news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
** TECHSPOT ------------------------------------------------------------ ** Razer Blade (2017) Review ------------------------------------------------------------ ** http://www.techspot.com/review/1400-razer-blade-2017/ ------------------------------------------------------------ I'm a big fan of Razer hardware. Their peripherals are top notch, in particular their outstanding Deathadder mice, while their laptops have surprised me in terms of how solid and well built they are. Razer seems to know what gamers are after and the latest Razer Blade is no exception. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
Win A Corsair VENGEANCE LED DDR4-3200 32GB Memory Kit @ ThinkComputers.org
news posted a topic in Upcoming News
Win A Corsair VENGEANCE LED DDR4-3200 32GB Memory Kit ( -at -) ThinkComputers.org Contest Link: http://www.thinkcomputers.org/win-a-corsair-vengeance-led-ddr4-3200-32gb-memory-kit/ Image URL: http://www.thinkcomputers.org/reviews/corsair_vengeance_ddr4/contest-email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/corsair_vengeance_ddr4/contest-small.jpg Quote: "It is about time we've had another contest!  This time we have a brand new Corsair VENGEANCE LED DDR4-3200 32GB Memory Kit!  We've recently reviewed the same kit and it received a 10 out of 10 score and our Recommended Award!  Corsair memory is some of the best and who can't complain about the cool white LED bar on the top of the memory.  There are quite a few different ways to enter this contest, see below." -
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kdelibs security update Advisory ID: RHSA-2017:1264-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1264 Issue date: 2017-05-22 CVE Names: CVE-2017-8422 ===================================================================== 1. Summary: An update for kdelibs is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, s390x Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch 3. Description: The K Desktop Environment (KDE) is a graphical desktop environment for the X Window System. The kdelibs packages include core libraries for the K Desktop Environment. Security Fix(es): * A privilege escalation flaw was found in the way kdelibs handled D-Bus messages. A local user could potentially use this flaw to gain root privileges by spoofing a callerID and leveraging a privileged helper application. (CVE-2017-8422) Red Hat would like to thank Sebastian Krahmer (SUSE) for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The desktop must be restarted (log out, then log back in) for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1449647 - CVE-2017-8422 kauth: service invoking dbus is not properly checked and allows local privilege escalation 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kdelibs-4.14.8-6.el7_3.src.rpm x86_64: kdelibs-4.14.8-6.el7_3.i686.rpm kdelibs-4.14.8-6.el7_3.x86_64.rpm kdelibs-common-4.14.8-6.el7_3.x86_64.rpm kdelibs-debuginfo-4.14.8-6.el7_3.i686.rpm kdelibs-debuginfo-4.14.8-6.el7_3.x86_64.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.i686.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: kdelibs-apidocs-4.14.8-6.el7_3.noarch.rpm x86_64: kdelibs-debuginfo-4.14.8-6.el7_3.i686.rpm kdelibs-debuginfo-4.14.8-6.el7_3.x86_64.rpm kdelibs-devel-4.14.8-6.el7_3.i686.rpm kdelibs-devel-4.14.8-6.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kdelibs-4.14.8-6.el7_3.src.rpm x86_64: kdelibs-4.14.8-6.el7_3.i686.rpm kdelibs-4.14.8-6.el7_3.x86_64.rpm kdelibs-common-4.14.8-6.el7_3.x86_64.rpm kdelibs-debuginfo-4.14.8-6.el7_3.i686.rpm kdelibs-debuginfo-4.14.8-6.el7_3.x86_64.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.i686.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: kdelibs-apidocs-4.14.8-6.el7_3.noarch.rpm x86_64: kdelibs-debuginfo-4.14.8-6.el7_3.i686.rpm kdelibs-debuginfo-4.14.8-6.el7_3.x86_64.rpm kdelibs-devel-4.14.8-6.el7_3.i686.rpm kdelibs-devel-4.14.8-6.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kdelibs-4.14.8-6.el7_3.src.rpm aarch64: kdelibs-4.14.8-6.el7_3.aarch64.rpm kdelibs-common-4.14.8-6.el7_3.aarch64.rpm kdelibs-debuginfo-4.14.8-6.el7_3.aarch64.rpm kdelibs-devel-4.14.8-6.el7_3.aarch64.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.aarch64.rpm ppc64le: kdelibs-4.14.8-6.el7_3.ppc64le.rpm kdelibs-common-4.14.8-6.el7_3.ppc64le.rpm kdelibs-debuginfo-4.14.8-6.el7_3.ppc64le.rpm kdelibs-devel-4.14.8-6.el7_3.ppc64le.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.ppc64le.rpm x86_64: kdelibs-4.14.8-6.el7_3.i686.rpm kdelibs-4.14.8-6.el7_3.x86_64.rpm kdelibs-common-4.14.8-6.el7_3.x86_64.rpm kdelibs-debuginfo-4.14.8-6.el7_3.i686.rpm kdelibs-debuginfo-4.14.8-6.el7_3.x86_64.rpm kdelibs-devel-4.14.8-6.el7_3.i686.rpm kdelibs-devel-4.14.8-6.el7_3.x86_64.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.i686.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: kdelibs-4.14.8-6.el7_3.src.rpm noarch: kdelibs-apidocs-4.14.8-6.el7_3.noarch.rpm ppc64: kdelibs-4.14.8-6.el7_3.ppc.rpm kdelibs-4.14.8-6.el7_3.ppc64.rpm kdelibs-common-4.14.8-6.el7_3.ppc64.rpm kdelibs-debuginfo-4.14.8-6.el7_3.ppc.rpm kdelibs-debuginfo-4.14.8-6.el7_3.ppc64.rpm kdelibs-devel-4.14.8-6.el7_3.ppc.rpm kdelibs-devel-4.14.8-6.el7_3.ppc64.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.ppc.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.ppc64.rpm s390x: kdelibs-4.14.8-6.el7_3.s390.rpm kdelibs-4.14.8-6.el7_3.s390x.rpm kdelibs-common-4.14.8-6.el7_3.s390x.rpm kdelibs-debuginfo-4.14.8-6.el7_3.s390.rpm kdelibs-debuginfo-4.14.8-6.el7_3.s390x.rpm kdelibs-devel-4.14.8-6.el7_3.s390.rpm kdelibs-devel-4.14.8-6.el7_3.s390x.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.s390.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.s390x.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kdelibs-4.14.8-6.el7_3.src.rpm x86_64: kdelibs-4.14.8-6.el7_3.i686.rpm kdelibs-4.14.8-6.el7_3.x86_64.rpm kdelibs-common-4.14.8-6.el7_3.x86_64.rpm kdelibs-debuginfo-4.14.8-6.el7_3.i686.rpm kdelibs-debuginfo-4.14.8-6.el7_3.x86_64.rpm kdelibs-devel-4.14.8-6.el7_3.i686.rpm kdelibs-devel-4.14.8-6.el7_3.x86_64.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.i686.rpm kdelibs-ktexteditor-4.14.8-6.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: kdelibs-apidocs-4.14.8-6.el7_3.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-8422 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZIryyXlSAg2UNWIIRAut+AKCL6Q41BgxjibClfIq2Qwsu4M9CzQCfSd+5 f9o61xNcufb5ePgoksmuU6o= =4XX+ -----END PGP SIGNATURE----- --
-
[RHSA-2017:1265-01] Moderate: samba security and bug fix update
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: samba security and bug fix update Advisory ID: RHSA-2017:1265-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1265 Issue date: 2017-05-22 CVE Names: CVE-2016-2125 CVE-2016-2126 CVE-2017-2619 ===================================================================== 1. Summary: An update for samba is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Resilient Storage (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64 3. Description: Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125) * A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126) * A race condition was found in samba server. A malicious samba client could use this flaw to access files and directories, in areas of the server file system not exported under the share definitions. (CVE-2017-2619) Red Hat would like to thank the Samba project for reporting CVE-2017-2619. Upstream acknowledges Jann Horn (Google) as the original reporter of CVE-2017-2619. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the smb service will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1403114 - CVE-2016-2125 samba: Unconditional privilege delegation to Kerberos servers in trusted realms 1403115 - CVE-2016-2126 samba: Flaws in Kerberos PAC validation can trigger privilege elevation 1429472 - CVE-2017-2619 samba: symlink race permits opening files outside share directory 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: samba-4.4.4-13.el7_3.src.rpm noarch: samba-common-4.4.4-13.el7_3.noarch.rpm x86_64: libsmbclient-4.4.4-13.el7_3.i686.rpm libsmbclient-4.4.4-13.el7_3.x86_64.rpm libwbclient-4.4.4-13.el7_3.i686.rpm libwbclient-4.4.4-13.el7_3.x86_64.rpm samba-client-4.4.4-13.el7_3.x86_64.rpm samba-client-libs-4.4.4-13.el7_3.i686.rpm samba-client-libs-4.4.4-13.el7_3.x86_64.rpm samba-common-libs-4.4.4-13.el7_3.x86_64.rpm samba-common-tools-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.i686.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm samba-krb5-printing-4.4.4-13.el7_3.x86_64.rpm samba-libs-4.4.4-13.el7_3.i686.rpm samba-libs-4.4.4-13.el7_3.x86_64.rpm samba-winbind-4.4.4-13.el7_3.x86_64.rpm samba-winbind-clients-4.4.4-13.el7_3.x86_64.rpm samba-winbind-modules-4.4.4-13.el7_3.i686.rpm samba-winbind-modules-4.4.4-13.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: samba-pidl-4.4.4-13.el7_3.noarch.rpm x86_64: libsmbclient-devel-4.4.4-13.el7_3.i686.rpm libsmbclient-devel-4.4.4-13.el7_3.x86_64.rpm libwbclient-devel-4.4.4-13.el7_3.i686.rpm libwbclient-devel-4.4.4-13.el7_3.x86_64.rpm samba-4.4.4-13.el7_3.x86_64.rpm samba-dc-4.4.4-13.el7_3.x86_64.rpm samba-dc-libs-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.i686.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm samba-devel-4.4.4-13.el7_3.i686.rpm samba-devel-4.4.4-13.el7_3.x86_64.rpm samba-python-4.4.4-13.el7_3.x86_64.rpm samba-test-4.4.4-13.el7_3.x86_64.rpm samba-test-libs-4.4.4-13.el7_3.i686.rpm samba-test-libs-4.4.4-13.el7_3.x86_64.rpm samba-vfs-glusterfs-4.4.4-13.el7_3.x86_64.rpm samba-winbind-krb5-locator-4.4.4-13.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: samba-4.4.4-13.el7_3.src.rpm noarch: samba-common-4.4.4-13.el7_3.noarch.rpm x86_64: libsmbclient-4.4.4-13.el7_3.i686.rpm libsmbclient-4.4.4-13.el7_3.x86_64.rpm libwbclient-4.4.4-13.el7_3.i686.rpm libwbclient-4.4.4-13.el7_3.x86_64.rpm samba-client-4.4.4-13.el7_3.x86_64.rpm samba-client-libs-4.4.4-13.el7_3.i686.rpm samba-client-libs-4.4.4-13.el7_3.x86_64.rpm samba-common-libs-4.4.4-13.el7_3.x86_64.rpm samba-common-tools-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.i686.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm samba-libs-4.4.4-13.el7_3.i686.rpm samba-libs-4.4.4-13.el7_3.x86_64.rpm samba-winbind-4.4.4-13.el7_3.x86_64.rpm samba-winbind-clients-4.4.4-13.el7_3.x86_64.rpm samba-winbind-modules-4.4.4-13.el7_3.i686.rpm samba-winbind-modules-4.4.4-13.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: samba-pidl-4.4.4-13.el7_3.noarch.rpm x86_64: libsmbclient-devel-4.4.4-13.el7_3.i686.rpm libsmbclient-devel-4.4.4-13.el7_3.x86_64.rpm libwbclient-devel-4.4.4-13.el7_3.i686.rpm libwbclient-devel-4.4.4-13.el7_3.x86_64.rpm samba-4.4.4-13.el7_3.x86_64.rpm samba-dc-4.4.4-13.el7_3.x86_64.rpm samba-dc-libs-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.i686.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm samba-devel-4.4.4-13.el7_3.i686.rpm samba-devel-4.4.4-13.el7_3.x86_64.rpm samba-krb5-printing-4.4.4-13.el7_3.x86_64.rpm samba-python-4.4.4-13.el7_3.x86_64.rpm samba-test-4.4.4-13.el7_3.x86_64.rpm samba-test-libs-4.4.4-13.el7_3.i686.rpm samba-test-libs-4.4.4-13.el7_3.x86_64.rpm samba-vfs-glusterfs-4.4.4-13.el7_3.x86_64.rpm samba-winbind-krb5-locator-4.4.4-13.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: samba-4.4.4-13.el7_3.src.rpm aarch64: libsmbclient-4.4.4-13.el7_3.aarch64.rpm libwbclient-4.4.4-13.el7_3.aarch64.rpm samba-4.4.4-13.el7_3.aarch64.rpm samba-client-4.4.4-13.el7_3.aarch64.rpm samba-client-libs-4.4.4-13.el7_3.aarch64.rpm samba-common-libs-4.4.4-13.el7_3.aarch64.rpm samba-common-tools-4.4.4-13.el7_3.aarch64.rpm samba-debuginfo-4.4.4-13.el7_3.aarch64.rpm samba-krb5-printing-4.4.4-13.el7_3.aarch64.rpm samba-libs-4.4.4-13.el7_3.aarch64.rpm samba-python-4.4.4-13.el7_3.aarch64.rpm samba-winbind-4.4.4-13.el7_3.aarch64.rpm samba-winbind-clients-4.4.4-13.el7_3.aarch64.rpm samba-winbind-modules-4.4.4-13.el7_3.aarch64.rpm noarch: samba-common-4.4.4-13.el7_3.noarch.rpm ppc64: libsmbclient-4.4.4-13.el7_3.ppc.rpm libsmbclient-4.4.4-13.el7_3.ppc64.rpm libwbclient-4.4.4-13.el7_3.ppc.rpm libwbclient-4.4.4-13.el7_3.ppc64.rpm samba-4.4.4-13.el7_3.ppc64.rpm samba-client-4.4.4-13.el7_3.ppc64.rpm samba-client-libs-4.4.4-13.el7_3.ppc.rpm samba-client-libs-4.4.4-13.el7_3.ppc64.rpm samba-common-libs-4.4.4-13.el7_3.ppc64.rpm samba-common-tools-4.4.4-13.el7_3.ppc64.rpm samba-debuginfo-4.4.4-13.el7_3.ppc.rpm samba-debuginfo-4.4.4-13.el7_3.ppc64.rpm samba-krb5-printing-4.4.4-13.el7_3.ppc64.rpm samba-libs-4.4.4-13.el7_3.ppc.rpm samba-libs-4.4.4-13.el7_3.ppc64.rpm samba-winbind-4.4.4-13.el7_3.ppc64.rpm samba-winbind-clients-4.4.4-13.el7_3.ppc64.rpm samba-winbind-modules-4.4.4-13.el7_3.ppc.rpm samba-winbind-modules-4.4.4-13.el7_3.ppc64.rpm ppc64le: libsmbclient-4.4.4-13.el7_3.ppc64le.rpm libwbclient-4.4.4-13.el7_3.ppc64le.rpm samba-4.4.4-13.el7_3.ppc64le.rpm samba-client-4.4.4-13.el7_3.ppc64le.rpm samba-client-libs-4.4.4-13.el7_3.ppc64le.rpm samba-common-libs-4.4.4-13.el7_3.ppc64le.rpm samba-common-tools-4.4.4-13.el7_3.ppc64le.rpm samba-debuginfo-4.4.4-13.el7_3.ppc64le.rpm samba-krb5-printing-4.4.4-13.el7_3.ppc64le.rpm samba-libs-4.4.4-13.el7_3.ppc64le.rpm samba-winbind-4.4.4-13.el7_3.ppc64le.rpm samba-winbind-clients-4.4.4-13.el7_3.ppc64le.rpm samba-winbind-modules-4.4.4-13.el7_3.ppc64le.rpm s390x: libsmbclient-4.4.4-13.el7_3.s390.rpm libsmbclient-4.4.4-13.el7_3.s390x.rpm libwbclient-4.4.4-13.el7_3.s390.rpm libwbclient-4.4.4-13.el7_3.s390x.rpm samba-4.4.4-13.el7_3.s390x.rpm samba-client-4.4.4-13.el7_3.s390x.rpm samba-client-libs-4.4.4-13.el7_3.s390.rpm samba-client-libs-4.4.4-13.el7_3.s390x.rpm samba-common-libs-4.4.4-13.el7_3.s390x.rpm samba-common-tools-4.4.4-13.el7_3.s390x.rpm samba-debuginfo-4.4.4-13.el7_3.s390.rpm samba-debuginfo-4.4.4-13.el7_3.s390x.rpm samba-krb5-printing-4.4.4-13.el7_3.s390x.rpm samba-libs-4.4.4-13.el7_3.s390.rpm samba-libs-4.4.4-13.el7_3.s390x.rpm samba-winbind-4.4.4-13.el7_3.s390x.rpm samba-winbind-clients-4.4.4-13.el7_3.s390x.rpm samba-winbind-modules-4.4.4-13.el7_3.s390.rpm samba-winbind-modules-4.4.4-13.el7_3.s390x.rpm x86_64: libsmbclient-4.4.4-13.el7_3.i686.rpm libsmbclient-4.4.4-13.el7_3.x86_64.rpm libwbclient-4.4.4-13.el7_3.i686.rpm libwbclient-4.4.4-13.el7_3.x86_64.rpm samba-4.4.4-13.el7_3.x86_64.rpm samba-client-4.4.4-13.el7_3.x86_64.rpm samba-client-libs-4.4.4-13.el7_3.i686.rpm samba-client-libs-4.4.4-13.el7_3.x86_64.rpm samba-common-libs-4.4.4-13.el7_3.x86_64.rpm samba-common-tools-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.i686.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm samba-krb5-printing-4.4.4-13.el7_3.x86_64.rpm samba-libs-4.4.4-13.el7_3.i686.rpm samba-libs-4.4.4-13.el7_3.x86_64.rpm samba-python-4.4.4-13.el7_3.x86_64.rpm samba-winbind-4.4.4-13.el7_3.x86_64.rpm samba-winbind-clients-4.4.4-13.el7_3.x86_64.rpm samba-winbind-modules-4.4.4-13.el7_3.i686.rpm samba-winbind-modules-4.4.4-13.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Resilient Storage (v. 7): x86_64: ctdb-4.4.4-13.el7_3.x86_64.rpm ctdb-tests-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: libsmbclient-devel-4.4.4-13.el7_3.aarch64.rpm libwbclient-devel-4.4.4-13.el7_3.aarch64.rpm samba-dc-4.4.4-13.el7_3.aarch64.rpm samba-dc-libs-4.4.4-13.el7_3.aarch64.rpm samba-debuginfo-4.4.4-13.el7_3.aarch64.rpm samba-devel-4.4.4-13.el7_3.aarch64.rpm samba-test-4.4.4-13.el7_3.aarch64.rpm samba-test-libs-4.4.4-13.el7_3.aarch64.rpm samba-winbind-krb5-locator-4.4.4-13.el7_3.aarch64.rpm noarch: samba-pidl-4.4.4-13.el7_3.noarch.rpm ppc64: libsmbclient-devel-4.4.4-13.el7_3.ppc.rpm libsmbclient-devel-4.4.4-13.el7_3.ppc64.rpm libwbclient-devel-4.4.4-13.el7_3.ppc.rpm libwbclient-devel-4.4.4-13.el7_3.ppc64.rpm samba-dc-4.4.4-13.el7_3.ppc64.rpm samba-dc-libs-4.4.4-13.el7_3.ppc64.rpm samba-debuginfo-4.4.4-13.el7_3.ppc.rpm samba-debuginfo-4.4.4-13.el7_3.ppc64.rpm samba-devel-4.4.4-13.el7_3.ppc.rpm samba-devel-4.4.4-13.el7_3.ppc64.rpm samba-python-4.4.4-13.el7_3.ppc64.rpm samba-test-4.4.4-13.el7_3.ppc64.rpm samba-test-libs-4.4.4-13.el7_3.ppc.rpm samba-test-libs-4.4.4-13.el7_3.ppc64.rpm samba-winbind-krb5-locator-4.4.4-13.el7_3.ppc64.rpm ppc64le: libsmbclient-devel-4.4.4-13.el7_3.ppc64le.rpm libwbclient-devel-4.4.4-13.el7_3.ppc64le.rpm samba-dc-4.4.4-13.el7_3.ppc64le.rpm samba-dc-libs-4.4.4-13.el7_3.ppc64le.rpm samba-debuginfo-4.4.4-13.el7_3.ppc64le.rpm samba-devel-4.4.4-13.el7_3.ppc64le.rpm samba-python-4.4.4-13.el7_3.ppc64le.rpm samba-test-4.4.4-13.el7_3.ppc64le.rpm samba-test-libs-4.4.4-13.el7_3.ppc64le.rpm samba-winbind-krb5-locator-4.4.4-13.el7_3.ppc64le.rpm s390x: libsmbclient-devel-4.4.4-13.el7_3.s390.rpm libsmbclient-devel-4.4.4-13.el7_3.s390x.rpm libwbclient-devel-4.4.4-13.el7_3.s390.rpm libwbclient-devel-4.4.4-13.el7_3.s390x.rpm samba-dc-4.4.4-13.el7_3.s390x.rpm samba-dc-libs-4.4.4-13.el7_3.s390x.rpm samba-debuginfo-4.4.4-13.el7_3.s390.rpm samba-debuginfo-4.4.4-13.el7_3.s390x.rpm samba-devel-4.4.4-13.el7_3.s390.rpm samba-devel-4.4.4-13.el7_3.s390x.rpm samba-python-4.4.4-13.el7_3.s390x.rpm samba-test-4.4.4-13.el7_3.s390x.rpm samba-test-libs-4.4.4-13.el7_3.s390.rpm samba-test-libs-4.4.4-13.el7_3.s390x.rpm samba-winbind-krb5-locator-4.4.4-13.el7_3.s390x.rpm x86_64: libsmbclient-devel-4.4.4-13.el7_3.i686.rpm libsmbclient-devel-4.4.4-13.el7_3.x86_64.rpm libwbclient-devel-4.4.4-13.el7_3.i686.rpm libwbclient-devel-4.4.4-13.el7_3.x86_64.rpm samba-dc-4.4.4-13.el7_3.x86_64.rpm samba-dc-libs-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.i686.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm samba-devel-4.4.4-13.el7_3.i686.rpm samba-devel-4.4.4-13.el7_3.x86_64.rpm samba-test-4.4.4-13.el7_3.x86_64.rpm samba-test-libs-4.4.4-13.el7_3.i686.rpm samba-test-libs-4.4.4-13.el7_3.x86_64.rpm samba-vfs-glusterfs-4.4.4-13.el7_3.x86_64.rpm samba-winbind-krb5-locator-4.4.4-13.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: samba-4.4.4-13.el7_3.src.rpm noarch: samba-common-4.4.4-13.el7_3.noarch.rpm x86_64: libsmbclient-4.4.4-13.el7_3.i686.rpm libsmbclient-4.4.4-13.el7_3.x86_64.rpm libwbclient-4.4.4-13.el7_3.i686.rpm libwbclient-4.4.4-13.el7_3.x86_64.rpm samba-4.4.4-13.el7_3.x86_64.rpm samba-client-4.4.4-13.el7_3.x86_64.rpm samba-client-libs-4.4.4-13.el7_3.i686.rpm samba-client-libs-4.4.4-13.el7_3.x86_64.rpm samba-common-libs-4.4.4-13.el7_3.x86_64.rpm samba-common-tools-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.i686.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm samba-krb5-printing-4.4.4-13.el7_3.x86_64.rpm samba-libs-4.4.4-13.el7_3.i686.rpm samba-libs-4.4.4-13.el7_3.x86_64.rpm samba-python-4.4.4-13.el7_3.x86_64.rpm samba-winbind-4.4.4-13.el7_3.x86_64.rpm samba-winbind-clients-4.4.4-13.el7_3.x86_64.rpm samba-winbind-modules-4.4.4-13.el7_3.i686.rpm samba-winbind-modules-4.4.4-13.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: samba-pidl-4.4.4-13.el7_3.noarch.rpm x86_64: libsmbclient-devel-4.4.4-13.el7_3.i686.rpm libsmbclient-devel-4.4.4-13.el7_3.x86_64.rpm libwbclient-devel-4.4.4-13.el7_3.i686.rpm libwbclient-devel-4.4.4-13.el7_3.x86_64.rpm samba-dc-4.4.4-13.el7_3.x86_64.rpm samba-dc-libs-4.4.4-13.el7_3.x86_64.rpm samba-debuginfo-4.4.4-13.el7_3.i686.rpm samba-debuginfo-4.4.4-13.el7_3.x86_64.rpm samba-devel-4.4.4-13.el7_3.i686.rpm samba-devel-4.4.4-13.el7_3.x86_64.rpm samba-test-4.4.4-13.el7_3.x86_64.rpm samba-test-libs-4.4.4-13.el7_3.i686.rpm samba-test-libs-4.4.4-13.el7_3.x86_64.rpm samba-vfs-glusterfs-4.4.4-13.el7_3.x86_64.rpm samba-winbind-krb5-locator-4.4.4-13.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2125 https://access.redhat.com/security/cve/CVE-2016-2126 https://access.redhat.com/security/cve/CVE-2017-2619 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZIr16XlSAg2UNWIIRApIoAKCIsiKcWKiCSBb+9mMJLMARG86ebwCgqObr Yn3444NvqQr9tn1E2HtQwjE= =mb+I -----END PGP SIGNATURE----- -- -
[Tech ARP] Fixed Disk Boot Sector from The BIOS Optimization Guide
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: rpcbind security update Advisory ID: RHSA-2017:1262-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1262 Issue date: 2017-05-22 CVE Names: CVE-2017-8779 ===================================================================== 1. Summary: An update for rpcbind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es): * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1448124 - CVE-2017-8779 rpcbind, libtirpc, libntirpc: Memory leak when failing to parse XDR strings or bytearrays 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: rpcbind-0.2.0-38.el7_3.src.rpm x86_64: rpcbind-0.2.0-38.el7_3.x86_64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: rpcbind-0.2.0-38.el7_3.src.rpm x86_64: rpcbind-0.2.0-38.el7_3.x86_64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: rpcbind-0.2.0-38.el7_3.src.rpm aarch64: rpcbind-0.2.0-38.el7_3.aarch64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.aarch64.rpm ppc64: rpcbind-0.2.0-38.el7_3.ppc64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.ppc64.rpm ppc64le: rpcbind-0.2.0-38.el7_3.ppc64le.rpm rpcbind-debuginfo-0.2.0-38.el7_3.ppc64le.rpm s390x: rpcbind-0.2.0-38.el7_3.s390x.rpm rpcbind-debuginfo-0.2.0-38.el7_3.s390x.rpm x86_64: rpcbind-0.2.0-38.el7_3.x86_64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: rpcbind-0.2.0-38.el7_3.src.rpm x86_64: rpcbind-0.2.0-38.el7_3.x86_64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-8779 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZImGhXlSAg2UNWIIRAh7TAJ9tlg3/AaQtejXB4xCaWGv7O2bGXACfZQXh /KHbCaDWXW5upkT0sOkxOUg= =Lz5V -----END PGP SIGNATURE----- -- -
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: rpcbind security update Advisory ID: RHSA-2017:1262-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1262 Issue date: 2017-05-22 CVE Names: CVE-2017-8779 ===================================================================== 1. Summary: An update for rpcbind is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: The rpcbind utility is a server that converts Remote Procedure Call (RPC) program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a server on that machine. Security Fix(es): * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1448124 - CVE-2017-8779 rpcbind, libtirpc, libntirpc: Memory leak when failing to parse XDR strings or bytearrays 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: rpcbind-0.2.0-38.el7_3.src.rpm x86_64: rpcbind-0.2.0-38.el7_3.x86_64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: rpcbind-0.2.0-38.el7_3.src.rpm x86_64: rpcbind-0.2.0-38.el7_3.x86_64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: rpcbind-0.2.0-38.el7_3.src.rpm aarch64: rpcbind-0.2.0-38.el7_3.aarch64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.aarch64.rpm ppc64: rpcbind-0.2.0-38.el7_3.ppc64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.ppc64.rpm ppc64le: rpcbind-0.2.0-38.el7_3.ppc64le.rpm rpcbind-debuginfo-0.2.0-38.el7_3.ppc64le.rpm s390x: rpcbind-0.2.0-38.el7_3.s390x.rpm rpcbind-debuginfo-0.2.0-38.el7_3.s390x.rpm x86_64: rpcbind-0.2.0-38.el7_3.x86_64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: rpcbind-0.2.0-38.el7_3.src.rpm x86_64: rpcbind-0.2.0-38.el7_3.x86_64.rpm rpcbind-debuginfo-0.2.0-38.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-8779 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZImGhXlSAg2UNWIIRAh7TAJ9tlg3/AaQtejXB4xCaWGv7O2bGXACfZQXh /KHbCaDWXW5upkT0sOkxOUg= =Lz5V -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libtirpc security update Advisory ID: RHSA-2017:1263-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1263 Issue date: 2017-05-22 CVE Names: CVE-2017-8779 ===================================================================== 1. Summary: An update for libtirpc is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix(es): * It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1448124 - CVE-2017-8779 rpcbind, libtirpc, libntirpc: Memory leak when failing to parse XDR strings or bytearrays 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libtirpc-0.2.4-0.8.el7_3.src.rpm x86_64: libtirpc-0.2.4-0.8.el7_3.i686.rpm libtirpc-0.2.4-0.8.el7_3.x86_64.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.i686.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libtirpc-debuginfo-0.2.4-0.8.el7_3.i686.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.x86_64.rpm libtirpc-devel-0.2.4-0.8.el7_3.i686.rpm libtirpc-devel-0.2.4-0.8.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libtirpc-0.2.4-0.8.el7_3.src.rpm x86_64: libtirpc-0.2.4-0.8.el7_3.i686.rpm libtirpc-0.2.4-0.8.el7_3.x86_64.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.i686.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libtirpc-debuginfo-0.2.4-0.8.el7_3.i686.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.x86_64.rpm libtirpc-devel-0.2.4-0.8.el7_3.i686.rpm libtirpc-devel-0.2.4-0.8.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libtirpc-0.2.4-0.8.el7_3.src.rpm aarch64: libtirpc-0.2.4-0.8.el7_3.aarch64.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.aarch64.rpm ppc64: libtirpc-0.2.4-0.8.el7_3.ppc.rpm libtirpc-0.2.4-0.8.el7_3.ppc64.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.ppc.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.ppc64.rpm ppc64le: libtirpc-0.2.4-0.8.el7_3.ppc64le.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.ppc64le.rpm s390x: libtirpc-0.2.4-0.8.el7_3.s390.rpm libtirpc-0.2.4-0.8.el7_3.s390x.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.s390.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.s390x.rpm x86_64: libtirpc-0.2.4-0.8.el7_3.i686.rpm libtirpc-0.2.4-0.8.el7_3.x86_64.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.i686.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: libtirpc-debuginfo-0.2.4-0.8.el7_3.aarch64.rpm libtirpc-devel-0.2.4-0.8.el7_3.aarch64.rpm ppc64: libtirpc-debuginfo-0.2.4-0.8.el7_3.ppc.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.ppc64.rpm libtirpc-devel-0.2.4-0.8.el7_3.ppc.rpm libtirpc-devel-0.2.4-0.8.el7_3.ppc64.rpm ppc64le: libtirpc-debuginfo-0.2.4-0.8.el7_3.ppc64le.rpm libtirpc-devel-0.2.4-0.8.el7_3.ppc64le.rpm s390x: libtirpc-debuginfo-0.2.4-0.8.el7_3.s390.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.s390x.rpm libtirpc-devel-0.2.4-0.8.el7_3.s390.rpm libtirpc-devel-0.2.4-0.8.el7_3.s390x.rpm x86_64: libtirpc-debuginfo-0.2.4-0.8.el7_3.i686.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.x86_64.rpm libtirpc-devel-0.2.4-0.8.el7_3.i686.rpm libtirpc-devel-0.2.4-0.8.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libtirpc-0.2.4-0.8.el7_3.src.rpm x86_64: libtirpc-0.2.4-0.8.el7_3.i686.rpm libtirpc-0.2.4-0.8.el7_3.x86_64.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.i686.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libtirpc-debuginfo-0.2.4-0.8.el7_3.i686.rpm libtirpc-debuginfo-0.2.4-0.8.el7_3.x86_64.rpm libtirpc-devel-0.2.4-0.8.el7_3.i686.rpm libtirpc-devel-0.2.4-0.8.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-8779 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZImHGXlSAg2UNWIIRAiX8AJ9IHJZbg87AHh5tSxprdrgCOWpSYACgs7Uk 20CJpxu10LU3dn4JOf4/Hh8= =Pxq5 -----END PGP SIGNATURE----- --
-
Title: COUGAR MINOS X3 Gaming Mouse Review ( -at -) NikKTech Description: The MINOS X3 Gaming Mouse is a very honest proposal by COUGAR primarily aimed towards serious gamers on a very tight budget. Article Link: https://www.nikktech.com/main/articles/peripherals/mice/7819-cougar-minos-x3 -gaming-mouse-review Image Link: http://www.nikktech.com/main/images/pics/reviews/cougar/minos_x3/cougar_mino s_x3a.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
TITLE: Razer Blackwidow Chroma V2 Review ( -at -) Vortez CONTENT: Razer are back, with their latest flagship keyboard, offering their very own mechanical keys, available in three flavours this time, along with a new wrist rest, brighter-than-ever full RGB per-key lighting, macro keys and a 3.5mm audio pass-through. LINK: https://www.vortez.net/review.php?id=1303 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
-------- FSP DAGGER 600W POWER SUPPLY REVIEW ( -at -) APH NETWORKS ------------------ Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: FSP Dagger 600W Power Supply Review ( -at -) APH Networks * Description: We took apart FSP's latest SFX PSU and gave the Dagger 600W a detailed inspection. * Link: http://aphnetworks.com/reports/fsp-dagger-600w * Image: http://aphnetworks.com/report/fsp-dagger-600w/004.JPG Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
-
Vertagear Triigger 275 and 350 Gaming Series Chairs ------------------------------------------------------------ http://mailchi.mp/kitguru/vertagear-triigger-275-and-350-gaming-series-chairs?e=872093acb5 http://www.kitguru.net Vertagear Triigger 275 and 350 Gaming Series Chairs Vertagear makes the bold claim that its Triigger 275 and Triigger 350 models are ‘Redefining gaming chairs.’ Mind you, that claim suggests you have a clear idea about the definition of a gaming chair. Some companies feel a gaming chair should look like a racing Recaro with bling colours and a chunky headrest while Vertagear instead puts the emphasis on support for your back and shoulders to keep you supported during lengthy gaming sessions. The Triigger model names are derived from ‘more than 275 components’ and ‘more than 350 components’ which suggests you might have an extensive construction job on your hands when you buy a new chair. In fact the opposite is true as the chairs arrive assembled and simply require that you pop the hubless caster wheels in the base, slide in the gas ram and lower the seat on to the base. The entire process took less than five minutes including tidying away the packaging. Read the review here: https://www.kitguru.net/peripherals/leo-waldock/vertagear-triigger-275-and-350-gaming-series-chairs/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=79339f049d&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
Upcoming Vacant Developer Membership Board seats: Second call for nominations
news posted a topic in Upcoming News
The membership of Mathieu Trudel-Lapierre in the Developer Membership board will be expiring shortly and Adam Conrad's membership will expire a few months after that. Subsequently, this email is a call for nominations to fill both of their positions although one elected developer will not begin their term immediately. The DMB is responsible for reviewing and approving new Ubuntu developers [1], meeting for about an hour once a fortnight. Candidates should be Ubuntu developers themselves, and should be well qualified to evaluate prospective Ubuntu developers and decide when to entrust them with developer privileges or to grant them Ubuntu membership status. The new member will be chosen using Condorcet voting. Members of the ubuntu-dev team in Launchpad will be eligible to vote. To ensure that you receive a ballot in the initial mail, please add a visible email address to your Launchpad profile (although there will be an opportunity to receive a ballot after the vote has started if you do not wish to do this). The term of the new board members will be at least two years (there will be some changes to terms to get these two positions to share the same expiration date). Providing at least three valid nominations are received, voting will commence on Tuesday, May 30, 2017 and will last for approximately 7 days, ending on or around Tuesday, June 6, 2017. The DMB will confirm the appointments in its next meeting thereafter. Please send GPG-signed nominations to developer-membership-board at -
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Vertagear Triigger 275 Gaming Chair Link: https://www.techpowerup.com/reviews/Vertagear/Triigger_275 Brief: We take a look at another high-end gaming chair, this time from Vertagear. It promises to take you through comfortable, hour-long gaming sessions and looks nice; however, its price is quite steep.
-
ASUS ROG GeForce GTX 1050 Ti STRIX Video Card Review @ Legit Reviews
news posted a topic in Upcoming News
Since the NVIDIA GeForce GTX 1050 Ti was released in October 2016 it has become one of the most desirable cards to have for 1080P gaming due to be priced around $150. Over the past the past seven months there have been many driver updates, so we wanted to take a fresh look at a GeForce GTX 1050 Ti 4GB graphics card to see how they perform. We managed to get our hands on an ASUS GeForce GTX 1050 Ti 4GB ROG STRIX OC Edition graphics card and gave it a test spin! Article Title: ASUS ROG GeForce GTX 1050 Ti STRIX Video Card Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/asus-rog-geforce-gtx-1050-ti-strix-video-card-review_194786 Happy Friday! Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// = -
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Benchmarking AMD's New AOCC Compiler For Ryzen ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=24662 Summary: "This week AMD released AOCC 1.0, the AMD Optimizing C/C++ Compiler, with initial support for Ryzen/Zen CPUs. In this article are our first benchmarks of the AOCC compiler compared to the GCC 6/7/8 and LLVM Clang 4/5 compilers." Please feel free to contact us with any questions or comments you may
-
Hello editors, Today we take a look at the quad-core Ryzen 5 1400 and six-core 1600 CPUs from AMD, priced for the sub-$300 USD market segment yet still promising plenty of power for 1080p gaming as well as overclocking potential. https://www.neoseeker.com/Articles/Hardware/Reviews/amd-ryzen-5-1400-1600/ "The two AMD processors for review today are the newest budget offerings of > the Ryzen 5 series with the Ryzen 1400 and 1600 models. The Ryzen 1400 is a > four core/eight thread and the Ryzen 1600 is a six core/twelve thread > processor, with both having a base operating speed of 3.2 GHz. The boost > clock for the Ryzen 1400 is 3.4 GHz while the Ryzen 1600 is able to boost > to 3.6 GHz." > Thanks as always for any linkage, we appreciate your support! Neoseeker Hardware https://www.neoseeker.com/ hardware ( -at -) neoseeker.com
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1360-1 Rating: important References: #1003077 #1008842 #1009682 #1012620 #1012985 #1015703 #1015787 #1015821 #1017512 #1018100 #1018263 #1018419 #1018446 #1019168 #1019514 #1020048 #1020795 #1021256 #1021374 #1021762 #1021913 #1022559 #1022971 #1023164 #1023207 #1023377 #1023762 #1023824 #1023888 #1023992 #1024081 #1024234 #1024309 #1024508 #1024788 #1025039 #1025235 #1025354 #1025802 #1026024 #1026722 #1026914 #1027066 #1027178 #1027189 #1027190 #1027974 #1028041 #1028415 #1028595 #1028648 #1028895 #1029470 #1029850 #1029986 #1030118 #1030213 #1030593 #1030901 #1031003 #1031052 #1031080 #1031440 #1031567 #1031579 #1031662 #1031842 #1032125 #1032141 #1032344 #1032345 #1033336 #1034670 #103470 #1034700 #1035576 #1035699 #1035738 #1035877 #1036752 #1038261 #799133 #857926 #914939 #917630 #922853 #930399 #931620 #937444 #940946 #954763 #968697 #970083 #971933 #979215 #982783 #983212 #984530 #985561 #988065 #989056 #993832 Cross-References: CVE-2015-1350 CVE-2016-10044 CVE-2016-10200 CVE-2016-10208 CVE-2016-2117 CVE-2016-3070 CVE-2016-5243 CVE-2016-7117 CVE-2016-9191 CVE-2016-9588 CVE-2016-9604 CVE-2017-2647 CVE-2017-2671 CVE-2017-5669 CVE-2017-5897 CVE-2017-5986 CVE-2017-6074 CVE-2017-6214 CVE-2017-6345 CVE-2017-6346 CVE-2017-6348 CVE-2017-6353 CVE-2017-6951 CVE-2017-7187 CVE-2017-7261 CVE-2017-7294 CVE-2017-7308 CVE-2017-7616 CVE-2017-7645 CVE-2017-8106 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Module for Public Cloud 12 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 30 vulnerabilities and has 72 fixes is now available. Description: The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive various security and bugfixes. Notable new/improved features: - Improved support for Hyper-V - Support for the tcp_westwood TCP scheduling algorithm The following security bugs were fixed: - CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877). - CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type. (bsc#1029850). - CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. (bsc#1030593) - CVE-2016-9604: This fixes handling of keyrings starting with '.' in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings (bsc#1035576) - CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. (bnc#1033336). - CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670). - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579) - CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003) - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440) - CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052) - CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213) - CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bsc#1015703). - CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914). - CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415) - CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377). - CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bsc#1023762). - CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235). - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024) - CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842) - CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178). - CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992). - CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacts with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215). - CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212). - CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190) - CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189) - CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066) - CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235). - CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722) - CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697) - CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bsc#914939). - CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003077). The following non-security bugs were fixed: - ACPI / APEI: Fix NMI notification handling (bsc#917630). - arch: Mass conversion of smp_mb__*() (bsc#1020795). - asm-generic: add __smp_xxx wrappers (bsc#1020795). - block: remove struct request buffer member (bsc#1020795). - block: submit_bio_wait() conversions (bsc#1020795). - bonding: Advertize vxlan offload features when supported (bsc#1009682). - bonding: handle more gso types (bsc#1009682). - bonding: use the correct ether type for alb (bsc#1028595). - btrfs: allow unlink to exceed subvolume quota (bsc#1015821). - btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821). - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100). - btrfs: make file clone aware of fatal signals (bsc#1015787). - btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821). - cancel the setfilesize transation when io error happen (bsc#1028648). - cgroup: remove stray references to css_id (bsc#1020795). - cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state (bnc#1023164). - dm: add era target (bsc#1020795). - dm: allow remove to be deferred (bsc#1020795). - dm bitset: only flush the current word if it has been dirtied (bsc#1020795). - dm btree: add dm_btree_find_lowest_key (bsc#1020795). - dm cache: actually resize cache (bsc#1020795). - dm cache: add block sizes and total cache blocks to status output (bsc#1020795). - dm cache: add cache block invalidation support (bsc#1020795). - dm cache: add passthrough mode (bsc#1020795). - dm cache: add policy name to status output (bsc#1020795). - dm cache: add remove_cblock method to policy interface (bsc#1020795). - dm cache: be much more aggressive about promoting writes to discarded blocks (bsc#1020795). - dm cache: cache shrinking support (bsc#1020795). - dm cache: do not add migration to completed list before unhooking bio (bsc#1020795). - dm cache: fix a lock-inversion (bsc#1020795). - dm cache: fix truncation bug when mapping I/O to more than 2TB fast device (bsc#1020795). - dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795). - dm cache: improve efficiency of quiescing flag management (bsc#1020795). - dm cache: io destined for the cache device can now serve as tick bios (bsc#1020795). - dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795). - dm cache metadata: check the metadata version when reading the superblock (bsc#1020795). - dm cache metadata: return bool from __superblock_all_zeroes (bsc#1020795). - dm cache: move hook_info into common portion of per_bio_data structure (bsc#1020795). - dm cache: optimize commit_if_needed (bsc#1020795). - dm cache policy mq: a few small fixes (bsc#1020795). - dm cache policy mq: fix promotions to occur as expected (bsc#1020795). - dm cache policy mq: implement writeback_work() and mq_{set,clear}_dirty() (bsc#1020795). - dm cache policy mq: introduce three promotion threshold tunables (bsc#1020795). - dm cache policy mq: protect residency method with existing mutex (bsc#1020795). - dm cache policy mq: reduce memory requirements (bsc#1020795). - dm cache policy mq: use list_del_init instead of list_del + INIT_LIST_HEAD (bsc#1020795). - dm cache policy: remove return from void policy_remove_mapping (bsc#1020795). - dm cache: promotion optimisation for writes (bsc#1020795). - dm cache: resolve small nits and improve Documentation (bsc#1020795). - dm cache: return -EINVAL if the user specifies unknown cache policy (bsc#1020795). - dm cache: use cell_defer() boolean argument consistently (bsc#1020795). - dm: change sector_count member in clone_info from sector_t to unsigned (bsc#1020795). - dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795). - dm crypt: properly handle extra key string in initialization (bsc#1020795). - dm delay: use per-bio data instead of a mempool and slab cache (bsc#1020795). - dm: fix Kconfig indentation (bsc#1020795). - dm: fix Kconfig menu indentation (bsc#1020795). - dm: make dm_table_alloc_md_mempools static (bsc#1020795). - dm mpath: do not call pg_init when it is already running (bsc#1020795). - dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795). - dm mpath: print more useful warnings in multipath_message() (bsc#1020795). - dm mpath: push back requests instead of queueing (bsc#1020795). - dm mpath: really fix lockdep warning (bsc#1020795). - dm mpath: reduce memory pressure when requeuing (bsc#1020795). - dm mpath: remove extra nesting in map function (bsc#1020795). - dm mpath: remove map_io() (bsc#1020795). - dm mpath: remove process_queued_ios() (bsc#1020795). - dm mpath: requeue I/O during pg_init (bsc#1020795). - dm persistent data: cleanup dm-thin specific references in text (bsc#1020795). - dm snapshot: call destroy_work_on_stack() to pair with INIT_WORK_ONSTACK() (bsc#1020795). - dm snapshot: fix metadata corruption (bsc#1020795). - dm snapshot: prepare for switch to using dm-bufio (bsc#1020795). - dm snapshot: use dm-bufio (bsc#1020795). - dm snapshot: use dm-bufio prefetch (bsc#1020795). - dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795). - dm space map disk: optimise sm_disk_dec_block (bsc#1020795). - dm space map metadata: limit errors in sm_metadata_new_block (bsc#1020795). - dm: stop using bi_private (bsc#1020795). - dm table: add dm_table_run_md_queue_async (bsc#1020795). - dm table: print error on preresume failure (bsc#1020795). - dm table: remove unused buggy code that extends the targets array (bsc#1020795). - dm thin: add error_if_no_space feature (bsc#1020795). - dm thin: add mappings to end of prepared_* lists (bsc#1020795). - dm thin: add 'no_space_timeout' dm-thin-pool module param (bsc#1020795). - dm thin: add timeout to stop out-of-data-space mode holding IO forever (bsc#1020795). - dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode (bsc#1020795). - dm thin: allow metadata space larger than supported to go unused (bsc#1020795). - dm thin: cleanup and improve no space handling (bsc#1020795). - dm thin: eliminate the no_free_space flag (bsc#1020795). - dm thin: ensure user takes action to validate data and metadata consistency (bsc#1020795). - dm thin: factor out check_low_water_mark and use bools (bsc#1020795). - dm thin: fix deadlock in __requeue_bio_list (bsc#1020795). - dm thin: fix noflush suspend IO queueing (bsc#1020795). - dm thin: fix out of data space handling (bsc#1020795). - dm thin: fix pool feature parsing (bsc#1020795). - dm thin: fix rcu_read_lock being held in code that can sleep (bsc#1020795). - dm thin: handle metadata failures more consistently (bsc#1020795). - dm thin: irqsave must always be used with the pool->lock spinlock (bsc#1020795). - dm thin: log info when growing the data or metadata device (bsc#1020795). - dm thin: requeue bios to DM core if no_free_space and in read-only mode (bsc#1020795). - dm thin: return error from alloc_data_block if pool is not in write mode (bsc#1020795). - dm thin: simplify pool_is_congested (bsc#1020795). - dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795). - dm thin: synchronize the pool mode during suspend (bsc#1020795). - dm thin: use bool rather than unsigned for flags in structures (bsc#1020795). - dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning (bsc#1020795). - dm thin: use per thin device deferred bio lists (bsc#1020795). - dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind (bsc#1020795). - drm/i915: relax uncritical udelay_range() (bsc#1038261). - ether: add loopback type ETH_P_LOOPBACK (bsc#1028595). - ext4: fix bh leak on error paths in ext4_rename() and ext4_cross_rename() (bsc#1012985). - ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986). - ext4: mark inode dirty after converting inline directory (bsc#1012985). - ftrace: Make ftrace_location_range() global (FATE#322421). - HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080). - hv: util: catch allocation errors - hv: utils: use memdup_user in hvt_op_write - hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344). - i40e: avoid null pointer dereference (bsc#922853). - i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561). - i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561). - i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561). - i40e: Impose a lower limit on gso size (bsc#985561). - i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561). - iommu/vt-d: Flush old iommu caches for kdump when the device gets context mapped (bsc#1023824). - iommu/vt-d: Tylersburg isoch identity map check is done too late (bsc#1032125). - ipv6: make ECMP route replacement less greedy (bsc#930399). - kabi: hide changes in struct sk_buff (bsc#1009682). - KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421). - kABI: mask struct xfs_icdinode change (bsc#1024788). - kABI: protect struct inet6_dev (kabi). - kABI: protect struct iscsi_conn (bsc#103470). - kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508). - kABI: restore can_rx_register parameters (kabi). - kernel/watchdog: use nmi registers snapshot in hardlockup handler (bsc#940946, bsc#937444). - kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662). - kgr/module: make a taint flag module-specific - kgr: remove unneeded kgr_needs_lazy_migration() s390x definition - l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415). - l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415). - l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415). - l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415). - l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415). - l2tp: lock socket before checking flags in connect() (bsc#1028415). - livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421). - locking/semaphore: Add down_interruptible_timeout() (bsc#1031662). - md: avoid oops on unload if some process is in poll or select (bsc#1020795). - md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795). - md: ensure metadata is writen after raid level change (bsc#1020795). - md linear: fix a race between linear_add() and linear_congested() (bsc#1018446). - md: md_clear_badblocks should return an error code on failure (bsc#1020795). - md: refuse to change shape of array if it is active but read-only (bsc#1020795). - megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207). - megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933). - mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118). - mm, memcg: do not retry precharge charges (bnc#1022559). - mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620). - mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842). - module: move add_taint_module() to a header file - net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682). - net: add skb_pop_rcv_encapsulation (bsc#1009682). - net: Call skb_checksum_init in IPv4 (bsc#1009682). - net: Call skb_checksum_init in IPv6 (bsc#1009682). - netfilter: allow logging fron non-init netns (bsc#970083). - net: Generalize checksum_init functions (bsc#1009682). - net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682). - NFS: do not try to cross a mountpount when there isn't one there (bsc#1028041). - NFS: Expedite unmount of NFS auto-mounts (bnc#1025802). - NFS: Fix a performance regression in readdir (bsc#857926). - NFS: flush out dirty data on file fput() (bsc#1021762). - ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1012985). - powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895). - powerpc: Create a helper for getting the kernel toc value (FATE#322421). - powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971). - powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141). - powerpc/fadump: Update fadump documentation (bsc#1032141). - powerpc/ftrace: Add Kconfig & Make glue for mprofile-kernel (FATE#322421). - powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421). - powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421). - powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421). - powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421). - powerpc/kgraft: Add kgraft header (FATE#322421). - powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421). - powerpc/kgraft: Add live patching support on ppc64le (FATE#322421). - powerpc/module: Create a special stub for ftrace_caller() (FATE#322421). - powerpc/module: Mark module stubs with a magic value (FATE#322421). - powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421). - powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421). - powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530). - powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164). - powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation (bnc#1023164). - powerpc: Reject binutils 2.24 when building little endian (boo#1028895). - RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1020048). - raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang - remove mpath patches from dmcache backport, for bsc#1035738 - revert "procfs: mark thread stack correctly in proc/PID/maps" (bnc#1030901). - Revert "RDMA/core: Fix incorrect structure packing for booleans" (kabi). - rtnetlink: allow to register ops without ops->setup set (bsc#1021374). - s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506, bsc#1019514). - sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419). - scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345). - scsi: libiscsi: add lock around task lists to fix list corruption regression (bsc#1034700). - scsi: storvsc: fix SRB_STATUS_ABORTED handling - sfc: reduce severity of PIO buffer alloc failures (bsc#1019168). - svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309). - taint/module: Clean up global and module taint flags handling - tcp: abort orphan sockets stalling on zero window probes (bsc#1021913). - thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974). - thp: reduce indentation level in change_huge_pmd() (bnc#1027974). - treewide: fix "distingush" typo (bsc#1020795). - tree-wide: use reinit_completion instead of INIT_COMPLETION (bsc#1020795). - usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros (bsc#1035699). - usb: host: xhci: print correct command ring address (bnc#1035699). - USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256). - vfs: Do not exchange "short" filenames unconditionally (bsc#1012985). - vfs: split generic splice code from i_mutex locking (bsc#1024788). - vmxnet3: segCnt can be 1 for LRO packets (bsc#988065). - VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752). - vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567). - vxlan: Checksum fixes (bsc#1009682). - vxlan: GRO support at tunnel layer (bsc#1009682). - xen-blkfront: correct maximum segment accounting (bsc#1018263). - xen-blkfront: do not call talk_to_blkback when already connected to blkback. - xen-blkfront: free resources if xlvbd_alloc_gendisk fails. - xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056). - xfs: do not allow di_size with high bit set (bsc#1024234). - xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508). - xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508). - xfs: fix broken multi-fsb buffer logging (bsc#1024081). - xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056). - xfs: Fix lock ordering in splice write (bsc#1024788). - xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888). - xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788). - xfs: pass total block res. as total xfs_bmapi_write() parameter (bsc#1029470). - xfs: replace global xfslogd wq with per-mount wq (bsc#1024508). - xfs: track and serialize in-flight async buffers against unmount (bsc#1024508). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2017-831=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-831=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-831=1 - SUSE Linux Enterprise Module for Public Cloud 12: zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2017-831=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-831=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-831=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): kernel-default-debuginfo-3.12.74-60.64.40.1 kernel-default-debugsource-3.12.74-60.64.40.1 kernel-default-extra-3.12.74-60.64.40.1 kernel-default-extra-debuginfo-3.12.74-60.64.40.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): kernel-obs-build-3.12.74-60.64.40.1 kernel-obs-build-debugsource-3.12.74-60.64.40.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (noarch): kernel-docs-3.12.74-60.64.40.4 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): kernel-default-3.12.74-60.64.40.1 kernel-default-base-3.12.74-60.64.40.1 kernel-default-base-debuginfo-3.12.74-60.64.40.1 kernel-default-debuginfo-3.12.74-60.64.40.1 kernel-default-debugsource-3.12.74-60.64.40.1 kernel-default-devel-3.12.74-60.64.40.1 kernel-syms-3.12.74-60.64.40.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): kernel-devel-3.12.74-60.64.40.1 kernel-macros-3.12.74-60.64.40.1 kernel-source-3.12.74-60.64.40.1 - SUSE Linux Enterprise Server 12-SP1 (x86_64): kernel-xen-3.12.74-60.64.40.1 kernel-xen-base-3.12.74-60.64.40.1 kernel-xen-base-debuginfo-3.12.74-60.64.40.1 kernel-xen-debuginfo-3.12.74-60.64.40.1 kernel-xen-debugsource-3.12.74-60.64.40.1 kernel-xen-devel-3.12.74-60.64.40.1 - SUSE Linux Enterprise Server 12-SP1 (s390x): kernel-default-man-3.12.74-60.64.40.1 - SUSE Linux Enterprise Module for Public Cloud 12 (x86_64): kernel-ec2-3.12.74-60.64.40.1 kernel-ec2-debuginfo-3.12.74-60.64.40.1 kernel-ec2-debugsource-3.12.74-60.64.40.1 kernel-ec2-devel-3.12.74-60.64.40.1 kernel-ec2-extra-3.12.74-60.64.40.1 kernel-ec2-extra-debuginfo-3.12.74-60.64.40.1 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_74-60_64_40-default-1-4.1 kgraft-patch-3_12_74-60_64_40-xen-1-4.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): kernel-default-3.12.74-60.64.40.1 kernel-default-debuginfo-3.12.74-60.64.40.1 kernel-default-debugsource-3.12.74-60.64.40.1 kernel-default-devel-3.12.74-60.64.40.1 kernel-default-extra-3.12.74-60.64.40.1 kernel-default-extra-debuginfo-3.12.74-60.64.40.1 kernel-syms-3.12.74-60.64.40.1 kernel-xen-3.12.74-60.64.40.1 kernel-xen-debuginfo-3.12.74-60.64.40.1 kernel-xen-debugsource-3.12.74-60.64.40.1 kernel-xen-devel-3.12.74-60.64.40.1 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): kernel-devel-3.12.74-60.64.40.1 kernel-macros-3.12.74-60.64.40.1 kernel-source-3.12.74-60.64.40.1 References: https://www.suse.com/security/cve/CVE-2015-1350.html https://www.suse.com/security/cve/CVE-2016-10044.html https://www.suse.com/security/cve/CVE-2016-10200.html https://www.suse.com/security/cve/CVE-2016-10208.html https://www.suse.com/security/cve/CVE-2016-2117.html https://www.suse.com/security/cve/CVE-2016-3070.html https://www.suse.com/security/cve/CVE-2016-5243.html https://www.suse.com/security/cve/CVE-2016-7117.html https://www.suse.com/security/cve/CVE-2016-9191.html https://www.suse.com/security/cve/CVE-2016-9588.html https://www.suse.com/security/cve/CVE-2016-9604.html https://www.suse.com/security/cve/CVE-2017-2647.html https://www.suse.com/security/cve/CVE-2017-2671.html https://www.suse.com/security/cve/CVE-2017-5669.html https://www.suse.com/security/cve/CVE-2017-5897.html https://www.suse.com/security/cve/CVE-2017-5986.html https://www.suse.com/security/cve/CVE-2017-6074.html https://www.suse.com/security/cve/CVE-2017-6214.html https://www.suse.com/security/cve/CVE-2017-6345.html https://www.suse.com/security/cve/CVE-2017-6346.html https://www.suse.com/security/cve/CVE-2017-6348.html https://www.suse.com/security/cve/CVE-2017-6353.html https://www.suse.com/security/cve/CVE-2017-6951.html https://www.suse.com/security/cve/CVE-2017-7187.html https://www.suse.com/security/cve/CVE-2017-7261.html https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://www.suse.com/security/cve/CVE-2017-7616.html https://www.suse.com/security/cve/CVE-2017-7645.html https://www.suse.com/security/cve/CVE-2017-8106.html https://bugzilla.suse.com/1003077 https://bugzilla.suse.com/1008842 https://bugzilla.suse.com/1009682 https://bugzilla.suse.com/1012620 https://bugzilla.suse.com/1012985 https://bugzilla.suse.com/1015703 https://bugzilla.suse.com/1015787 https://bugzilla.suse.com/1015821 https://bugzilla.suse.com/1017512 https://bugzilla.suse.com/1018100 https://bugzilla.suse.com/1018263 https://bugzilla.suse.com/1018419 https://bugzilla.suse.com/1018446 https://bugzilla.suse.com/1019168 https://bugzilla.suse.com/1019514 https://bugzilla.suse.com/1020048 https://bugzilla.suse.com/1020795 https://bugzilla.suse.com/1021256 https://bugzilla.suse.com/1021374 https://bugzilla.suse.com/1021762 https://bugzilla.suse.com/1021913 https://bugzilla.suse.com/1022559 https://bugzilla.suse.com/1022971 https://bugzilla.suse.com/1023164 https://bugzilla.suse.com/1023207 https://bugzilla.suse.com/1023377 https://bugzilla.suse.com/1023762 https://bugzilla.suse.com/1023824 https://bugzilla.suse.com/1023888 https://bugzilla.suse.com/1023992 https://bugzilla.suse.com/1024081 https://bugzilla.suse.com/1024234 https://bugzilla.suse.com/1024309 https://bugzilla.suse.com/1024508 https://bugzilla.suse.com/1024788 https://bugzilla.suse.com/1025039 https://bugzilla.suse.com/1025235 https://bugzilla.suse.com/1025354 https://bugzilla.suse.com/1025802 https://bugzilla.suse.com/1026024 https://bugzilla.suse.com/1026722 https://bugzilla.suse.com/1026914 https://bugzilla.suse.com/1027066 https://bugzilla.suse.com/1027178 https://bugzilla.suse.com/1027189 https://bugzilla.suse.com/1027190 https://bugzilla.suse.com/1027974 https://bugzilla.suse.com/1028041 https://bugzilla.suse.com/1028415 https://bugzilla.suse.com/1028595 https://bugzilla.suse.com/1028648 https://bugzilla.suse.com/1028895 https://bugzilla.suse.com/1029470 https://bugzilla.suse.com/1029850 https://bugzilla.suse.com/1029986 https://bugzilla.suse.com/1030118 https://bugzilla.suse.com/1030213 https://bugzilla.suse.com/1030593 https://bugzilla.suse.com/1030901 https://bugzilla.suse.com/1031003 https://bugzilla.suse.com/1031052 https://bugzilla.suse.com/1031080 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031567 https://bugzilla.suse.com/1031579 https://bugzilla.suse.com/1031662 https://bugzilla.suse.com/1031842 https://bugzilla.suse.com/1032125 https://bugzilla.suse.com/1032141 https://bugzilla.suse.com/1032344 https://bugzilla.suse.com/1032345 https://bugzilla.suse.com/1033336 https://bugzilla.suse.com/1034670 https://bugzilla.suse.com/103470 https://bugzilla.suse.com/1034700 https://bugzilla.suse.com/1035576 https://bugzilla.suse.com/1035699 https://bugzilla.suse.com/1035738 https://bugzilla.suse.com/1035877 https://bugzilla.suse.com/1036752 https://bugzilla.suse.com/1038261 https://bugzilla.suse.com/799133 https://bugzilla.suse.com/857926 https://bugzilla.suse.com/914939 https://bugzilla.suse.com/917630 https://bugzilla.suse.com/922853 https://bugzilla.suse.com/930399 https://bugzilla.suse.com/931620 https://bugzilla.suse.com/937444 https://bugzilla.suse.com/940946 https://bugzilla.suse.com/954763 https://bugzilla.suse.com/968697 https://bugzilla.suse.com/970083 https://bugzilla.suse.com/971933 https://bugzilla.suse.com/979215 https://bugzilla.suse.com/982783 https://bugzilla.suse.com/983212 https://bugzilla.suse.com/984530 https://bugzilla.suse.com/985561 https://bugzilla.suse.com/988065 https://bugzilla.suse.com/989056 https://bugzilla.suse.com/993832 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
-------- NZXT AER F120 AND F140 COOLING FANS REVIEW ( -at -) APH NETWORKS ----------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: NZXT Aer F120 and F140 Cooling Fans Review ( -at -) APH Networks * Description: The NZXT Aer F may not take my breath away, but they are a capable and aesthetically customizable set of fans. * Link: http://aphnetworks.com/reviews/nzxt-aer-f120-and-f140 * Image: http://aphnetworks.com/review/nzxt-aer-f120-and-f140/003.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
-
ID-Cooling FrostFlow 240L AIO Review ------------------------------------------------------------ http://mailchi.mp/kitguru/id-cooling-frostflow-240l-aio-review?e=872093acb5 http://www.kitguru.net ID-Cooling FrostFlow 240L AIO Review While you might not have heard of ID-Cooling, the company is targeting the mainstream all-in-one cooler market with its FrostFlow 240L. A big part of its appeal is undoubtedly the price – at £79.99, it is not ‘cheap’ but is definitely more affordable than a lot of other AIOs currently on the market. Can it justify the price with solid performance? Read the review here: https://www.kitguru.net/components/cooling/dominic-moass/id-cooling-frostflow-240l-aio-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=43e0ab7437&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
A news post would be great. OCC has published a review on the ASUS ROG Strix X99 Gaming Here is a quote from the review: Quote: â€ÂWhat sets the ROG Strix X99 Gaming apart from other motherboards is the broad swath of features that you get with the board. As a gaming-centric board, the whole of the feature set is geared toward the gaming experience. Starting with the hardware level build out on the board, you have ESD Guards to prevent inbound current spikes from damaging the board. Gamer's Guardian is a set of hardware level protections, including ASUS SafeSlot, ASUS' excellent Digi+ VRM, Q-Code diagnostic display, Supreme FX Sound, Q-Dimm slots with DRAM overvoltage protection, and the RGB LED lit PCIe Q-Slots. RGB lighting is all the rage now and ASUS is ready to support this feature set with AURA controlled RGB LED headers on board. Using AURA, you have the ability to manage attached RGB accessories.†Title: ASUS ROG Strix X99 Gaming Review Link: http://www.overclockersclub.com/reviews/asus_rog_strix_x99_gaming/ Img: http://www.overclockersclub.com/siteimages/articles/asus_rog_strix_x99_gaming/7_thumb.jpg
-
[security-announce] openSUSE-SU-2017:1343-1: important: Security update for smb4k
news posted a topic in Upcoming News
openSUSE Security Update: Security update for smb4k ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1343-1 Rating: important References: #1036245 Cross-References: CVE-2017-8849 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for smb4k fixes the following issues: - Disabled dbus service and polkit rules, because this version of smb4k has a local root exploit issue (boo#1036245, CVE-2017-8849). Automatic mounting will no longer be possible to work around this security issue. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-595=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): smb4k-1.2.1-3.3.1 smb4k-debuginfo-1.2.1-3.3.1 smb4k-debugsource-1.2.1-3.3.1 smb4k-doc-1.2.1-3.3.1 - openSUSE Leap 42.2 (noarch): smb4k-lang-1.2.1-3.3.1 References: https://www.suse.com/security/cve/CVE-2017-8849.html https://bugzilla.suse.com/1036245 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
Corsair is throwing its hat into the NVMe SSD ring with the Force Series MP500 drive. We subjected this gumstick to our testing gauntlet to see how well the 240GB version fares against the rest of the formidable NVMe field. Read more: http://techreport.com/review/31901/corsair-force-mp500-240gb-nvme-ssd-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Palit GTX 1050 Ti KalmX 4 GB Link: https://www.techpowerup.com/reviews/Palit/GeForce_GTX_1050_Ti_KalmX Brief: Palit's GeForce GTX 1050 Ti KalmX is the fastest passively cooled graphics card on the market. It also runs on PCI-Express slot power only, no additional power connector is needed, which makes the card an excellent candidate for a media PC or quiet small-form-factor system.
-
[security-announce] SUSE-SU-2017:1328-1: important: Security update for rpcbind
news posted a topic in Upcoming News
SUSE Security Update: Security update for rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1328-1 Rating: important References: #1037559 Cross-References: CVE-2017-8779 Affected Products: SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Desktop 12-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for rpcbind fixes the following issues: - CVE-2017-8779: A crafted UDP package could lead rcpbind to remote denial-of-service (bsc#1037559) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-803=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-803=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-803=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): rpcbind-0.2.3-23.1 rpcbind-debuginfo-0.2.3-23.1 rpcbind-debugsource-0.2.3-23.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): rpcbind-0.2.3-23.1 rpcbind-debuginfo-0.2.3-23.1 rpcbind-debugsource-0.2.3-23.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): rpcbind-0.2.3-23.1 rpcbind-debuginfo-0.2.3-23.1 rpcbind-debugsource-0.2.3-23.1 References: https://www.suse.com/security/cve/CVE-2017-8779.html https://bugzilla.suse.com/1037559 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
[security-announce] SUSE-SU-2017:1336-1: important: Security update for rpcbind
news posted a topic in Upcoming News
SUSE Security Update: Security update for rpcbind ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1336-1 Rating: important References: #1037559 Cross-References: CVE-2017-8779 Affected Products: SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for rpcbind fixes the following issues: - CVE-2017-8779: A crafted UDP package could lead rcpbind to remote denial-of-service (bsc#1037559) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-804=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-804=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): rpcbind-0.2.1_rc4-17.3.1 rpcbind-debuginfo-0.2.1_rc4-17.3.1 rpcbind-debugsource-0.2.1_rc4-17.3.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): rpcbind-0.2.1_rc4-17.3.1 rpcbind-debuginfo-0.2.1_rc4-17.3.1 rpcbind-debugsource-0.2.1_rc4-17.3.1 References: https://www.suse.com/security/cve/CVE-2017-8779.html https://bugzilla.suse.com/1037559 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org