news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hi, All RC bugs have been tagged with either "stretch-can-defer" or "stretch-will-remove". If a package has an RC bug tagged "stretch-will-remove", then it will be manually removed from stretch next week (unless it is fixed and the fix migrates to stretch before the deadline on Friday, 2017-07-09) You can find all RC bugs tagged "stretch-will-remove" via this link: https://udd.debian.org/bugs/?release=stretch&merged=ign&rtstretch-will-remove=only&fnewerval=7&flastmodval=7&rc=1&chints=1&cdeferred=1&caffected=1&sortby=id&sorto=asc&format=html#results With the deadline for fixes being what it is, please keep in mind that: ======================================================================= * Assume that the Release Team want your package to have at least 2 days in unstable before they are migrated (via a "age-days 2" hint) * Uploads processed /after/ the 13:52 UTC dinstall Wednesday, 2017-06-07 will *not* be able to reach 2 days in testing before the deadline. * Packages uploaded before this deadline will have a very limited time to be tested, so only very small, targeted fixes can be considered. * Accordingly, we are at the point where NMUs have to be without delay to make it in stretch. (Please NMU responsibly) * If your changes are covered by the list in "Please keep changes limited to", then upload first and file an unblock after. A pre-approval round trip will cost us significant time that is better spent having the package in unstable. Uploads with changes not covered by that list will be rejected, so there is no point in asking for pre-approval or unblocks for those changes. Please keep changes limited to: =============================== * RC bugs * Patches for crashes/memory leaks/etc. * Security bug fixes * Regressions compared to jessie or a previous upload to stretch * jessie to stretch upgrade issues * Translation updates If your changes include anything beyond that and an update to d/changelog, then we will probably ask you to reupload without such changes or simply reject the entire changeset. Mini-FAQ ======== Q: What if my upload misses the deadline? A: The upload will not be included in the initial stretch release. - If the package has an unfixed RC bug tagged "stretch-will-remove", the package will be removed from stretch prior to the release. - Otherwise, the package will be included in the release. Please consider whether the bug should be fixed in a stable update (e.g. 9.1) Q: Can an upload after 13:52 UTC dinstall Wednesday, 2017-06-07 still make it into stretch? A: Assume no. Q: Can I assume that my upload will be included if it is unblocked AND and in unstable before 13:52 UTC dinstall Wednesday, 2017-06-07? A: No. We often unblock uploads pre-emptively before buildds and piuparts test have run. If they report back regressions (or simply do not have capacity before the migration deadline), they will stop the migration. Q: My package got a (new) RC bug, which is not tagged "stretch-can-defer" OR "stretch-will-remove". What will happen to it? A: It will generally receive a "stretch-can-defer". For the Release Team, Niels -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEsxMaRR2/33ygW0GXBUu7n32AZEIFAlk0Z0IACgkQBUu7n32A ZEJGqw/+Mv4nsTN+7j24lrTCRIARSARfpWDvgvFKk+mfdTmIa5FfcTzcayUjXxVp YZiwQeDG0y0CEs6IMLat75gbXdDQuNF6t1R4P/la1fsPzV4AlBsgzp95srsTI4jz KmTCqbJluNcqF0/cWP8jX/N1njkKLsq41vOa0Fchoo3NsT/p+Bmco8s4A1wNPjWm FLrcpb+7JMGnC2ThFTU0E68lJhIwGMLrevHlhZs8OdKPKdZDwzyFp7AGVmfbejuC i9962QzMxWd3mAb0q55kEEezENmJUeE5jk5n5FrsmFLbzrYUesYO6ey3nueYQuGH Y7xgO4srBciyB2CXutjzRUdXY6GOSofIcqaB89TpssYt6rGDJ6DvA+0I6BtqwbYi F7EOVzOqzJQqeofw2wfbQyYoCXOoKmXrMC8o8kEsgLIUCZm834ymD2x4xvI9BBOM ETmGJSF1i1toZbpZYwvKu4MV2znaPRHkWF+fPu3rwFbCA+quA443COP+w3ZAHxti Q0Wdit8/sAA5jlMKbxAhaxO/nFUrA4L3+O0sG+F5Xd7bVjtbUkuw0JgOTne+QaEC 8dTDmImE0suQPd4v+/ygbT0HdRNMqOZxLBeNDh5PWqElv0U1ZcnE9BHFQs+TWDdd TsHjm4BlqLtVBQuqgFGfNzIQjWTITSZtbsmr/o3u+dow7rRlPIs= =+ilY -----END PGP SIGNATURE-----
-
-------- ROCCAT KONE PURE OWL-EYE OPTICAL MOUSE REVIEW ( -at -) APH NETWORKS -------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: ROCCAT Kone Pure Owl-Eye Optical Mouse Review ( -at -) APH Networks * Description: The ROCCAT Kone Pure Owl-Eye is everything we loved from the Kone EMP in an agile package. * Link: http://aphnetworks.com/reviews/roccat-kone-pure-owl-eye * Image: http://aphnetworks.com/review/roccat-kone-pure-owl-eye/003.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
-
-------- ROCCAT KONE PURE OWL-EYE OPTICAL MOUSE REVIEW ( -at -) APH NETWORKS -------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: ROCCAT Kone Pure Owl-Eye Optical Mouse Review ( -at -) APH Networks * Description: The ROCCAT Kone Pure Owl-Eye is everything we loved from the Kone EMP in an agile package. * Link: http://aphnetworks.com/reviews/roccat-kone-pure-owl-eye * Image: http://aphnetworks.com/review/roccat-kone-pure-owl-eye/003.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
-
-------- LINKSYS WRT3200ACM WIRELESS ROUTER REVIEW ( -at -) APH NETWORKS ------------ Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: Linksys WRT3200ACM Wireless Router Review ( -at -) APH Networks * Description: The Linksys WRT3200ACM is a reborn of the famous WRT54G, and lives up to its legacy by offering solid Wi-Fi performance along with open source firmware support. * Link: http://aphnetworks.com/reviews/linksys-wrt3200acm * Image: http://aphnetworks.com/review/linksys-wrt3200acm/007.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
-
View this email in your browser (http://mailchi.mp/9a7e5a35a02a/biostar-z270gtn-mitx-motherboard-review?e=8138df6da5) ** Benchmark Reviews Presents: ------------------------------------------------------------ TITLE: BIOSTAR Z270GTN mITX Motherboard Review (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=dcfa580a9b&e=8138df6da5) QUOTE: Mini-ITX (mITX) motherboards, once nice products for HTPCs and the like, are becoming mainstream as the need for multiple PCI-E slots wanes. Today Benchmark Reviews has Biostar’s new Z270GTN Racing mITX motherboard, and it’s aimed squarely at the enthusiast and gamer market with features like solid state capacitors, onboard RGB LED lighting and control, and m.2 and u.2 storage connectors. LINK: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=5f84abfc34&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=b8728c2562&e=8138df6da5 ============================================================ ** (http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=97f2d78d42&e=8138df6da5) ** (http://benchmarkreviews.us10.list-manage2.com/track/click?u=9a2f239b17114c9008e3dfda9&id=d8de9dee46&e=8138df6da5) ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=7ba271c3f1&e=8138df6da5)
-
Nixeus EDG 27 IPS Freesync 144Hz Gaming Monitor Review: Hitting The Sweet Spot
news posted a topic in Upcoming News
View this email in your browser (http://mailchi.mp/hothardware/intel-optane-memory-with-3d-xpoint-review-easy-robust-pc-acceleration-1082797?e=0c004f9c13) Los Angeles-based Nixeus has been working with AMD on FreeSync since the project’s inception. Nixeus was among the first companies to offer anaffordable, Full-HD FreeSync monitor with a wide adaptive-sync frequency range and one of Nixeus’ monitors was used in AMD’s initial FreeSync demos all the way back in 2014. Now the company is readying a brand-new FreeSync-compatible display, the Nixeus EDG 27, that features an IPS panel, 2560x1440 WQHD resolution, and a price point that undercuts competing offerings... Nixeus EDG 27 IPS Freesync 144Hz Gaming Monitor Review: Hitting The Sweet Spot (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=b52d880ac4&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=74bf238c7f&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=24f2349c82&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=376f23faf1&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=282de0463d&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=3c0d43df29&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=c56759d368&e=0c004f9c13 ============================================================ -
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: 51 GPUs Tested, From The Radeon HD 2900XT To RX 580 & R9 Fury: Testing The 2017 Linux Driver Stack ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=24724 Summary: "It's that time of the year where we see how the open-source AMD Linux graphics driver stack is working on past and present hardware in a large GPU comparison with various OpenGL games and workloads. This year we go from the new Radeon RX 580 all the way back to the Radeon HD 2900XT, looking at how the mature Radeon DRM kernel driver and R600 Gallium3D driver is working for aging ATI/AMD graphics hardware. In total there were 51 graphics cards tested for this comparison of Radeon cards as well as NVIDIA GeForce hardware for reference." Please feel free to contact us with any questions or comments you may
-
Case Mod Friday: Arctic ( -at -) ThinkComputers.org Feature Link: http://www.thinkcomputers.org/case-mod-friday-arctic/ Image URL: http://www.thinkcomputers.org/articles/casemodfriday/arctic-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/casemodfriday/arctic-small.jpg Quote: "This week for Case Mod Friday we have another build for the guys at GGF Lan Party. They have done an very impressive build inside of the In Win 301 with complex water cooling and of course that GGF Lan Party style we all love!"
-
*Gigabyte GeForce GTX 1080 AORUS 11 Gbps review* We review the latest iteration of the GeForce GTX 1080 AORUS 8G fitted with faster 11 Gbps memory. This card is custom cooled and tweaked with super fast. Let's check out the new 8 GB model from Gigabyte, the GTX 1080 AORUS 11 Gbps with 11,008 MHz clocked memory. Read our full review here <http://www.guru3d.com/articles-pages/gigabyte-geforce-gtx-1080-aorus-11-gbps-review,1.html>'>http://www.guru3d.com/articles-pages/gigabyte-geforce-gtx-1080-aorus-11-gbps-review,1.html> : URL: http://www.guru3d.com/articles-pages/gigabyte-geforce-gtx-1080-aorus-11-gbps-review,1.html <http://www.guru3d.com/articles-pages/gigabyte-geforce-gtx-1080-aorus-11-gbps-review,1.html> --
-
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Asus Strix GTX 1080 11Gbps ( -at -) LanOC Reviews <https://lanoc.org/review/video-cards/7547-asus-strix-gtx-1080-11gbps> *DESCRIPTION:* While getting components in for an upcoming build, Asus sent over their new GTX 1080 that is running the new 11Gbps memory from the 1080 Ti. I couldn’t just have the card come into the office without taking a closer look. I was really digging what Asus had going on with the Strix RX 570 that I took a look at, so today I’m going to see what they have to offer in the Strix GTX 1080 11Gbps and then run it through all of our normal testing to see how it performs as well as how it compares to the similar MSI card that already covered. *ARTICLE URL:* https://lanoc.org/review/video-cards/7547-asus-strix-gtx-1080-11gbps *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/asus_gtx1080_11gbps/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/asus_gtx1080_11gbps/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
-
** AMD Ryzen 7 1700 5-Way Cooler Comparison ------------------------------------------------------------ ------------------------------------------------------------ http://mailchi.mp/kitguru/amd-ryzen-7-1700-5-way-cooler-comparison?e=872093acb5 http://www.kitguru.net ** AMD Ryzen 7 1700 5-Way Cooler Comparison ------------------------------------------------------------ At this point, AMD’s Ryzen processors have been on the market for nearly 3 months. It’s taken a while for some companies to catch up, but we are getting to a position where most, if not all, CPU coolers now support AM4 either out-of-the-box or with an additional bracket. With that being said, we thought it is high time to get some coolers in and see which is best for your Ryzen processor. Read the review here: https://www.kitguru.net/components/cooling/dominic-moass/amd-ryzen-7-1700-5-way-cooler-comparison/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=fe8f2cef7f&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
[security-announce] openSUSE-SU-2017:1475-1: important: Security update for mariadb
news posted a topic in Upcoming News
openSUSE Security Update: Security update for mariadb ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1475-1 Rating: important References: #1020868 #1020890 #1020976 #1022428 #1034911 #1038740 #996821 Cross-References: CVE-2017-3302 CVE-2017-3313 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that solves two vulnerabilities and has 5 fixes is now available. Description: This update for mariadb fixes the following issues: - update to MariaDB 10.0.30 GA * notable changes: * XtraDB updated to 5.6.35-80.0 * TokuDB updated to 5.6.35-80.0 * PCRE updated to 8.40 * MDEV-11027: better InnoDB crash recovery progress reporting * MDEV-11520: improvements to how InnoDB data files are extended * Improvements to InnoDB startup/shutdown to make it more robust * MDEV-11233: fix for FULLTEXT index crash * MDEV-6143: MariaDB Linux binary tarballs will now always untar to directories that match their filename * release notes and changelog: * https://kb.askmonty.org/en/mariadb-10030-release-notes * https://kb.askmonty.org/en/mariadb-10030-changelog * fixes the following CVEs: CVE-2017-3313: unspecified vulnerability affecting the InnoDB component [bsc#1020890] CVE-2017-3302: Use after free in libmysqlclient.so [bsc#1022428] - set the default umask to 077 in mysql-systemd-helper [bsc#1020976] - [bsc#1034911] - tracker bug * fixes also [bsc#1020868] This update for mariadb fixes permissions for /var/run/mysql in mysql-systemd-helper that were incorrectly set to 700 instead of 755 due to umask. This prevented non-root users from connecting to the database. This update was imported from the SUSE:SLE-12-SP1:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-644=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): libmysqlclient-devel-10.0.30-20.4.1 libmysqlclient18-10.0.30-20.4.1 libmysqlclient18-debuginfo-10.0.30-20.4.1 libmysqlclient_r18-10.0.30-20.4.1 libmysqld-devel-10.0.30-20.4.1 libmysqld18-10.0.30-20.4.1 libmysqld18-debuginfo-10.0.30-20.4.1 mariadb-10.0.30-20.4.1 mariadb-bench-10.0.30-20.4.1 mariadb-bench-debuginfo-10.0.30-20.4.1 mariadb-client-10.0.30-20.4.1 mariadb-client-debuginfo-10.0.30-20.4.1 mariadb-debuginfo-10.0.30-20.4.1 mariadb-debugsource-10.0.30-20.4.1 mariadb-errormessages-10.0.30-20.4.1 mariadb-test-10.0.30-20.4.1 mariadb-test-debuginfo-10.0.30-20.4.1 mariadb-tools-10.0.30-20.4.1 mariadb-tools-debuginfo-10.0.30-20.4.1 - openSUSE Leap 42.2 (x86_64): libmysqlclient18-32bit-10.0.30-20.4.1 libmysqlclient18-debuginfo-32bit-10.0.30-20.4.1 libmysqlclient_r18-32bit-10.0.30-20.4.1 References: https://www.suse.com/security/cve/CVE-2017-3302.html https://www.suse.com/security/cve/CVE-2017-3313.html https://bugzilla.suse.com/1020868 https://bugzilla.suse.com/1020890 https://bugzilla.suse.com/1020976 https://bugzilla.suse.com/1022428 https://bugzilla.suse.com/1034911 https://bugzilla.suse.com/1038740 https://bugzilla.suse.com/996821 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : strongswan Version : 4.5.2-1.5+deb7u9 CVE ID : CVE-2017-9022 CVE-2017-9023 Two denial of service vulnerabilities were identified in strongSwan, an IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project. CVE-2017-9022 RSA public keys passed to the gmp plugin aren't validated sufficiently before attempting signature verification, so that invalid input might lead to a floating point exception and crash of the process. A certificate with an appropriately prepared public key sent by a peer could be used for a denial-of-service attack. CVE-2017-9023 ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when parsing X.509 certificates with extensions that use such types. This could lead to infinite looping of the thread parsing a specifically crafted certificate. For Debian 7 "Wheezy", these problems have been fixed in version 4.5.2-1.5+deb7u9. We recommend that you upgrade your strongswan packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEl0WwInMjgf6efq/1bdtT8qZ1wKUFAlkwan8ACgkQbdtT8qZ1 wKX8kwf9HD1z1N3o/atabA6uCRDWMWpyjkbBrYwZ1e8JUoAwaARORGeYCrh9OrKl zQCEc9J8ljyyMHj/XwyyWd4+sRldH9VSQAmq1zDLddFkQS5pQu15QwCQJrV07Bhd e5LzJ0o7rOB/vf4sM57qcEI2rwPgZnTDiNZjRVhSJXJUZKCxdWHcoN/su2cHGG2d 6A5/C8d1FBB2xFPf/1otDgAcZ57qaSQcpJbdLpnO0C4bif74NeV8JmYyDBk7TyyT YELcqBSab8TTFMESkxJ17SZrn6L6OSKDMO4Df306Gxf+m0FKu3CMH/b7Ehu9+h0A Fhyj6n23MaS6hu6Lfoln0ipiO7yAKg== =sUzv -----END PGP SIGNATURE-----
-
SUSE Security Update: Security update for strongswan ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1471-1 Rating: important References: #1039514 #1039515 Cross-References: CVE-2017-9022 CVE-2017-9023 Affected Products: SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for strongswan fixes the following issues: - CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514) - CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service (bsc#1039515) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-strongswan-13136=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-strongswan-13136=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): strongswan-4.4.0-6.35.1 strongswan-doc-4.4.0-6.35.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): strongswan-debuginfo-4.4.0-6.35.1 strongswan-debugsource-4.4.0-6.35.1 References: https://www.suse.com/security/cve/CVE-2017-9022.html https://www.suse.com/security/cve/CVE-2017-9023.html https://bugzilla.suse.com/1039514 https://bugzilla.suse.com/1039515 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
[security-announce] SUSE-SU-2017:1471-1: important: Security update for strongswan
news posted a topic in Upcoming News
SUSE Security Update: Security update for strongswan ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1471-1 Rating: important References: #1039514 #1039515 Cross-References: CVE-2017-9022 CVE-2017-9023 Affected Products: SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for strongswan fixes the following issues: - CVE-2017-9022: Insufficient Input Validation in gmp Plugin leads to Denial of service (bsc#1039514) - CVE-2017-9023: Incorrect x509 ASN.1 parser error handling could lead to Denial of service (bsc#1039515) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-strongswan-13136=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-strongswan-13136=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): strongswan-4.4.0-6.35.1 strongswan-doc-4.4.0-6.35.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): strongswan-debuginfo-4.4.0-6.35.1 strongswan-debugsource-4.4.0-6.35.1 References: https://www.suse.com/security/cve/CVE-2017-9022.html https://www.suse.com/security/cve/CVE-2017-9023.html https://bugzilla.suse.com/1039514 https://bugzilla.suse.com/1039515 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
PowerColor Red Devl Radeon RX 580 Video Card Review @ Hardware Asylum
news posted a topic in Upcoming News
Visit Hardware Asylum - http://www.hardwareasylum.com body { margin: 0px; padding: 10px; text-align: left; background-color: #FFF; } #header { vertical-align: top; height: 80px; } #footer { font-family: arial, Helvetica, sans-serif; font-size: 10px; color: #000; margin-top: 5px; padding: 3px; } .titletext { font-family: Arial, Helvetica, sans-serif; font-size: 18px; font-weight: bold; color: #852222; } .subtitletext { font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #9E9E9E; } .bodytext { font-family: Arial, Helvetica, sans-serif; font-size: 14px; color: #000000; } .smalltext { font-family: Arial, Helvetica, sans-serif; font-size: 11px; color: #9E9E9E; } b { font-weight: bold; } i { font-style: italic; } a { color: #C00; } Hello Everyone,It may not be a Devil 13 or be overclockable to the moon but, it looks amazing. #justsayinSubject: PowerColor Red Devil Radeon RX 580 Video Card Review ( -at -) Hardware AsylumURL: http://www.hardwareasylum.com/reviews/video/pc-axrx580-8gbd5Quote: The Devil line of graphics cards have enjoyed a cult following with enthusiasts due to some very creative marketing, outlandish pricetags and amazing designs. We talk about them a lot on the podcast because of this and even though they may not be the best cards out there they have the best story to tell.A news posting would be appreciatedThanksDennis Garciahttp://www.hardwareasylum.com To no longer receive these types of emails please send a copy of this message to us at support ( -at -) hardwareasylum.com and we'll remove you from the list. Copyright © Hardware Asylum 1999-2013 All rights reserved -
** TECHSPOT ------------------------------------------------------------ ** Corsair One Review ------------------------------------------------------------ ** http://www.techspot.com/review/1406-corsair-one/ ------------------------------------------------------------ The Corsair One is the ultimate compact gaming PC. I've looked at several pre-built small form factor systems over the years, and none are as well built or as powerful as this Corsair system. If you have the money and you'd rather not build your own system, the One is genuinely the leading contender on the market. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
ASUS GTX 1080 ROG Strix OC 11Gbps Review ------------------------------------------------------------ http://mailchi.mp/kitguru/asus-gtx-1080-rog-strix-oc-11gbps-review?e=872093acb5 http://www.kitguru.net ASUS GTX 1080 ROG Strix OC 11Gbps Review Nvidia graphics card partners have refreshed a number of GTX 1080 models to take advantage of faster 11Gbps Micron memory. ASUS were one of the first companies to participate in the new scheme from Nvidia that was announced at its 2017 GDC conference. Read the review here: https://www.kitguru.net/components/graphic-cards/ryan-martin/asus-gtx-1080-rog-strix-oc-11gbps-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=cb62929be4&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
SUSE Security Update: Security update for libtirpc, rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1468-1 Rating: important References: #1037559 Cross-References: CVE-2017-8779 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for libtirpc and rpcbind fixes the following issues: - CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-libtirpc-13135=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-libtirpc-13135=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-libtirpc-13135=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-libtirpc-13135=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-libtirpc-13135=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-libtirpc-13135=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc-devel-0.2.1-1.12.3 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc-debuginfo-0.2.1-1.12.3 libtirpc-debugsource-0.2.1-1.12.3 rpcbind-debuginfo-0.1.6+git20080930-6.27.2 rpcbind-debugsource-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): libtirpc-debuginfo-0.2.1-1.12.3 libtirpc-debugsource-0.2.1-1.12.3 rpcbind-debuginfo-0.1.6+git20080930-6.27.2 rpcbind-debugsource-0.1.6+git20080930-6.27.2 References: https://www.suse.com/security/cve/CVE-2017-8779.html https://bugzilla.suse.com/1037559 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for libtirpc, rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1468-1 Rating: important References: #1037559 Cross-References: CVE-2017-8779 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for libtirpc and rpcbind fixes the following issues: - CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-libtirpc-13135=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-libtirpc-13135=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-libtirpc-13135=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-libtirpc-13135=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-libtirpc-13135=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-libtirpc-13135=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc-devel-0.2.1-1.12.3 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc-debuginfo-0.2.1-1.12.3 libtirpc-debugsource-0.2.1-1.12.3 rpcbind-debuginfo-0.1.6+git20080930-6.27.2 rpcbind-debugsource-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): libtirpc-debuginfo-0.2.1-1.12.3 libtirpc-debugsource-0.2.1-1.12.3 rpcbind-debuginfo-0.1.6+git20080930-6.27.2 rpcbind-debugsource-0.1.6+git20080930-6.27.2 References: https://www.suse.com/security/cve/CVE-2017-8779.html https://bugzilla.suse.com/1037559 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for libtirpc, rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1468-1 Rating: important References: #1037559 Cross-References: CVE-2017-8779 Affected Products: SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for libtirpc and rpcbind fixes the following issues: - CVE-2017-8779: A crafted UDP package could lead rpcbind to remote denial-of-service. (bsc#1037559) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-libtirpc-13135=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-libtirpc-13135=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-libtirpc-13135=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-libtirpc-13135=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-libtirpc-13135=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-libtirpc-13135=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc-devel-0.2.1-1.12.3 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): libtirpc1-0.2.1-1.12.3 rpcbind-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): libtirpc-debuginfo-0.2.1-1.12.3 libtirpc-debugsource-0.2.1-1.12.3 rpcbind-debuginfo-0.1.6+git20080930-6.27.2 rpcbind-debugsource-0.1.6+git20080930-6.27.2 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): libtirpc-debuginfo-0.2.1-1.12.3 libtirpc-debugsource-0.2.1-1.12.3 rpcbind-debuginfo-0.1.6+git20080930-6.27.2 rpcbind-debugsource-0.1.6+git20080930-6.27.2 References: https://www.suse.com/security/cve/CVE-2017-8779.html https://bugzilla.suse.com/1037559 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
CentOS Errata and Bugfix Advisory 2017:1375 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-1375.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: bb61a129a930afc49cc9f655938288e43269d1c243a2f11d96bfa08df4c2c97a cups-1.4.2-78.el6_9.i686.rpm 507a6306b9543005d9f9ddd7dc5c041750b51e87685d4859ae371edd2f2036d4 cups-devel-1.4.2-78.el6_9.i686.rpm faa968facc1bf2c75647d950338121ddb1f244f0b963af3852cd7db7c31575f9 cups-libs-1.4.2-78.el6_9.i686.rpm 17cd0b9047260012f3df6e9be04bb373d1e6da55dde183236e17e85e7f3c9a6d cups-lpd-1.4.2-78.el6_9.i686.rpm 91b3f675c05ca9ae952e3e7cbd64f2991b03036bc2d7569bc30c13ecadfe0984 cups-php-1.4.2-78.el6_9.i686.rpm x86_64: c54a0c2e00cf3033e1ee384333e2410dd275048303d8a883086e96afa2812e26 cups-1.4.2-78.el6_9.x86_64.rpm 507a6306b9543005d9f9ddd7dc5c041750b51e87685d4859ae371edd2f2036d4 cups-devel-1.4.2-78.el6_9.i686.rpm a642fc2167677279ee81cb8f5ddeee5b6c4b3352e75309e1f9223851a4530db1 cups-devel-1.4.2-78.el6_9.x86_64.rpm faa968facc1bf2c75647d950338121ddb1f244f0b963af3852cd7db7c31575f9 cups-libs-1.4.2-78.el6_9.i686.rpm 0869b9bf311cffd9cb85461abe565237ab59650d464df8762b852220051ce6f8 cups-libs-1.4.2-78.el6_9.x86_64.rpm e5581d62eb087b0987f7f6f33ce5d5ae422620de8d5703c97aeaaa27861c7d43 cups-lpd-1.4.2-78.el6_9.x86_64.rpm 477bb878a906cdcad7c87c6e1eb6d17027445e51f130e043ccc78c56673ff1b1 cups-php-1.4.2-78.el6_9.x86_64.rpm Source: 4342143aff9e0ff55c789c01514b8aef4fa7ceab53060225e56173b3c3cba2af cups-1.4.2-78.el6_9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
-
[CentOS-announce] CESA-2017:1372 Moderate CentOS 6 kernel Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2017:1372 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1372.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 7eca6abfc3631d243aa69324cc95949df9efda9c6ebe36e651d7e5a06f417422 kernel-2.6.32-696.3.1.el6.i686.rpm 5d0fe7683787a58d7be5acf5bfd7394dd067d7d7042fb8ef9aea594a0be010f6 kernel-abi-whitelists-2.6.32-696.3.1.el6.noarch.rpm afa4011eff0af56fe67209ca677b2042cb857e51fce527a8fc1aabd527f09792 kernel-debug-2.6.32-696.3.1.el6.i686.rpm bea822208b180df3b99d27be1d2d584fddc62487013066610a01edab72cd25e6 kernel-debug-devel-2.6.32-696.3.1.el6.i686.rpm 0fddb2f686e3f3480fdd726b282aa49a30120de69c465e9aa3ab9efc4a142be2 kernel-devel-2.6.32-696.3.1.el6.i686.rpm 35b2a15772d2fd05df555445deecd0899e472c3fb9d97269e273af170ae21876 kernel-doc-2.6.32-696.3.1.el6.noarch.rpm 5a98986b2fbd04ee2b29c32e1d66c7cf162810c9c0266746f14908c70122af8f kernel-firmware-2.6.32-696.3.1.el6.noarch.rpm 44dc07a0cca20d915962a9e08cec582e6de1016fcc136aa293c79dac72c79bb0 kernel-headers-2.6.32-696.3.1.el6.i686.rpm 029e4464a2d06a287b6f0e9931295b1022361e56c478390921ef59ac18628a9c perf-2.6.32-696.3.1.el6.i686.rpm d00ba719a2ae5dd7a46a028b1583fb3c2c12b21d8d54f3f9e4c59e6d025a0106 python-perf-2.6.32-696.3.1.el6.i686.rpm x86_64: 9da032798e60a87114323bad949c299e8382d15c3d5428373c06bf2a2e02658c kernel-2.6.32-696.3.1.el6.x86_64.rpm 5d0fe7683787a58d7be5acf5bfd7394dd067d7d7042fb8ef9aea594a0be010f6 kernel-abi-whitelists-2.6.32-696.3.1.el6.noarch.rpm d3a93c55bfaf2c329d067e45648dc216fbe0de6a1078fe0328e95f9dc6fc0cf7 kernel-debug-2.6.32-696.3.1.el6.x86_64.rpm bea822208b180df3b99d27be1d2d584fddc62487013066610a01edab72cd25e6 kernel-debug-devel-2.6.32-696.3.1.el6.i686.rpm be6425141017536cd4142277767e058f05e31703ff30f47c81dd93ea2068cd30 kernel-debug-devel-2.6.32-696.3.1.el6.x86_64.rpm 48e4d6db1b6c49a723ddabf44b1e20b77752d27f86f74de0aba1a3f08e6fdce9 kernel-devel-2.6.32-696.3.1.el6.x86_64.rpm 35b2a15772d2fd05df555445deecd0899e472c3fb9d97269e273af170ae21876 kernel-doc-2.6.32-696.3.1.el6.noarch.rpm 5a98986b2fbd04ee2b29c32e1d66c7cf162810c9c0266746f14908c70122af8f kernel-firmware-2.6.32-696.3.1.el6.noarch.rpm fdb958c19589cc95425b38c3df1d0b721c889668b9f192729c1a14eaa1c8cebb kernel-headers-2.6.32-696.3.1.el6.x86_64.rpm 14327a35fe9c00a83558755615e4f08dea3fbf0527fd5647a6f560c8152c7a09 perf-2.6.32-696.3.1.el6.x86_64.rpm 48406786ab4435fd9a050cff6d5692a64d3a9fb8488d3556e4f673b65a67970e python-perf-2.6.32-696.3.1.el6.x86_64.rpm Source: 32fc5e4a4af19dfce7a58b4e0e10ac97ae65186f526b24d6ab3ce026edd08087 kernel-2.6.32-696.3.1.el6.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Visiting the Verizon 5G House at the Indy500 ( -at -) LanOC Reviews <https://lanoc.org/review/editorials/7546-visiting-the-verizon-5g-house-at-the-indy500> *DESCRIPTION:* So last week Adam and I took a break from the office and made the trip over to Indianapolis as Verizon invited us to check out their 5G Home of the Future that they had set up just outside of Indianapolis Speedway during the week of the Indy500. The original plan was a short visit to check out the home but we ended up also getting invited over to the track to also take a quick look at their 5G setup over there as well along with a peek inside of their mobile 5G truck. The main headlines were the low latency and the extremely high speeds but they had a few demos setup that I’m going to quickly run through today. *ARTICLE URL:* https://lanoc.org/review/editorials/7546-visiting-the-verizon-5g-house-at-the-indy500 *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/verizon_5g_house/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/verizon_5g_house/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
-
[CentOS-announce] CESA-2017:1365 Important CentOS 7 nss Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2017:1365 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-1365.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 0536cf40d3defdbc22f25218ae674c91f2425eb69bafd1858d1cd9ab526c3682 nss-3.28.4-1.2.el7_3.i686.rpm fb37820045416e7bc172eb98f3af5dea0088cebf6c4eafd0bf4cd45601f3f7f2 nss-3.28.4-1.2.el7_3.x86_64.rpm 9039d34f9105c69dbfeff967eb7286103b15d268b813fec728dd948390298955 nss-devel-3.28.4-1.2.el7_3.i686.rpm 13aabc002f56b81c1d8d4df88cb2f082e942d25627de90ef0b88d6e8a6054906 nss-devel-3.28.4-1.2.el7_3.x86_64.rpm 832656e7c80467344368bb064b1cb363f99e0168db25f719927466dbc6578965 nss-pkcs11-devel-3.28.4-1.2.el7_3.i686.rpm ccadb9d437bd63fe4881e4bc7662a266dae6fb9e3d120e570212146eb848571a nss-pkcs11-devel-3.28.4-1.2.el7_3.x86_64.rpm 7bc62046adb8c0d29bb1e6e798d8226057d772aefb3ecb33eda904b70ee14fc3 nss-sysinit-3.28.4-1.2.el7_3.x86_64.rpm 013275b785ea830b3ab87ef8ef971527d248c2450f9cded98cdf199b65cf4476 nss-tools-3.28.4-1.2.el7_3.x86_64.rpm Source: 67e7973b087488e1f2e51f3cb28fac7d143a1dd07f9b3ddcf79375d5913ea123 nss-3.28.4-1.2.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________