVE-2016-2815/CVE-2016-2818: Miscellaneous memory safety hazards (boo#983638 MFSA 2016-49) - CVE-2016-2819: Buffer overflow parsing HTML5 fragments (boo#983655 MFSA 2016-50) - CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (boo#983653 MFSA 2016-51) - CVE-2016-2822: Addressbar spoofing though the SELECT element (boo#983652 MFSA 2016-52) - CVE-2016-2824: Out-of-bounds write with WebGL shader (boo#983651 MFSA 2016-53) - CVE-2016-2825: Partial same-origin-policy through setting location.host through data URI (boo#983649 MFSA 2016-54) - CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (boo#983646 MFSA 2016-56) - CVE-2016-2829: Incorrect icon displayed on permissions notifications (boo#983644 MFSA 2016-57) - CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (boo#983643 MFSA 2016-58) - CVE-2016-2832: Information disclosure of disabled plugins through CSS pseudo-classes (boo#983632 MFSA 2016-59) - CVE-2016-2833: Java applets bypass CSP protections (boo#983640 MFSA 2016-60) Mozilla NSS was updated to 3.23 to address the following vulnerabilities: - CVE-2016-2834: Memory safety bugs (boo#983639 MFSA-2016-61) The following non-security changes are included: - Enable VP9 video codec for users with fast machines - Embedded YouTube videos now play with HTML5 video if Flash is not installed - View and search open tabs from your smartphone or another computer in a sidebar - Allow no-cache on back/forward navigations for https resources The following packaging changes are included: - boo#981695: cleanup configure options, notably removing GStreamer support which is gone from FF - boo#980384: enable build with PIE and full relro on x86_64 The following new functionality is provided: - ChaCha20/Poly1305 cipher and TLS cipher suites now supported - The list of TLS extensions sent in the TLS handshake has been reordered to increase compatibility of the Extended Master Secret with with servers Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch 2016-714=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): MozillaFirefox-47.0-116.1 MozillaFirefox-branding-upstream-47.0-116.1 MozillaFirefox-buildsymbols-47.0-116.1 MozillaFirefox-debuginfo-47.0-116.1 MozillaFirefox-debugsource-47.0-116.1 MozillaFirefox-devel-47.0-116.1 MozillaFirefox-translations-common-47.0-116.1 MozillaFirefox-translations-other-47.0-116.1 libfreebl3-3.23-80.1 libfreebl3-debuginfo-3.23-80.1 libsoftokn3-3.23-80.1 libsoftokn3-debuginfo-3.23-80.1 mozilla-nss-3.23-80.1 mozilla-nss-certs-3.23-80.1 mozilla-nss-certs-debuginfo-3.23-80.1 mozilla-nss-debuginfo-3.23-80.1 mozilla-nss-debugsource-3.23-80.1 mozilla-nss-devel-3.23-80.1 mozilla-nss-sysinit-3.23-80.1 mozilla-nss-sysinit-debuginfo-3.23-80.1 mozilla-nss-tools-3.23-80.1 mozilla-nss-tools-debuginfo-3.23-80.1 - openSUSE 13.1 (x86_64): libfreebl3-32bit-3.23-80.1 libfreebl3-debuginfo-32bit-3.23-80.1 libsoftokn3-32bit-3.23-80.1 libsoftokn3-debuginfo-32bit-3.23-80.1 mozilla-nss-32bit-3.23-80.1 mozilla-nss-certs-32bit-3.23-80.1 mozilla-nss-certs-debuginfo-32bit-3.23-80.1 mozilla-nss-debuginfo-32bit-3.23-80.1 mozilla-nss-sysinit-32bit-3.23-80.1 mozilla-nss-sysinit-debuginfo-32bit-3.23-80.1 References: https://www.suse.com/security/cve/CVE-2016-1950.html https://www.suse.com/security/cve/CVE-2016-2815.html https://www.suse.com/security/cve/CVE-2016-2818.html https://www.suse.com/security/cve/CVE-2016-2819.html https://www.suse.com/security/cve/CVE-2016-2821.html https://www.suse.com/security/cve/CVE-2016-2822.html https://www.suse.com/security/cve/CVE-2016-2824.html https://www.suse.com/security/cve/CVE-2016-2825.html https://www.suse.com/security/cve/CVE-2016-2828.html https://www.suse.com/security/cve/CVE-2016-2829.html https://www.suse.com/security/cve/CVE-2016-2831.html https://www.suse.com/security/cve/CVE-2016-2832.html https://www.suse.com/security/cve/CVE-2016-2833.html https://www.suse.com/security/cve/CVE-2016-2834.html https://bugzilla.suse.com/980384 https://bugzilla.suse.com/981695 https://bugzilla.suse.com/983549 https://bugzilla.suse.com/983632 https://bugzilla.suse.com/983638 https://bugzilla.suse.com/983639 https://bugzilla.suse.com/983640 https://bugzilla.suse.com/983643 https://bugzilla.suse.com/983644 https://bugzilla.suse.com/983646 https://bugzilla.suse.com/983649 https://bugzilla.suse.com/983651 https://bugzilla.suse.com/983652 https://bugzilla.suse.com/983653 https://bugzilla.suse.com/983655 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
openSUSE Security Update: Security update for MozillaFirefox, mozilla-nss ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1552-1 Rating: important References: #980384 #981695 #983549 #983632 #983638 #983639 #983640 #983643 #983644 #983646 #983649 #983651 #983652 #983653 #983655 Cross-References: CVE-2016-2815 CVE-2016-2818 CVE-2016-2819 CVE-2016-2821 CVE-2016-2822 CVE-2016-2824 CVE-2016-2825 CVE-2016-2828 CVE-2016-2829 CVE-2016-2831 CVE-2016-2832 CVE-2016-2833 CVE-2016-2834 Affected Products: openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that solves 13 vulnerabilities and has two fixes is now available. Description: This update to Mozilla Firefox 47 fixes the following issues (boo#983549): Security fixes: - CVE-2016-2815/CVE-2016-2818: Miscellaneous memory safety hazards (boo#983638 MFSA 2016-49) - CVE-2016-2819: Buffer overflow parsing HTML5 fragments (boo#983655 MFSA 2016-50) - CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (boo#983653 MFSA 2016-51) - CVE-2016-2822: Addressbar spoofing though the SELECT element (boo#983652 MFSA 2016-52) - CVE-2016-2824: Out-of-bounds write with WebGL shader (boo#983651 MFSA 2016-53) - CVE-2016-2825: Partial same-origin-policy through setting location.host through data URI (boo#983649 MFSA 2016-54) - CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (boo#983646 MFSA 2016-56) - CVE-2016-2829: Incorrect icon displayed on permissions notifications (boo#983644 MFSA 2016-57) - CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (boo#983643 MFSA 2016-58) - CVE-2016-2832: Information disclosure of disabled plugins through CSS pseudo-classes (boo#983632 MFSA 2016-59) - CVE-2016-2833: Java applets bypass CSP protections (boo#983640 MFSA 2016-60) Mozilla NSS was updated to 3.23 to address the following vulnerabilities: - CVE-2016-2834: Memory safety bugs (boo#983639 MFSA-2016-61) The following non-security changes are included: - Enable VP9 video codec for users with fast machines - Embedded YouTube videos now play with HTML5 video if Flash is not installed - View and search open tabs from your smartphone or another computer in a sidebar - Allow no-cache on back/forward navigations for https resources The following packaging changes are included: - boo#981695: cleanup configure options, notably removing GStreamer support which is gone from FF - boo#980384: enable build with PIE and full relro on x86_64 The following new functionality is provided: - ChaCha20/Poly1305 cipher and TLS cipher suites now supported - The list of TLS extensions sent in the TLS handshake has been reordered to increase compatibility of the Extended Master Secret with with servers Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-704=1 - openSUSE 13.2: zypper in -t patch openSUSE-2016-704=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): MozillaFirefox-47.0-24.1 MozillaFirefox-branding-upstream-47.0-24.1 MozillaFirefox-buildsymbols-47.0-24.1 MozillaFirefox-debuginfo-47.0-24.1 MozillaFirefox-debugsource-47.0-24.1 MozillaFirefox-devel-47.0-24.1 MozillaFirefox-translations-common-47.0-24.1 MozillaFirefox-translations-other-47.0-24.1 libfreebl3-3.23-18.1 libfreebl3-debuginfo-3.23-18.1 libsoftokn3-3.23-18.1 libsoftokn3-debuginfo-3.23-18.1 mozilla-nss-3.23-18.1 mozilla-nss-certs-3.23-18.1 mozilla-nss-certs-debuginfo-3.23-18.1 mozilla-nss-debuginfo-3.23-18.1 mozilla-nss-debugsource-3.23-18.1 mozilla-nss-devel-3.23-18.1 mozilla-nss-sysinit-3.23-18.1 mozilla-nss-sysinit-debuginfo-3.23-18.1 mozilla-nss-tools-3.23-18.1 mozilla-nss-tools-debuginfo-3.23-18.1 - openSUSE Leap 42.1 (x86_64): libfreebl3-32bit-3.23-18.1 libfreebl3-debuginfo-32bit-3.23-18.1 libsoftokn3-32bit-3.23-18.1 libsoftokn3-debuginfo-32bit-3.23-18.1 mozilla-nss-32bit-3.23-18.1 mozilla-nss-certs-32bit-3.23-18.1 mozilla-nss-certs-debuginfo-32bit-3.23-18.1 mozilla-nss-debuginfo-32bit-3.23-18.1 mozilla-nss-sysinit-32bit-3.23-18.1 mozilla-nss-sysinit-debuginfo-32bit-3.23-18.1 - openSUSE 13.2 (i586 x86_64): MozillaFirefox-47.0-71.1 MozillaFirefox-branding-upstream-47.0-71.1 MozillaFirefox-buildsymbols-47.0-71.1 MozillaFirefox-debuginfo-47.0-71.1 MozillaFirefox-debugsource-47.0-71.1 MozillaFirefox-devel-47.0-71.1 MozillaFirefox-translations-common-47.0-71.1 MozillaFirefox-translations-other-47.0-71.1 libfreebl3-3.23-34.1 libfreebl3-debuginfo-3.23-34.1 libsoftokn3-3.23-34.1 libsoftokn3-debuginfo-3.23-34.1 mozilla-nss-3.23-34.1 mozilla-nss-certs-3.23-34.1 mozilla-nss-certs-debuginfo-3.23-34.1 mozilla-nss-debuginfo-3.23-34.1 mozilla-nss-debugsource-3.23-34.1 mozilla-nss-devel-3.23-34.1 mozilla-nss-sysinit-3.23-34.1 mozilla-nss-sysinit-debuginfo-3.23-34.1 mozilla-nss-tools-3.23-34.1 mozilla-nss-tools-debuginfo-3.23-34.1 - openSUSE 13.2 (x86_64): libfreebl3-32bit-3.23-34.1 libfreebl3-debuginfo-32bit-3.23-34.1 libsoftokn3-32bit-3.23-34.1 libsoftokn3-debuginfo-32bit-3.23-34.1 mozilla-nss-32bit-3.23-34.1 mozilla-nss-certs-32bit-3.23-34.1 mozilla-nss-certs-debuginfo-32bit-3.23-34.1 mozilla-nss-debuginfo-32bit-3.23-34.1 mozilla-nss-sysinit-32bit-3.23-34.1 mozilla-nss-sysinit-debuginfo-32bit-3.23-34.1 References: https://www.suse.com/security/cve/CVE-2016-2815.html https://www.suse.com/security/cve/CVE-2016-2818.html https://www.suse.com/security/cve/CVE-2016-2819.html https://www.suse.com/security/cve/CVE-2016-2821.html https://www.suse.com/security/cve/CVE-2016-2822.html https://www.suse.com/security/cve/CVE-2016-2824.html https://www.suse.com/security/cve/CVE-2016-2825.html https://www.suse.com/security/cve/CVE-2016-2828.html https://www.suse.com/security/cve/CVE-2016-2829.html https://www.suse.com/security/cve/CVE-2016-2831.html https://www.suse.com/security/cve/CVE-2016-2832.html https://www.suse.com/security/cve/CVE-2016-2833.html https://www.suse.com/security/cve/CVE-2016-2834.html https://bugzilla.suse.com/980384 https://bugzilla.suse.com/981695 https://bugzilla.suse.com/983549 https://bugzilla.suse.com/983632 https://bugzilla.suse.com/983638 https://bugzilla.suse.com/983639 https://bugzilla.suse.com/983640 https://bugzilla.suse.com/983643 https://bugzilla.suse.com/983644 https://bugzilla.suse.com/983646 https://bugzilla.suse.com/983649 https://bugzilla.suse.com/983651 https://bugzilla.suse.com/983652 https://bugzilla.suse.com/983653 https://bugzilla.suse.com/983655 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
[security-announce] openSUSE-SU-2016:1553-1: important: Security update for php5
news posted a topic in Upcoming News
openSUSE Security Update: Security update for php5 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1553-1 Rating: important References: #976775 #980366 #980373 #980375 #981049 #981050 #981061 #982009 #982010 #982011 #982012 #982013 #982162 Cross-References: CVE-2013-7456 CVE-2015-4116 CVE-2015-8873 CVE-2015-8874 CVE-2015-8876 CVE-2015-8877 CVE-2015-8879 CVE-2016-3074 CVE-2016-5093 CVE-2016-5094 CVE-2016-5095 CVE-2016-5096 CVE-2016-5114 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: This update for php5 fixes the following issues: - CVE-2013-7456: imagescale out-of-bounds read (bnc#982009). - CVE-2016-5093: get_icu_value_internal out-of-bounds read (bnc#982010). - CVE-2016-5094: Don't create strings with lengths outside int range (bnc#982011). - CVE-2016-5095: Don't create strings with lengths outside int range (bnc#982012). - CVE-2016-5096: int/size_t confusion in fread (bsc#982013). - CVE-2016-5114: fpm_log.c memory leak and buffer overflow (bnc#982162). - CVE-2015-8877: The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd), as used in PHP, used inconsistent allocate and free approaches, which allowed remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function (bsc#981061). - CVE-2015-8876: Zend/zend_exceptions.c in PHP did not validate certain Exception objects, which allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data (bsc#981049). - CVE-2015-8879: The odbc_bindcols function in ext/odbc/php_odbc.c in PHP mishandled driver behavior for SQL_WVARCHAR columns, which allowed remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table Aliased: (bsc#981050). - CVE-2015-4116: Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP allowed remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation (bsc#980366). - CVE-2015-8874: Stack consumption vulnerability in GD in PHP allowed remote attackers to cause a denial of service via a crafted imagefilltoborder call (bsc#980375). - CVE-2015-8873: Stack consumption vulnerability in Zend/zend_exceptions.c in PHP allowed remote attackers to cause a denial of service (segmentation fault) via recursive method calls (bsc#980373). - CVE-2016-3074: Integer signedness error in GD Graphics Library (aka libgd or libgd2) allowed remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow (bsc#976775). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-703=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): apache2-mod_php5-5.6.1-66.1 apache2-mod_php5-debuginfo-5.6.1-66.1 php5-5.6.1-66.1 php5-bcmath-5.6.1-66.1 php5-bcmath-debuginfo-5.6.1-66.1 php5-bz2-5.6.1-66.1 php5-bz2-debuginfo-5.6.1-66.1 php5-calendar-5.6.1-66.1 php5-calendar-debuginfo-5.6.1-66.1 php5-ctype-5.6.1-66.1 php5-ctype-debuginfo-5.6.1-66.1 php5-curl-5.6.1-66.1 php5-curl-debuginfo-5.6.1-66.1 php5-dba-5.6.1-66.1 php5-dba-debuginfo-5.6.1-66.1 php5-debuginfo-5.6.1-66.1 php5-debugsource-5.6.1-66.1 php5-devel-5.6.1-66.1 php5-dom-5.6.1-66.1 php5-dom-debuginfo-5.6.1-66.1 php5-enchant-5.6.1-66.1 php5-enchant-debuginfo-5.6.1-66.1 php5-exif-5.6.1-66.1 php5-exif-debuginfo-5.6.1-66.1 php5-fastcgi-5.6.1-66.1 php5-fastcgi-debuginfo-5.6.1-66.1 php5-fileinfo-5.6.1-66.1 php5-fileinfo-debuginfo-5.6.1-66.1 php5-firebird-5.6.1-66.1 php5-firebird-debuginfo-5.6.1-66.1 php5-fpm-5.6.1-66.1 php5-fpm-debuginfo-5.6.1-66.1 php5-ftp-5.6.1-66.1 php5-ftp-debuginfo-5.6.1-66.1 php5-gd-5.6.1-66.1 php5-gd-debuginfo-5.6.1-66.1 php5-gettext-5.6.1-66.1 php5-gettext-debuginfo-5.6.1-66.1 php5-gmp-5.6.1-66.1 php5-gmp-debuginfo-5.6.1-66.1 php5-iconv-5.6.1-66.1 php5-iconv-debuginfo-5.6.1-66.1 php5-imap-5.6.1-66.1 php5-imap-debuginfo-5.6.1-66.1 php5-intl-5.6.1-66.1 php5-intl-debuginfo-5.6.1-66.1 php5-json-5.6.1-66.1 php5-json-debuginfo-5.6.1-66.1 php5-ldap-5.6.1-66.1 php5-ldap-debuginfo-5.6.1-66.1 php5-mbstring-5.6.1-66.1 php5-mbstring-debuginfo-5.6.1-66.1 php5-mcrypt-5.6.1-66.1 php5-mcrypt-debuginfo-5.6.1-66.1 php5-mssql-5.6.1-66.1 php5-mssql-debuginfo-5.6.1-66.1 php5-mysql-5.6.1-66.1 php5-mysql-debuginfo-5.6.1-66.1 php5-odbc-5.6.1-66.1 php5-odbc-debuginfo-5.6.1-66.1 php5-opcache-5.6.1-66.1 php5-opcache-debuginfo-5.6.1-66.1 php5-openssl-5.6.1-66.1 php5-openssl-debuginfo-5.6.1-66.1 php5-pcntl-5.6.1-66.1 php5-pcntl-debuginfo-5.6.1-66.1 php5-pdo-5.6.1-66.1 php5-pdo-debuginfo-5.6.1-66.1 php5-pgsql-5.6.1-66.1 php5-pgsql-debuginfo-5.6.1-66.1 php5-phar-5.6.1-66.1 php5-phar-debuginfo-5.6.1-66.1 php5-posix-5.6.1-66.1 php5-posix-debuginfo-5.6.1-66.1 php5-pspell-5.6.1-66.1 php5-pspell-debuginfo-5.6.1-66.1 php5-readline-5.6.1-66.1 php5-readline-debuginfo-5.6.1-66.1 php5-shmop-5.6.1-66.1 php5-shmop-debuginfo-5.6.1-66.1 php5-snmp-5.6.1-66.1 php5-snmp-debuginfo-5.6.1-66.1 php5-soap-5.6.1-66.1 php5-soap-debuginfo-5.6.1-66.1 php5-sockets-5.6.1-66.1 php5-sockets-debuginfo-5.6.1-66.1 php5-sqlite-5.6.1-66.1 php5-sqlite-debuginfo-5.6.1-66.1 php5-suhosin-5.6.1-66.1 php5-suhosin-debuginfo-5.6.1-66.1 php5-sysvmsg-5.6.1-66.1 php5-sysvmsg-debuginfo-5.6.1-66.1 php5-sysvsem-5.6.1-66.1 php5-sysvsem-debuginfo-5.6.1-66.1 php5-sysvshm-5.6.1-66.1 php5-sysvshm-debuginfo-5.6.1-66.1 php5-tidy-5.6.1-66.1 php5-tidy-debuginfo-5.6.1-66.1 php5-tokenizer-5.6.1-66.1 php5-tokenizer-debuginfo-5.6.1-66.1 php5-wddx-5.6.1-66.1 php5-wddx-debuginfo-5.6.1-66.1 php5-xmlreader-5.6.1-66.1 php5-xmlreader-debuginfo-5.6.1-66.1 php5-xmlrpc-5.6.1-66.1 php5-xmlrpc-debuginfo-5.6.1-66.1 php5-xmlwriter-5.6.1-66.1 php5-xmlwriter-debuginfo-5.6.1-66.1 php5-xsl-5.6.1-66.1 php5-xsl-debuginfo-5.6.1-66.1 php5-zip-5.6.1-66.1 php5-zip-debuginfo-5.6.1-66.1 php5-zlib-5.6.1-66.1 php5-zlib-debuginfo-5.6.1-66.1 - openSUSE 13.2 (noarch): php5-pear-5.6.1-66.1 References: https://www.suse.com/security/cve/CVE-2013-7456.html https://www.suse.com/security/cve/CVE-2015-4116.html https://www.suse.com/security/cve/CVE-2015-8873.html https://www.suse.com/security/cve/CVE-2015-8874.html https://www.suse.com/security/cve/CVE-2015-8876.html https://www.suse.com/security/cve/CVE-2015-8877.html https://www.suse.com/security/cve/CVE-2015-8879.html https://www.suse.com/security/cve/CVE-2016-3074.html https://www.suse.com/security/cve/CVE-2016-5093.html https://www.suse.com/security/cve/CVE-2016-5094.html https://www.suse.com/security/cve/CVE-2016-5095.html https://www.suse.com/security/cve/CVE-2016-5096.html https://www.suse.com/security/cve/CVE-2016-5114.html https://bugzilla.suse.com/976775 https://bugzilla.suse.com/980366 https://bugzilla.suse.com/980373 https://bugzilla.suse.com/980375 https://bugzilla.suse.com/981049 https://bugzilla.suse.com/981050 https://bugzilla.suse.com/981061 https://bugzilla.suse.com/982009 https://bugzilla.suse.com/982010 https://bugzilla.suse.com/982011 https://bugzilla.suse.com/982012 https://bugzilla.suse.com/982013 https://bugzilla.suse.com/982162 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
<http://www.eteknix.com> Total War: Warhammer DirectX 12 Graphics Performance Analysis The Total War franchise has entertained fans of the strategy genre who have a penchant for barbaric historical periods since the dawn of PC gaming. Furthermore, these bloody conflicts brought history to life and gave users an insight into the harsh reality of classical warfare. Not only that, the ability to plan strategic onslaughts and react to the enemy's movements is incredibly satisfying. Of course, Total War titles are set on a huge scale featuring a massive quantity of ground units which requires a thoughtful approach. The latest entry is quite unusual and based on the Warhammer fantasy series. Throughout the game, you can select between four playable factions: the Dwarfs, the Empire of Man, the Greenskins and the Vampire counts. According to Metacritic <http://www.metacritic.com/game/pc/total-war-warhammer> , the game has received a relatively positive response from both professional critics and PC users. URL - http://www.eteknix.com/total-war-warhammer-directx-12-graphics-performance-analysis/ --
-
Kingston HyperX Savage Black HX426C15SBK4/64 4x16GB DDR4 RAM Review @ APH Networks
news posted a topic in Upcoming News
-------- KINGSTON HYPERX SAVAGE BLACK HX426C15SBK4/64 4X16GB DDR4 RAM REVIEW ( -at -) APH NETWORKS ------------------------------------------------------ Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Kingston HyperX Savage Black HX426C15SBK4/64 4x16GB DDR4 RAM Review ( -at -) APH Networks * Description: With its savage capacity and savage overclocking potential, the Kingston HyperX Savage Black HX426C15SBK4/64 4x16GB is exactly what its name suggests. * Link: http://aphnetworks.com/reviews/kingston-hyperx-savage-black-hx426c15sbk4-64-4x16gb * Image: http://aphnetworks.com/review/kingston-hyperx-savage-black-hx426c15sbk4-64-4x16gb/006.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5 -
The Wine development release 1.9.12 is now available. What's new in this release (see below for details): - Bug fix update of the Mono engine. - Initial version of a taskbar in desktop mode. - Fixes for right-to-left languages in Uniscribe. - More Shader Model 4 support in Direct3D. - Better metafile support in RichEdit. - Various bug fixes. The source is available from the following locations: http://dl.winehq.org/wine/source/1.9/wine-1.9.12.tar.bz2 http://mirrors.ibiblio.org/wine/source/1.9/wine-1.9.12.tar.bz2 Binary packages for various distributions will be available from: http://www.winehq.org/download You will find documentation on http://www.winehq.org/documentation You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details. Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list. ---------------------------------------------------------------- Bugs fixed in 1.9.12 (total 20): 11898 Dance eJay Demo 7 crashes due to unimplemented interface relating to devenum 20977 Bad hlp table rendering 23954 Threads not allocated to multiple processors. 26965 Dragon Age 2 demo - sound in cutscenes is muffled 31971 mspaint.exe from windows 8 wants ntdll.WinSqmStartSession 34557 Lemmings Revolution: can't rotate playing field 34897 Lego Mindstorms EV3 Home Edition (.NET 4.0 app) needs msctf DocumentMgrSource_AdviseSink implementation 37096 Problems with DC Universe Online and Virtual Desktops 39896 Robot animations glitch in main lobby of Lego Mindstorms EV3 software 40380 Wine should take dosbox's configuration instead of creating a new one 40497 "Trainz: A New Era" needs msvcr120.dll.?__ExceptionPtrToBool ( -at -) ( -at -) YA_NPEBX ( -at -) Z 40593 wininet:http test regression (failure & timeout) 40624 Source games make wined3d to attach incomplete texture to FBO (WINED3DFMT_NULL) 40660 latest update Sega Genesis & Mega Drive update no longer running after May 18, 2016 update 40662 CAPS key Not Working !! 40691 DVDFab 9.2.4.4 pre-check FabCheck.exe executable fails, needs setupapi.dll.CM_Get_DevNode_Status 40709 iexplore crashes when proxy enabled 40711 Splinter Cell: Blacklist crashes at launch (needs GetVoiceDetails implementation) 40727 ddraw tests broken with warn+heap 40745 Python 3.5.1 interpreter crashes, needs _set_thread_local_invalid_parameter_handler ---------------------------------------------------------------- Changes since 1.9.11: Aaryaman Vasishta (2): d3drm: Fix declaration of IDirect3DRMViewport*::Init. d3drm/tests: Fix some missing HRESULT returns in test_frame_qi. Akihiro Sagawa (3): imm32/tests: Add tests showing that the IME window is created between WM_NCCREATE and WM_NCCALCSIZE. imm32/tests: Add tests showing the IME window is created if the first window is a child. imm32/tests: Add more tests showing that the IME window is created after WM_NCCREATE. Alex Henrie (2): ntdll: Skip synchronous read if a serial read interval timeout is set. msvcrt: Stub out _(get|set)_thread_local_invalid_parameter_handler. Alexandre Julliard (14): winebrowser: Support MULTI_SZ strings for browsers and mailers configuration. winebrowser: Support browser and mailer commands with arguments. user32: Post notification to the desktop window for window creation/activation. explorer: Add a generic handler for desktop notifications. explorer: Display buttons on the task bar for running applications. winex11: Hide window icons in desktop mode when the taskbar is active. makefiles: Remove some obsolete import libraries. explorer: Show the application system menu on taskbar right clicks. user32: Setup system menu even when used through TrackPopupMenu. user32: Remove redundant system menu handle checks. ntdll: Add a helper function for registering a file read async I/O. explorer: Avoid crash on empty Start Menu folders. explorer: Don't bother with taskbar buttons when the taskbar is not visible. user32: Notify explorer when the active window changes. Alistair Leslie-Hughes (4): inetcomm: Add support for PID ids in MimeBody Get/SetProp. inetcomm: Add missing default properties. include: Add ID3D10InfoQueue interface. d3d10_1/tests: Test for ID3D10InfoQueue interface. Andreas Maier (3): msi: Use special error control flag in CreateService. msi/tests: Delete TestService after testing. msi/tests: Test for error control flag handling. Andrew Eikum (2): xaudio2: Shut down OpenAL in the correct order. xaudio2: Implement GetVoiceDetails for source and submix voices. Andrey Gusev (16): include: Fix a typo in IHTMLSelection interface. wineps.drv: Fix typos. ddraw: Fix a typo in WARN() messages. d3d10: Fix a typo in depthstencilstate_count variable name. wined3d: Fix a typo in comment. advapi32: Fix a typo in comment. hlink/tests: Fix a typo in ok() messages. kernel32/tests: Fix a typo in ok() messages. user32/tests: Fix a typo in ok() messages. urlmon/tests: Fix a typo in ok() message. server: Fix a typo in comment. d3dx9_36: Fix typos in comments. mmdevapi/tests: Fix a typo in ok() messages. gdiplus: Fix a typo in struct GpAdjustableArrowCap. include: Fix a typo in IWMReaderAdvanced interface. mshtml: Fix a typo in WARN() message. Aric Stewart (2): winex11.drv: Correct sizes in COMPOSITIONSTRING structure when up[censored] fields. winemac.drv: Correct sizes in COMPOSITIONSTRING structure when up[censored] fields. Austin English (1): ntdll: Add WinSqmEndSession/WinSqmStartSession stubs. Béla Gyebrószki (2): quartz: Fix a typo in an ERR() message. wined3d: Add Nvidia GeForce GTS 250. Caron Wills (1): wined3d: Add Nvidia GeForce GT 730M. François Gouget (13): shell32: Spelling fixes. secur32: Spelling fixes. mlang: Spelling fixes. kernel32: Spelling fixes. gdi.exe16: Spelling fixes. d3dxof: Spelling fixes. dmsynth: Spelling fixes. wined3d: Spelling fixes. d3d9/tests: Fix a trailing ok() '\n'. usp10: Punctuation fixes. msxml3: Spelling fixes. ole32: Spelling fixes. imm32/tests: Spelling fix. Grazvydas Ignotas (3): wined3d: Use Intel data returned by Windows driver. wined3d: Add some more Intel GPUs. wined3d: Add a fallback for Skylake. Guillaume Charifi (1): wined3d: Add support for the ishr opcode. Hadrien Boizard (4): msvcrt: Use BOOL type where appropriate. winegstreamer: Use BOOL type where appropriate. include: Add missing FILE_ATTRIBUTE flags. include: Add file notification flags. Hans Leidekker (1): webservices: Add support for encoded UTF-8 characters in WsDecodeUrl. Henri Verbeet (10): usp10/tests: Add an itemisation test for Persian numerals and punctuation. usp10: Fix the script tag and fallback font for Script_Persian. usp10: Persian numerals are written left-to-right. usp10: Set the base embedding level for Script_Persian to 2. usp10: Properly check for numeric scripts. ddraw: Avoid accessing free'd memory on an error path in ddraw_surface_create(). usp10/tests: Add an itemisation test for Arabic numerals and punctuation. usp10: Handle C2_ARABICNUMBER as numeric. usp10: Arabic numerals are written left-to-right. usp10: Set the base embedding level for Script_Arabic_Numeric to 2. Hugh McMaster (17): reg: Recognise hyphen and forward slash help switches. reg: Parse the registry operation using an enum. reg: Exit with an error if the specified operation is invalid. reg: Simplify help logic and syntax. reg: Make help for registry operations common in wmain. reg: Move duplicate sane_path() calls to wmain. reg: Move duplicate path_get_rootkey() calls to wmain. reg: Rename HKEY 'subkey' to 'key' in reg_add() and reg_delete(). reg: Move duplicate strchrW() calls to wmain. reg: Combine duplicate 'for' loops in wmain and parse all remaining arguments. reg: Remove an unreachable 'else' pathway from wmain. reg: Move duplicate /v, /ve and /va combination checks to wmain. reg/tests: Add initial tests for 'reg import'. reg: Do not allow duplicate /d or /t switches. reg/tests: Add tests for invalid switches. reg: Recognise switches beginning with a forward slash or hyphen. reg: Avoid possible out-of-bounds memory access when a switch is only a forward slash or hyphen. Huw D. M. Davies (7): include: Add flags for the EM_AUTOURLDETECT message. riched20: Fix URL auto-detection to handle 'neutral' characters. riched20: Add support for quoting urls with spaces within ''. riched20: Add support for saving enhanced metafiles. gdi32: Rename the struct representing an embedded EMF in a WMF. gdi32: If the WMF was created by GetWinMetaFileBits() then return the original EMF. gdi32: Rename the struct representing an embedded WMF in an EMF. Jacek Caban (8): msctf: Don't call ITextStoreACP::UnadviseSink in context destructor. msctf: Added Push/Pop context tests. msctf: Fixed ref counts in tests. wininet: Fixed leak in HTTP_DealWithProxy (coverity). wininet: Added missing LeaveCriticalSection to set_cookie (coverity). wininet: Skip more problematic tests on IE6. wininet: Correctly handle the last proxy override in HTTP_ShouldBypassProxy. user32: Make SetWindowLongW hotpatchable. Julian Rüger (1): po: Update German translation. Józef Kucia (38): wined3d: Use pure integer vertex attributes for SM4+ shaders. d3d11/tests: Add test for input assembler. d3d10core/tests: Add test for input assembler. wined3d: Add ARB_explicit_attrib_location extension. wined3d: Use ARB_explicit_attrib_location to pre-assign vertex attribute locations. wined3d: Add support for NULL sampler. wined3d: Implement index buffer offset. d3d11: Set blend states only when blending is enabled. d3d11/tests: Add test for NULL sampler. d3d10core/tests: Add test for NULL sampler. wined3d: Implement SM4 umax instruction. wined3d: Implement SM4 switch instruction. wined3d: Implement SM4 case instruction. wined3d: Implement SM4 default instruction. wined3d: Implement SM4 endswitch instruction. wined3d: Allow creating render targets for some _UNORM/_SNORM formats. wined3d: Add wined3d_shader_resource_view_desc. d3d11: Normalize more fields in SRV descriptions. wined3d: Add more formats to WINED3DFMT_R24G8_TYPELESS class. wined3d: Do not try to attach WINED3FMT_NULL surfaces to FBO. d3d11/tests: Add more tests for creating shader resource views. wined3d: Remove "view_type" from "wined3d_shader_resource_view_desc". wined3d: Store GL view class for each wined3d format. wined3d: Add ARB_texture_view extension. wined3d: Create texture views for shader resource views. d3d10core/tests: Add more tests for creating shader resource views. d3d11: Normalize "ArraySize" field in D3D11_RENDER_TARGET_VIEW_DESC. wined3d: Fix wined3d_rendertarget_view_desc validation for 3D textures. d3d11/tests: Add more tests for creating render target views. d3d11: Normalize "ArraySize" field in D3D11_DEPTH_STENCIL_VIEW_DESC. d3d11/tests: Add more tests for creating depth stencil views. d3d11: Normalize SRV descriptions for remaining view dimensions. d3d10core/tests: Add more tests for creating render target views. d3d10core/tests: Add more tests for creating depth stencil views. d3d11/tests: Add test for texturing with custom shader resource views. d3d10core/tests: Add test for texturing with custom shader resource views. wined3d: Recognize SM 4.1 gather4 opcode. wined3d: Recognize SM 5 gather4_c opcode. Ken Thomases (3): winemac: Use a more idiomatic pattern for an autorelease pool around a loop. winemac: Fix the logic for checking if a view is already in the intended z-order. winemac: Remove an unnecessary call to -[NSView removeFromSuperview]. Lauri Kenttä (2): winefile: Fix horizontal scrolling. winefile: Clarify header width calculations. Luis Sahagun (1): winevdm: Tell dosbox to read the current user's config. Matteo Bruni (3): wined3d: Fix FFP vertex shaders with ARB_explicit_attrib_location. wined3d: Cleanup state_clipping() a bit. wined3d: User clip planes emulation for core profile contexts. Michael Stefaniuc (17): riched20/tests: Use EqualRect() instead of open coding it. include: Add an inline version of EqualRect() too. comctl32/tests: Use EqualRect() instead of open coding it. user32/tests: Use EqualRect() instead of open coding it. wordpad: Use OffsetRect() instead of open coding it. user32: Use InflateRect() instead of open coding it. include: Make wine_dbgstr_rect() available for tests too. shell32/tests: Use wine_dbgstr_rect() to print RECTs. dxgi/tests: Use wine_dbgstr_rect() to print RECTs. comctl32/tests: Use wine_dbgstr_rect() to print RECTs. ddraw/tests: Use wine_dbgstr_rect() in the ddraw1 tests. ddraw/tests: Use wine_dbgstr_rect() in the ddraw2 tests. ddraw/tests: Use wine_dbgstr_rect() in the ddraw4 tests. ddraw/tests: Use wine_dbgstr_rect() in the ddraw7 tests. comdlg32/tests: Use wine_dbgstr_rect() to print RECTs. d3d10core/tests: Use wine_dbgstr_rect() to print RECTs. d3d9/tests: Use wine_dbgstr_rect() to print RECTs. Miklós Máté (2): winex11: Use GLX 1.3 for pixmaps. winex11: Use GLX 1.3 for windows. Nikolay Sivov (19): dwrite: Fix font data array leak on list release (Valgrind). kernel32/tests: Fix a leak in tests (Valgrind). ntdll/tests: Fix some string leaks (Valgrind). ole32: Don't try to read key value if key was not found (Valgrind). user32/tests: Fix a leak when creating test icons (Valgrind). gdiplus/tests: Fix a font leak (Valgrind). include: Added missing ASSOCF enum members. msxml3/schema: Support element nodes in add(). user32/tests: Some tests for EqualRect()/SetRect(). oledb32: IErrorInfo methods are stubs. msscript: Added IOleObject stub. dsound: Remove redundant null pointer check (Coverity). dwrite: Implement IDWriteFontFace3::GetRecommendedRenderingMode(). msscript: Implement GetMiscStatus(). msscript: Implement SetClientSite()/GetClientSite(). msscript: Added IPersistStreamInit stub. msscript: Implement GetExtent(). msscript: Claim success in InitNew(). msscript: Added IOleControl stub. Paul Gofman (2): d3dx9: Implement IsParameterUsed function in effect. d3dx9/tests: Add test for IsParameterUsed function. Piotr Caban (2): kernel32: Use utf8 for filenames encoding if different encoding was not specified on Mac. msvcr110: Fix critical_section_scoped_lock structure size. Rob Walker (1): setupapi: Add stub for setupapi.dll.CM_Get_DevNode_Status. Stefan Dösinger (3): ddraw/tests: Add readback tests to test_palette_gdi. ddraw/tests: Test P8 color keying. ddraw/tests: Remove p8_primary_test. Theodore Dubois (3): shell32/tests: Fix out of memory errors and their underlying cause. shell32/tests: Fix memory leaks. shell32: Avoid closing the caller's key. Thomas Faber (1): wininet: Avoid buffer overrun in alloc_object. Vincent Povirk (4): explorer: Hide empty folders in the start menu. gdiplus/tests: Accept empty metafiles having 0 size on Windows. gdiplus: Return visible clip bounds in world coordinates. mscoree: Update Wine Mono to 4.6.3. YongHao Hu (1): msvcr120/tests: Add critical section test. Zhenbo Li (1): winegstreamer: Remove a condition which is always true. -- Alexandre Julliard julliard ( -at -) winehq.org
-
Hands-On The Phab2 AR Smartphone, Moto Z And Moto Z Force At Lenovo Tech World
news posted a topic in Upcoming News
View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=5f12e53163&e=0c004f9c13) On Thursday, Lenovo summoned the tech press to San Francisco where it took the wraps off two new mobile phone platforms that could both be game changers. It unveiled the world’s first Project Tango-enabled phone in the Phab2 Pro, and introduced an all-new type of modular smart phone with the Moto Z. The Moto Z has the ability to be upgraded via things Lenovo calls Moto Mods. We got some hands-on time with all of the new gear after the keynote, which we'll be presenting to you here... Hands-On The Phab2 AR Smartphone, Moto Z And Moto Z Force At Lenovo Tech World (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=18c593c1ad&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=00da8aedc5&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=67dab64f6a&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=e3ec6f3c96&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=88a850dfbe&e=0c004f9c13 http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=5561719b6b&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=a003c2451b&e=0c004f9c13 ============================================================ -
*MSI GeForce GTX 1070 Gaming X review* This time for real and apologies on the first news-letter. In this review we test the MSI GeForce GTX 1070 Gaming X (8G). Now we all like the reference founders edition cards, but be honest with me .. everybody really waiting to see the board partner cards, right ? Read the * review right here <http://www.guru3d.com/articles-pages/msi-geforce-gtx-1070-gaming-x-review,1.html>'>http://www.guru3d.com/articles-pages/msi-geforce-gtx-1070-gaming-x-review,1.html> *. URL: http://www.guru3d.com/articles-pages/msi-geforce-gtx-1070-gaming-x-review,1.html <http://www.guru3d.com/articles-pages/msi-geforce-gtx-1070-gaming-x-review,1.html> --
-
[security-announce] SUSE-SU-2016:1541-1: important: Security update for bind
news posted a topic in Upcoming News
SUSE Security Update: Security update for bind ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1541-1 Rating: important References: #970072 #970073 Cross-References: CVE-2016-1285 CVE-2016-1286 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for bind fixes two assertion failures that could lead to a remote denial of service attack: - CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072) - CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-bind-12608=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-bind-12608=1 - SUSE Manager 2.1: zypper in -t patch sleman21-bind-12608=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): bind-9.9.6P1-0.27.1 bind-chrootenv-9.9.6P1-0.27.1 bind-doc-9.9.6P1-0.27.1 bind-libs-32bit-9.9.6P1-0.27.1 bind-libs-9.9.6P1-0.27.1 bind-utils-9.9.6P1-0.27.1 - SUSE Manager Proxy 2.1 (x86_64): bind-9.9.6P1-0.27.1 bind-chrootenv-9.9.6P1-0.27.1 bind-doc-9.9.6P1-0.27.1 bind-libs-32bit-9.9.6P1-0.27.1 bind-libs-9.9.6P1-0.27.1 bind-utils-9.9.6P1-0.27.1 - SUSE Manager 2.1 (s390x x86_64): bind-9.9.6P1-0.27.1 bind-chrootenv-9.9.6P1-0.27.1 bind-doc-9.9.6P1-0.27.1 bind-libs-32bit-9.9.6P1-0.27.1 bind-libs-9.9.6P1-0.27.1 bind-utils-9.9.6P1-0.27.1 References: https://www.suse.com/security/cve/CVE-2016-1285.html https://www.suse.com/security/cve/CVE-2016-1286.html https://bugzilla.suse.com/970072 https://bugzilla.suse.com/970073 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
Missing Remote has released a new review which your readers might enjoy. We would be grateful if you would please share it with them. *TITLE: *Intel NUC6i5SYK Skylake SFF HTPC kit *INTRO: *Intel just about perfected the small form factor (SFF) home theater PC (HTPC) over the last few iterations of NUC systems, so it is great to see that the Skylake based Intel NUC6i5SYK kit has stayed with this winning formula. Updated with an Intel Core i5-6260U with Intel Iris Graphics 540, support for NVMe SSD, and DDR4, the system has the opportunity to fix the shortcomings in the previous generation (cough, CSH). The sleek looks and features will not be as much of a bargain as the plug-in-and-go Intel Pentium based NUC5PGYH <http://missingremote.com/review/intel-nuc-kit-nuc5pgyh-braswell-mini-pc>. Intel is asking $380/£335 for the barebones kit, but with quite a bit more performance, better networking, and features on tap, it could well be worth the extra dosh. *ARTICLE URL: * http://missingremote.com/review/intel-nuc6i5syk-skylake-sff-htpc-kit <http://missingremote.com/review/netgear-readynas-212-quad-core-2-bay-network-attached-storage-nas> *IMAGE: *http://missingremote.com/sites/default/files/u701/NUC6i5SYKtp_0.png Thank you for your time and post. Feel free to send us news to post, at
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: NVIDIA GeForce GTX 1070 8 GB Link: http://www.techpowerup.com/reviews/NVIDIA/GeForce_GTX_1070 Brief: NVIDIA's GeForce GTX 1070 is nearly twice as fast as GTX 970, easily beats the $1000 Titan X, and GTX 970 SLI, at only $379/$449. It is built on the same platform as the GeForce 1080, using the same GPU and cooler, just GDDR5 memory instead of GDDR5X. As expected, power efficiency is amazing, and overclocking works well, too.
-
A news post would be great. OCC has published a review on the AMD Athlon X4 845 CPU Here is a quote from the review: Quote: â€ÂSo, this review was a bit of an odd one for me. I normally don't look at $60 CPUs or motherboard as options when building machines for personal use, however I have to admit my eyes were opened a bit by this one. Not only does the new Excavator core design perform exceedingly well at gaming and general use tasks, it actually beats out the more expensive Piledriver chips that are running at much higher clocks in a few tests! Granted, you don't get absolute bleeding edge performance, but for under $60, the AMD Athlon X4 845 is one heck of a deal! At under $120 for a CPU and motherboard pairing, it doesn't take much imagination to realize you can put together a very capable gaming machine for not a whole lot of Benjamins. The new AMD stock cooler for 95 watt CPUs is excellent all-around, providing worry-free temperatures and very little noise, except when really pushed for long periods of time. This is yet another bonus to this CPU as you don't have to toss the stock cooler, even with a bit of mild overclocking thrown into the mix. The lack of multiplier-based overclocking is a bit of a sore point, as it feels like the CPU has a lot more legs to it than the base clock allows for.†Title: AMD Athlon X4 845 CPU Review Link: http://www.overclockersclub.com/reviews/amd_athlon_x4_845_cpu/ Img: http://www.overclockersclub.com/siteimages/articles/amd_athlon_x4_845_cpu/6_thumb.jpg
-
Package : samba Version : 2:3.6.6-6+deb7u10 Debian Bug : 820982 821811 The Samba 2:3.6.6-6+deb7u9 release, issued by the DSA-3548-1, introduced different regressions causing trust relationship with Win 7 domains to fail. The fix for the CVE-2016-2115 has been reverted, so administrators should set 'client signing = required' instead. For Debian 7 "Wheezy", these problems have been fixed in version 2:3.6.6-6+deb7u10. More information is available in the NEWS file included in this samba release. We recommend that you upgrade your samba packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
-
View this email in your browser (http://us3.campaign-archive2.com/?u=efc4c507c2cf964fc2462caca&id=a0833b646c&e=0c004f9c13) Whether you have a $10,000 beast of a gaming rig or a hand me down that isn't any more powerful than a toaster, having the right input devices can make a significant improvement in your work and play. Mice in particular come in all shapes and sizes to meet anyone's comfort and performance needs. That bargain bin mouse may be fine for browsing cat pictures, but its cheap sensor and total lack of ergonomics may be holding you back from pwning n00bs like you deserve. To help step your game up we're checking out three new mice that recently slid across our desk: Tesoro's Sagitta Spectrum H6L Gaming Mouse, Corsair's new M65 Pro RGB Gaming Mouse, and Logitech's G900 Chaos Spectrum Professional-Grade Wired/Wireless Gaming Mouse... Precision Gaming Mouse Round-Up: Tesoro, Corsair, Logitech (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e9aea879a0&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=0361bc4e32&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=46027905ee&e=0c004f9c13 Best Regards, HotHardware.com http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=4357ddc254&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=f5b65ab491&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=9ab5b5c74c&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=6194e1cb5c&e=0c004f9c13 ============================================================
-
Hi News Poster HardwareOverclock.com has just posted another review. This week we have taken a look at the new Scythe Kabuto 3 cpu cooler. Title: Scythe Kabuto 3 cpu cooler ( -at -) HardwareOverclock.com Link: http://hardwareoverclock.com/Scythe-Kabuto-3-CPU-Kuehler.htm Image: http://hardwareoverclock.com/kuehler/Scythe-Kabuto-3-Presse-Bild-small.jpg Thanks for posting Rene Ruf Chefredakteur HardwareOverclock.com <http://www.hardwareoverclock.com/> http://www.hardwareoverclock.com <mailto:admin ( -at -) hardwareoverclock.com> mailto:admin ( -at -) hardwareoverclock.com
-
** KREW MOBILE LAUNCHES LOWEST COST U.S. FAMILY CELL PHONE PLAN WITH 2 FREE CELL PHONE LINES FOR KIDS – PREPAID 3 LINE FAMILY PLAN FOR ONLY $19 PER MONTH Video: http://www.thomas-pr.com/136/photos/otonokrewsim.html ------------------------------------------------------------ Features Unlimited Talk, Text, & Data, & 2 Free Bonus Lines Starting at $19 per Month/$39.95 After 2 Months – No Contract or Credit Check Required Controls to Protect Kids With Parental Release: http://www.thomas-pr.com/otono/krewmobilerelease.html Seattle, WA, June 9, 2016 -- Family-focused cellular provider, Krew Mobile™ https://krewmobile.com/, launched today its nationwide prepaid wireless service offering the lowest cost family cell phone plan in the U.S. at a limited-time introductory price of $19.95 per month for 3 Line Family Plan -- 1 parent line for $19.95/month with 2 FREE bonus children lines – no contract or credit check needed. Parental Controls Protect Kids -- Ideal for Younger Children’s First Phones The Krew Mobile Family Plan includes 3 lines: 1 parent line with unlimited talk, text, and 2GB of 4G LTE data, plus 2 free bonus lines for kids with nationwide talk and text. Perfect for children’s first phones, included are parental control features that allow parents to remotely manage and control when and how kids can use their cell phones. The introductory price for the Krew Mobile 3 Line Family Plan is $19.95 per month for the first 2 months, after which it will change to $39.95 per month for 3 lines. Krew Mobile will also be adding additional features at no additional cost, including its proprietary Krew Messaging Service and additional parental controls and management features. Wireless 4G LTE coverage includes nationwide U.S., Puerto Rico, and Hawaii. “As a parent, I want to know that I can reach my children at any time. That’s why we want to give them cell phones. But we also want to teach children mobile responsibility. Krew Mobile gives me that peace of mind,†said Sharon Vinderine, founder and CEO of Parent Tested Parent Approved. “With Krew, children have the freedom of a phone plan while giving parents control of their usage—all at a ridiculously affordable rate! Now I can get a great phone plan for myself and my two children get their own plans for free!†“Family plans offered by other carriers really only offer value when everybody is using up all the data,†said Oren Chervinsky, VP Global Sales & Marketing. “With Krew, we are delivering a budget-friendly plan to families with younger kids who don’t need all that data. That’s why Krew includes free lines for kids with nationwide talk and text.†Easy Online Sign-up – No Credit Check Needed To get started with Krew Mobile, families simply need a Krew Mobile Starter Kit (available online) which includes three 3-in-1 SIM cards. Consumers can go to KrewMobile.com (https://krewmobile.com) to learn more about Krew Mobile, review the plan, and order a starter kit. Krew Mobile is a BYOD (Bring Your Own Device) service, so subscribers will need unlocked phones to work with the service, see here for compatible devices: https://krewmobile.com/support#compatible-devices. Activation is provided online and does not require any credit check or contract commitment. For more information, see the website: http://www.krewmobile.com, Facebook: https://www.facebook.com/krewmobile, Twitter: https://twitter.com/krewmobile. http://www.thomas-pr.com/136/photos/otonokrewsimpackaging.html About Otono Otono Networks Inc. (Otono) is an emerging global technology based telecom with multiple carrier supported networks that develops unique market opportunities around the world. Otono’s unique technology platform accommodates multiple services powered by both traditional SIM and eSIM technology, making integration with different networks and third-party platforms faster and easier. Otono’s portfolio of mobile services includes Roam Mobility for USA, Roam Mobility for Canada, ZIP SIM, AlwaysOnline Wireless, and Krew Mobile. For more information about Otono, visit http://www.otono.com. Photos: Krew Mobile SIM Card: http://www.thomas-pr.com/136/photos/otonokrewsim.html Krew Mobile Packaging: http://www.thomas-pr.com/136/photos/otonokrewpackaging.html Krew Mobile SIMs with Packaging: http://www.thomas-pr.com/136/photos/otonokrewsimpackaging.html Krew Mobile Logo: http://www.thomas-pr.com/136/photos/otonokrewlogo.html Otono Logo: http://www.thomas-pr.com/136/photos/otonologo.html Press Contact: Karen Thomas/Eva Yutani Thomas PR (631) 549-7575 Emails: kthomas ( -at -) thomaspr.com (mailto:kthomas ( -at -) thomaspr.com) eyutani ( -at -) thomaspr.com (mailto:eyutani ( -at -) thomaspr.com) Website: http://www.thomas-pr.com http://www.thomaspr.com ============================================================ ** Facebook (https://www.facebook.com/karenthomaspr'>https://www.facebook.com/karenthomaspr) ** Facebook (https://www.facebook.com/karenthomaspr) ** Twitter (https://www.twitter.com/thomaspr/'>https://www.twitter.com/thomaspr/) ** Twitter (https://www.twitter.com/thomaspr/) ** Website (http://www.thomas-pr.com'>http://www.thomas-pr.com) ** Website (http://www.thomas-pr.com) ** (http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb5agUf'>http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb5agUf) ** Share (http://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Feepurl.com%2Fb5agUf) ** (http://twitter.com/intent/tweet?text=Krew+Mobile+Launches+Lowest+Cost+U.S.+Family+Cell+Phone+Plan+with+2+Free+Lines+for+Kids:'>http://twitter.com/intent/tweet?text=Krew+Mobile+Launches+Lowest+Cost+U.S.+Family+Cell+Phone+Plan+with+2+Free+Lines+for+Kids: http%3A%2F%2Feepurl.com%2Fb5agUf) ** Tweet (http://twitter.com/intent/tweet?text=Krew+Mobile+Launches+Lowest+Cost+U.S.+Family+Cell+Phone+Plan+with+2+Free+Lines+for+Kids: http%3A%2F%2Feepurl.com%2Fb5agUf) ** (http://us7.forward-to-friend.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=dea82431de&e=0f97826edb'>http://us7.forward-to-friend.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=dea82431de&e=0f97826edb) ** Forward (http://us7.forward-to-friend.com/forward?u=ea42f2f1144c19c74ba3bc89b&id=dea82431de&e=0f97826edb) ** (https://plus.google.com/share?url=http%3A%2F%2Feepurl.com%2Fb5agUf'>https://plus.google.com/share?url=http%3A%2F%2Feepurl.com%2Fb5agUf) ** +1 (https://plus.google.com/share?url=http%3A%2F%2Feepurl.com%2Fb5agUf) Copyright © 2016 Thomas PR, All rights reserved.
-
[security-announce] SUSE-SU-2016:1538-1: important: Security update for libxml2
news posted a topic in Upcoming News
SUSE Security Update: Security update for libxml2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:1538-1 Rating: important References: #963963 #965283 #978395 #981040 #981041 #981108 #981109 #981111 #981112 #981114 #981115 #981548 #981549 #981550 Cross-References: CVE-2015-8806 CVE-2016-1762 CVE-2016-1833 CVE-2016-1834 CVE-2016-1835 CVE-2016-1837 CVE-2016-1838 CVE-2016-1839 CVE-2016-1840 CVE-2016-2073 CVE-2016-3705 CVE-2016-4447 CVE-2016-4448 CVE-2016-4449 CVE-2016-4483 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Software Development Kit 12 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Server 12 SUSE Linux Enterprise Desktop 12-SP1 SUSE Linux Enterprise Desktop 12 ______________________________________________________________________________ An update that fixes 15 vulnerabilities is now available. Description: This update for libxml2 fixes the following security issues: - CVE-2016-2073, CVE-2015-8806, CVE-2016-1839: A Heap-buffer overread was fixed in libxml2/dict.c [bsc#963963, bsc#965283, bsc#981114]. - CVE-2016-4483: Code was added to avoid an out of bound access when serializing malformed strings [bsc#978395]. - CVE-2016-1762: Fixed a heap-based buffer overread in xmlNextChar [bsc#981040]. - CVE-2016-1834: Fixed a heap-buffer-overflow in xmlStrncat [bsc#981041]. - CVE-2016-1833: Fixed a heap-based buffer overread in htmlCurrentChar [bsc#981108]. - CVE-2016-1835: Fixed a heap use-after-free in xmlSAX2AttributeNs [bsc#981109]. - CVE-2016-1837: Fixed a heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral [bsc#981111]. - CVE-2016-1838: Fixed a heap-based buffer overread in xmlParserPrintFileContextInternal [bsc#981112]. - CVE-2016-1840: Fixed a heap-buffer-overflow in xmlFAParsePosCharGroup [bsc#981115]. - CVE-2016-4447: Fixed a heap-based buffer-underreads due to xmlParseName [bsc#981548]. - CVE-2016-4448: Fixed some format string warnings with possible format string vulnerability [bsc#981549], - CVE-2016-4449: Fixed inappropriate fetch of entities content [bsc#981550]. - CVE-2016-3705: Fixed missing increment of recursion counter. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-915=1 - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2016-915=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-915=1 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2016-915=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-915=1 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2016-915=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libxml2-debugsource-2.9.1-24.1 libxml2-devel-2.9.1-24.1 - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64): libxml2-debugsource-2.9.1-24.1 libxml2-devel-2.9.1-24.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libxml2-2-2.9.1-24.1 libxml2-2-debuginfo-2.9.1-24.1 libxml2-debugsource-2.9.1-24.1 libxml2-tools-2.9.1-24.1 libxml2-tools-debuginfo-2.9.1-24.1 python-libxml2-2.9.1-24.1 python-libxml2-debuginfo-2.9.1-24.1 python-libxml2-debugsource-2.9.1-24.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libxml2-2-32bit-2.9.1-24.1 libxml2-2-debuginfo-32bit-2.9.1-24.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): libxml2-doc-2.9.1-24.1 - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64): libxml2-2-2.9.1-24.1 libxml2-2-debuginfo-2.9.1-24.1 libxml2-debugsource-2.9.1-24.1 libxml2-tools-2.9.1-24.1 libxml2-tools-debuginfo-2.9.1-24.1 python-libxml2-2.9.1-24.1 python-libxml2-debuginfo-2.9.1-24.1 python-libxml2-debugsource-2.9.1-24.1 - SUSE Linux Enterprise Server 12 (s390x x86_64): libxml2-2-32bit-2.9.1-24.1 libxml2-2-debuginfo-32bit-2.9.1-24.1 - SUSE Linux Enterprise Server 12 (noarch): libxml2-doc-2.9.1-24.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libxml2-2-2.9.1-24.1 libxml2-2-32bit-2.9.1-24.1 libxml2-2-debuginfo-2.9.1-24.1 libxml2-2-debuginfo-32bit-2.9.1-24.1 libxml2-debugsource-2.9.1-24.1 libxml2-tools-2.9.1-24.1 libxml2-tools-debuginfo-2.9.1-24.1 python-libxml2-2.9.1-24.1 python-libxml2-debuginfo-2.9.1-24.1 python-libxml2-debugsource-2.9.1-24.1 - SUSE Linux Enterprise Desktop 12 (x86_64): libxml2-2-2.9.1-24.1 libxml2-2-32bit-2.9.1-24.1 libxml2-2-debuginfo-2.9.1-24.1 libxml2-2-debuginfo-32bit-2.9.1-24.1 libxml2-debugsource-2.9.1-24.1 libxml2-tools-2.9.1-24.1 libxml2-tools-debuginfo-2.9.1-24.1 python-libxml2-2.9.1-24.1 python-libxml2-debuginfo-2.9.1-24.1 python-libxml2-debugsource-2.9.1-24.1 References: https://www.suse.com/security/cve/CVE-2015-8806.html https://www.suse.com/security/cve/CVE-2016-1762.html https://www.suse.com/security/cve/CVE-2016-1833.html https://www.suse.com/security/cve/CVE-2016-1834.html https://www.suse.com/security/cve/CVE-2016-1835.html https://www.suse.com/security/cve/CVE-2016-1837.html https://www.suse.com/security/cve/CVE-2016-1838.html https://www.suse.com/security/cve/CVE-2016-1839.html https://www.suse.com/security/cve/CVE-2016-1840.html https://www.suse.com/security/cve/CVE-2016-2073.html https://www.suse.com/security/cve/CVE-2016-3705.html https://www.suse.com/security/cve/CVE-2016-4447.html https://www.suse.com/security/cve/CVE-2016-4448.html https://www.suse.com/security/cve/CVE-2016-4449.html https://www.suse.com/security/cve/CVE-2016-4483.html https://bugzilla.suse.com/963963 https://bugzilla.suse.com/965283 https://bugzilla.suse.com/978395 https://bugzilla.suse.com/981040 https://bugzilla.suse.com/981041 https://bugzilla.suse.com/981108 https://bugzilla.suse.com/981109 https://bugzilla.suse.com/981111 https://bugzilla.suse.com/981112 https://bugzilla.suse.com/981114 https://bugzilla.suse.com/981115 https://bugzilla.suse.com/981548 https://bugzilla.suse.com/981549 https://bugzilla.suse.com/981550 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
Crucial Ballistix Sport LT 2400MHz DDR4 SODIMM Memory Kit Review @ Legit Reviews
news posted a topic in Upcoming News
Last month our friends over at Crucial announced the availability of Ballistix Sport LT DDR4 SODIMMs that are aimed gamers and performance enthusiasts looking to get the most from their mobile platforms. The modules feature a ‘stealth digital camo’ design, Intel XMP 2.0 profiles, speeds of at least 2400MHz and a black PCB design. Crucial knows that these improvements will increase overall system performance, especially mobile platforms running Intel integrated graphics, over their standard Crucial DDR4 memory series. We were able to get our hands on the Crucial Ballistix Sport LT 32GB (2x16GB) DDR4 2400MHz CL16 260-pin SODIMM memory kit to benchmark and put it to the test in the Intel NUC NUC6i7KYK ‘Skull Canyon’ mini PC! Article Title: Crucial Ballistix Sport LT 2400MHz DDR4 SODIMM Memory Kit Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/crucial-ballistix-sport-lt-2400mhz-ddr4-sodimm-memory-kit-review_182281 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// = -
openSUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:1534-1 Rating: important References: #982178 Cross-References: CVE-2016-5118 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for ImageMagick fixes the following issues: - security update: * CVE-2016-5118 [boo#982178] + ImageMagick-CVE-2016-5118.patch Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-700=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): ImageMagick-6.8.9.8-21.1 ImageMagick-debuginfo-6.8.9.8-21.1 ImageMagick-debugsource-6.8.9.8-21.1 ImageMagick-devel-6.8.9.8-21.1 ImageMagick-extra-6.8.9.8-21.1 ImageMagick-extra-debuginfo-6.8.9.8-21.1 libMagick++-6_Q16-5-6.8.9.8-21.1 libMagick++-6_Q16-5-debuginfo-6.8.9.8-21.1 libMagick++-devel-6.8.9.8-21.1 libMagickCore-6_Q16-2-6.8.9.8-21.1 libMagickCore-6_Q16-2-debuginfo-6.8.9.8-21.1 libMagickWand-6_Q16-2-6.8.9.8-21.1 libMagickWand-6_Q16-2-debuginfo-6.8.9.8-21.1 perl-PerlMagick-6.8.9.8-21.1 perl-PerlMagick-debuginfo-6.8.9.8-21.1 - openSUSE 13.2 (noarch): ImageMagick-doc-6.8.9.8-21.1 - openSUSE 13.2 (x86_64): ImageMagick-devel-32bit-6.8.9.8-21.1 libMagick++-6_Q16-5-32bit-6.8.9.8-21.1 libMagick++-6_Q16-5-debuginfo-32bit-6.8.9.8-21.1 libMagick++-devel-32bit-6.8.9.8-21.1 libMagickCore-6_Q16-2-32bit-6.8.9.8-21.1 libMagickCore-6_Q16-2-debuginfo-32bit-6.8.9.8-21.1 libMagickWand-6_Q16-2-32bit-6.8.9.8-21.1 libMagickWand-6_Q16-2-debuginfo-32bit-6.8.9.8-21.1 References: https://www.suse.com/security/cve/CVE-2016-5118.html https://bugzilla.suse.com/982178 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org