news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* VisionTek SoundTube Pro Wireless Speaker ( -at -) LanOC Reviews <https://lanoc.org/review/audio/7585-visiontek-soundtube-pro-wireless-speaker> *DESCRIPTION:* Portable speakers is an area, like keyboards and mice, and for a while SSDs everyone seems to have their own model. Even VisionTek who I would normally associate with video cards has gotten into the market. They have their SoundTube Pro Wireless Speaker with a pill like shape only with a large grill across both the front and back. So they sent one over, curious what we thought of it so today I’m going to see what it is all about and find out if it is a good pickup to take out with you this summer while you are enjoying the weather. *ARTICLE URL:* https://lanoc.org/review/audio/7585-visiontek-soundtube-pro-wireless-speaker *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/visiontek_soundtube/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/visiontek_soundtube/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
-
Package : qemu Version : 1.1.2+dfsg-6+deb7u22 CVE ID : CVE-2016-9602 CVE-2016-9603 CVE-2017-7377 CVE-2017-7471 CVE-2017-7493 CVE-2017-7718 CVE-2017-7980 CVE-2017-8086 Several vulnerabilities were discovered in qemu, a fast processor emulator. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-9603 qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator and the VNC display driver support is vulnerable to a heap buffer overflow issue. It could occur when Vnc client attempts to update its display after a vga operation is performed by a guest. A privileged user/process inside guest could use this flaw to crash the Qemu process resulting in DoS OR potentially leverage it to execute arbitrary code on the host with privileges of the Qemu process. CVE-2017-7718 qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt functions cirrus_bitblt_rop_fwd_transp_ and/or cirrus_bitblt_rop_fwd_. A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS. CVE-2017-7980 qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds r/w access issues. It could occur while copying VGA data via various bitblt functions. A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS OR potentially execute arbitrary code on a host with privileges of Qemu process on the host. CVE-2016-9602 Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper link following issue. It could occur while accessing symbolic link files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host. CVE-2017-7377 Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable to a memory leakage issue. It could occur while doing a I/O operation via v9fs_create/v9fs_lcreate routine. A privileged user/process inside guest could use this flaw to leak host memory resulting in Dos. CVE-2017-7471 Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host. CVE-2017-7493 Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest. CVE-2017-8086 Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable to a memory leakage issue. It could occur while querying file system extended attributes via 9pfs_list_xattr() routine. A privileged user/process inside guest could use this flaw to leak host memory resulting in Dos. For Debian 7 "Wheezy", these problems have been fixed in version 1.1.2+dfsg-6+deb7u22. We recommend that you upgrade your qemu packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
-
Package : qemu Version : 1.1.2+dfsg-6+deb7u22 CVE ID : CVE-2016-9602 CVE-2016-9603 CVE-2017-7377 CVE-2017-7471 CVE-2017-7493 CVE-2017-7718 CVE-2017-7980 CVE-2017-8086 Several vulnerabilities were discovered in qemu, a fast processor emulator. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-9603 qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator and the VNC display driver support is vulnerable to a heap buffer overflow issue. It could occur when Vnc client attempts to update its display after a vga operation is performed by a guest. A privileged user/process inside guest could use this flaw to crash the Qemu process resulting in DoS OR potentially leverage it to execute arbitrary code on the host with privileges of the Qemu process. CVE-2017-7718 qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt functions cirrus_bitblt_rop_fwd_transp_ and/or cirrus_bitblt_rop_fwd_. A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS. CVE-2017-7980 qemu-kvm built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds r/w access issues. It could occur while copying VGA data via various bitblt functions. A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS OR potentially execute arbitrary code on a host with privileges of Qemu process on the host. CVE-2016-9602 Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper link following issue. It could occur while accessing symbolic link files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host. CVE-2017-7377 Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable to a memory leakage issue. It could occur while doing a I/O operation via v9fs_create/v9fs_lcreate routine. A privileged user/process inside guest could use this flaw to leak host memory resulting in Dos. CVE-2017-7471 Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host. CVE-2017-7493 Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest. CVE-2017-8086 Quick Emulator(Qemu) built with the virtio-9p back-end support is vulnerable to a memory leakage issue. It could occur while querying file system extended attributes via 9pfs_list_xattr() routine. A privileged user/process inside guest could use this flaw to leak host memory resulting in Dos. For Debian 7 "Wheezy", these problems have been fixed in version 1.1.2+dfsg-6+deb7u22. We recommend that you upgrade your qemu packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
-
Logitech G433 7.1 Wired Surround Gaming Headset Review @ Legit Reviews
news posted a topic in Upcoming News
Those that keep up with current events in the tech space will notice that the timing of this review is coincidental as Logitech recently announced the acquisition of gaming headset maker ASTRO Gaming which is a big win for them. ASTRO Gaming made some of the best gaming headsets on the market so Logitech gets a nice boost in that department. However, at the present we have their G433 7.1 Wired Surround Gaming Headset sitting here begging to be played with, so we’ll oblige and get to it... Article Title: Logitech G433 7.1 Wired Surround Gaming Headset Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/logitech-g433-7-1-wired-surround-gaming-headset-review_196102 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// = -
CentOS Errata and Security Advisory 2017:1789 Critical Upstream details at : https://access.redhat.com/errata/RHSA-2017:1789 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: edb8077e58e41caaa199362bc57724007cc15952b2dea1bb35f120aa61400698 java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.i686.rpm 6717ac7dc584e61c8bf68171b322331d6eac8c8a7d9a4a5fd662a4bf4efa794f java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.x86_64.rpm ad904ba554b4ebaf47a8c9e1087513cadba468e1c225cc1bb02990e5643208b1 java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3.x86_64.rpm d7eb40e252335322f7678b561e6e11d41c85a9e469d42801007f9b4e617a4d34 java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm 716ef81de6147878ea1ff9c8dd9ea324f2de4b65216df9c95db9319cf51c230c java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3.i686.rpm b5d1c62ed70d1c1cb960e9896e876a6a27e5429cf2f8c41f603e7d57f8a9f42f java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm 6c6722f43edf530ad67c0778c866491c0aef703e26dbefc9ddc1f6857ecb1600 java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3.x86_64.rpm 00eaae7219cab8370c36f50b799786ca01cfbf299a34ce7d307ef1ee120768ab java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm ca56200f35f8228bbfb29a0d9c89ad9e580e275b30c3b228e512d703b6a272dd java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3.i686.rpm 995f62425703a173bea32d04971507b042d0d36eeb6fdb032c695f8a471d5c4a java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3.x86_64.rpm eca771e28f8e82bbffe0c740fd6be956be157380643d0959fc2dfd44f858b794 java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3.i686.rpm eb8c47a56da6401ccaac6096dee2748f37fe74f3b7ae39bac69de3495aa5c56a java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm 360abe6e43018ff4964fb71cb9b1fbf4dd9b9944ea9d2bfbd4ecbe9bdc00608a java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3.i686.rpm 53e7df3b218f9522fb054774b66a44b050fee2389249c1c9c03004fa7b02a173 java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3.x86_64.rpm c2299a3f9ad8bfe12774793563da01e076e5c98a74de81b49cbe8a55f80aa413 java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3.i686.rpm 10cebec92938e045f77848abd64225cddab79966794dc026a3d58d5e373deafa java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm 473b0bdcdbaf70deb36b34808a6eb81968c3997d60d78d6f761acfa0deb4d719 java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3.noarch.rpm 8df058a609ea6e8a7d660c0c9dce9f260e0fa5040de9f375081e1116e8963843 java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3.noarch.rpm c6170ee7c3056c116eb1ac878f989455b087edfdf1f00afa150bbd1dd80c142d java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3.noarch.rpm 3a6f2679d7b1c51c8a5f8d497ada36914fab880311eef66ed384b0947ee1146d java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3.noarch.rpm cc08abb15e61118c147cf42febd1d7b759680b6a3726fc4e1017a8d4fa106176 java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3.x86_64.rpm 4244b40b9d9d104764454e1f9f1346528e8a6c1b64734e97513c1f88b3d50b2b java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm Source: 3648961c8cb07f0426f5cb9b688737664afd5188095ee5630008c207a7f23274 java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
-
CentOS Errata and Security Advisory 2017:1789 Critical Upstream details at : https://access.redhat.com/errata/RHSA-2017:1789 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: f52e4ad097d13678088a4e75b78f77b16ca66c046c5783abcba212654dc36970 java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.i686.rpm 3a6e22d84f5abeec393247fc3cb1530ab93da5f068a002ba92ee861ae258d0e0 java-1.8.0-openjdk-debug-1.8.0.141-2.b16.el6_9.i686.rpm bffa9cb71ea43f4753a846b9450da2e8b7b81bd94e4484d809934cd17268e375 java-1.8.0-openjdk-demo-1.8.0.141-2.b16.el6_9.i686.rpm 4cce6815f6360c532d491d52e4b142a3309e8b57468609d597102b6d9e5cc7a6 java-1.8.0-openjdk-demo-debug-1.8.0.141-2.b16.el6_9.i686.rpm 54f92980aefab61f850923cf91d3f17fdc69e987d4ad84b3c490e2cd83ea31a6 java-1.8.0-openjdk-devel-1.8.0.141-2.b16.el6_9.i686.rpm fa7bb77a495ee1401e9951cb704a8660e86a374e67547173e4a07f16260a1285 java-1.8.0-openjdk-devel-debug-1.8.0.141-2.b16.el6_9.i686.rpm a4d3a7d676b3a1150eccb624eaf132094109ae644645b5e9fadf08a948f9dc97 java-1.8.0-openjdk-headless-1.8.0.141-2.b16.el6_9.i686.rpm 9ec95b88d7c6964e769e666451636934daa62a06a4de02dd979601f41d90bd0d java-1.8.0-openjdk-headless-debug-1.8.0.141-2.b16.el6_9.i686.rpm 4dba092ad163f12f2baa26b8df729a0ef48042290a0c4bb0820d0705a64615c7 java-1.8.0-openjdk-javadoc-1.8.0.141-2.b16.el6_9.noarch.rpm b2f21bbd6e97ad285088cdf254ae3bd3e80bc1fef92f53622852a35aaee625e3 java-1.8.0-openjdk-javadoc-debug-1.8.0.141-2.b16.el6_9.noarch.rpm 9ad05542df8705ca50458b913f87bf00d0e614e7fa4f61cafd2ef926b024bbe2 java-1.8.0-openjdk-src-1.8.0.141-2.b16.el6_9.i686.rpm 0a46d8e8f5f6ccd3423d6a88b806dbd9bba65cc8dae4afa0734a74e90c56fce8 java-1.8.0-openjdk-src-debug-1.8.0.141-2.b16.el6_9.i686.rpm x86_64: d6f873e3cf402ec86b6787e47d048f16ee0e46c479183c4a3ed91686e8dd3283 java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.x86_64.rpm 5cd11249fdfd267fe826a81e2f72db50f773874408a265654d24442f3567e5da java-1.8.0-openjdk-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm c007905d767920d1cd312a08b034abf1aae58e33a2ccb87f880e73ddb35f0a5e java-1.8.0-openjdk-demo-1.8.0.141-2.b16.el6_9.x86_64.rpm 0930f7131581917e8d038db37fa4f567ee2054729a201da3793c543efa9d5440 java-1.8.0-openjdk-demo-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm 8d86dc26bc1dbccc86f68facefac5a528c4471d69ab984f696f40e08a03e4f97 java-1.8.0-openjdk-devel-1.8.0.141-2.b16.el6_9.x86_64.rpm aaa7c5cc5b260277e471b65f26b5dfba40dc408091d5b35c8e1961907bc05da0 java-1.8.0-openjdk-devel-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm fb8f39171b2825b3c02ca0b3dd1933c20044fe43192db05125de3d487176ad4d java-1.8.0-openjdk-headless-1.8.0.141-2.b16.el6_9.x86_64.rpm fb65ce188c11cb677cab4c268511a648a065ea0aa74c319c519229a1ef8496c0 java-1.8.0-openjdk-headless-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm 4dba092ad163f12f2baa26b8df729a0ef48042290a0c4bb0820d0705a64615c7 java-1.8.0-openjdk-javadoc-1.8.0.141-2.b16.el6_9.noarch.rpm b2f21bbd6e97ad285088cdf254ae3bd3e80bc1fef92f53622852a35aaee625e3 java-1.8.0-openjdk-javadoc-debug-1.8.0.141-2.b16.el6_9.noarch.rpm 9168f6aa93be930be869f7f1eabb39fb5ff26768c4e70a6b7be73d2e43a4f1bb java-1.8.0-openjdk-src-1.8.0.141-2.b16.el6_9.x86_64.rpm b226fb799e77db44bcd875043d385a0863f027e98036bf05318ba68567a54a48 java-1.8.0-openjdk-src-debug-1.8.0.141-2.b16.el6_9.x86_64.rpm Source: 8661435a6023919fb61977e19566d75143a782482866ab55114873a83a1982dc java-1.8.0-openjdk-1.8.0.141-2.b16.el6_9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
-
[CentOS-announce] CESA-2017:1793 Important CentOS 7 graphite2 Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2017:1793 Important Upstream details at : https://access.redhat.com/errata/RHSA-2017:1793 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: c3e6a22ff94cc8f2dff08a00f4fb2bdf24dad7c113f2e92e57ab2d58f2395b0c graphite2-1.3.10-1.el7_3.i686.rpm 06cc9092a8016778f4708c4d6443e76e4bc628b047dc83af8155ee694e6035df graphite2-1.3.10-1.el7_3.x86_64.rpm 9b929a1b6f97f17de020928bc2d58db1d98a975bcbd49eccbc9e14ac240c061e graphite2-devel-1.3.10-1.el7_3.i686.rpm 0f0ffdc164dc72b02f7de2147b50b1db15f3c5597d6cd34de7788a4804c8da30 graphite2-devel-1.3.10-1.el7_3.x86_64.rpm Source: 346757f69f162461ef4a26d2e08994c53837f4858c5a64fc46d0e483f522f2b5 graphite2-1.3.10-1.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
SUSE Security Update: Security update for Linux Kernel Live Patch 18 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1922-1 Rating: important References: #1017589 #1025013 #1030575 #1031660 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has four fixes is now available. Description: This update for the Linux Kernel 3.12.60-52_63 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-1194=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-1194=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_63-default-6-3.1 kgraft-patch-3_12_60-52_63-xen-6-3.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_63-default-6-3.1 kgraft-patch-3_12_60-52_63-xen-6-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1017589 https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031660 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 4 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1923-1 Rating: important References: #1019079 #1025013 #1025254 #1030575 #1031481 #1031660 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves one vulnerability and has 6 fixes is now available. Description: This update for the Linux Kernel 4.4.38-93 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1197=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_38-93-default-6-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1019079 https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1025254 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 19 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1924-1 Rating: important References: #1025013 #1030575 #1031660 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has three fixes is now available. Description: This update for the Linux Kernel 3.12.61-52_66 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-1195=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-1195=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_61-52_66-default-5-3.1 kgraft-patch-3_12_61-52_66-xen-5-3.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_61-52_66-default-5-3.1 kgraft-patch-3_12_61-52_66-xen-5-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031660 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 6 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1925-1 Rating: important References: #1031481 #1031660 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update for the Linux Kernel 4.4.49-92_14 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1196=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_49-92_14-default-3-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title: * Kingston 32GB DataTraveler microDuo 3.0 *Link:* https://bigbruin.com/content/microduo-32gb_1 *Image (250x250):* https://bigbruin.com/images/articles/954/promo_1.jpg *Quote: * Given the extremely small size and the ability to connect via USB 3.0 and microUSB, the Kingston 32GB DataTraveler microDuo 3.0 is definitely a handy little flash drive to carry around. If your mobile device supports USB OTG (On-The-Go) you will be able to sync or backup your files with ease, and perhaps you could use it to free up some valuable storage space on your phone or tablet. Best regards, Jason www.bigbruin.com --
-
This is a follow-up to the End of Life warning sent earlier this month to confirm that as of today (July 20, 2017), Ubuntu 16.10 is no longer supported. No more package updates will be accepted to 16.10, and it will be archived to old-releases.ubuntu.com in the coming weeks. The original End of Life warning follows, with upgrade instructions: Ubuntu announced its 16.10 (Yakkety Yak) release almost 9 months ago, on October 13, 2016. As a non-LTS release, 16.10 has a 9-month support cycle and, as such, the support period is now nearing its end and Ubuntu 16.10 will reach end of life on Thursday, July 20th. At that time, Ubuntu Security Notices will no longer include information or updated packages for Ubuntu 16.10. The supported upgrade path from Ubuntu 16.10 is via Ubuntu 17.04. Instructions and caveats for the upgrade may be found at: https://help.ubuntu.com/community/ZestyUpgrades Ubuntu 17.04 continues to be actively supported with security updates and select high-impact bug fixes. Announcements of security updates for Ubuntu releases are sent to the ubuntu-security-announce mailing list, information about which may be found at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce Since its launch in October 2004 Ubuntu has become one of the most highly regarded Linux distributions with millions of users in homes, schools, businesses and governments around the world. Ubuntu is Open Source software, costs nothing to download, and users are free to customise or alter their software in order to meet their needs. On behalf of the Ubuntu Release Team, Adam Conrad --
-
Toshiba's XG5 NVMe SSD is shipping to the company's OEM partners now. We run it through our test suite to see if the company's newfangled 64-layer BiCS NAND helps it compete with the best in the business. Read more: http://techreport.com/review/32267/toshiba-xg5-1tb-nvme-ssd-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
-
SUSE Security Update: Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1910-1 Rating: important References: #1001487 #1012183 #1012759 #1012852 #1013543 #1014271 #1021417 #1025013 #1030575 #1031481 #1039496 #991667 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP1-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has 11 fixes is now available. Description: This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1189=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1189=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): kgraft-patch-3_12_62-60_64_8-default-9-3.1 kgraft-patch-3_12_62-60_64_8-xen-9-3.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64): kgraft-patch-3_12_62-60_64_8-default-9-3.1 kgraft-patch-3_12_62-60_64_8-xen-9-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1001487 https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012759 https://bugzilla.suse.com/1012852 https://bugzilla.suse.com/1013543 https://bugzilla.suse.com/1014271 https://bugzilla.suse.com/1021417 https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1039496 https://bugzilla.suse.com/991667 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 2 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1913-1 Rating: important References: #1013543 #1014271 #1019079 #1025013 #1025254 #1030575 #1031481 #1031660 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves one vulnerability and has 8 fixes is now available. Description: This update for the Linux Kernel 4.4.21-84 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1184=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-84-default-6-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1013543 https://bugzilla.suse.com/1014271 https://bugzilla.suse.com/1019079 https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1025254 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 22 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1912-1 Rating: important References: #1039348 #1039496 #1045340 #1045406 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has three fixes is now available. Description: This update for the Linux Kernel 3.12.61-52_77 fixes several issues. The following bugs were fixed: - CVE-2017-1000364: The previous fix for the stack gap increase tracked by CVE-2017-1000364 had a regression, which is fixed by this follow up patch. (bsc#1039496) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-1188=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-1188=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_61-52_77-default-2-2.1 kgraft-patch-3_12_61-52_77-xen-2-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_61-52_77-default-2-2.1 kgraft-patch-3_12_61-52_77-xen-2-2.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1039348 https://bugzilla.suse.com/1039496 https://bugzilla.suse.com/1045340 https://bugzilla.suse.com/1045406 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 3 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1914-1 Rating: important References: #1019079 #1025013 #1025254 #1030575 #1031481 #1031660 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves one vulnerability and has 6 fixes is now available. Description: This update for the Linux Kernel 4.4.21-90 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1185=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-90-default-6-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1019079 https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1025254 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 16 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1915-1 Rating: important References: #1039348 #1039496 #1045340 #1045406 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP1-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has three fixes is now available. Description: This update for the Linux Kernel 3.12.74-60_64_45 fixes several issues. The following bugs were fixed: - CVE-2017-1000364: The previous fix for the stack gap increase tracked by CVE-2017-1000364 had a regression, which is fixed by this follow up patch. (bsc#1039496) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1187=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1187=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): kgraft-patch-3_12_74-60_64_45-default-2-2.1 kgraft-patch-3_12_74-60_64_45-xen-2-2.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64): kgraft-patch-3_12_74-60_64_45-default-2-2.1 kgraft-patch-3_12_74-60_64_45-xen-2-2.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1039348 https://bugzilla.suse.com/1039496 https://bugzilla.suse.com/1045340 https://bugzilla.suse.com/1045406 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 9 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1909-1 Rating: important References: #1012183 #1012759 #1012852 #1013543 #1014271 #1021417 #1025013 #1025254 #1030575 #1031481 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP1-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has 10 fixes is now available. Description: This update for the Linux Kernel 3.12.67-60_64_18 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2017-1190=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-1190=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12-SP1 (x86_64): kgraft-patch-3_12_67-60_64_18-default-8-3.1 kgraft-patch-3_12_67-60_64_18-xen-8-3.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (x86_64): kgraft-patch-3_12_67-60_64_18-default-8-3.1 kgraft-patch-3_12_67-60_64_18-xen-8-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012759 https://bugzilla.suse.com/1012852 https://bugzilla.suse.com/1013543 https://bugzilla.suse.com/1014271 https://bugzilla.suse.com/1021417 https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1025254 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: 1MORE Triple Driver In-ears Link: https://www.techpowerup.com/reviews/1MORE/Triple_Driver Brief: 1MORE is one of the few companies that focuses on creating affordable quality in-ears. Even though the company is new, it has gained quite the following because they deliver in-ears with more drivers and accessories at a given price point than any of the older in-ear companies. Of course drivers are not everything. We put their Triple Driver in-ear under scrutiny to see if it can live up to the hype!
-
The Wine maintenance release 2.0.2 is now available. What's new in this release (see below for details): - Various bug fixes The source is available from the following locations: http://dl.winehq.org/wine/source/2.0/wine-2.0.2.tar.xz http://mirrors.ibiblio.org/wine/source/2.0/wine-2.0.2.tar.xz Binary packages for various distributions will be available from: http://www.winehq.org/download You will find documentation on http://www.winehq.org/documentation You can also get the current source directly from the git repository. Check http://www.winehq.org/git for details. Wine is available thanks to the work of many people. See the file AUTHORS in the distribution for the complete list. ---------------------------------------------------------------- Bugs fixed in 2.0.2 (total 62): 2624 In dialogs, an incorrect extra WM_ERASEBKGND is sent after WM_PAINT 10858 BlueByte Game Channel fails to install 14606 TreeView + right click doesn't work the way it does in native windows 20215 Extra mouse buttons do not work in Firefox 23302 Not standard background color in Wine configuration 25625 Implement PROPSHEET_InsertPage 30378 Xuzhou network client crashes at start 30764 regedit: a key created from right-click context menu is in incorrect position 33717 regedit: Sorting registry keys on refreshing 33987 Secret Files 3 demo shows only some parts of background in ConfigTool 35563 Custom game development library expects non-zero value for ProcessVmCounters info class member 'WorkingSetSize' 37404 A right click on a registry key does not select it 37976 Poedit 1.7.4 crashes on unimplemented function msvcr120.dll.??0_ReentrantBlockingLock ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) QAE ( -at -) XZ 39685 Multiple applications crash on startup, need unimplemented function msvcr120.dll.??0event ( -at -) Concurrency ( -at -) ( -at -) QAE ( -at -) XZ (Rollcage Redux v1.3.8, ARC client, Playstation Now) 39856 Regedit: Default registry key is not the same as on Windows 39895 MalwareBytes Anti-malware software needs msvcr100.dll.lldiv implementation 40629 Noto Nastaliq Urdu font crashes notepad during shaping 40798 ACDSee Pro 9 (64-bit) needs msvcr120.dll.??0event ( -at -) Concurrency ( -at -) ( -at -) QEAA ( -at -) XZ 40948 Multiple apps need api-ms-win-crt-locale-l1-1-0.dll.__initialize_lconv_for_unsigned_char 40956 unimplemented function msvcr110.dll._Lock_shared_ptr_spin_lock when starting Zoner Photo Studio 18 41408 Multiple applications crash on unimplemented function msvcp140.dll.??0task_continuation_context ( -at -) Concurrency ( -at -) ( -at -) AAE ( -at -) XZ 41472 kolotibablo needs ntoskrnl.exe.KeAcquireInStackQueuedSpinLock 41753 Steep (Ubisoft) needs iphlpapi.dll.GetUnicastIpAddressEntry 41928 Mortal Kombat X needs msvcr110.dll._get_dstbias 42017 Silence d3d11_immediate_context_OMSetBlendState spam at console 42129 Steam client - unimplemented function mfreadwrite.dll.MFCreateSourceReaderFromMediaSource 42138 bug when running reaktor 6: "Unhandled exception: unimplemented function concrt140.dll.??0_ReentrantBlockingLock ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) QAE ( -at -) XZ called in 32-bit code (0x7b43bf1c)." 42206 Gauntlet character screen background is corrupted. 42209 Native Instruments Native Access 1.0.25 (R37) crashes on unimplemented function concrt140.dll.??1_ReentrantBlockingLock ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) QAE ( -at -) XZ 42239 Kontact 5.6 needs api-ms-win-crt-time-l1-1-0.dll._Wcsftime 42240 Kontact 5.6 needs concrt140.dll.??0_ReentrantBlockingLock ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) QEAA ( -at -) XZ 42271 Final Fantasy X needs msvcr110.dll.__crtUnhandledException 42449 Multiple apps need function msvcr120.dll.fesetround (0 A.D., BeamNG.drive) 42463 ZmLearn crash at startup: "Assertion 'm->state == STATE_PASSIVE' failed at pulse/mainloop.c:787, function pa_mainloop_prepare(). Aborting." 42465 winhttp set_cookies() violates RFC6265 string comparison rules 42487 Free Devanagari font Samanata crashes during GPOS processing 42490 Assertion failure when clicking boxes in altWinDirStat 42510 InternetOpenUrl does not send query parameters for HTTPS urls 42559 Adobe Reader DC: No longer installs (Unimplemented function msi.dll.MsiGetComponentPathExW) 42575 Multiple applications need msvcp140.dll.?_LogScheduleTask ( -at -) _TaskEventLogger ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) QAEX_N ( -at -) Z 42576 Poedit crashes on start on unimplemented function msvcp140.dll.?_Reset ( -at -) _ContextCallback ( -at -) details ( -at -) Concurrency ( -at -) ( -at -) AAEXXZ 42578 WSAStringToAddress fails to parse IP v6 addresses with port number 42626 unimplemented function msvcr110.dll.__crtUnhandledException 42651 ViStart: fails to install, needs ntoskrnl.exe.IoReportResourceForDetection 42655 Aliens vs. Predator (2010) needs d3dx11_42.dll.D3DX11FilterTexture 42657 ACDSee Pro 9 needs msvcr120.dll.?Alloc ( -at -) Concurrency ( -at -) ( -at -) YAPEAX_K ( -at -) Z 42658 Playstation Now needs msvcr120.dll.?Alloc ( -at -) Concurrency ( -at -) ( -at -) YAPAXI ( -at -) Z 42688 Native Acces crashes on unimplemented msvcp140.dll.?__ExceptionPtrCompare ( -at -) ( -at -) YA_NPBX0 ( -at -) Z 42703 Excel 2010 does not work: unimplemented function oleaut32.dll.GetAltMonthNames 42736 scanf doesn't work as expected when using format string contains non-ascii chars 42774 WinHttpQueryAuthSchemes fails to return the correct supported value for multiple WWW-Authenticate 42798 MsiGetPatchInfoEx returns incorrect values for UNINSTALLABLE, PATCHSTATE properties 42834 Steuer-Spar-Erklärung 2017 crashes with critical error 42876 iTunes needs function msvcp140.dll._Lock_shared_ptr_spin_lock 42986 wine can't be compiled by gcc-2.95.4 (amstream/mediastream.c) 42991 wine can't be compiled by gcc-2.95.4 (dmusic/port.c) 42992 wine can't be compiled by gcc-2.95.4 (dwrite/opentype.c) 42993 wine can't be compiled by gcc-2.95.4 (gdiplus/metafile.c) 42994 wine can't be compiled by gcc-2.95.4 (mscoree/assembly.c) 42995 wine can't be compiled by gcc-2.95.4 (netprofm/list.c) 43127 Multiple 64-bit applications crash with stack overflow errors when Wine is compiled with GCC 7.x (set_context_reg in ntdll/signal_x86_64.c assumes Xmm registers are aligned) 43315 Steam fails to start [After update Thu, 06 Jul 2017] ---------------------------------------------------------------- Changes since 2.0.1: Alex Henrie (8): winecfg: Paint text on About tab with the right background color. ntdll: Implement ProcessVmCounters for Linux. user32: Translate WM_(NC)XBUTTONUP to WM_APPCOMMAND in DefWindowProc. comctl32: Return TRUE from LVM_REDRAWITEMS with bad indices. ddraw: Don't crash if writing out a new ddraw2 surface segfaults. ddraw: Don't crash if writing out a new ddraw4 surface segfaults. ddraw: Don't crash if writing out a new ddraw7 surface segfaults. ddraw: Validate the "surface" pointer before creating the surface in CreateSurface(). Alistair Leslie-Hughes (3): winhttp/tests: Added multi Authenticate header test. include: Add mfreadwrite.idl. mfreadwrite: Add MFCreateSourceReaderFromMediaSource stub. Andrey Gusev (1): d3dx11: Add D3DX11FilterTexture stub. André Hentschel (4): include: Add the new version of the IP_ADAPTER_UNICAST_ADDRESS structure. iphlpapi: Add GetUnicastIpAddressEntry implementation. hidclass.sys: Fix compilation on systems that don't support nameless structs. winebus.sys: Fix compilation on systems that don't support nameless structs. Aric Stewart (1): usp10: Fix Contextual Shaping for Languages with RTL write order. Austin English (2): ntoskrnl.exe: Add KeAcquireInStackQueuedSpinLock stub. ntoskrnl.exe: Add IoReportResourceForDetection stub. Björn Bidar (1): wined3d: Add NVIDIA GTX 1080 Ti to the GPU list. Bruno Jesus (3): ws2_32/tests: Rework WSAStringToAddress tests. ws2_32: Fix WSAStringToAddress parsing for IPv6. ws2_32: Turn SIO_GET_EXTENSION_FUNCTION_POINTER into a table. Christopher Berner (1): wined3d: Add Nvidia TitanX (Pascal). Daniel Lehman (1): msvcrt: Add Concurrency::event stubs. Fabian Maurer (5): user32/tests: Add tests for windows when first shown with WS_VISIBLE or RedrawWindow. user32/tests: Add tests for windows when first shown with SetWindowPos. user32/tests: Add tests for windows when first shown if they have children. user32/tests: Add WM_NCPAINT tests for windows crossing screen or maximized. user32: Send WM_NCPAINT and WM_ERASEBKGND when window is shown. Gijs Vermeulen (1): msvcrt: Add stub for Concurrency::Alloc. Hans Leidekker (7): msi: Implement MsiGetComponentPathExA/W. winhttp: Parse cookie attributes. winhttp: Cookie attributes are case-insensitive. winhttp: Ignore unknown schemes in WinHttpQueryAuthSchemes. msi: Properly handle DWORD registry values in MsiGetPatchInfoEx. netprofm: Fix compilation on systems that don't support nameless unions. winhttp: Fix a memory leak in insert_header (Valgrind). Hugh McMaster (4): comctl32: Improve right-click handling in treeview controls. regedit: Call TrackPopupMenu() from WM_CONTEXTMENU. regedit: Select the targeted treeview item on right mouse click. regedit: Sort treeview children on refresh. Huw D. M. Davies (1): shell32: Avoid leaking icon handles. Jacek Caban (1): msvcrt: Added lldiv implementation. Jakub Bartmiński (1): regedit: Fall back to tree root on invalid path. Józef Kucia (11): d3d11: Try to avoid spurious blend state FIXMEs(). wined3d: Add ARB_texture_buffer_object extension. wined3d: Create dummy buffer textures. wined3d: Add initial support for shader buffer views. wined3d: Do not pass LOD to texelFetch() for buffer resources. wined3d: Implement buffer samplers. amstream: Fix compilation on systems that don't support nameless unions. dmusic: Fix compilation on systems that don't support nameless structs or unions. mscoree: Fix compilation on systems that don't support nameless unions. gdiplus: Fix compilation on systems that don't support nameless unions. dxgi: Fix HMODULE leak in register_d3d10core_layers(). Kimmo Myllyvirta (1): ws2_32: Set return size when calling WSAIoctl with WS_SIO_GET_EXTENSION_FUNCTION_POINTER. Michael Müller (2): cabinet: Set index of folder in FDICopy callback. wininet: Handle query parameters for HTTPS urls in InternetOpenUrlW. Michael Stefaniuc (1): dmloader: Avoid a crash on a NULL string pointer. Nikolay Sivov (8): oleaut32: Implement GetAltMonthNames(). dwrite: Make CreateFontFaceFromHdc() properly fail on unsupported font format. regedit: Sort each of top level branches separately. usp10: Ignore device tables with invalid delta format. dwrite: Fix compilation failure regarding nameless unions. schedsvc: Fix xml buffer leak (Valgrind). dwrite: Fix file object leak. shell32: Fix string leak. Peter Hater (1): comctl32/propsheet: Added PSM_INSERTPAGE implementation. Piotr Caban (16): msvcp110: Add _Lock_shared_ptr_spin_lock implementation. msvcp140: Add task_continuation_context constructor implementation. msvcp140: Add _ContextCallback implementation. msvcp140: Add _TaskEventLogger class implementation. msvcr: Add _Wcsftime implementation. msvcr100: Add reader_writer_lock class stub. msvcr100: Add _ReentrantBlockingLock class implementation. msvcrt: Add __ExceptionPtrCopyException implementation. msvcrt: Add __ExceptionPtrCompare implementation. msvcr: Add __crtUnhandledException implementation. msvcr120: Add fesetround implementation. msvcrt: Fix handling of unsigned chars in scanf format. msvcrt: Fix wide characters handling in wscanf functions. msvcr: Add _get_dstbias implementation. ucrtbase: Add __initialize_lconv_for_unsigned_char implementation. msvcr110: Add _Lock_shared_ptr_spin_lock implementation. Sebastian Lackner (3): rasapi32: Set *lpcDevices in RasEnumDevicesA. ntdll: Do not cast unaligned pointer to M128A in set_context_reg. mmdevapi: Use InitOnce to initialize audio drivers. Thierry Vermeylen (1): wnaspi32: Do not crash on SC_GETSET_TIMEOUTS. Viktor Semykin (2): windowscodecs/tests: Test for png codec seeking too far. windowscodecs: Fixed loading png from streams. -- Michael Stefaniuc mstefani ( -at -) winehq.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 0 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1908-1 Rating: important References: #1008284 #1012183 #1012759 #1012852 #1013543 #1014271 #1019079 #1025013 #1025254 #1030575 #1031481 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves one vulnerability and has 11 fixes is now available. Description: This update for the Linux Kernel 4.4.21-69 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1182=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-69-default-7-21.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1008284 https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012759 https://bugzilla.suse.com/1012852 https://bugzilla.suse.com/1013543 https://bugzilla.suse.com/1014271 https://bugzilla.suse.com/1019079 https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1025254 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 1 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1907-1 Rating: important References: #1012183 #1012759 #1012852 #1013543 #1014271 #1019079 #1025013 #1025254 #1030575 #1031481 #1039496 Cross-References: CVE-2017-1000364 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves one vulnerability and has 10 fixes is now available. Description: This update for the Linux Kernel 4.4.21-81 fixes several issues. The following security bugs were fixed: - CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed) (bsc#1039496). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-1183=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-81-default-7-3.1 References: https://www.suse.com/security/cve/CVE-2017-1000364.html https://bugzilla.suse.com/1012183 https://bugzilla.suse.com/1012759 https://bugzilla.suse.com/1012852 https://bugzilla.suse.com/1013543 https://bugzilla.suse.com/1014271 https://bugzilla.suse.com/1019079 https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1025254 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1039496 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
ThruNite TN12 (2016) XP-L v6 LED Tactical Flashlight Review @ Legit Reviews
news posted a topic in Upcoming News
Today we are taking a break looking at PC hardware and are going to be taking a look at a tactical flashlight by ThruNite. ThruNite, which is short for ‘Through Night’, is a Chinese company that was founded in 2009 that has striven to become a leader in LED products.This new to us company got our attention as did the popular ThruNite TN12 2016 XP-L LED flashlight model, which is rated at 1100 ANSI lumen and has an all metal enclosure. Read on to see what we think of this model! Article Title: ThruNite TN12 (2016) XP-L v6 LED Tactical Flashlight Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/thrunite-tn12-2016-xpl-v6-led-tactical-flashlight-review_190644 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =