news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
View this email in your browser (http://mailchi.mp/hothardware/intel-optane-memory-with-3d-xpoint-review-easy-robust-pc-acceleration-1082909?e=0c004f9c13) While Ryzen helped propel AMD back to essentially performance parity with Intel Core series processors, Ryzen Threadripper offers the hope of surpassing even Intel's latest Core i9 Skylake-X family, with more core resources and PCIe connectivity at its disposal. As it turns out, however, our first hands-on experience with AMD Ryzen Threadripper wasn't afforded to us by the usual manufacturer press kit, but rather an OEM desktop system from Dell's Alienware Gaming PC division. And today we're able to give you an early preview look at the performance of AMD's 16-core Ryzen Threadripper 1950X processor, courtesy of the Alienware Area-51 Threadripper Edition beastly gaming desktop PC... Exclusive: Ryzen Threadripper 1950X Performance First Look With Alienware Area-51 Threadripper Edition (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=451222a96b&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=d40b70c045&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=def03bf044&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=486b9af5e5&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=fdfe74820d&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=5ba9ca57c2&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=7eb700117f&e=0c004f9c13 ============================================================
-
SUSE Security Update: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:2072-1 Rating: important References: #1027575 #1038564 #1042892 #1046191 #1050751 Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645 CVE-2017-8890 CVE-2017-9242 Affected Products: SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP1-LTSS ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.67-60_64_21 fixes several issues. The following security bugs were fixed: - CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751). - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191). - CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575). - CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1276=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1276=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): kgraft-patch-3_12_67-60_64_21-default-8-2.1 kgraft-patch-3_12_67-60_64_21-xen-8-2.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64): kgraft-patch-3_12_67-60_64_21-default-8-2.1 kgraft-patch-3_12_67-60_64_21-xen-8-2.1 References: https://www.suse.com/security/cve/CVE-2017-2636.html https://www.suse.com/security/cve/CVE-2017-7533.html https://www.suse.com/security/cve/CVE-2017-7645.html https://www.suse.com/security/cve/CVE-2017-8890.html https://www.suse.com/security/cve/CVE-2017-9242.html https://bugzilla.suse.com/1027575 https://bugzilla.suse.com/1038564 https://bugzilla.suse.com/1042892 https://bugzilla.suse.com/1046191 https://bugzilla.suse.com/1050751 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Be Quiet! Dark Base Pro 900 Orange ( -at -) LanOC Reviews <https://lanoc.org/review/cases/7601-be-quiet-dark-base-pro-900-orange> *DESCRIPTION:* I think everyone knows at this point that I’ve been on a big ITX kick for a while now. But sometimes when you need to build something completely crazy you have to go bigger. I did that with our Fridge build years ago. But what cases are a good pick to do that now? Well, it just so happens that I’ve had the Dark Base Pro 900 in the orange model from Be Quiet! sitting around the office for FAR too long. It’s about time I build something in it and see what it is all about. With a tempered glass side panel, orange highlights, and a lot of modularity it has the potential to be a great case. Let’s take a closer look and see if it is. *ARTICLE URL:* https://lanoc.org/review/cases/7601-be-quiet-dark-base-pro-900-orange *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/bequiet_dark_base_pro_900/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/bequiet_dark_base_pro_900/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
-
SUSE Security Update: Security update for Linux Kernel Live Patch 7 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:2060-1 Rating: important References: #1027575 #1038564 #1042892 #1046191 #1050751 Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645 CVE-2017-8890 CVE-2017-9242 Affected Products: SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP1-LTSS ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.62-60_62 fixes several issues. The following security bugs were fixed: - CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751). - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191). - CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575). - CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1274=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1274=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): kgraft-patch-3_12_62-60_62-default-10-2.1 kgraft-patch-3_12_62-60_62-xen-10-2.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64): kgraft-patch-3_12_62-60_62-default-10-2.1 kgraft-patch-3_12_62-60_62-xen-10-2.1 References: https://www.suse.com/security/cve/CVE-2017-2636.html https://www.suse.com/security/cve/CVE-2017-7533.html https://www.suse.com/security/cve/CVE-2017-7645.html https://www.suse.com/security/cve/CVE-2017-8890.html https://www.suse.com/security/cve/CVE-2017-9242.html https://bugzilla.suse.com/1027575 https://bugzilla.suse.com/1038564 https://bugzilla.suse.com/1042892 https://bugzilla.suse.com/1046191 https://bugzilla.suse.com/1050751 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
TITLE BenQ ZOWIE EC2-A Review ( -at -) Vortez CONTENT: BenQ, better known for their displays and projectors, bought ZOWIE back in 2015 since then they've been fleshing out their gaming offerings, with high-refresh displays, keyboards, mice etc. The BenQ ZOWIE EC2-A is their first right-handed gaming mouse aimed at E-Sports, available in two sizes and now two colours; the white one in for testing today is the new addition. LINK: https://www.vortez.net/review.php?id=1328 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
[Tech ARP] Execute Disable Bit from The BIOS Optimization Guide
news posted a topic in Upcoming News
Hi, I've just uploaded a version of OpenSSL to unstable that disables the TLS 1.0 and 1.1 protocol. This currently leaves TLS 1.2 as the only supported SSL/TLS protocol version. This will likely break certain things that for whatever reason still don't support TLS 1.2. I strongly suggest that if it's not supported that you add support for it, or get the other side to add support for it. OpenSSL made a release 5 years ago that supported TLS 1.2. The current support of the server side seems to be around 90%. I hope that by the time Buster releases the support for TLS 1.2 will be high enough that I don't need to enable them again. Kurt -
Hi, I've just uploaded a version of OpenSSL to unstable that disables the TLS 1.0 and 1.1 protocol. This currently leaves TLS 1.2 as the only supported SSL/TLS protocol version. This will likely break certain things that for whatever reason still don't support TLS 1.2. I strongly suggest that if it's not supported that you add support for it, or get the other side to add support for it. OpenSSL made a release 5 years ago that supported TLS 1.2. The current support of the server side seems to be around 90%. I hope that by the time Buster releases the support for TLS 1.2 will be high enough that I don't need to enable them again. Kurt
-
Hello everyone, Debian Policy 4.0.1.0 is on its way into unstable. Many thanks to everyone who helped make this release possible, especially those at DebCamp. I'm pleased to announce that Margarita Manterola's maintscript flowcharts have made their way into the Policy Manual as a new appendix, which should make them much easier to find. Here are the changes from the previously announced version of Policy (4.0.0): A.2. Version 4.0.1 Released August, 2017. 2.5 Priorities are now used only for controlling which packages are part of a minimal or standard Debian installation and should be selected based on functionality provided directly to users (so nearly all shared libraries should have a priority of optional). Packages may now depend on packages with a lower priority. The extra priority has been deprecated and should be treated as equivalent to optional. All extra priorities should be changed to optional. Packages with a priority of optional may conflict with each other (but packages that both have a priority of standard or higher still may not conflict). 5.6.30 New section documenting the Testsuite field in Debian source control files. 8.1.1 Shared libraries must now invoke ldconfig by means of triggers, instead of maintscripts. 9.3.3 Packages are recommended to use debhelper tools instead of invoking update-rc.d and invoke-rc.d directly. 9.3.3 Policy's description of how the local system administrator may modify the runlevels at which a daemon is started and stopped, and how init scripts may depend on other init scripts, have been removed. These are now handled by LSB headers. 9.4 Policy's specification of the console messages that should be emitted by init.d scripts has been removed. This is now defined by LSB, for sysvinit, and is not expected to be followed by other init systems. 9.6 Packages installing a Free Desktop entry must not also install a Debian menu system entry. 9.9 The prohibition against depending on environment variables for reasonable defaults is only for programs on the system PATH and only for custom environment variable settings (not, say, a sane PATH). -- Sean Whitton
-
Title: Sandberg Hailstorm Mechanical Gaming Keyboard Review ( -at -) NikKTech Description: Sandberg further enriched their gaming peripherals line with the Hailstorm Mechanical Gaming Keyboard and we've been testing it for almost 10 days to see just what it has to offer. Article Link: https://www.nikktech.com/main/articles/peripherals/keyboards/8075-sandberg-h ailstorm-mechanical-gaming-keyboard-review Image Link: https://www.nikktech.com/main/images/pics/reviews/sandberg/hailstorm/sandber g_hailstorma.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: 50+ Segmentation Faults Per Hour: Continuing To Stress Ryzen ( -at -) Phoronix Direct Link: http://www.phoronix.com/scan.php?page=article&item=ryzen-segv-continues&num=1 Summary: "In direct continuation of yesterday's article about easily causing segmentation faults on AMD Zen CPUs, I have carried out another battery of tests for 24 hours and have more information to report today on the ability to trivially cause segmentation faults and in some cases system lock-ups with Ryzen CPUs." Please feel free to contact us with any questions or comments you may
-
SUSE Security Update: Security update for Linux Kernel Live Patch 12 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:2049-1 Rating: important References: #1027575 #1038564 #1042892 #1046191 #1050751 Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645 CVE-2017-8890 CVE-2017-9242 Affected Products: SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP1-LTSS ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for the Linux Kernel 3.12.69-60_64_29 fixes several issues. The following security bugs were fixed: - CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751). - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191). - CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575). - CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1261=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1261=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): kgraft-patch-3_12_69-60_64_29-default-6-2.1 kgraft-patch-3_12_69-60_64_29-xen-6-2.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64): kgraft-patch-3_12_69-60_64_29-default-6-2.1 kgraft-patch-3_12_69-60_64_29-xen-6-2.1 References: https://www.suse.com/security/cve/CVE-2017-2636.html https://www.suse.com/security/cve/CVE-2017-7533.html https://www.suse.com/security/cve/CVE-2017-7645.html https://www.suse.com/security/cve/CVE-2017-8890.html https://www.suse.com/security/cve/CVE-2017-9242.html https://bugzilla.suse.com/1027575 https://bugzilla.suse.com/1038564 https://bugzilla.suse.com/1042892 https://bugzilla.suse.com/1046191 https://bugzilla.suse.com/1050751 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3925-1 security ( -at -) debian.org https://www.debian.org/security/ Moritz Muehlenhoff August 04, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : qemu CVE ID : CVE-2017-9524 CVE-2017-10806 CVE-2017-11334 CVE-2017-11443 Debian Bug : 865755 869171 869173 867751 869945 Multiple vulnerabilities were found in qemu, a fast processor emulator: CVE-2017-9524 Denial of service in qemu-nbd server CVE-2017-10806 Buffer overflow in USB redirector CVE-2017-11334 Out-of-band memory access in DMA operations CVE-2017-11443 Out-of-band memory access in SLIRP/DHCP For the stable distribution (stretch), these problems have been fixed in version 1:2.8+dfsg-6+deb9u2. We recommend that you upgrade your qemu packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
-
SUSE Security Update: Security update for Linux Kernel Live Patch 3 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:2043-1 Rating: important References: #1027575 #1038564 #1042364 #1042892 #1046191 #1046202 #1046206 #1050751 Cross-References: CVE-2017-2636 CVE-2017-7533 CVE-2017-7645 CVE-2017-8797 CVE-2017-8890 CVE-2017-9077 CVE-2017-9242 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves 7 vulnerabilities and has one errata is now available. Description: This update for the Linux Kernel 4.4.21-90 fixes several issues. The following security bugs were fixed: - CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751). - CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202) - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191). - CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575). - CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892). - CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1257=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-90-default-7-2.1 References: https://www.suse.com/security/cve/CVE-2017-2636.html https://www.suse.com/security/cve/CVE-2017-7533.html https://www.suse.com/security/cve/CVE-2017-7645.html https://www.suse.com/security/cve/CVE-2017-8797.html https://www.suse.com/security/cve/CVE-2017-8890.html https://www.suse.com/security/cve/CVE-2017-9077.html https://www.suse.com/security/cve/CVE-2017-9242.html https://bugzilla.suse.com/1027575 https://bugzilla.suse.com/1038564 https://bugzilla.suse.com/1042364 https://bugzilla.suse.com/1042892 https://bugzilla.suse.com/1046191 https://bugzilla.suse.com/1046202 https://bugzilla.suse.com/1046206 https://bugzilla.suse.com/1050751 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 8 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:2046-1 Rating: important References: #1038564 #1042364 #1042892 #1046191 #1046202 #1046206 #1047518 #1050751 Cross-References: CVE-2017-7533 CVE-2017-7645 CVE-2017-8797 CVE-2017-8890 CVE-2017-9077 CVE-2017-9242 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves 6 vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 4.4.59-92_20 fixes several issues. The following security bugs were fixed: - CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751). - CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202) - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191). - CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892). - CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364). - CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564). The following non-security bug was fixed: - Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON's from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1258=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_59-92_20-default-3-2.1 References: https://www.suse.com/security/cve/CVE-2017-7533.html https://www.suse.com/security/cve/CVE-2017-7645.html https://www.suse.com/security/cve/CVE-2017-8797.html https://www.suse.com/security/cve/CVE-2017-8890.html https://www.suse.com/security/cve/CVE-2017-9077.html https://www.suse.com/security/cve/CVE-2017-9242.html https://bugzilla.suse.com/1038564 https://bugzilla.suse.com/1042364 https://bugzilla.suse.com/1042892 https://bugzilla.suse.com/1046191 https://bugzilla.suse.com/1046202 https://bugzilla.suse.com/1046206 https://bugzilla.suse.com/1047518 https://bugzilla.suse.com/1050751 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
-------- ROCCAT LEADR WIRELESS OPTICAL MOUSE REVIEW ( -at -) APH NETWORKS ----------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: ROCCAT Leadr Wireless Optical Mouse Review ( -at -) APH Networks * Description: The ROCCAT Leadr is a class-leading gaming mouse that is comfortable to use and has the performance to match its price tag. * Link: http://aphnetworks.com/reviews/roccat-leadr * Image: http://aphnetworks.com/review/roccat-leadr/007.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:2042-1 Rating: important References: #1049483 Cross-References: CVE-2017-7533 Affected Products: SUSE OpenStack Cloud 6 SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP1-LTSS SUSE Linux Enterprise Module for Public Cloud 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive the following security fix: - CVE-2017-7533: Bug in inotify code allowed privilege escalation (bnc#1049483). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 6: zypper in -t patch SUSE-OpenStack-Cloud-6-2017-1254=1 - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1254=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1254=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-1254=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 6 (noarch): kernel-devel-3.12.74-60.64.51.1 kernel-macros-3.12.74-60.64.51.1 kernel-source-3.12.74-60.64.51.1 - SUSE OpenStack Cloud 6 (x86_64): kernel-default-3.12.74-60.64.51.1 kernel-default-base-3.12.74-60.64.51.1 kernel-default-base-debuginfo-3.12.74-60.64.51.1 kernel-default-debuginfo-3.12.74-60.64.51.1 kernel-default-debugsource-3.12.74-60.64.51.1 kernel-default-devel-3.12.74-60.64.51.1 kernel-syms-3.12.74-60.64.51.1 kernel-xen-3.12.74-60.64.51.1 kernel-xen-base-3.12.74-60.64.51.1 kernel-xen-base-debuginfo-3.12.74-60.64.51.1 kernel-xen-debuginfo-3.12.74-60.64.51.1 kernel-xen-debugsource-3.12.74-60.64.51.1 kernel-xen-devel-3.12.74-60.64.51.1 kgraft-patch-3_12_74-60_64_51-default-1-2.1 kgraft-patch-3_12_74-60_64_51-xen-1-2.1 - SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64): kernel-default-3.12.74-60.64.51.1 kernel-default-base-3.12.74-60.64.51.1 kernel-default-base-debuginfo-3.12.74-60.64.51.1 kernel-default-debuginfo-3.12.74-60.64.51.1 kernel-default-debugsource-3.12.74-60.64.51.1 kernel-default-devel-3.12.74-60.64.51.1 kernel-syms-3.12.74-60.64.51.1 - SUSE Linux Enterprise Server for SAP 12-SP1 (noarch): kernel-devel-3.12.74-60.64.51.1 kernel-macros-3.12.74-60.64.51.1 kernel-source-3.12.74-60.64.51.1 - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): kernel-xen-3.12.74-60.64.51.1 kernel-xen-base-3.12.74-60.64.51.1 kernel-xen-base-debuginfo-3.12.74-60.64.51.1 kernel-xen-debuginfo-3.12.74-60.64.51.1 kernel-xen-debugsource-3.12.74-60.64.51.1 kernel-xen-devel-3.12.74-60.64.51.1 kgraft-patch-3_12_74-60_64_51-default-1-2.1 kgraft-patch-3_12_74-60_64_51-xen-1-2.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64): kernel-default-3.12.74-60.64.51.1 kernel-default-base-3.12.74-60.64.51.1 kernel-default-base-debuginfo-3.12.74-60.64.51.1 kernel-default-debuginfo-3.12.74-60.64.51.1 kernel-default-debugsource-3.12.74-60.64.51.1 kernel-default-devel-3.12.74-60.64.51.1 kernel-syms-3.12.74-60.64.51.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (noarch): kernel-devel-3.12.74-60.64.51.1 kernel-macros-3.12.74-60.64.51.1 kernel-source-3.12.74-60.64.51.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64): kernel-xen-3.12.74-60.64.51.1 kernel-xen-base-3.12.74-60.64.51.1 kernel-xen-base-debuginfo-3.12.74-60.64.51.1 kernel-xen-debuginfo-3.12.74-60.64.51.1 kernel-xen-debugsource-3.12.74-60.64.51.1 kernel-xen-devel-3.12.74-60.64.51.1 kgraft-patch-3_12_74-60_64_51-default-1-2.1 kgraft-patch-3_12_74-60_64_51-xen-1-2.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (s390x): kernel-default-man-3.12.74-60.64.51.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.74-60.64.51.1 kernel-ec2-debuginfo-3.12.74-60.64.51.1 kernel-ec2-debugsource-3.12.74-60.64.51.1 kernel-ec2-devel-3.12.74-60.64.51.1 kernel-ec2-extra-3.12.74-60.64.51.1 kernel-ec2-extra-debuginfo-3.12.74-60.64.51.1 References: https://www.suse.com/security/cve/CVE-2017-7533.html https://bugzilla.suse.com/1049483 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Prusa i3 MK2S Kit ( -at -) LanOC Reviews <https://lanoc.org/review/3d-printing/7602-prusa-i3-mk2s-kit> *DESCRIPTION:* So I started down the 3d printing hole over a year ago and in that time I have in some ways reached my original goal of being able to learn how to design 3d parts and later use them around the office and house. In that time I spent a lot of time with Delta style printers, having the chance to check out both the SeeMeCNC Eris and their Rostock MAX v3 as they launched. This only made me more curious about other printers, especially Cartesian style printers. Cartesian printers are by far the most popular style and are more what you expect to see what you think of a 3d printer. Well, earlier this year I had the chance to meet and talk with Josef Prusa and later through email, we arranged for a printer to come our way. For the last few months, I have had the Prusa i3 MK2 here in the office as I worked on projects (a few that you guys have seen me post about) getting a feel for the printer. Well, it’s about time that I sit down and gather my thoughts on the printer and run through my experience building, troubleshooting, and making with the i3 MK2. *ARTICLE URL:* https://lanoc.org/review/3d-printing/7602-prusa-i3-mk2s-kit *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/prusa_i3_mk2s_kit/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/prusa_i3_mk2s_kit/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
-
View this email in your browser (http://mailchi.mp/2455abaabdfd/hp-ssd-s700-pro-solid-state-drive-review?e=8138df6da5) ** Benchmark Reviews Presents: ------------------------------------------------------------ 512GB-HP-SSD-S700-PRO-Solid-State-Drive-Review TITLE: HP SSD S700 PRO Solid State Drive Review (http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=52ae4d6a8c&e=8138df6da5) QUOTE: HP suggests top speeds up to 565 MB/s for reads and 520 MB/s writes from SSD S700 PRO, which utilizes 3D NAND to deliver impressive storage density and reliability. Adding to its appeal is the cost of solid state technology, which has doubled its storage capacity per dollar from just one year ago. In this article for Benchmark Reviews, we test the HP SSD S700 PRO (SATA 2.5″ 512GB model 2AP99AA#ABL) against other solid state drive competition. LINK: http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=9b7989fe57&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage2.com/track/click?u=9a2f239b17114c9008e3dfda9&id=683aa64760&e=8138df6da5 ============================================================ ** (http://benchmarkreviews.us10.list-manage2.com/track/click?u=9a2f239b17114c9008e3dfda9&id=0e031654bc&e=8138df6da5) ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=e4af7e9942&e=8138df6da5) ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=ac7317aeca&e=8138df6da5)
-
AMD Ryzen Threadripper Unboxing and Installation @ Legit Reviews
news posted a topic in Upcoming News
We were expecting a board and processor like normal, but we ended up receiving two large boxes that tipped the scales at 55 pounds! This was not going to be your average board and processor! One boxed included a large pelican case with the AMD Ryzen Threadripper logo and a plaque that custom engraved for the site. The other box included ... Article Title: AMD Ryzen Threadripper Unboxing and Installation ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/amd-ryzen-threadripper-unboxing-installation_196763 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// = -
========================================================================== Kernel Live Patch Security Notice LSN-0027-1 August 03, 2017 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu: | Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency | Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: Fan Wu and Shixiong Zhao discovered a race condition between inotify events and vfs rename operations in the Linux kernel. An unprivileged local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2017-7533) Update instructions: The problem can be corrected by up[censored] your livepatches to the following versions: | Kernel | Version | flavors | |-----------------+----------+--------------------------| | Kernel | Version | flavors | |-----------------+----------+--------------------------| | 4.4.0-21.37 | 27.3 | generic, lowlatency | | 4.4.0-22.39 | 27.3 | generic, lowlatency | | 4.4.0-22.40 | 27.3 | generic, lowlatency | | 4.4.0-24.43 | 27.3 | generic, lowlatency | | 4.4.0-28.47 | 27.3 | generic, lowlatency | | 4.4.0-31.50 | 27.3 | generic, lowlatency | | 4.4.0-34.53 | 27.3 | generic, lowlatency | | 4.4.0-36.55 | 27.3 | generic, lowlatency | | 4.4.0-38.57 | 27.3 | generic, lowlatency | | 4.4.0-42.62 | 27.3 | generic, lowlatency | | 4.4.0-43.63 | 27.3 | generic, lowlatency | | 4.4.0-45.66 | 27.3 | generic, lowlatency | | 4.4.0-47.68 | 27.3 | generic, lowlatency | | 4.4.0-51.72 | 27.3 | generic, lowlatency | | 4.4.0-53.74 | 27.3 | generic, lowlatency | | 4.4.0-57.78 | 27.3 | generic, lowlatency | | 4.4.0-59.80 | 27.3 | generic, lowlatency | | 4.4.0-62.83 | 27.3 | generic, lowlatency | | 4.4.0-63.84 | 27.3 | generic, lowlatency | | 4.4.0-64.85 | 27.3 | generic, lowlatency | | 4.4.0-66.87 | 27.3 | generic, lowlatency | | 4.4.0-67.88 | 27.3 | generic, lowlatency | | 4.4.0-70.91 | 27.3 | generic, lowlatency | | 4.4.0-71.92 | 27.3 | generic, lowlatency | | 4.4.0-72.93 | 27.3 | generic, lowlatency | | 4.4.0-75.96 | 27.3 | generic, lowlatency | | 4.4.0-77.98 | 27.3 | generic, lowlatency | | 4.4.0-78.99 | 27.3 | generic, lowlatency | | 4.4.0-79.100 | 27.3 | generic, lowlatency | | 4.4.0-81.104 | 27.3 | generic, lowlatency | | 4.4.0-83.106 | 27.3 | generic, lowlatency | | lts-4.4.0-21.37_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-22.39_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-22.40_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-24.43_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-28.47_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-31.50_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-34.53_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-36.55_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-38.57_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-42.62_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-45.66_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-47.68_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-51.72_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-53.74_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-57.78_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-59.80_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-62.83_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-64.85_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-66.87_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-70.91_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-71.92_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-72.93_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-75.96_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-79.100_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-81.104_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | | lts-4.4.0-87.110_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency | Additionally, you should install an updated kernel with these fixes and reboot at your convienience. References: CVE-2017-7533 --
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Bykski FOUR Founders GTX 1080 GPU Waterblock Link: https://www.techpowerup.com/reviews/Bykski/FOUR_Founders_GTX_1080_Waterblock Brief: The Bykski FR-N-GTX1080 is a full-cover water block component from Bykski's high-end FOUR series. It features an anodized aluminum top cover over an acrylic top, nickel-plated copper cold plate with split flow design, an included anodized aluminum back plate, and multiple color options for customizing your build.
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:2041-1 Rating: important References: #1049483 Cross-References: CVE-2017-7533 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise High Availability 12-SP2 SUSE Linux Enterprise Desktop 12-SP2 SUSE Container as a Service Platform ALL OpenStack Cloud Magnum Orchestration 7 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.74 to receive the following security update: - CVE-2017-7533: Bug in inotify code allowed privilege escalation (bnc#1049483). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP2: zypper in -t patch SUSE-SLE-WE-12-SP2-2017-1251=1 - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1251=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1251=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1251=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1251=1 - SUSE Linux Enterprise High Availability 12-SP2: zypper in -t patch SUSE-SLE-HA-12-SP2-2017-1251=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1251=1 - SUSE Container as a Service Platform ALL: zypper in -t patch SUSE-CAASP-ALL-2017-1251=1 - OpenStack Cloud Magnum Orchestration 7: zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1251=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64): kernel-default-debuginfo-4.4.74-92.32.1 kernel-default-debugsource-4.4.74-92.32.1 kernel-default-extra-4.4.74-92.32.1 kernel-default-extra-debuginfo-4.4.74-92.32.1 - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): kernel-obs-build-4.4.74-92.32.1 kernel-obs-build-debugsource-4.4.74-92.32.1 - SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch): kernel-docs-4.4.74-92.32.3 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): kernel-default-4.4.74-92.32.1 kernel-default-base-4.4.74-92.32.1 kernel-default-base-debuginfo-4.4.74-92.32.1 kernel-default-debuginfo-4.4.74-92.32.1 kernel-default-debugsource-4.4.74-92.32.1 kernel-default-devel-4.4.74-92.32.1 kernel-syms-4.4.74-92.32.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch): kernel-devel-4.4.74-92.32.1 kernel-macros-4.4.74-92.32.1 kernel-source-4.4.74-92.32.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64): kernel-default-4.4.74-92.32.1 kernel-default-base-4.4.74-92.32.1 kernel-default-base-debuginfo-4.4.74-92.32.1 kernel-default-debuginfo-4.4.74-92.32.1 kernel-default-debugsource-4.4.74-92.32.1 kernel-default-devel-4.4.74-92.32.1 kernel-syms-4.4.74-92.32.1 - SUSE Linux Enterprise Server 12-SP2 (noarch): kernel-devel-4.4.74-92.32.1 kernel-macros-4.4.74-92.32.1 kernel-source-4.4.74-92.32.1 - SUSE Linux Enterprise Server 12-SP2 (s390x): kernel-default-man-4.4.74-92.32.1 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_74-92_32-default-1-2.1 - SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64): cluster-md-kmp-default-4.4.74-92.32.1 cluster-md-kmp-default-debuginfo-4.4.74-92.32.1 cluster-network-kmp-default-4.4.74-92.32.1 cluster-network-kmp-default-debuginfo-4.4.74-92.32.1 dlm-kmp-default-4.4.74-92.32.1 dlm-kmp-default-debuginfo-4.4.74-92.32.1 gfs2-kmp-default-4.4.74-92.32.1 gfs2-kmp-default-debuginfo-4.4.74-92.32.1 kernel-default-debuginfo-4.4.74-92.32.1 kernel-default-debugsource-4.4.74-92.32.1 ocfs2-kmp-default-4.4.74-92.32.1 ocfs2-kmp-default-debuginfo-4.4.74-92.32.1 - SUSE Linux Enterprise Desktop 12-SP2 (noarch): kernel-devel-4.4.74-92.32.1 kernel-macros-4.4.74-92.32.1 kernel-source-4.4.74-92.32.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): kernel-default-4.4.74-92.32.1 kernel-default-debuginfo-4.4.74-92.32.1 kernel-default-debugsource-4.4.74-92.32.1 kernel-default-devel-4.4.74-92.32.1 kernel-default-extra-4.4.74-92.32.1 kernel-default-extra-debuginfo-4.4.74-92.32.1 kernel-syms-4.4.74-92.32.1 - SUSE Container as a Service Platform ALL (x86_64): kernel-default-4.4.74-92.32.1 kernel-default-debuginfo-4.4.74-92.32.1 kernel-default-debugsource-4.4.74-92.32.1 - OpenStack Cloud Magnum Orchestration 7 (x86_64): kernel-default-4.4.74-92.32.1 kernel-default-debuginfo-4.4.74-92.32.1 kernel-default-debugsource-4.4.74-92.32.1 References: https://www.suse.com/security/cve/CVE-2017-7533.html https://bugzilla.suse.com/1049483 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for libzypp, zypper ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:2040-1 Rating: important References: #1009745 #1031756 #1033236 #1038132 #1038984 #1043218 #1045735 #1047785 #1048315 Cross-References: CVE-2017-7435 CVE-2017-7436 CVE-2017-9269 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Desktop 12-SP2 OpenStack Cloud Magnum Orchestration 7 ______________________________________________________________________________ An update that solves three vulnerabilities and has 6 fixes is now available. Description: The Software Update Stack was updated to receive fixes and enhancements. libzypp: Security issues fixed: - CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows, mainly for unsigned repositories and packages. (bsc#1045735, bsc#1038984) Bug fixes: - Re-probe on refresh if the repository type changes. (bsc#1048315) - Propagate proper error code to DownloadProgressReport. (bsc#1047785) - Allow to trigger an appdata refresh unconditionally. (bsc#1009745) - Support custom repo variables defined in /etc/zypp/vars.d. - Adapt loop mounting of ISO images. (bsc#1038132, bsc#1033236) - Fix potential crash if repository has no baseurl. (bsc#1043218) zypper: - Adapt download callback to report and handle unsigned packages. (bsc#1038984) - Report missing/optional files as 'not found' rather than 'error'. (bsc#1047785) - Document support for custom repository variables defined in /etc/zypp/vars.d. - Emphasize that it depends on how fast PackageKit will respond to a 'quit' request sent if PK blocks package management. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-1252=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1252=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1252=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1252=1 - OpenStack Cloud Magnum Orchestration 7: zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1252=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): libzypp-debuginfo-16.15.2-27.21.1 libzypp-debugsource-16.15.2-27.21.1 libzypp-devel-16.15.2-27.21.1 libzypp-devel-doc-16.15.2-27.21.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): libzypp-16.15.2-27.21.1 libzypp-debuginfo-16.15.2-27.21.1 libzypp-debugsource-16.15.2-27.21.1 zypper-1.13.30-18.13.3 zypper-debuginfo-1.13.30-18.13.3 zypper-debugsource-1.13.30-18.13.3 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch): zypper-log-1.13.30-18.13.3 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64): libzypp-16.15.2-27.21.1 libzypp-debuginfo-16.15.2-27.21.1 libzypp-debugsource-16.15.2-27.21.1 zypper-1.13.30-18.13.3 zypper-debuginfo-1.13.30-18.13.3 zypper-debugsource-1.13.30-18.13.3 - SUSE Linux Enterprise Server 12-SP2 (noarch): zypper-log-1.13.30-18.13.3 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): libzypp-16.15.2-27.21.1 libzypp-debuginfo-16.15.2-27.21.1 libzypp-debugsource-16.15.2-27.21.1 zypper-1.13.30-18.13.3 zypper-debuginfo-1.13.30-18.13.3 zypper-debugsource-1.13.30-18.13.3 - SUSE Linux Enterprise Desktop 12-SP2 (noarch): zypper-log-1.13.30-18.13.3 - OpenStack Cloud Magnum Orchestration 7 (x86_64): libzypp-16.15.2-27.21.1 libzypp-debuginfo-16.15.2-27.21.1 libzypp-debugsource-16.15.2-27.21.1 zypper-1.13.30-18.13.3 zypper-debuginfo-1.13.30-18.13.3 zypper-debugsource-1.13.30-18.13.3 References: https://www.suse.com/security/cve/CVE-2017-7435.html https://www.suse.com/security/cve/CVE-2017-7436.html https://www.suse.com/security/cve/CVE-2017-9269.html https://bugzilla.suse.com/1009745 https://bugzilla.suse.com/1031756 https://bugzilla.suse.com/1033236 https://bugzilla.suse.com/1038132 https://bugzilla.suse.com/1038984 https://bugzilla.suse.com/1043218 https://bugzilla.suse.com/1045735 https://bugzilla.suse.com/1047785 https://bugzilla.suse.com/1048315 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
TITLE ZOTAC GTX 1080 Ti MINI Review ( -at -) Vortez CONTENT: In the spotlight today we have the ZOTAC GTX 1080 Ti MINI. Touted as the world's smallest GTX 1080 Ti, this graphics card has a footprint unlike any of NVIDIA's flagship designs. Measuring in at just 211mm in length, compared to rival offerings (which in some cases exceed 300mm) this card will squeeze into the smallest of mini-ITX chassis and although gamers to take advantage of the highest performance available. LINK: https://www.vortez.net/review.php?id=1329 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
The Wine development release 2.14 is now available. What's new in this release (see below for details): - Mono engine updated with some bug fixes. - C++ calling convention workarounds in the IDL compiler. - Z-order support in the Android graphics driver. - Scalable mouse cursors on macOS. - Various bug fixes. The source is available from the following locations: http://dl.winehq.org/wine/source/2.x/wine-2.14.tar.xz http://mirrors.ibiblio.org/wine/source/2.x/wine-2.14.tar.xz Binary packages for various distributions will be available from: http://www.winehq.org/download You will find documentation on http://www.winehq.org/documentation You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details. Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list. ---------------------------------------------------------------- Bugs fixed in 2.14 (total 18): 35423 Serif WebPlus x5/x6/x8 installer fails, reports 'Invalid command line.' 38322 Call of Duty Modern Warfare 3 and Saints Row 3: Wine crashes when Steam is starting the game 40919 Worms Armageddon Gameplay only shows top-left corner of screen 41263 Dead by Daylight: Crash on starting the game 41985 CHM viewer does not use default window 42165 Root Double only shows black window in new game 42416 iMesh 10 crashes at startup (IWMReader::QueryInterface doesn't support IWMReaderAccelerator, 'BDDC4D08-944D-4D52-A612-46C3FDA07DD4') 42508 start.exe does not detect its title argument when it should (breaking .e.g URL opening in League of Legends) 42514 start.exe incorrectly treats multiple quoted arguments as the console title (breaking .e.g URL opening in League of Legends) 42526 DiRT Showdown hangs on start 43135 The Witcher 3. The game does not start after upgrading to wine-staging 2.9. On wine-staging 2.8 game works. 43144 Distorted graphics in the game Starcraft 2. 43369 Nora, Princess and Stray cat (demo): fails to run (division by zero) 43402 Star Wars - Knights of the Old Republic: hardware mouse pointer invisible 43403 make error on Debian 4.9.30-2kali1 (2017-06-22) x86_64 GNU/Linux 43413 Quicken Basic 2007 installer triggers __stack_chk_fail() on Wine builtin 'msiexec' 43420 UnrealEd 3: Cannot fully build map since Wine 2.13 43424 cursor icon has the wrong size ---------------------------------------------------------------- Changes since 2.13: Alex Henrie (9): msvcr120: Declare ret as a float in functions that return a float. msvcrt: Set ERANGE in exp functions on finite input and infinite output. msvcr120: Don't double-check error conditions in log2f. msvcrt: Set errno in _logb(f) if x is 0. msvcrt: Don't set errno in _logb(f) if x is ±INF. msvcrt: Don't set errno in sinh(f), cosh(f), or atan2(f) if x is ±INF. msvcrt: Don't set errno in sqrt(f) if x is positive infinity. msvcrt: Set errno through the _matherr function. ucrtbase/tests: Add tests for math function errors. Alexandre Julliard (26): ntdll: Add an assembly wrapper to return correct values for the current thread in NtGetContextThread. ntdll: Get some values from the parent stackframe in RtlCaptureContext. ntdll: Use RtlCaptureContext also in RtlUnwind. krnl386: Simplify a couple of register functions. krnl386: Add a simple wrapper for CommonUnimpStub instead of saving/restoring all registers. user32: Reduce the cursor height if it also includes the mask. user32: Always update the visible region for cross-process DCEs. configure: Allow specifying custom CFLAGS for LDAP. ntdll: Mark function that are only called from assembly as hidden. hal: Mark function that are only called from assembly as hidden. ntoskrnl: Mark function that are only called from assembly as hidden. rpcrt4: Mark function that are only called from assembly as hidden. msvcrt: Mark function that are only called from assembly as hidden. krnl386: Mark function that are only called from assembly as hidden. krnl386: Explicitly fetch the service argument in VxDCall. krnl386: Use RtlCaptureContext and NtSetContextThread to implement register functions. configure: Disable LDAP completely if the headers are not missing. ntdll: Set thread context directly in assembly instead of using generated code. ntdll: Remove support for relay debugging of register functions. winebuild: Disallow register functions in 32-bit modules. winebuild: Remove 32-bit register function support. ntdll/tests: Test hardware breakpoints in newly created thread. server: Add a platform-specific entry point to initialize registers of a new thread. server: Initialize debug registers in new threads if necessary. wineandroid: Update the views z-order based on the window hierarchy. wineandroid: Also set WINEDLLPATH. Alistair Leslie-Hughes (12): wmvcore: Support IWMHeaderInfo/2/3 interfaces in IWMReader. wmvcore: Support IWMLanguageList interfaces in IWMReader. wmvcore: Support IReferenceClock interfaces in IWMReader. wmvcore: Support IWMProfile3 interfaces in IWMReader. wmvcore: Support IWMPacketSize2 interfaces in IWMReader. include: Add BackgroundCopyManager3_0 coclass. rpcrt4/tests: Use standard wine_dbgstr_longlong. ucrtbase/tests: Use standard wine_dbgstr_longlong. wmp: Ignore IMarshal/IRunnableObject interfaces in IOleObject_QueryInterface. msxml3/tests: Use standard wine_dbgstr_longlong. msvcp90/tests: Use standard wine_dbgstr_longlong. msvcrt/tests: Use standard wine_dbgstr_longlong. Andrew Eikum (1): gdiplus: Implement stub for GdipGraphicsSetAbort. André Hentschel (1): ntdll: Make sure the stack is quad-word aligned on ARM64. Fabian Maurer (4): gdiplus: Avoid division by zero in SOFTWARE_GdipDrawThinPath. include: Add UIRibbon interface definitions. uiribbon: Add DLL. uiribbon: Add stubs for IUIFramework. François Gouget (1): msvcp140/tests: Fix a typo in a variable name. Henri Verbeet (7): widl: Handle C++ aggregate returns in a MSVC compatible way. wined3d: Validate vertex shader input signature register indices (AFL). wined3d: Only flush valid contexts in wined3d_cs_exec_flush(). wined3d: Properly update the context when falling back to the backup window in context_set_gl_context(). wined3d: Use the context information in context_set_pixel_format(). d3d8/tests: Introduce a test for drawing with a destroyed window. d3d9/tests: Introduce a test for drawing with a destroyed window. Hugh McMaster (21): po: Fix a typo in the Norwegian translation. regedit: Free the value name buffer from the default value name parser state if necessary (Valgrind). regedit: Check for a valid subkey pointer before attempting to delete a registry key (Coverity). regedit: Prevent out-of-bounds reads when unescaping a string (Valgrind). regedit: Use a helper function to allocate memory and check for a valid pointer. regedit: Use a helper function to free allocated memory. regedit: Use heap_xrealloc() for consistency. regedit: Use the heap_*() functions in childwnd.c where possible. regedit: Use the heap_*() functions in edit.c where possible. regedit: Use the heap_*() functions in framewnd.c where possible. regedit: Use the heap_*() functions in regedit.c where possible. regedit: Remove commented code from resize_frame_rect(). regedit: Use the heap_*() functions in listview.c where possible. regedit: Use the heap_*() functions in treeview.c where possible. regedit: Store the data from a listview subitem in a valid memory address. regedit: Pass memcpy() the correct destination address. reg: Use a helper function to allocate memory and die on failure. reg: Use a helper function to free allocated memory. reg: Use a helper function to resize a memory buffer. regedit: Use the heap_*() functions in hexedit.c where possible. regedit: Replace a HeapAlloc() HEAP_ZERO_MEMORY call in framewnd.c. Huw D. M. Davies (3): gdi32: Add a helper to fill rectangles with a given pixel. gdi32: Respect the rop mode in SetPixel. packager: Add the ProgID. Jacek Caban (13): wininet: Improved cookie debug traces. mshtml: Set correct load type in load_nsuri. mshtml: Always create load info object in load_nsuri. mshtml: Set referrer in load_nsuri. ws2_32: Added GetAddrInfoExOverlappedResult stub implementation. ws2_32: Factor out GetAddrInfoW implementation. ws2_32: Added FreeAddrInfoEx implementation. ws2_32: Return ADDRINFOEXW type from WS_getaddrinfoW. ws2_32: Added partial GetAddrInfoExW implementation. ws2_32: Added support for overlapped GetAddrInfoExW. ws2_32/tests: Added GetAddrInfoExW tests. rpcrt4: Always protect ref access for connections associated with protseq in RPCRT4_ReleaseConnection. msvcp: Added std::_Raise_handler implementation. Julian Rüger (1): po: Update German translation. Józef Kucia (4): wined3d: Implement forceEarlyDepthStencil shader global flag. d3d11/tests: Add test for forced early depth stencil. opengl32: Update OpenGL Registry files URLs. wined3d: Update ARB_pipeline_statistics_query extension detection. Ken Thomases (1): winemac: Scale cursors for Retina mode, now that user32 scales them with DPI. Marcus Meissner (1): gdiplus: Free dash_pattern_scaled (Coverity). Martin Storsjo (4): ntdll: Implement allocate_stub for arm64. ntdll: Simplify the arm version of a stub function. msvcrt: Don't export _isnanf, _nextafterf, _scalbf and frexpf on arm. msvcrt: Export -f suffixed float functions functions on arm64. Michael Müller (1): ntdll/tests: Test debug register values in newly created thread. Michael Stefaniuc (11): dmloader: Handle NULL and empty path strings in SetSearchDirectory(). dmloader/tests: Add more SetSearchDirectory() tests. dmloader/tests: Add some EnableCache() tests. dmloader: Use a bitfield to store the per class cache enable info. dmloader: Move struct definitions to the files they are used in. dmloader: Simplify the search path handling. dmloader: Remove some commented out debugging code. dmloader: Simplify the cache list handling. dmloader: Don't leak memory in the cache. dmloader: Get rid of two gratuitous typedefs. dmloader: Remove a now redundant helper function. Nikolay Sivov (8): xmllite/writer: Fix empty element and state handling in WriteElementString(). xmllite/writer: Fix indentation on WriteElementString(). xmllite/writer: Do not indent after just BOM has been written. dwrite: Use newer enum version to avoid type mismatch (Coverity). windowscodecs/tests: Fix a leak in tests (Valgrind). windowscodecs/tests: Remove unused type declarations. xmllite/writer: Improve handling of the output with invalid encoding. xmllite/tests: Added a test for output with code page 1200. Piotr Caban (6): gdiplus: Fix saving pen dashed line cap style to metafile. gdiplus: Return success saving path to metafile. include: Define IElementTraversal interface. mshtml: Add IElementTraversal stub implementation. mshtml: Expose IElementTraversal interface to scripts. mshtml: Add IElementTraversal::get_firstElementChild implementation. Tim Worthington (1): user32: Fix rendering of tabs in edit control. Vincent Povirk (6): mscoree: Update for mono profiler api v2. gdiplus: Fix a possible floating point exception in path gradients. gdiplus/tests: Enable floating point exceptions. mscoree: Implement RequestRuntimeLoadedNotification. mscoree: Update Wine Mono to 4.7.1. mscoree: Fix locking in GetRuntimeHost. Zebediah Figura (4): wincodecs: Add encoder options for JPEG. include: Add initial IDL for cmnquery.h. dsquery: Add stub DLL. dsquery: Add stub implementation of ICommonQuery. -- Alexandre Julliard julliard ( -at -) winehq.org